Unlock instant, AI-driven research and patent intelligence for your innovation.

Access control method of private base station

A private base station and access control technology, applied in access restriction, electrical components, wireless communication, etc., can solve problems such as rejection, failure to prevent unintended users from providing wireless access services, failure to satisfy private base station users, etc., to achieve Realize the effect of unified management

Inactive Publication Date: 2012-10-10
ZTE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] However, in this case, image 3 The above-mentioned processing flow cannot meet the needs of users of private base stations, because in the above-mentioned processing, it is only through authentication processing that it is judged whether the user requesting access is a legal subscriber, but it cannot be judged whether the user is It is the user that the equipment owner of the private base station expects to access. Therefore, the access of other legal subscribers cannot be rejected based on the actual needs of the private base station user, that is, the access authority of the user cannot be effectively controlled, so it cannot prevent illegal Intended users use private cells to provide wireless access services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method of private base station
  • Access control method of private base station
  • Access control method of private base station

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0048] Example 1: The core network allows terminal access

[0049] In this example, the authentication is performed after the access control operation as an example, that is, after the above step S406, the following processing is further included: the core network authenticates the user according to the core network user identifier, and after the authentication If successful, establish a service for the terminal.

[0050] Such as Figure 5 As shown, it specifically includes the following processing:

[0051] Step 501: the terminal sends a wireless access request to the wireless access network;

[0052] Step 502: the base station (or controller) processes the access request, allocates corresponding wireless resources to the terminal, and establishes a communication connection between the terminal and the wireless access network;

[0053] Step 503: The terminal requests the core network to establish a service, which will carry its own user ID;

[0054] Step 504: The wireless...

example 2

[0062] Example 2: The core network rejects terminal access

[0063] At this time, after the above step S406, the following processing is further included: the core network notifies the terminal to reject the service request, and further notifies the terminal that the reason for the rejection is access control failure; the core network orders the radio access network to release the connection; and the radio access network releases the connection. The radio resource allocated to the terminal before the communication connection is established.

[0064] Such as Image 6 As shown, the specific process is as follows:

[0065] Step 601: the terminal sends a wireless access request to the wireless access network;

[0066] Step 602: the base station or the controller processes the access request, allocates corresponding wireless resources to the terminal, and establishes a communication connection between the terminal and the wireless access network;

[0067] Step 603: The terminal ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access control method of a private base station, comprising steps of: S402, building a communication connection between a terminal and a wireless access network, the terminal sends a service request message to the wireless access network, wherein the service request message carries a user label of the user; S404, the wireless access network transmits the service requestmessage to the core network, and the service request message carries a private region label; S406, the core network processes access control on the terminal according to the user label and the private region label. Adopting the invention, the owner of the private base station can control the access authorities of users, to prevent non-predicted users from using the wireless access service provided by the private region and realize the uniform management of operation enterprises on the contracted user data.

Description

technical field [0001] The present invention relates to a distributed cellular wireless communication system, and in particular, relates to an access control method of a private base station. Background technique [0002] A distributed cellular wireless communication system is composed of terminals, base stations, and a core network (CN) (see figure 1 ), there may also be a base station controller or a distributed network controller between the base station and the core network (see figure 2 ), used to manage the base station and aggregate the connection between the base station and the core network. The network composed of base stations and network controllers is called the radio access network (RAN), which is responsible for access layer affairs, such as the management of radio resources. Each base station or network controller can be connected to one or more core networks. The core network is responsible for non-access stratum affairs, such as mobility management. A ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W48/08H04W12/06H04W12/08
Inventor 王继承
Owner ZTE CORP