Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for implementing authentication on user of home base station

A home base station and user technology, applied in transmission systems, electrical components, safety devices, etc., can solve the problems of increased operating burden of base station nodes, inability to guarantee the correctness of user identification, and inability to analyze and obtain user identification information, etc.

Inactive Publication Date: 2010-06-09
ZTE CORP
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0019] It can be seen from the above process that the home base station checks whether the user belongs to the CSG list according to the user ID carried by the terminal (step 205). For example, EAP (Extensible Authentication Protocol, Extensible Authentication Protocol) encapsulation, at this time, the femto base station needs to analyze the authentication encapsulation protocol, which increases the operating burden of the base station node and reduces the efficiency; when the terminal encrypts and transmits the real identity, the femto base station is even more helpless Parse and obtain the user ID information; even if the terminal transmits the user ID in plain text without encapsulating the authentication message, the user ID has not been verified by the authentication and authorization server, so the correctness of the user ID cannot be guaranteed, and frequently used on the air interface Clear text transmission of the user's real identity is easy to be stolen by others, and there is a security risk in the wireless communication system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for implementing authentication on user of home base station
  • System and method for implementing authentication on user of home base station
  • System and method for implementing authentication on user of home base station

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] This embodiment provides a system for authenticating home base station users, such as figure 1 As shown, including: a terminal, a home base station, an access gateway, an authentication and authorization server, and a CSG user server;

[0071] The access gateway is used to send user identification information and home base station information to the authentication and authorization server when the terminal accesses the home base station in closed access mode or hybrid access mode;

[0072] The authentication and authorization server is used to judge whether the user is allowed to access the home base station when the home base station is in the closed access mode, and return the judgment result to the home base station through the access gateway; Determine the user category information when entering the mode, and return the user category information to the home base station through the access gateway.

[0073] The authentication and authorization server is used to judg...

Embodiment 2

[0129] This embodiment provides a system for authenticating home base station users, such as figure 1 As shown, including: a terminal, a home base station, an access gateway, an authentication and authorization server, and a CSG user server;

[0130] The access gateway is used to send the user identification information and the home base station information to the CSG user server through the authentication and authorization server when the terminal accesses the home base station in the closed access mode or the hybrid access mode;

[0131] The CSG user server is used to determine whether the user is allowed to access the home base station when the home base station is in the closed access mode, and returns the judgment result to the home base station through the authentication authorization server and the access gateway; In the access mode, the user category information is determined, and the user category information is returned to the home base station through the authentica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a system and a method for implementing authentication on a user of a home base station. The method comprises the following steps that: in the process of requesting for access to the home base station in a closed access mode or a mixed access mode by a terminal, an access gateway sends user identification information, a home base station identifier and a home base station mode to an authentication and authorization server, or to a user server of a closed user group CSG through the authentication and authorization server; when the home base station is in the closed access mode, the authentication and authorization server or the CSG user server judges whether to allow the user to access the home base station or not and returns a judgment result to the home base station through the access gateway; and when the home base station is in the mixed access mode, the authentication and authorization server or the user server of the closed user group CSG determines user type information and returns the type information to the home base station through the access gateway. The system and the method can avoid transferring a real user identifier frequently at a hollow port, and reduce the burden of the home base station and the potential safety hazard of the home base station.

Description

technical field [0001] The present invention relates to the field of mobile communication, in particular to a system and method for implementing authentication on home base station users. Background technique [0002] Home base stations are small, low-power base stations that are deployed in indoor places such as homes and offices. Insufficient coverage of cellular wireless communication systems. The advantages of femto base stations are affordable, convenient, low power output, plug and play, etc. The home base station system has already been implemented in the 3rd Generation Partnership Project (3GPP for short), the 3rd Generation Partnership Project 2 (3GPP2 for short) and the Worldwide Interoperability for Microwave Access (Worldwide Interoperability for Microwave Access, referred to as WiMAX) three major standards for research, the network architecture adopted by the femto base station system in each standard organization is basically the same, this article uses WiMAX...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06
CPCH04W12/08H04L63/104H04W12/082
Inventor 霍玉臻周娜
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products