CN101312593B - Access control method of private base station - Google Patents

Access control method of private base station Download PDF

Info

Publication number
CN101312593B
CN101312593B CN200710109307A CN200710109307A CN101312593B CN 101312593 B CN101312593 B CN 101312593B CN 200710109307 A CN200710109307 A CN 200710109307A CN 200710109307 A CN200710109307 A CN 200710109307A CN 101312593 B CN101312593 B CN 101312593B
Authority
CN
China
Prior art keywords
base station
core net
private
terminal
wireless access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN200710109307A
Other languages
Chinese (zh)
Other versions
CN101312593A (en
Inventor
王继承
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN200710109307A priority Critical patent/CN101312593B/en
Publication of CN101312593A publication Critical patent/CN101312593A/en
Application granted granted Critical
Publication of CN101312593B publication Critical patent/CN101312593B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses an access control method of a private base station, comprising steps of: S402, building a communication connection between a terminal and a wireless access network, the terminal sends a service request message to the wireless access network, wherein the service request message carries a user label of the user; S404, the wireless access network transmits the service request message to the core network, and the service request message carries a private region label; S406, the core network processes access control on the terminal according to the user label and the private region label. Adopting the invention, the owner of the private base station can control the access authorities of users, to prevent non-predicted users from using the wireless access service provided by the private region and realize the uniform management of operation enterprises on the contracted user data.

Description

The connection control method of private base station
Technical field
The present invention relates to the distributed cellular wireless telecommunication system, and especially, relate to a kind of connection control method of private base station.
Background technology
Distributed cellular radio communication system will be formed (referring to Fig. 1) by terminal, base station and core net (CN); Between base station and core net, also possibly there are base station controller or distributed network controller (referring to Fig. 2), are used for management of base station and converge the connection of base station to core net.The network that base station and network controller are formed is called wireless access network (RAN), is responsible for the Access Layer affairs, such as the management of Radio Resource.Each base station or network controller can be connected with one or more core net.Core net is responsible for the Non-Access Stratum affairs, such as mobile management etc.The terminal be meant can with the equipment of network communication, such as mobile phone, notebook computer, PDA etc.The user at terminal generally needs with wireless communication networks operator signatory, and to obtain the right of the business that the use wireless communication networks provides, the user at terminal can be referred to as the user.
The business of user in order to use wireless communication networks to provide need insert wireless telecommunication system with its terminal that has.General flow at the common cell connecting system is as shown in Figure 3, specifically comprises following processing:
301: the terminal is sent the wireless access request and is given wireless access network;
302: base station or controller are handled the request of access, give the terminal distribution corresponding radio resource, set up the terminal and are connected with communication between the wireless access network;
303: the terminal is set up professional to core network requests, wherein carries the ID of oneself;
304: wireless access network is transmitted the service request at terminal to core net;
305: before core net is given this terminal foundation business, need carry out authentication, judge whether validated user of terminal user according to the ID at terminal; If the disabled user does not then set up business, directly carry out 308;
306: if authentication success in 305 then can be set up business for the user;
307: customer service is finished using, and termination should business;
308: the professional termination, or failed authentication, core net order wireless access network discharges and connects; And
309: wireless access network discharges the Radio Resource of distributing to the terminal.
Wherein, authentication process guarantees as long as the terminal is the contracted user of wireless communication networks operator, the wireless access service that just can use common cell to provide.The terminal user identification that authentication is used can be global mobile user identification (IMSI) or global mobile device number (IMEI), also can be interim temporary transient ID (TMSI) or the temporary transient ID of packet domain (P-TMSI) of distributing of core net.These signs all are responsible for maintenance and management by core net.
On the other hand; In order higher service rate to be provided to the user and to reduce the user and use the required expense of high rate services; Also in order to remedy the deficiency of existing distributed cellular wireless telecommunication system to subscriber household or office's covering, into be easy to carry and install WiMAX access device can be repacked in the base station in wireless communication networks operator, offers the user and is placed on family or office's use simultaneously; That is, as privately owned (or family expenses) base station.
For privately owned (or family expenses) base station, the equipment owner of possible base station does not hope that other-end inserts in this base station, in order to avoid the user of its family or office is impacted, even other-end also is the legal contracted user of this Virtual network operator.
Yet in this case, the described above-mentioned handling process of Fig. 3 can not satisfy private base station user's this demand; This is because in above-mentioned processing; Only judge through authentication process whether the user that request inserts is legal contracted user, and can not judge whether this user is the user of the desired access of equipment owner of private base station, therefore; Can not refuse other legal contracted users' access based on private base station user's actual demand; That is, can not control user's access authority effectively, therefore can not prevent that unexpected user from using private cell that the wireless access service is provided.
Summary of the invention
Consider the access authority that can not control the user effectively that exists in the correlation technique; And can not prevent that unexpected user from using private cell that the problem of wireless access service is provided and make the present invention; For this reason, the present invention aims to provide a kind of connection control method of private base station.
According to embodiments of the invention; A kind of connection control method of private base station is provided; This method comprises following processing: step S402; Between terminal and wireless access network, set up after communication is connected, business request information is sent to wireless access network in the terminal, and in business request information, carries user's ID; Step S404, wireless access network is transmitted business request information to core net, and in business request information, carries the private cell sign; And step S406, core net is implemented access control according to ID and private cell sign to the terminal.
Wherein, private base station is that user installation supplies the individual but not the base station of public's use in private area; The wireless access sub-district of private cell on private base station, disposing.
Here, the private cell sign comprises: the owner of the numbering that the device number of private base station, private base station dispose in core net, the numbering that private cell disposes in core net, private base station is at the Base Station Identification of registers kernel network.Which kind of private cell sign wireless access network and core net consult to use in advance.
In addition, before step S402, further comprise following processing: pre-configured private cell allows all users' of access ID tabulation in the database of core net.
At this moment, in above-mentioned steps S406, the access control that core net is implemented is specially: core net identifies Query Database according to private cell, obtains the ID tabulation of the corresponding private cell of private cell sign; And under the situation of ID in the ID tabulation, core net allows the terminal to insert, otherwise the refusal terminal is inserted.
And, allow in core net under the situation of terminal access, after step S406, further comprise following processing: core net is carried out authentication according to the core net ID to the user, and under the authentication case of successful, is that business is set up at the terminal.
On the other hand, under the situation about inserting at core net refusal terminal, after step S406, further comprise following processing: core net notice terminal refusal service request, and further to notify the terminal Reason For Denial be the access control failure; Core net order wireless access network discharges and connects; And wireless access network is released in and sets up the Radio Resource of distributing to the terminal before communication connects.
In addition, alternatively, before above-mentioned steps S404, core net is carried out authentication according to the core net ID to the user, and under the authentication case of successful, carries out step S404.
Through technique scheme of the present invention; Make the owner of private base station can control user's access authority; Thereby prevented the wireless access service that unexpected user uses private cell to provide, and realized the unified management of operator contracted user's data.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, and illustrative examples of the present invention and explanation thereof are used to explain the present invention, do not constitute improper qualification of the present invention.In the accompanying drawings:
Fig. 1 is the block diagram according to the base station of correlation technique and the direct-connected distributed cellular radio communication system of core net;
Fig. 2 is the block diagram of the distributed cellular radio communication system that is connected with core net through controller according to the base station of correlation technique;
Fig. 3 is the flow chart according to the processing of terminal access service in the wireless telecommunication system of correlation technique;
Fig. 4 is the flow chart according to the connection control method of the private base station of the embodiment of the invention;
Fig. 5 is the detailed process flow chart according to the instance that allows the terminal to insert in the private base station connection control method of the embodiment of the invention; And
Fig. 6 is the flow chart according to section processes in the instance of refusal terminal access in the private base station connection control method of the embodiment of the invention.
Embodiment
Describe embodiments of the invention below with reference to accompanying drawings in detail.
At first, hereinafter, the base station that the public uses that offers of wireless communication networks operator unified plan is referred to as public base station, the wireless access sub-district that on this base station, disposes is referred to as common cell; User installation is supplied the individual in the private area (for example, family or office) but not base station that the public uses is referred to as privately owned (or family expenses) base station, and the wireless access sub-district that on this base station, disposes is referred to as privately owned (or family expenses) sub-district.
In an embodiment of the present invention, a kind of connection control method of private base station is provided, Fig. 4 is the process chart that this method is shown.
Need to prove, before the processing of carrying out Fig. 4, at first need handle as follows: pre-configured private cell allows all users' of access ID tabulation in the database of core net.Wherein, these data record can be that the equipment owner of private base station offers Virtual network operator when obtaining equipment, and the equipment owner of private base station can upgrade these data.Like this, core net can identify Query Database to obtain the user list that this sub-district allows access according to private cell, and then judges whether to allow the terminal to insert.
Above-mentioned private cell sign can comprise: the owner of the numbering that the device number of private base station, private base station dispose in core net, the numbering that private cell disposes in core net, private base station is at the Base Station Identification (for example, being similar to the character string forms of e-mail accounts) of registers kernel network.
Then, carry out following processing as shown in Figure 4:
Step S402 sets up between terminal and wireless access network after communication is connected, and business request information is sent to wireless access network in the terminal, and in business request information, carries user's ID;
Step S404, wireless access network is transmitted business request information to core net, and in business request information, carries the private cell sign; And
Step S406, core net is implemented access control according to ID and private cell sign to the terminal.
Wherein, in above-mentioned steps S404, private cell that wireless access network carries sign can be any of the above private cell sign that provides, and specifically uses which kind of wireless access network ID to be consulted in advance to confirm by core net and wireless access network.In addition, in step S404, specifically can transmit business request information by base station, base station controller or distributed network controller.
In above-mentioned steps S406, the access control that core net is implemented is specially: core net identifies Query Database according to private cell, obtains the ID tabulation of the corresponding private cell of private cell sign; And under the situation of ID in the ID tabulation, core net allows the terminal to insert, otherwise the refusal terminal is inserted.
It should be noted that in addition core net also need be carried out authentication to the user, and only operates under the equal case of successful in authentication operations and above-mentioned access control except implementing access control, could set up professional for the terminal.According to the needs of concrete implementation procedure, authentication operations can be carried out before or after the access control operation of step S404-step S406, that is, the present invention does not have strict restriction for the processing sequence of access control operation and authentication operations.
Particularly, before the access control operation, carry out under the situation of authentication operations, preferably, before step S404, core net is carried out authentication according to ID to the user, and under the authentication case of successful, carries out step S404; After the access control operation, carry out under the situation of authentication operations, after step S406, core net is carried out authentication according to ID to the user, and under the authentication case of successful, for setting up professional in the terminal.
Below will combine instance to specifically describe above-mentioned permission terminal respectively and insert and refuse the processing under two kinds of situation of terminal access.
Instance 1: core net allows the terminal to insert
In this example, be that example describes after the access control operation, to carry out authentication, promptly; After above-mentioned steps S406; Further comprise following processing: core net is carried out authentication according to the core net ID to the user, and under the authentication case of successful, for setting up professional in the terminal.
As shown in Figure 5, specifically comprise following processing:
Step 501: the terminal is sent the wireless access request and is given wireless access network;
Step 502: base station (or controller) handle to insert request, gives the terminal distribution corresponding radio resource, sets up the terminal and is connected with communication between the wireless access network;
Step 503: the terminal is set up professional to core network requests, wherein can carry own user's sign;
Step 504: wireless access network is transmitted the service request at terminal to core net, subsidiary simultaneously private cell sign;
Step 505: before core net allows to this terminal foundation business, need carry out access control to the terminal, judge whether to allow this user to use the service of this private cell according to privately owned (or family expenses) cell ID and ID;
Step 506: before core net allows to this terminal foundation business, need carry out authentication, judge whether validated user according to the ID at terminal;
Step 507: if all successes of the authentication in access control in step 505 and the step 506 then can be set up business for the user;
Step 508: customer service is finished using, and termination should business;
Step 509: the professional termination, core net order wireless access network discharges and connects; And
Step 510: wireless access network discharges the Radio Resource of distributing to the terminal.
Need to prove; Above-mentioned instance only is explanation and exemplary, and through combining description of the invention, those skilled in the art should be easy to expect; Can before step 505, carry out the authentication operations of step 506, and under the authentication case of successful, carry out the subsequent treatment after the step S505.
Instance 2: core net refusal terminal is inserted
At this moment, after above-mentioned steps S406, further comprise following processing: core net notice terminal refusal service request, and further to notify the terminal Reason For Denial be the access control failure; Core net order wireless access network discharges and connects; And wireless access network is released in and sets up the Radio Resource of distributing to the terminal before communication connects.
As shown in Figure 6, detailed process is following:
Step 601: the terminal is sent the wireless access request and is given wireless access network;
Step 602: base station or controller are handled the request of access, give the terminal distribution corresponding radio resource, set up the terminal and are connected with communication between the wireless access network;
Step 603: the terminal is set up professional to core network requests, wherein can carry this user's sign;
Step 604: wireless access network is transmitted the service request at terminal to core net, simultaneously the sign of subsidiary this privately owned (or family expenses) sub-district;
Step 605: before core net allows to this terminal foundation business, need carry out access control to the terminal, judge whether to allow this user to use the service of this private cell according to private cell sign and ID;
Step 606: core net judgement terminal haves no right to insert at this private cell, then notifies terminal traffic request refusal, and Reason For Denial is the access control failure;
Step 607: core net order wireless access network discharges and connects; And
Step 608: wireless access network discharges the Radio Resource of distributing to the terminal.
Equally,, then judge the access of refusal terminal, then need not carrying out authentication owing to access control behaviour among this embodiment organizes if after the access control operation, carry out authentication.
In sum,, make the owner of private base station can control the user and insert authority, prevent the wireless access service that unexpected user uses private cell to provide by means of technical scheme of the present invention; In addition, the present invention is stored in core net through implementing the required data record of access control, has made things convenient for the uniform maintenance of operator to contracted user's data.
The above is merely the preferred embodiments of the present invention, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.All within spirit of the present invention and principle, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (7)

1. the connection control method of a private base station is characterized in that, comprises following processing:
Step S402 sets up between terminal and wireless access network after communication is connected, and business request information is sent to wireless access network in said terminal, and in said business request information, carries user's ID;
Step S404, said wireless access network is transmitted said business request information to core net, and in said business request information, carries the private cell sign; And
Step S406, said core net is implemented access control according to said ID and said private cell sign to said terminal;
Wherein, before said step S402, further comprise following processing: pre-configured private cell allows all users' of access ID tabulation in the database of said core net; In said step S406, the said access control that said core net is implemented is specially: said core net is according to the said database of said private cell sign inquiry, the ID tabulation of obtaining the corresponding private cell of said private cell sign; And under the situation of said ID in said ID tabulation, said core net allows said terminal to insert, otherwise, refuse said terminal and insert.
2. private base station connection control method according to claim 1 is characterized in that, said private base station is that user installation supplies the individual but not the base station of public's use in private area; The wireless access sub-district of said private cell on said private base station, disposing.
3. private base station connection control method according to claim 2; It is characterized in that said private cell sign comprises: the owner of the numbering that the device number of said private base station, said private base station dispose in said core net, the numbering that said private cell disposes in said core net, said private base station is at the Base Station Identification of said registers kernel network.
4. private base station connection control method according to claim 3 is characterized in that, which kind of private cell sign said wireless access network and said core net consult to confirm to use in advance.
5. private base station connection control method according to claim 1 is characterized in that, allows in said core net after said step S406, further to comprise following processing under the situation of said terminal access:
Said core net is carried out authentication according to said ID to said user, and under the authentication case of successful, for setting up professional in said terminal.
6. private base station connection control method according to claim 1 is characterized in that, under the situation of refusing to insert at said terminal in said core net, after said step S406, further comprises following processing:
Said core net is notified said terminal refusal service request, and further to notify said terminal Reason For Denial be the access control failure;
Said core net orders said wireless access network to discharge connection; And
Said wireless access network is released in sets up the Radio Resource of distributing to said terminal before said communication connects.
7. private base station connection control method according to claim 1 is characterized in that, before said step S404, said core net is carried out authentication according to said ID to said user, and under the authentication case of successful, carries out said step S404.
CN200710109307A 2007-05-25 2007-05-25 Access control method of private base station Expired - Fee Related CN101312593B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200710109307A CN101312593B (en) 2007-05-25 2007-05-25 Access control method of private base station

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200710109307A CN101312593B (en) 2007-05-25 2007-05-25 Access control method of private base station

Publications (2)

Publication Number Publication Date
CN101312593A CN101312593A (en) 2008-11-26
CN101312593B true CN101312593B (en) 2012-10-10

Family

ID=40100974

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200710109307A Expired - Fee Related CN101312593B (en) 2007-05-25 2007-05-25 Access control method of private base station

Country Status (1)

Country Link
CN (1) CN101312593B (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101754317B (en) * 2008-12-15 2013-06-05 华为技术有限公司 Method, device and system for routing cell switching information
CN101765216B (en) * 2008-12-23 2012-07-25 大唐移动通信设备有限公司 Method, device and system for controlling subscriber access
CN101778388B (en) * 2009-01-13 2014-06-25 华为技术有限公司 Communication system, access control entity and method for controlling access of user equipment
CN103200631B (en) * 2009-01-19 2016-01-27 华为技术有限公司 The implementation method of switching controls, relevant device and communication system
CN102396263A (en) * 2009-02-13 2012-03-28 三星电子株式会社 Handover method and apparatus in a wireless communication system including femto cells
US20110237250A1 (en) * 2009-06-25 2011-09-29 Qualcomm Incorporated Management of allowed csg list and vplmn-autonomous csg roaming
CN101998562A (en) * 2009-08-26 2011-03-30 中兴通讯股份有限公司 Systems and methods for acquiring access information of user by core network in the switching process
JP4870201B2 (en) * 2009-10-14 2012-02-08 株式会社エヌ・ティ・ティ・ドコモ Mobile communication method and radio base station
CN102098757A (en) * 2011-02-14 2011-06-15 中兴通讯股份有限公司 Method, device and system for controlling user access to network
CN102800083B (en) * 2012-06-19 2014-12-10 中国农业大学 Crop spraying positioning method based on binocular vision gridding partition matching algorithm
WO2014106334A1 (en) * 2013-01-05 2014-07-10 华为技术有限公司 Cell access control method, base station, terminal and system
CN110636587B (en) * 2018-06-22 2022-02-01 维沃移动通信有限公司 Processing method, terminal and network element
CN112312435B (en) * 2020-11-02 2023-06-23 中国联合网络通信集团有限公司 Configuration method and device for connection data of wireless access network equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
3GPP R2,Nokia Siemens Networks.Update on Mobility, Security, Random Access Procedure, etc….《3GPP TSG-RAN2 Meeting #58 R2-072338》.2007, *

Also Published As

Publication number Publication date
CN101312593A (en) 2008-11-26

Similar Documents

Publication Publication Date Title
CN101312593B (en) Access control method of private base station
CN101312592B (en) access control method of private base station
CN101669327B (en) A method and device of accessing control
US7950051B1 (en) Password management for a communication network
CN100473187C (en) Method and equipment for storing subscriber data
CN1281086C (en) User identification module card, method for activating user identification module card in sky and its system
EP2510716B1 (en) Method for automatic provisioning of a sim card
CN101018375B (en) Method for remotely controlling the terminal data
CN101507309B (en) Selective control of user equipment capabilities
EP3582525A1 (en) Implementation and communication methods, apparatus and system of virtual subscriber identity module
CN103139696A (en) Telecommunications network and method for time-based network access
CN100499866C (en) Method and system for supplying sufficient LAI/RAI for switch-in points in universal mobile communication system
CN101027932A (en) Registration of a mobile station in a communication network
CN101291249A (en) Method for configuring and displaying name of household base station, and name of internal customer group
CN101119582A (en) Method and system to subscribe mobile service
CN101313555A (en) Authentication management system and method, authentication management server
CN101155368A (en) Terminal ability information updating system and method
CN101529854A (en) System for controlling access to a service, and corresponding method, control device, and computer programme
US8731566B2 (en) Device and a method for multiple numbers for one user
CN101047506B (en) Management method for terminal equipment starting service in radio communication network
CN101330704A (en) Method and apparatus for implementing network management control
CN101388811A (en) Access control method based on radio access network
CN101610495A (en) A kind of network of user access control and method
CN102143550A (en) System and method for determining that a maximum number of IP sessions have been established
CN100385989C (en) Methods for allocating roaming number and forming visitor location register in mobile network, and mobile network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20121010

Termination date: 20160525

CF01 Termination of patent right due to non-payment of annual fee