WO2015139442A1 - 本地网络访问的控制方法及装置、计算机存储介质 - Google Patents

本地网络访问的控制方法及装置、计算机存储介质 Download PDF

Info

Publication number
WO2015139442A1
WO2015139442A1 PCT/CN2014/087568 CN2014087568W WO2015139442A1 WO 2015139442 A1 WO2015139442 A1 WO 2015139442A1 CN 2014087568 W CN2014087568 W CN 2014087568W WO 2015139442 A1 WO2015139442 A1 WO 2015139442A1
Authority
WO
WIPO (PCT)
Prior art keywords
network connection
connection identifier
network
local
legal
Prior art date
Application number
PCT/CN2014/087568
Other languages
English (en)
French (fr)
Inventor
钟哲英
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2015139442A1 publication Critical patent/WO2015139442A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • the present invention relates to the field of mobile internet technologies of fourth generation mobile communication systems, and in particular, to a local network access control method and apparatus, and a computer storage medium.
  • the LIPA (Local IP Access) technology is based on the HeNB (Home Enhanced Node) network technology.
  • the core technology is that the communication data of the local network can be directly passed by the HeNB without going through the carrier's core network.
  • the communication data of each local network is offloaded to the corresponding destination, thereby reducing the load and transmission cost of the core network.
  • the LIPA technology stipulates that the establishment of the LIPA connection needs to obtain the network side authorization (including the subscription, the carrier configuration, etc.), and the network side authorization control process is mainly performed on the MME (Mobility Management Entity, network node).
  • MME Mobility Management Entity, network node
  • the LIPA technology stipulates in the protocol that the UE (User equipment) can obtain the CSG (closed subscriber group) id of the home base station supporting the LIPA connection in the static configuration, and decide whether to initiate the LIPA connection request according to the obtained CSG id.
  • the user equipment determines whether to initiate the LIPA connection request according to its own access mode; for the user equipment that does not have the CSG function, the LIPA connection may not be initiated, and the connection may be established with the local network through other connection modes.
  • the network node When the user equipment sends a LIPA connection request, the network node obtains the LIPA granularity identifier corresponding to the user equipment and the network capability of the HeNB from the HSS (Hierarchical Service System), and according to the obtained LIPA granularity identifier, the HeNB The network capability determines whether the user equipment is authorized to establish a LIPA connection with the local network.
  • HSS Hierarchical Service System
  • LIPA connection When the user equipment that does not have the CSG function initiates the LIPA connection request, the network node acquires the support capability of the LIPA connection of the user equipment and the support capability of the LIPA connection of the local gateway from the HSS, when the user equipment and the local gateway support the LIPA connection.
  • the network node allows the creation of a LIPA connection between the user equipment and the local gateway. However, the network node cannot obtain more information to identify whether the local gateway belongs to the access point of the user equipment connection request.
  • the main purpose of the present invention is to provide a local network access control method and apparatus, and a computer storage medium, which are designed to effectively prevent a connection request that is not the local gateway from accessing the local gateway, thereby implementing local network access control and improving the network. Access security.
  • an embodiment of the present invention provides a method for controlling local network access, where the method includes the following steps:
  • the local gateway When receiving the network connection request sent by the network node, the local gateway acquires the network connection identifier included in the connection request, where the network connection request is a connection request of the user equipment and the local network;
  • the local gateway determines that the network connection request is an illegal request and refuses to respond to the network connection request.
  • the method further includes:
  • the local gateway determines that the network connection request is a legal connection request and authorizes the user equipment to access the local network.
  • the local gateway determines whether the acquired network connection identifier is a legal network connection identifier, and includes:
  • the local gateway analyzes whether the pre-stored legal connection identifier is consistent with the obtained network connection identifier
  • the local gateway determines that the network connection identifier is an illegal network connection identifier
  • the local gateway determines that the network connection identifier is a legal network connection identifier.
  • the local gateway determines whether the acquired network connection identifier is a legal network connection identifier, and includes:
  • the local gateway receives the verification information sent by the authentication device, and parses the received verification information to determine whether the obtained network connection identifier is a legal network connection identifier.
  • the method further includes:
  • the local gateway sends a reminder message to prompt an illegal request to access the local network.
  • the embodiment of the invention further provides a local network access control device, the device comprising:
  • An acquiring module configured to: when receiving a network connection request sent by the network node, obtain a network connection identifier included in the connection request, where the network connection request is a connection request of the user equipment and the local network;
  • An analysis module configured to determine whether the obtained network connection identifier is a legal network connection identifier
  • the response module is configured to determine that the network connection request is an illegal request and refuse to respond to the network connection request when determining that the acquired network connection identifier is an illegal network connection identifier.
  • the response module is further configured to: when determining that the acquired network connection identifier is a legal network connection identifier, determine that the network connection request is a legal connection request and authorize the user equipment to access the local network.
  • the analyzing module is further configured to analyze whether the pre-stored legal connection identifier is consistent with the obtained network connection identifier;
  • the network connection identifier is determined to be a legal network connection identifier.
  • the apparatus further includes:
  • the sending and receiving module is configured to send the obtained network connection identifier to the authentication device connected to the communication device to verify whether the obtained network connection identifier is a legal network connection identifier;
  • the processing module is configured to parse the received verification information to determine whether the obtained network connection identifier is a legal network connection identifier.
  • the apparatus further includes:
  • the reminder module is configured to issue a reminder message to prompt an illegal request to access the local network.
  • Embodiments of the present invention also provide a computer storage medium in which computer executable instructions are stored, the computer executable instructions being used to perform the above method.
  • the local gateway when receiving the network connection request sent by the network node, acquires the network connection identifier included in the connection request, and the network connection request is a connection request of the user equipment and the local network. Determining, by the local gateway, whether the acquired network connection identifier is a legal network connection identifier; when determining that the acquired network connection identifier is an illegal network connection identifier, the local gateway determines that the network connection request is an illegal request and rejects the response. Network connection request.
  • the local gateway When the local gateway recognizes that the access point of the user equipment is not the local gateway, the local gateway refuses to respond to the network connection request, effectively avoiding a connection request that is not the local gateway from accessing the local The gateway realizes the control of local network access and improves the security of network access.
  • FIG. 1 is a schematic flowchart of a first embodiment of a method for controlling local network access according to the present invention
  • FIG. 2 is a structural structural diagram of an embodiment of a mobile communication network according to the present invention.
  • FIG. 3 is a schematic flowchart of a second embodiment of a method for controlling local network access according to the present invention.
  • FIG. 4 is a schematic flowchart of a first embodiment of a local network access control apparatus according to the present invention.
  • FIG. 5 is a schematic flowchart diagram of a second embodiment of a local network access control apparatus according to the present invention.
  • FIG. 1 is a schematic flowchart diagram of a first embodiment of a method for controlling local network access according to the present invention.
  • the local gateway When receiving the network connection request sent by the network node, the local gateway acquires a network connection identifier included in the connection request, where the network connection request is a connection request of the user equipment and the local network; and the local gateway determines the acquired network. Whether the connection identifier is a legal network connection identifier; when it is determined that the acquired network connection identifier is an illegal network connection identifier, the local gateway determines that the network connection request is an illegal request and refuses to respond to the network connection request.
  • Step S11 When receiving the network connection request sent by the network node, the local gateway acquires the network connection identifier included in the connection request, where the network connection request is a connection request of the user equipment and the local network.
  • a user equipment, a home base station, a network node, an HSS, a local gateway, and a local network are deployed in a mobile communication network, and the user equipment is wirelessly connected to the home base station, and the home base station,
  • the local gateway and the HSS are all in communication connection with the network node, the local gateway is in communication connection with the local network, and the network node controls the user
  • the establishment of a communication connection between the device and the local gateway may be one or more (only one is shown), and the local gateway may also be multiple (only one is shown).
  • the mobile communication network further includes an authentication device communicatively coupled to the local gateway.
  • the process of the network node controlling the establishment of the communication connection between the user equipment and the local gateway includes: the user equipment initiates establishing a LIPA connection request with the local network to the home base station, where the home base station is Recognizing a request sent by the user equipment to establish a connection, constructing a message including a local gateway address, and transmitting the message to the network node, when the network node receives the information of the configuration sent by the home base station And obtaining the context information of the subscription corresponding to the user equipment, and receiving the context information of the subscription corresponding to the user equipment, and parsing the context information of the subscription corresponding to the user equipment, to determine the content provided by the user equipment.
  • the network node authorizes the establishment of the user equipment to establish a LIPA connection with the local gateway, that is, at the user equipment and the Creating a communication link between the local gateways for the user equipment to pass through the local gateway Forwarding or receiving mobile communication data, the above authorization process is network side authorization.
  • the network node authorizes establishing a communication link between the user equipment and the local gateway, sending a request to the local gateway to establish a network connection between the user equipment and the local network, where the local gateway receives
  • the network connection request is sent by the network node
  • the network connection identifier included in the connection request is obtained.
  • the user equipment is an electronic device that uses a mobile communication network, for example, a mobile phone, a computer, a tablet computer, etc.
  • the network connection identifier may be an IMSI (International Mobile Subscriber Identity), a mobile phone number, a wireless Internet account, etc. Information that the user device distinguishes.
  • IMSI International Mobile Subscriber Identity
  • Step S12 The local gateway determines whether the obtained network connection identifier is a legal network connection identifier.
  • the process of determining, by the local gateway, whether the acquired network connection identifier is a legal network connection identifier may be: the local gateway pre-stores all legal network connection identifiers that are legally connected to the local gateway, and obtains When the network connection identifier included in the connection request is analyzed, it is analyzed whether the pre-stored legal network connection identifier is consistent with the obtained network connection identifier. When the pre-stored legal connection identifier is consistent with the acquired network connection identifier, the local gateway determines the location.
  • the network connection identifier is an illegal network connection identifier.
  • the local gateway determines that the network connection identifier is a legal network connection identifier.
  • the process of determining, by the local gateway, whether the acquired network connection identifier is a legal network connection identifier may be: the local gateway sends the obtained network connection identifier to an authentication device that is communicatively connected thereto. To verify whether the obtained network connection identifier is a legal network connection identifier. The authentication device pre-stores all legal network connection identifiers that are legally connected to the local gateway.
  • the authentication device When receiving the network connection identifier sent by the network node, the authentication device analyzes whether there is a pre-stored legal network connection identifier and The received network connection identifiers are consistent.
  • the pre-stored legal network connection identifier is consistent with the received network connection identifier, and the received network connection identifier is determined to be a legal network connection identifier, and the received network connection identifier is verified as a valid network connection identifier. If the pre-stored legal network connection identifier is consistent with the received network connection identifier, the received network connection identifier is determined to be an illegal network connection identifier, and the received network connection identifier is generated as the verification information of the illegal network connection identifier.
  • the local gateway receives the verification information sent by the authentication device, and parses the received verification information to determine whether the obtained network connection identifier is a legal network connection identifier.
  • Step S13 When it is determined that the acquired network connection identifier is an illegal network connection identifier, the local gateway determines that the network connection request is an illegal request and refuses to respond to the network connection request.
  • the local gateway determines that the network connection request is an illegal request and refuses to respond to the network connection request.
  • the legal network connection identifier is used, the local gateway does The network connection request is a legitimate connection request and the user equipment is authorized to access the local network.
  • the local gateway when receiving the network connection request sent by the network node, acquires the network connection identifier included in the connection request, where the network connection request is a connection request of the user equipment and the local network; the local gateway determines Whether the obtained network connection identifier is a legal network connection identifier; when it is determined that the acquired network connection identifier is an illegal network connection identifier, the local gateway determines that the network connection request is an illegal request and refuses to respond to the network connection request.
  • the local gateway recognizes that the access point of the user equipment is not the local gateway, the local gateway refuses to respond to the network connection request, effectively avoiding a connection request that is not the local gateway from accessing the local Gateway to achieve local network access control and improve network access security.
  • FIG. 3 is a schematic flowchart diagram of a second embodiment of a method for controlling local network access according to the present invention. Based on the foregoing first embodiment, after the step S13, the method further includes:
  • step S14 the local gateway sends an alert message to prompt an illegal request to access the local network.
  • the local gateway when the local gateway determines that the network connection request is an illegal request, the local gateway sends a reminder message to prompt an illegal request to access the local network.
  • the local gateway sends a reminder message to the management end of the local network to prompt the monitoring personnel of the local network management terminal to know that there is an illegal request to access the local network, so as to strengthen the monitoring of the local network access and prevent the user equipment.
  • the end user establishes a connection with the local network through illegal means and accesses data of the local network.
  • the local gateway sends an alert message to the user equipment, to prompt the user equipment end user to send the network connection request as an illegal request, that is, the access point of the connection request is not The local gateway.
  • the local gateway sends system information to prompt an illegal request to access the local network, so as to prompt the management user of the local network to request unauthorized access to the local network, strengthen monitoring of local network access, and further improve network access security.
  • FIG. 4 is a schematic diagram of functional modules of a first embodiment of a local network access control apparatus according to the present invention.
  • the device comprises: an obtaining module 10, an analyzing module 20, a sending and receiving module 30, a processing module 40 and a response module 50.
  • the obtaining module 10 is configured to acquire a network connection identifier included in the connection request when receiving a network connection request sent by the network node, where the network connection request is a connection request of the user equipment and the local network.
  • a user equipment, a home base station, a network node, an HSS, a local gateway, and a local network are deployed in a mobile communication network, and the user equipment is wirelessly connected to the home base station, and the home base station,
  • the local gateway and the HSS are both communicatively connected to the network node, the local gateway is in communication connection with the local network, and the network node controls establishment of a communication connection between the user equipment and the local gateway,
  • the local network may be one or more (only one is shown), and the local gateway may also be multiple (only one is shown).
  • the mobile communication network further includes an authentication device communicatively coupled to the local gateway.
  • the control device for the local network access is preferably a local gateway.
  • the process of the network node controlling the establishment of the communication connection between the user equipment and the local gateway includes: the user equipment initiates establishing a LIPA connection request with the local network to the home base station, where the home base station is Recognizing a request sent by the user equipment to establish a connection, constructing a message including a local gateway address, and transmitting the message to the network node, when the network node receives the information of the configuration sent by the home base station And obtaining the context information of the subscription corresponding to the user equipment, and receiving the context information of the subscription corresponding to the user equipment, and parsing the context information of the subscription corresponding to the user equipment, to determine the content provided by the user equipment.
  • the network node authorizes the establishment of the user equipment to establish a LIPA connection with the local gateway, that is, at the user equipment and the Creating a communication link between the local gateways for the user equipment to pass through the local gateway Forward or receive mobile communication data,
  • the above authorization process is authorized by the network side.
  • the network node authorizes establishing a communication link between the user equipment and the local gateway, sending a request to the local gateway to establish a network connection between the user equipment and the local network, where the local gateway receives
  • the network connection request is sent by the network node
  • the network connection identifier included in the connection request is obtained.
  • the user equipment is an electronic device that uses a mobile communication network, for example, a mobile phone, a computer, a tablet computer, etc.
  • the network connection identifier may be an IMSI (International Mobile Subscriber Identity), a mobile phone number, a wireless Internet account, etc. Information that the user device distinguishes.
  • IMSI International Mobile Subscriber Identity
  • the analyzing module 20 is configured to determine whether the acquired network connection identifier is a legal network connection identifier.
  • the process of determining, by the local gateway, whether the acquired network connection identifier is a legal network connection identifier may be: the local gateway pre-stores all legal network connection identifiers that are legally connected to the local gateway, and obtains When the network connection identifier included in the connection request is analyzed, it is analyzed whether the pre-stored legal network connection identifier is consistent with the obtained network connection identifier. When the pre-stored legal connection identifier is consistent with the acquired network connection identifier, the local gateway determines the location. The network connection identifier is an illegal network connection identifier. When the pre-stored legal connection identifier is consistent with the obtained network connection identifier, the local gateway determines that the network connection identifier is a legal network connection identifier.
  • the process of determining, by the local gateway, whether the acquired network connection identifier is a legal network connection identifier may be: the sending and receiving module 30 sends the obtained network connection identifier to an authentication device that is communicatively connected thereto. To verify whether the obtained network connection identifier is a legal network connection identifier. The authentication device pre-stores all legal network connection identifiers that are legally connected to the local gateway. When receiving the network connection identifier sent by the network node, the authentication device analyzes whether there is a pre-stored legal network connection identifier and The received network connection identifiers are consistent. When the pre-stored legal network connection identifier is consistent with the received network connection identifier, the received network connection is determined.
  • the identifier is a legal network connection identifier
  • the received network connection identifier is the verification information of the legal network connection identifier.
  • the received network connection identifier is determined to be an illegal network connection.
  • the identifier generates the verification information that the received network connection identifier is an illegal network connection identifier.
  • the receiving module 30 receives the verification information sent by the authentication device, and parses the received verification information through the processing module 40 to determine whether the obtained network connection identifier is a legal network connection identifier.
  • the response module 50 is configured to determine that the network connection request is an illegal request and refuse to respond to the network connection request when determining that the acquired network connection identifier is an illegal network connection identifier.
  • the local gateway determines that the network connection request is an illegal request and refuses to respond to the network connection request.
  • the local gateway determines that the network connection request is a legal connection request and authorizes the user equipment to access the local network.
  • the local gateway when receiving the network connection request sent by the network node, acquires the network connection identifier included in the connection request, where the network connection request is a connection request of the user equipment and the local network; the local gateway determines Whether the obtained network connection identifier is a legal network connection identifier; when it is determined that the acquired network connection identifier is an illegal network connection identifier, the local gateway determines that the network connection request is an illegal request and refuses to respond to the network connection request.
  • the local gateway recognizes that the access point of the user equipment is not the local gateway, the local gateway refuses to respond to the network connection request, effectively avoiding a connection request that is not the local gateway from accessing the local Gateway to achieve local network access control and improve network access security.
  • FIG. 5 is a schematic diagram of functional modules of a second embodiment of a local network access control apparatus according to the present invention.
  • the device also includes a reminder module 60.
  • the reminding module 60 sends a reminder message to prompt an illegal request to access the local network.
  • the local gateway when the local gateway determines that the network connection request is an illegal request, The local gateway sends a reminder message to prompt an illegal request to access the local network.
  • the local gateway sends a reminder message to the management end of the local network to prompt the monitoring personnel of the local network management terminal to know that there is an illegal request to access the local network, so as to strengthen the monitoring of the local network access and prevent the user equipment.
  • the end user establishes a connection with the local network through illegal means and accesses data of the local network.
  • the local gateway sends an alert message to the user equipment, to prompt the user equipment end user to send the network connection request as an illegal request, that is, the access point of the connection request is not The local gateway.
  • the local gateway sends system information to prompt an illegal request to access the local network, so as to prompt the management user of the local network to request unauthorized access to the local network, strengthen monitoring of local network access, and further improve network access security.
  • the embodiment of the invention further provides a computer storage medium storing computer executable instructions for performing the method described in any of the above embodiments.
  • Each of the above modules may be implemented by a central processing unit (CPU), a digital signal processor (DSP), or a field-programmable gate array (FPGA) in the electronic device.
  • CPU central processing unit
  • DSP digital signal processor
  • FPGA field-programmable gate array
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention can take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

一种本地网络访问的控制方法、控制装置以及计算机存储介质,该方法包括步骤:当接收到网络节点发送来的网络连接请求时,本地网关获取所述连接请求中包括的网络连接标识,所述网络连接请求为用户设备与本地网络的连接请求;所述本地网关确定获取的网络连接标识是否为合法网络连接标识;在确定获取的网络连接标识为非法网络连接标识时,所述本地网关确定所述网络连接请求为非法请求并拒绝响应所述网络连接请求。

Description

本地网络访问的控制方法及装置、计算机存储介质 技术领域
本发明涉及***移动通信***的移动互联网技术领域,尤其涉及本地网络访问的控制方法及装置、计算机存储介质。
背景技术
LIPA(Local IP Access,本地IP接入)技术是基于HeNB(Home enhanced Node,家庭基站)网络技术提出的,其核心技术是本地网络的通信数据可以不经过运营商的核心网络,直接由HeNB将各个本地网络的通信数据分流至对应的目的端,从而减轻了核心网络的负荷和传输成本。
LIPA技术在其协议中规定,LIPA连接的建立需要取得网络侧授权(包括签约、运营商配置等),网络侧授权的控制过程主要在MME(Mobility Management Entity,网络节点)上进行。
LIPA技术在其协议中还规定,UE(User equipment,用户设备)可以在静态配置中获取支持LIPA连接的家庭基站的CSG(闭合用户组)id,并根据获取的CSG id决定是否发起LIPA连接请求;对于支持混合模式的家庭基站,用户设备根据自身的接入模式判断是否发起LIPA连接请求;对于不具有CSG功能的用户设备可以不发起LIPA连接,可通过其他连接方式与本地网络建立连接。网络节点在有用户设备发出LIPA连接请求时,从HSS(Hierarchical Service System,分层次服务***)获取该用户设备对应的LIPA粒度的标识、HeNB的网络能力,并根据获取的LIPA粒度的标识、HeNB的网络能力来判定是否授权该用户设备建立与本地网络的LIPA连接。
但是在协议中并没有明确规定,用户设备必须具有CSG功能才可发起 LIPA连接。当不具有CSG功能的用户设备发起LIPA连接请求时,网络节点从HSS获取该用户设备LIPA连接的支持能力及本地网关的LIPA连接的支持能力,在该用户设备及该本地网关均支持LIPA连接时,网络节点允许创建该用户设备与该本地网关之间的LIPA连接,然而,网络节点无法获得更多的信息识别出该本地网关是否属于该用户设备连接请求的接入点。
发明内容
本发明的主要目的为提供本地网络访问的控制方法及装置、计算机存储介质,旨在有效避免不是所述本地网关的连接请求接入到所述本地网关,以实现本地网络访问的控制,提高网络访问的安全性。
为实现上述目的,本发明实施例提供一种本地网络访问的控制方法,该方法包括步骤:
当接收到网络节点发送来的网络连接请求时,本地网关获取所述连接请求中包括的网络连接标识,所述网络连接请求为用户设备与本地网络的连接请求;
所述本地网关确定获取的网络连接标识是否为合法网络连接标识;
在确定获取的网络连接标识为非法网络连接标识时,所述本地网关确定所述网络连接请求为非法请求并拒绝响应所述网络连接请求。
在一具体实施例中,在所述本地网关确定获取的网络连接标识是否为合法网络连接标识的步骤之后,该方法还包括:
在确定获取的网络连接标识为合法网络连接标识时,所述本地网关确定所述网络连接请求为合法连接请求并授权所述用户设备接入本地网络。
在一具体实施例中,所述本地网关确定获取的网络连接标识是否为合法网络连接标识,包括:
所述本地网关分析是否有预存合法连接标识与获取的网络连接标识一致;
在未有预存合法连接标识与获取的网络连接标识一致时,所述本地网关确定所述网络连接标识为非法网络连接标识;
在有预存合法连接标识与获取的网络连接标识一致时,所述本地网关确定所述网络连接标识为合法网络连接标识。
在一具体实施例中,所述本地网关确定获取的网络连接标识是否为合法网络连接标识,包括:
所述本地网关将获取的网络连接标识发送至与其通信连接的鉴权设备,以验证获取的网络连接标识是否为合法网络连接标识;
所述本地网关接收所述鉴权设备发送来的验证信息,并解析接收到的验证信息,以确定获取的网络连接标识是否为合法网络连接标识。
在一具体实施例中,在所述本地网关确定所述网络连接请求为非法请求并拒绝响应所述网络连接请求的步骤之后,该方法还包括:
所述本地网关发出提醒信息,以提示有非法请求访问本地网络。
本发明实施例还提供一种本地网络访问的控制装置,该装置包括:
获取模块,配置为当接收到网络节点发送来的网络连接请求时,获取所述连接请求中包括的网络连接标识,所述网络连接请求为用户设备与本地网络的连接请求;
分析模块,配置为确定获取的网络连接标识是否为合法网络连接标识;
响应模块,配置为在确定获取的网络连接标识为非法网络连接标识时,确定所述网络连接请求为非法请求并拒绝响应所述网络连接请求。
在一具体实施例中,响应模块,还配置为在确定获取的网络连接标识为合法网络连接标识时,确定所述网络连接请求为合法连接请求并授权所述用户设备接入本地网络。
在一具体实施例中,所述分析模块,还配置为分析是否有预存合法连接标识与获取的网络连接标识一致;及
在未有预存合法连接标识与获取的网络连接标识一致时,确定所述网络连接标识为非法网络连接标识;或
在有预存合法连接标识与获取的网络连接标识一致时,确定所述网络连接标识为合法网络连接标识。
在一具体实施例中,该装置还包括:
接发模块,配置为将获取的网络连接标识发送至与其通信连接的鉴权设备,以验证获取的网络连接标识是否为合法网络连接标识;及
接收所述鉴权设备发送来的验证信息;
处理模块,配置为解析接收到的验证信息,以确定获取的网络连接标识是否为合法网络连接标识。
在一具体实施例中,该装置还包括:
提醒模块,配置为发出提醒信息,以提示有非法请求访问本地网络。
本发明实施例还提供了一种计算机存储介质,其中存储有计算机可执行指令,所述计算机可执行指令用于执行上述的方法。
相对现有技术,本发明实施例当接收到网络节点发送来的网络连接请求时,本地网关获取所述连接请求中包括的网络连接标识,所述网络连接请求为用户设备与本地网络的连接请求;所述本地网关确定获取的网络连接标识是否为合法网络连接标识;在确定获取的网络连接标识为非法网络连接标识时,所述本地网关确定所述网络连接请求为非法请求并拒绝响应所述网络连接请求。通过所述本地网关识别出所述用户设备的接入点不是所述本地网关时,所述本地网关拒绝响应所述网络连接请求,有效避免不是所述本地网关的连接请求接入到所述本地网关,从而实现了本地网络访问的控制,提高了网络访问的安全性。
附图说明
图1为本发明本地网络访问的控制方法第一实施例的流程示意图;
图2为本发明移动通信网络一实施例的结构架构图;
图3为本发明本地网络访问的控制方法第二实施例的流程示意图;
图4为本发明本地网络访问的控制装置第一实施例的流程示意图;
图5为本发明本地网络访问的控制装置第二实施例的流程示意图。
具体实施方式
应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
如图1所示,为本发明本地网络访问的控制方法第一实施例的流程示意图。
需要强调的是:图1所示流程图仅为一个较佳实施例,本领域的技术人员当知,任何围绕本发明思想构建的实施例都不应脱离于如下技术方案涵盖的范围:
当接收到网络节点发送来的网络连接请求时,本地网关获取所述连接请求中包括的网络连接标识,所述网络连接请求为用户设备与本地网络的连接请求;所述本地网关确定获取的网络连接标识是否为合法网络连接标识;在确定获取的网络连接标识为非法网络连接标识时,所述本地网关确定所述网络连接请求为非法请求并拒绝响应所述网络连接请求。
以下是本实施例逐步实现控制本地网络访问的具体步骤:
步骤S11,当接收到网络节点发送来的网络连接请求时,本地网关获取所述连接请求中包括的网络连接标识,所述网络连接请求为用户设备与本地网络的连接请求。
在本实施例中,参考图2,移动通信网络中部署有用户设备、家庭基站、网络节点、HSS、本地网关及本地网络,所述用户设备与所述家庭基站无线连接,所述家庭基站、所述本地网关及所述HSS均与所述网络节点通信连接,所述本地网关与所述本地网络通信连接,所述网络节点控制所述用户 设备与所述本地网关之间通信连接的建立,所述本地网络可以是一个或者多个(图中仅示出一个),所述本地网关也可以是多个(图中仅示出一个)。在本发明其他实施例中,在所述移动通信网络中还包括一与所述本地网关通信连接的鉴权设备。
所述网络节点控制所述用户设备与所述本地网关之间通信连接的建立的过程包括:所述用户设备向所述家庭基站发起建立与所述本地网络的LIPA连接请求,所述家庭基站在识别出所述用户设备发送来的为建立连接的请求时,构造一个包括本地网关地址的消息,发送至所述网络节点,所述网络节点在接收到所述家庭基站发送来的构造的信息时,向HSS发起获取所述用户设备对应的订阅的上下文信息,并接收所述用户设备对应的订阅的上下文信息,并解析所述用户设备对应的订阅的上下文信息,以确定所述用户设备提供的接入点是否支持LIPA功能,在接收的上下文信息中包括允许LIPA连接的字样时,所述网络节点授权建立所述用户设备与所述本地网关建立LIPA连接,即,在所述用户设备与所述本地网关之间创建一个通信链路,供所述用户设备通过所述本地网关转发或者接收移动通信数据,上述授权过程为网络侧授权。
所述网络节点在授权建立用户设备与本地网关之间的通信链路时,向所述本地网关发出创建所述用户设备与所述本地网络之间网络连接的请求,所述本地网关在接收到网络节点发送来的网络连接请求时,获取所述连接请求中包括的网络连接标识。所述用户设备为运用移动通信网络的电子设备,例如,手机、电脑、平板电脑等;所述网络连接标识可以是IMSI(国际移动用户识别码)、手机号码、无线上网账号等用以将各个用户设备加以区分的信息。
步骤S12,所述本地网关确定获取的网络连接标识是否为合法网络连接标识。
在本实施例中,所述本地网关确定获取的网络连接标识是否为合法网络连接标识的过程可以为:所述本地网关预存有与所述本地网关合法连接的所有合法网络连接标识,在获取到所述连接请求中包括的网络连接标识时,分析是否有预存合法网络连接标识与获取的网络连接标识一致,在未有预存合法连接标识与获取的网络连接标识一致时,所述本地网关确定所述网络连接标识为非法网络连接标识;在有预存合法连接标识与获取的网络连接标识一致时,所述本地网关确定所述网络连接标识为合法网络连接标识。在本发明其他实施例中,所述本地网关确定获取的网络连接标识是否为合法网络连接标识的过程还可以为:所述本地网关将获取的网络连接标识发送至与其通信连接的鉴权设备,以验证获取的网络连接标识是否为合法网络连接标识。所述鉴权设备预存有与所述本地网关合法连接的所有合法网络连接标识,在接收到所述网络节点发送来的网络连接标识时,所述鉴权设备分析是否有预存合法网络连接标识与接收的网络连接标识一致,在有预存合法网络连接标识与接收的网络连接标识一致,确定接收的网络连接标识为合法网络连接标识,生成接收的网络连接标识为合法网络连接标识的验证信息;在未有预存合法网络连接标识与接收的网络连接标识一致时,确定接收的网络连接标识为非法网络连接标识,生成接收的网络连接标识为非法网络连接标识的验证信息。所述本地网关接收所述鉴权设备发送来的验证信息,并解析接收到的验证信息,以确定获取的网络连接标识是否为合法网络连接标识。
步骤S13,在确定获取的网络连接标识为非法网络连接标识时,所述本地网关确定所述网络连接请求为非法请求并拒绝响应所述网络连接请求。
在本实施例中,在确定获取的网络连接标识为非法网络连接标识时,所述本地网关确定所述网络连接请求为非法请求并拒绝响应所述网络连接请求.在确定获取的网络连接标识为合法网络连接标识时,所述本地网关确 定所述网络连接请求为合法连接请求并授权所述用户设备接入本地网络。
本实施例当接收到网络节点发送来的网络连接请求时,本地网关获取所述连接请求中包括的网络连接标识,所述网络连接请求为用户设备与本地网络的连接请求;所述本地网关确定获取的网络连接标识是否为合法网络连接标识;在确定获取的网络连接标识为非法网络连接标识时,所述本地网关确定所述网络连接请求为非法请求并拒绝响应所述网络连接请求。通过所述本地网关识别出所述用户设备的接入点不是所述本地网关时,所述本地网关拒绝响应所述网络连接请求,有效避免不是所述本地网关的连接请求接入到所述本地网关,以实现本地网络访问的控制,提高网络访问的安全性。
如图3所示,为本发明本地网络访问的控制方法第二实施例的流程示意图。基于上述第一实施例,在所述步骤S13之后,该方法还包括:
步骤S14,所述本地网关发出提醒信息,以提示有非法请求访问本地网络。
在本实施例中,所述本地网关在确定所述网络连接请求为非法请求时,所述本地网关发出提醒信息,以提示有非法请求访问本地网络。在本实施例中优选为所述本地网关向所述本地网络的管理端发出提醒消息,以提示本地网络管理端的监控人员知晓有非法请求访问本地网络,以加强对本地网络访问的监控防止用户设备端用户通过非法手段建立与本地网络连接,并访问本地网络的数据。在本发明其他实施例中,所述本地网关向所述用户设备发出提醒信息,以提示所述用户设备端用户发出的所述网络连接请求为非法请求,即该连接请求的接入点不为所述本地网关。
在本实施所述本地网关发出***信息,以提示有非法请求访问本地网络,以提示本地网络的管理端用户有非法请求访问本地网络,加强对本地网络访问的监控,进一步提高网络访问的安全性。
如图4所示,为本发明本地网络访问的控制装置第一实施例的功能模块示意图。该装置包括:获取模块10、分析模块20、接发模块30、处理模块40及响应模块50。
所述获取模块10,配置为当接收到网络节点发送来的网络连接请求时,获取所述连接请求中包括的网络连接标识,所述网络连接请求为用户设备与本地网络的连接请求。
在本实施例中,参考图2,移动通信网络中部署有用户设备、家庭基站、网络节点、HSS、本地网关及本地网络,所述用户设备与所述家庭基站无线连接,所述家庭基站、所述本地网关及所述HSS均与所述网络节点通信连接,所述本地网关与所述本地网络通信连接,所述网络节点控制所述用户设备与所述本地网关之间通信连接的建立,所述本地网络可以是一个或者多个(图中仅示出一个),所述本地网关也可以是多个(图中仅示出一个)。在本发明其他实施例中,在所述移动通信网络中还包括一与所述本地网关通信连接的鉴权设备。所述本地网络访问的控制装置优选为本地网关。
所述网络节点控制所述用户设备与所述本地网关之间通信连接的建立的过程包括:所述用户设备向所述家庭基站发起建立与所述本地网络的LIPA连接请求,所述家庭基站在识别出所述用户设备发送来的为建立连接的请求时,构造一个包括本地网关地址的消息,发送至所述网络节点,所述网络节点在接收到所述家庭基站发送来的构造的信息时,向HSS发起获取所述用户设备对应的订阅的上下文信息,并接收所述用户设备对应的订阅的上下文信息,并解析所述用户设备对应的订阅的上下文信息,以确定所述用户设备提供的接入点是否支持LIPA功能,在接收的上下文信息中包括允许LIPA连接的字样时,所述网络节点授权建立所述用户设备与所述本地网关建立LIPA连接,即,在所述用户设备与所述本地网关之间创建一个通信链路,供所述用户设备通过所述本地网关转发或者接收移动通信数据, 上述授权过程为网络侧授权。
所述网络节点在授权建立用户设备与本地网关之间的通信链路时,向所述本地网关发出创建所述用户设备与所述本地网络之间网络连接的请求,所述本地网关在接收到网络节点发送来的网络连接请求时,获取所述连接请求中包括的网络连接标识。所述用户设备为运用移动通信网络的电子设备,例如,手机、电脑、平板电脑等;所述网络连接标识可以是IMSI(国际移动用户识别码)、手机号码、无线上网账号等用以将各个用户设备加以区分的信息。
所述分析模块20,配置为确定获取的网络连接标识是否为合法网络连接标识。
在本实施例中,所述本地网关确定获取的网络连接标识是否为合法网络连接标识的过程可以为:所述本地网关预存有与所述本地网关合法连接的所有合法网络连接标识,在获取到所述连接请求中包括的网络连接标识时,分析是否有预存合法网络连接标识与获取的网络连接标识一致,在未有预存合法连接标识与获取的网络连接标识一致时,所述本地网关确定所述网络连接标识为非法网络连接标识;在有预存合法连接标识与获取的网络连接标识一致时,所述本地网关确定所述网络连接标识为合法网络连接标识。
在本发明其他实施例中,所述本地网关确定获取的网络连接标识是否为合法网络连接标识的过程还可以为:接发模块30将获取的网络连接标识发送至与其通信连接的鉴权设备,以验证获取的网络连接标识是否为合法网络连接标识。所述鉴权设备预存有与所述本地网关合法连接的所有合法网络连接标识,在接收到所述网络节点发送来的网络连接标识时,所述鉴权设备分析是否有预存合法网络连接标识与接收的网络连接标识一致,在有预存合法网络连接标识与接收的网络连接标识一致,确定接收的网络连 接标识为合法网络连接标识,生成接收的网络连接标识为合法网络连接标识的验证信息;在未有预存合法网络连接标识与接收的网络连接标识一致时,确定接收的网络连接标识为非法网络连接标识,生成接收的网络连接标识为非法网络连接标识的验证信息。所述接发模块30接收所述鉴权设备发送来的验证信息,并通过处理模块40解析接收到的验证信息,以确定获取的网络连接标识是否为合法网络连接标识。
所述响应模块50,配置为在确定获取的网络连接标识为非法网络连接标识时,确定所述网络连接请求为非法请求并拒绝响应所述网络连接请求。
在本实施例中,在确定获取的网络连接标识为非法网络连接标识时,所述本地网关确定所述网络连接请求为非法请求并拒绝响应所述网络连接请求.在确定获取的网络连接标识为合法网络连接标识时,所述本地网关确定所述网络连接请求为合法连接请求并授权所述用户设备接入本地网络。
本实施例当接收到网络节点发送来的网络连接请求时,本地网关获取所述连接请求中包括的网络连接标识,所述网络连接请求为用户设备与本地网络的连接请求;所述本地网关确定获取的网络连接标识是否为合法网络连接标识;在确定获取的网络连接标识为非法网络连接标识时,所述本地网关确定所述网络连接请求为非法请求并拒绝响应所述网络连接请求。通过所述本地网关识别出所述用户设备的接入点不是所述本地网关时,所述本地网关拒绝响应所述网络连接请求,有效避免不是所述本地网关的连接请求接入到所述本地网关,以实现本地网络访问的控制,提高网络访问的安全性。
如图5所示,为本发明本地网络访问的控制装置第二实施例的功能模块示意图。该装置还包括:提醒模块60。
所述提醒模块60,发出提醒信息,以提示有非法请求访问本地网络。
在本实施例中,所述本地网关在确定所述网络连接请求为非法请求时, 所述本地网关发出提醒信息,以提示有非法请求访问本地网络。在本实施例中优选为所述本地网关向所述本地网络的管理端发出提醒消息,以提示本地网络管理端的监控人员知晓有非法请求访问本地网络,以加强对本地网络访问的监控防止用户设备端用户通过非法手段建立与本地网络连接,并访问本地网络的数据。在本发明其他实施例中,所述本地网关向所述用户设备发出提醒信息,以提示所述用户设备端用户发出的所述网络连接请求为非法请求,即该连接请求的接入点不为所述本地网关。
在本实施所述本地网关发出***信息,以提示有非法请求访问本地网络,以提示本地网络的管理端用户有非法请求访问本地网络,加强对本地网络访问的监控,进一步提高网络访问的安全性。
本发明实施例还提供了一种计算机存储介质,其中存储有计算机可执行指令,所述计算机可执行指令用于执行上述任一实施例所述的方法。
上述各模块可以由电子设备中的中央处理器(Central Processing Unit,CPU)、数字信号处理器(Digital Signal Processor,DSP)或可编程逻辑阵列(Field-Programmable Gate Array,FPGA)实现。
本领域内的技术人员应明白,本发明的实施例可提供为方法、***、或计算机程序产品。因此,本发明可采用硬件实施例、软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。
本发明是参照根据本发明实施例的方法、设备(***)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得 通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。

Claims (11)

  1. 一种本地网络访问的控制方法,其中,该方法包括:
    当接收到网络节点发送来的网络连接请求时,本地网关获取所述连接请求中包括的网络连接标识,所述网络连接请求为用户设备与本地网络的连接请求;
    所述本地网关确定获取的网络连接标识是否为合法网络连接标识;
    在确定获取的网络连接标识为非法网络连接标识时,所述本地网关确定所述网络连接请求为非法请求并拒绝响应所述网络连接请求。
  2. 根据权利要求1所述的本地网络访问的控制方法,其中,在所述本地网关确定获取的网络连接标识是否为合法网络连接标识的步骤之后,该方法还包括:
    在确定获取的网络连接标识为合法网络连接标识时,所述本地网关确定所述网络连接请求为合法连接请求并授权所述用户设备接入本地网络。
  3. 根据权利要求1或2所述的本地网络访问的控制方法,其中,所述本地网关确定获取的网络连接标识是否为合法网络连接标识,包括:
    所述本地网关分析是否有预存合法连接标识与获取的网络连接标识一致;
    在未有预存合法连接标识与获取的网络连接标识一致时,所述本地网关确定所述网络连接标识为非法网络连接标识;
    在有预存合法连接标识与获取的网络连接标识一致时,所述本地网关确定所述网络连接标识为合法网络连接标识。
  4. 根据权利要求1或2所述的本地网络访问的控制方法,其中,所述本地网关确定获取的网络连接标识是否为合法网络连接标识,包括:
    所述本地网关将获取的网络连接标识发送至与其通信连接的鉴权设备,以验证获取的网络连接标识是否为合法网络连接标识;
    所述本地网关接收所述鉴权设备发送来的验证信息,并解析接收到的验证信息,以确定获取的网络连接标识是否为合法网络连接标识。
  5. 根据权利要求1或2所述的本地网络访问的控制方法,其中,在所述本地网关确定所述网络连接请求为非法请求并拒绝响应所述网络连接请求的步骤之后,该方法还包括:
    所述本地网关发出提醒信息,以提示有非法请求访问本地网络。
  6. 一种本地网络访问的控制装置,其中,该装置包括:
    获取模块,配置为当接收到网络节点发送来的网络连接请求时,获取所述连接请求中包括的网络连接标识,所述网络连接请求为用户设备与本地网络的连接请求;
    分析模块,配置为确定获取的网络连接标识是否为合法网络连接标识;
    响应模块,配置为在确定获取的网络连接标识为非法网络连接标识时,确定所述网络连接请求为非法请求并拒绝响应所述网络连接请求。
  7. 根据权利要求6所述的本地网络访问的控制装置,其中,
    响应模块,还配置为在确定获取的网络连接标识为合法网络连接标识时,确定所述网络连接请求为合法连接请求并授权所述用户设备接入本地网络。
  8. 根据权利要求6或7所述的本地网络访问的控制装置,其中,
    所述分析模块,还配置为分析是否有预存合法连接标识与获取的网络连接标识一致;及
    在未有预存合法连接标识与获取的网络连接标识一致时,确定所述网络连接标识为非法网络连接标识;或
    在有预存合法连接标识与获取的网络连接标识一致时,确定所述网络连接标识为合法网络连接标识。
  9. 根据权利要求6或7所述的本地网络访问的控制装置,其中,该装 置还包括:
    接发模块,配置为将获取的网络连接标识发送至与其通信连接的鉴权设备,以验证获取的网络连接标识是否为合法网络连接标识;及
    接收所述鉴权设备发送来的验证信息;
    处理模块,配置为解析接收到的验证信息,以确定获取的网络连接标识是否为合法网络连接标识。
  10. 根据权利要求6或7所述的本地网络访问的控制装置,其中,该装置还包括:
    提醒模块,配置为发出提醒信息,以提示有非法请求访问本地网络。
  11. 一种计算机存储介质,其中存储有计算机可执行指令,所述计算机可执行指令用于执行所述权利要求1至5任一项所述的方法。
PCT/CN2014/087568 2014-03-20 2014-09-26 本地网络访问的控制方法及装置、计算机存储介质 WO2015139442A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410105999.6 2014-03-20
CN201410105999.6A CN104935557A (zh) 2014-03-20 2014-03-20 本地网络访问的控制方法及装置

Publications (1)

Publication Number Publication Date
WO2015139442A1 true WO2015139442A1 (zh) 2015-09-24

Family

ID=54122530

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/087568 WO2015139442A1 (zh) 2014-03-20 2014-09-26 本地网络访问的控制方法及装置、计算机存储介质

Country Status (2)

Country Link
CN (1) CN104935557A (zh)
WO (1) WO2015139442A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106792688A (zh) * 2016-12-15 2017-05-31 中磊电子(苏州)有限公司 用于网络流量路由的方法
CN107257556A (zh) * 2017-08-15 2017-10-17 世纪龙信息网络有限责任公司 验证用户本机号码的方法、***和平台
CN112752300B (zh) * 2020-12-29 2022-09-20 锐捷网络股份有限公司 本地分流的实现方法及装置
CN113938305B (zh) * 2021-10-18 2024-04-26 杭州安恒信息技术股份有限公司 一种非法外联的判定方法、***及装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101860910A (zh) * 2009-04-09 2010-10-13 大唐移动通信设备有限公司 本地网络的承载建立方法、***及装置
US20100287599A1 (en) * 2008-01-07 2010-11-11 Huawei Technologies Co., Ltd. Method, apparatus and system for implementing policy control
CN102056129A (zh) * 2009-11-05 2011-05-11 中兴通讯股份有限公司 本地ip访问连接的建立方法和装置

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100856409B1 (ko) * 2006-10-09 2008-09-04 삼성전자주식회사 로컬 네트워크 장치의 원격 제어 방법 및 그 장치
FI20075252A0 (fi) * 2007-04-13 2007-04-13 Nokia Corp Menetelmä, radiojärjestelmä, matkaviestin ja tukiasema
CN102123493B (zh) * 2008-03-26 2014-11-19 华为技术有限公司 分组数据网络连接的注册方法及装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100287599A1 (en) * 2008-01-07 2010-11-11 Huawei Technologies Co., Ltd. Method, apparatus and system for implementing policy control
CN101860910A (zh) * 2009-04-09 2010-10-13 大唐移动通信设备有限公司 本地网络的承载建立方法、***及装置
CN102056129A (zh) * 2009-11-05 2011-05-11 中兴通讯股份有限公司 本地ip访问连接的建立方法和装置

Also Published As

Publication number Publication date
CN104935557A (zh) 2015-09-23

Similar Documents

Publication Publication Date Title
US11096051B2 (en) Connection establishment method, device, and system
JP6632713B2 (ja) 直接通信キーの確立のための方法および装置
CN103929748B (zh) 一种物联网无线终端及其配置方法和无线网络接入点
CN102474720B (zh) 通信***
US20160105410A1 (en) OMA DM Based Terminal Authentication Method, Terminal and Server
CN110958142A (zh) 设备维护方法、维护设备、存储介质及计算机程序产品
US9730061B2 (en) Network authentication
CN107567017B (zh) 无线连接***、装置及方法
WO2016054888A1 (zh) 一种创建订阅资源的方法和装置
JP2016506152A (ja) タグ付けによるデバイスの認証
WO2015018327A1 (zh) 一种终端设备与网关设备间的互联方法和装置
US9667625B2 (en) Access control method, authentication method, and authentication device
JP2017535122A (ja) センサのコード照合処理方法、装置、ネットワークプラットフォーム機器及びモノのインターネットゲートウェイ
US11848926B2 (en) Network authentication
WO2015139442A1 (zh) 本地网络访问的控制方法及装置、计算机存储介质
CN105681259A (zh) 一种开放授权方法、装置及开放平台
WO2013185709A1 (zh) 一种呼叫认证方法、设备和***
US11171927B2 (en) Method for enabling establishment of a direct connection
CN105357224A (zh) 一种智能家居网关注册、移除方法及***
WO2014177106A1 (zh) 一种网络接入控制方法和***
CN105429978B (zh) 数据访问方法、设备及***
CN104349318A (zh) 无线局域网的自动认证方法、装置和***
CN106537962B (zh) 无线网络配置、接入和访问方法、装置及设备
US11178542B1 (en) Method and system for secure device-to-device data communications
WO2016165443A1 (zh) 一种保护机器类通信设备的方法、网络实体及mtc设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14886025

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14886025

Country of ref document: EP

Kind code of ref document: A1