Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User access method and system, user management method and system of closed user group

An access method and user technology, applied in the communication field, can solve problems such as exposing user privacy

Active Publication Date: 2010-12-08
南通东湖国际商务服务有限公司
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the access gateway and the AAA server may belong to different operators, passing the real user ID to the access gateway in plain text will expose the privacy of the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User access method and system, user management method and system of closed user group
  • User access method and system, user management method and system of closed user group
  • User access method and system, user management method and system of closed user group

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0137] Figure 5 It is a flow chart of the first embodiment of the CSG member management method of the present invention; in this embodiment, the user (the owner of the home base station) manages the CSG members of the home base station by operating the home base station, and the user data server generates the SIS; like Figure 5 As shown, the method includes the following steps:

[0138] Step 501: The HNB accesses the mobile communication network, generally including the following sub-steps:

[0139] First, the femto base station discovers the security gateway it needs to connect to and establishes a security channel with the security gateway;

[0140] Secondly, with the participation of the AAA server of the home base station, mutual authentication is performed between the home base station and the mobile communication network connected to it;

[0141] Finally, the HNB interacts with the network to obtain a series of parameters required for the HNB initialization, and com...

Embodiment 2

[0176] Figure 6 It is a flow chart of the second embodiment of the CSG member management method of the present invention; in this embodiment, the user (the owner of the home base station) manages the CSG members of the home base station by operating the home base station, and the home base station generates an SIS; as Figure 6 As shown, the method includes the following steps:

[0177] Step 601: Same as step 501.

[0178] Step 602: As described in step 502, the HNB receives a request to add the terminal user to its CSG member, for example, the owner of the HNB adds the terminal user to the CSG member of the HNB through the management interface on the HNB .

[0179] In this step, after receiving the above request, the HNB also needs to generate a parameter SIS for the terminal user.

[0180] The HNB may check the values ​​of all SIS recorded locally, and then generate a new SIS different from these SIS as the parameter SIS.

[0181] In addition, the HNB may also directly ...

Embodiment 3

[0193] Figure 7 It is a flowchart of the third embodiment of the CSG member management method of the present invention; in this embodiment, the user (the owner of the home base station) manages the CSG members of the home base station through the user data server (for example, the owner of the home base station through Call the operator to request to add the end user to the CSG member of the femtocell it owns), and the SIS is generated by the user data server; as Figure 7 As shown, the method includes the following steps:

[0194] Step 701: same as step 501.

[0195] Step 702: The user data server receives a request to add the terminal user as a CSG member of the HNB.

[0196] The above request includes at least the HNB ID and the real user ID of the terminal user.

[0197] In addition, the above request may also include attribute parameters of the terminal used by the terminal user, such as the MAC address of the terminal, the MSID of the terminal, and the like.

[0198...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user access method and a user access system, a user management method and a user management system of a closed user group. The user access method comprises the following steps that: a terminal transmits a user identifier response message to an access gateway through a home base station after receiving a user identifier request transmitted from the access gateway, wherein the message carries a pseudo identifier of a terminal user; the access gateway transmits the pseudo identifier to an authentication, authorization and accounting (AAA) server; the AAA server initiates an authentication flow of the terminal user by using the pseudo identifier and acquires an actual user identifier of the terminal user in the authentication flow; and the AAA server transmits the actual user identifier or a user identifier code corresponding to the actual user identifier to the home base station through the access gateway.

Description

technical field [0001] The present invention relates to the communication field, in particular to a user access method and system, and a closed user group user management method and system. Background technique [0002] In order to provide users with a higher service rate and reduce the cost of using high-speed services, and at the same time, in order to make up for the lack of coverage of existing distributed cellular wireless communication systems, femto base stations are usually set up in homes, office areas and other places. A femto base station is a small, low-power base station with the advantages of affordability, convenience, and low power output. [0003] figure 1 and figure 2 is a schematic diagram of a communication network including a femtocell. like figure 1 and figure 2 As shown, the femto base station can access the core network through the logical network element of the access gateway. [0004] A security gateway may exist between the femtocell and th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/08H04W12/06H04W28/16H04W48/02
CPCH04W48/02H04W84/045
Inventor 骆文周娜霍玉臻
Owner 南通东湖国际商务服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products