Method for household base station access control

A technology of access control and home base station, applied in access restriction, wireless communication, transmission system, etc., can solve problems such as no solution, user deletion, etc.

Inactive Publication Date: 2009-04-01
HUAWEI TECH CO LTD
View PDF0 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, how to use the above access control list to restrict the UE accessing HNB, how to add the user to the access control list, how to delete the user from the access control list, and how to use MS-ISDN to configure the access control list, etc. , there is no relevant solution in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for household base station access control
  • Method for household base station access control
  • Method for household base station access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] Embodiment 1 of the present invention provides a method for the HHSS or the HSS to update the access control list of the HNB.

[0023] The first case occurs when the user uses the UE's MS-ISDN to configure the access control list. The HHSS on the network side stores the subscription information of the HNB, including: security information, the identity of the HNB, the identity of the CSG to which the HNB belongs (CSG Identity, CSG ID), and the UE access control list related to each CSG.

[0024] The CSG may include one or more HNBs, and for multiple HNBs, their access control lists may be the same. Therefore, an access control list can be maintained for each CSG on the HHSS, that is, each access control list is identified by a different CSG ID. The HHSS does not need to maintain its access control list for all HNBs belonging to a CSG, it only needs to maintain the access control list of the CSG. Alternatively, an access control list can also be maintained for each HNB ...

Embodiment 2

[0066] Embodiment 2 of the present invention provides a method for performing access control on a UE by using the IMSI or TMSI of the UE and the access control list, including:

[0067] When the UE is in the idle (Idle) state, the access control on the HNB is performed after the radio resource control (Radio Resource Control, RRC) connection is successfully established; when the UE is in the active (Active) state, the access control on the HNB is Followed by a switch request. The HNB acquires UE identity (IMSI or TMSI, etc.) information from the UE, compares it with the access control list stored in the HNB, and judges whether the UE is allowed to access, thereby realizing access control on the UE.

[0068] The IMSI will be used only when the UE performs an initial network attachment (Attach) after the UE is turned on, and the TMSI will be used for communication in the subsequent communication process for the sake of security. Every time the UE is powered off or its location ...

Embodiment 3

[0082] The embodiment of the present invention also provides an HNB for performing access control on the UE, the HNB includes a message sending and receiving module 501, an information storage module 502, and an access control module 503, wherein,

[0083] The message transceiving module 501 is used for receiving the request for modifying the access control list sent by the HHSS or the HSS or the SGSN.

[0084] The request for modifying the access control list above carries the information of the UE required to modify the list, and the information may carry the IMSI and TMSI of the UE, or a new identifier defined by the HHSS for the UE.

[0085] Information storage module 502: for storing access control information, and for updating the information of the information storage module.

[0086] The access control module 503 is configured to perform access control on the UE according to the access control information stored in the information storage module 502 .

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method of accessing a household base station with control, comprising that: HNB receives modified access control list request transmitted by network entity, realizes control on UE access according to the request modified access control list. The invention also discloses a HNB, for storing the access control list, updating the information in the access control list based on modified request, and performing access control on UE. According to the invention, the user conveniently configurates and uses the access control list, thereby realizing access control on UE.

Description

technical field [0001] The present invention relates to a method for access control in the communication field, in particular to a method for access control of a home base station (HomeNodeB, HNB). Background technique [0002] With the vigorous development of Internet (Internet) services and the wide application of broadband access networks and wireless networks, high-speed and convenient access to the network is the goal pursued by people. In order to better utilize the resources of the existing network and protect the cost of network equipment operators, 3GPP started the research work of HNB. HNB refers to a miniaturized small base station for home or office use. It may be completely private, or it may be open to the public with different priorities and permissions. Its ownership belongs to private individuals, not to the government or operation. business; its target users may be a small range of users, it may be a large range of users. Using HNB to implement wireless a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W48/02H04W48/08
CPCH04L63/101
Inventor 刘晓寒黄敏
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products