Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and device for controlling access of user equipment

A technology of user equipment and equipment, applied in the field of communication, can solve problems such as the inability to control UE access to the network, and achieve the effect of reducing national information security risks

Active Publication Date: 2014-11-19
DATANG MOBILE COMM EQUIP CO LTD
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since some UEs do not have clear requirements for TA reporting, there is a certain proportion of UEs that do not report TAs in actual operation. Therefore, the existing technology cannot control access to the network for UEs that do not report TAs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for controlling access of user equipment
  • Method and device for controlling access of user equipment
  • Method and device for controlling access of user equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Embodiments of the present invention provide a method and device for controlling user equipment access, which are used to control whether all UEs can access the network, thereby reducing the illegal access network caused by UEs that do not report TA. national information security risks.

[0048] In the embodiment of the present invention, by comparing the receiving uplink synchronization timing offset reported by the base station with the preset synchronization timing offset threshold value, it is determined whether the UE is connected to the network, thereby realizing the monitoring of whether all UEs can access the network Control, which solves the problem of illegal access to the network abroad for UEs that do not report TA, and determines whether the UE is allowed to access the network before service access, thereby avoiding the release of the illegal access UE after access and business , reducing the hidden dangers of national information security caused by UE's il...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for controlling the access of user equipment, is used for realizing the control on the state whether all the user equipment can access to a network or not, and can reduce national information security hazards caused by the fact that user equipment failing at reporting time advance access to a network illegally overseas. The method comprises the following steps: firstly, receiving the reception uplink synchronization timing offset in an RACH (Random Access Channel) reported by a base station, wherein the reception uplink synchronization timing offset is determined through the uplink data reported by the base station according to UE; secondly, comparing the reception uplink synchronization timing offset in the RACH reported by the base station with a preset synchronization timing offset threshold value, and determining whether the UE accesses to the network or not according to the comparative result.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method and device for controlling user equipment access. Background technique [0002] The network signal covers some overseas areas. For example, the borders of China and other countries are separated by waters ranging from hundreds of meters to several thousand meters. Therefore, it is possible to receive base station signals in the border areas of China in some overseas areas. It may happen that users outside the country can still receive Time Division Synchronized Code Division Multiple Access (TD-SCDMA) signals transmitted by Chinese base stations. If a user outside the country uses a user equipment (User Equipment, UE) that supports TD-SCDMA, he can access the TD-SCDMA network in China through the UE to operate services such as voice, data, and short messages. This phenomenon has caused certain hidden dangers to the user's information security. Therefore, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W48/02
Inventor 李淑玲刘吉凤郭俊利
Owner DATANG MOBILE COMM EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products