CN106131841A - A kind of access authentication method, equipment and system - Google Patents
A kind of access authentication method, equipment and system Download PDFInfo
- Publication number
- CN106131841A CN106131841A CN201510251045.0A CN201510251045A CN106131841A CN 106131841 A CN106131841 A CN 106131841A CN 201510251045 A CN201510251045 A CN 201510251045A CN 106131841 A CN106131841 A CN 106131841A
- Authority
- CN
- China
- Prior art keywords
- public safety
- safety
- base station
- terminal
- vectors
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention discloses a kind of access authentication method, described method includes: when public safety base station can be connected with core net, receives and store the Safety Vectors for public safety terminal distribution issued by core net;When described public safety base station disconnects with core net, described public safety base station uses described Safety Vectors to be mutually authenticated with described public safety terminal.Meanwhile, the embodiment of the invention also discloses a kind of access authentication equipment and system.
Description
Technical field
The present invention relates to communication technical field, be specifically related to a kind of access authentication method, equipment and system.
Background technology
Fig. 1 is the network architecture schematic diagram of evolution block core net (EPC, Evolved Packet Core),
As it is shown in figure 1, in the EPC network architecture, comprise home subscriber data server (HSS, Home
Subscriber Server), Mobility Management Entity (MME, Mobility Management Entity), clothes
Business gateway (S-GW, Serving Gateway), grouped data network gateway (P-GW, Packet work
Gateway), service universal grouping wireless business supporting node (SGSN, Serving GPRS Support
Node), strategy and charging regulation function entity (PCRF, Policy and Charging Enforcement
Function), wherein:
HSS: be the permanent storage place of user contracting data, is positioned at the home network of user's signing;
MME: be the user contracting data storage place in current network, is responsible for the non-access of terminal to network
Tracking under layer (NAS, Non-Access Stratum) signaling management, terminal idle mode and paging management
Function and bearer management;
S-GW: be the core net gateway that arrives wireless system, is responsible for terminal to the user plane bearer of core net, end
Data buffer storage, the function of network side initiating business request, lawful interception and grouped data under end idle pulley
Route and forwarding capability;
P-GW: be the gateway of EPC and this its exterior network, be responsible for terminal Internet protocol (IP,
Internet Protocol) address distribution, billing function, packet packet filtering, the strategy function such as application;
SGSN: be GSM EDGE Radio Access Network network (GERAN, GPRS EDGE Radio Access
And UMTS Terrestrial radio access network (UTRAN, UMTS Terrestrial Radio Access Network)
Network) user accesses the business support point of EPC network, functionally similar with MME, is responsible for user
The function such as location updating, paging management and bearer management;Wherein, GSM is English Global System For
The abbreviation of Mobile, i.e. global system for mobile communications;EDGE is English Enhanced Data Rate for GSM
The abbreviation of Evolution, i.e. enhanced data rates for gsm evolution technology;UMTS is English Universal
The abbreviation of Mobile Telecommunications System, i.e. UMTS;
PCRF: be responsible for strategy and charging execution function entity (PCEF, Policy and Charging
Enforcement Function) policy control and charging regulation are provided.
Under some case of emergency, base station may disconnect with core net or keep limited connection (i.e.
The message transmission of chain of command can ensure that, but the possibly of user face data cannot ensure), now in the middle part of network
Divide special user, the personnel that such as country's public safety is relevant, need quickly to set up the net of an emergency communication
Network, provides special business under special circumstances with guarantee.The network of emergency communication, is also called isolated network,
The network architecture used there is no different from existing framework, and simply base station may be changed into and has public safety energy
The base station of power, i.e. has the function of part EPC, and it is real that multiple logical functional entities are integrated in one or several
In body public safety base station.
Owing to public safety base station enters public safety pattern, if common terminal needs to access public safety
Base station carries out public safety business, then public safety base station and public safety terminal need to be mutually authenticated, existing
Technology uses double international mobile subscriber identity (IMSI, International Mobile Subscriber
Identification Number) technology, i.e. one IMSI accesses proper network, and an IMSI accesses public
Secure network, but, this pair of IMSI technology has two defects: first is to need terminal to support double IMSI
Technology, and select different IMSI according to different networks, second is to need public safety base station to join in advance
Putting the security parameter of user, this mode has certain limitation, configures which public safety user's needs
Knowing in advance, this is disadvantageous to some emergent occurred events of public safeties, and Consumer's Experience is very poor;It addition, one
Public safety base station can be converted into a bit and be likely located at outlying district, if the peace of the most pre-configured user after suspension
Population parameter all will be had a greatly reduced quality in the ageing of emergency scene and probability.
Summary of the invention
In view of this, embodiment of the present invention expectation provides a kind of access authentication method, equipment and system, can be fast
Speed realizes the access authentication certification of isolated network, it is ensured that the feasibility of emergency communication.
For reaching above-mentioned purpose, the technical scheme of the embodiment of the present invention is achieved in that
Embodiments providing a kind of access authentication method, described method includes:
When public safety base station can be connected with core net, receive and store by core net issue for public
The Safety Vectors of security terminal distribution;
When described public safety base station disconnects with core net, described public safety base station uses described peace
Omnidirectional's amount is mutually authenticated with described public safety terminal.
Preferably, described public safety base station uses described Safety Vectors to carry out phase with described public safety terminal
Certification mutually, including:
If described Safety Vectors for organizing more, one group of peace that described public safety base station prioritizing selection is not used by
Omnidirectional's amount is mutually authenticated with described public safety terminal.
Preferably, described method also includes:
When receiving the Safety Vectors update notification that core net issues, public safety base station according to described safety to
The Safety Vectors stored is updated by amount update notification.
Preferably, receive the Safety Vectors update notification that core net issues, including:
Again it is described public affairs in public safety terminal by public safety base station core network access again and core net
Altogether during security terminal distribution Safety Vectors, receive the Safety Vectors update notification that core net issues.
The embodiment of the present invention additionally provides a kind of access authentication method, and described method includes:
Confirm public safety terminal, and be described public safety terminal distribution Safety Vectors;
Described Safety Vectors is issued to public safety base station, so that when described public safety base station and core net
When disconnecting, described public safety base station uses described Safety Vectors to carry out phase with described public safety terminal
Certification mutually.
Preferably, described confirmation public safety terminal, including:
Public safety terminal is confirmed according to user signing contract information;
Or, confirm public safety terminal according to user signing contract information and terminal ability information.
Preferably, described method also includes:
When being updated to the Safety Vectors of public safety terminal distribution, issue Safety Vectors more to public safety base station
New notice, so that the Safety Vectors stored is updated by described public safety base station.
Preferably, described in be updated to the Safety Vectors of public safety terminal distribution, including:
When described public safety terminal being detected by described public safety base station core network access again, weight
New is public safety terminal distribution Safety Vectors.
The embodiment of the present invention additionally provides a kind of access authentication method, and described method includes:
Public safety terminal distributes Safety Vectors by public safety base station to core network requests, so that described public affairs
Safe base station receives and stores the Safety Vectors that described core net is described public safety terminal distribution altogether;
When public safety base station and core net disconnect, described public safety terminal by described safety to
Amount is mutually authenticated with public safety base station.
Preferably, described public safety terminal distributes Safety Vectors by public safety base station to core network requests,
Including:
Public safety terminal sends service request to public safety base station, so that described public safety base station is by institute
State service request and be forwarded to core net;
Wherein, in described service request, carry user signing contract information or carry user signing contract information and end
End ability information, so that core net is according to described user signing contract information or according to user signing contract information and end
End ability information confirms public safety terminal.
The embodiment of the present invention additionally provides a kind of base station, and described base station includes:
Receive unit, for receiving the Safety Vectors for public safety terminal distribution issued by core net;
Memory element, is used for storing described Safety Vectors;
First authentication ' unit, for when described base station disconnects with core net, using described Safety Vectors
It is mutually authenticated with described public safety terminal.
Preferably, described first authentication ' unit, it is additionally operable to:
If described Safety Vectors for organizing more, one group of Safety Vectors that prioritizing selection is not used by is public with described
Security terminal is mutually authenticated.
Preferably, described reception unit, it is additionally operable to:
Receive the Safety Vectors update notification that core net issues;
Accordingly, described base station also includes:
Updating block, for being updated the Safety Vectors stored according to described Safety Vectors update notification.
Preferably, described reception unit, it is additionally operable to:
Again it is described public peace in public safety terminal by described base station again core network access and core net
During full terminal distribution Safety Vectors, receive the Safety Vectors update notification that core net issues.
The embodiment of the present invention additionally provides a kind of network equipment, and the described network equipment includes:
Confirmation unit, is used for confirming public safety terminal;
Allocation unit, is used for as described public safety terminal distribution Safety Vectors;
Issue unit, for described Safety Vectors is issued to public safety base station, so that when described public peace
When full base station disconnects with described core net, described public safety base station uses described Safety Vectors with described
Public safety terminal is mutually authenticated.
Preferably, described confirmation unit, it is additionally operable to:
Public safety terminal is confirmed according to user signing contract information;
Or, confirm public safety terminal according to user signing contract information and terminal ability information.
Preferably, described allocation unit, it is additionally operable to: be updated to the Safety Vectors of public safety terminal distribution;
Described issue unit, be additionally operable to issue Safety Vectors update notification to public safety base station, so that described
The Safety Vectors stored is updated by public safety base station.
Preferably, described allocation unit, it is additionally operable to:
When described public safety terminal being detected by described public safety base station core network access again, weight
New is public safety terminal distribution Safety Vectors.
The embodiment of the present invention additionally provides a kind of terminal, and described terminal includes:
Request unit, for distributing Safety Vectors by public safety base station to core network requests;
Second authentication ' unit, for when public safety base station disconnects with core net, by described safety
Vector is mutually authenticated with public safety base station.
Preferably, described request unit, it is additionally operable to:
Service request is sent, so that described service request is forwarded to by public safety base station to public safety base station
Core net;
Wherein, in described service request, carry user signing contract information or carry user signing contract information and end
End ability information, so that core net is according to described user signing contract information or according to user signing contract information and end
End ability information confirms public safety terminal.
The embodiment of the present invention additionally provides a kind of access authentication system, and described system includes:
Public safety terminal, for distributing Safety Vectors by public safety base station to network device requests;
Public safety base station, for receive and store by the network equipment issue for public safety terminal distribution
Safety Vectors;When described base station disconnects with core net, use described Safety Vectors and described public peace
Full terminal is mutually authenticated;
The network equipment, is used for confirming public safety terminal, and is described public safety terminal distribution Safety Vectors;
Described Safety Vectors is issued to public safety base station.
Preferably, described public safety terminal is terminal mentioned above;Described public safety base station is above
Described base station;The described network equipment is the network equipment mentioned above.
Access authentication method, equipment and the system that the embodiment of the present invention provides, when public safety base station can be with
When core net connects, receive and store the Safety Vectors for public safety terminal distribution issued by core net;
When described public safety base station and core net disconnect, described public safety base station use described safety to
Amount is mutually authenticated with described public safety terminal.So, the access authentication of isolated network can quickly be realized
Certification, it is ensured that the feasibility of emergency communication, also improves the safety and reliability of authentication.Additionally, use
Technical scheme of the present invention, reduces the requirement to terminal, solves in prior art and " to realize isolating
Require during the access authentication certification of network that terminal supports double IMSI technology, and select according to different networks
Different IMSI " problem;And, it is to avoid the security parameter of user it is pre-configured with by public safety base station
Problem.
Accompanying drawing explanation
Fig. 1 is the network architecture schematic diagram of EPC;
The schematic flow sheet of a kind of access authentication method that Fig. 2 provides for the embodiment of the present invention;
The schematic flow sheet of the another kind of access authentication method that Fig. 3 provides for the embodiment of the present invention;
The schematic flow sheet of another access authentication method that Fig. 4 provides for the embodiment of the present invention;
The composition structural representation of the base station that Fig. 5 provides for the embodiment of the present invention;
The composition structural representation of the network equipment that Fig. 6 provides for the embodiment of the present invention;
The composition structural representation of the terminal that Fig. 7 provides for the embodiment of the present invention;
The composition structural representation of the access authentication system that Fig. 8 provides for the embodiment of the present invention;
Fig. 9 is that the public safety terminal access public safety base station that the embodiment of the present invention provides carries out authentication
Schematic flow sheet one;
Figure 10 is that the public safety terminal that the embodiment of the present invention provides accesses public safety base station and carries out authentication and recognize
The schematic flow sheet two of card.
Detailed description of the invention
The technical solution of the present invention is further elaborated with specific embodiment below in conjunction with the accompanying drawings.
The schematic flow sheet of a kind of access authentication method that Fig. 2 provides for the embodiment of the present invention;Described access is recognized
Card method is applied to base station side, as in figure 2 it is shown, this access authentication method mainly comprises the steps that
Step 201: when public safety base station can be connected with core net, reception by what core net issued is
The Safety Vectors of public safety terminal distribution.
Specifically, often group Safety Vectors at least includes:
Random number, authentication token, Expected Response value, intermediate key.
In the present embodiment, there are two kinds of mode of operations public safety base station, and one is normal mode, and one is public
Safe mode altogether;Wherein, when public safety base station can be connected with core net, public safety is base station initiated
Normal mode;When public safety base station disconnects with core net, the base station initiated public safety of public safety
Pattern.
Step 202: when public safety base station disconnects with core net, public safety base station uses described
Safety Vectors is mutually authenticated with public safety terminal.
Preferably, described public safety base station uses described Safety Vectors to carry out phase with described public safety terminal
Certification mutually, may include that
If described Safety Vectors for organizing more, one group of peace that described public safety base station prioritizing selection is not used by
Omnidirectional's amount is mutually authenticated with described public safety terminal.
Specifically, described public safety base station uses described Safety Vectors to recognize each other mutually with public safety terminal
Card, may include that
Public safety terminal sends public safety service request to public safety base station;
Public safety base station uses the Safety Vectors stored that described public safety terminal is carried out authentication;
If authentication passes through, send public safety service response message to public safety terminal.
In such scheme, it is preferable that described method can also include:
When receiving the Safety Vectors update notification that core net issues, described public safety base station is according to described peace
The Safety Vectors stored is updated by omnidirectional's amount update notification.
Preferably, receive the Safety Vectors update notification that core net issues, may include that
Again it is described public affairs in public safety terminal by public safety base station core network access again and core net
Altogether during security terminal distribution Safety Vectors, receive the Safety Vectors update notification that core net issues.
It is to say, during public safety base station under public safety terminal accesses normal mode again, public
Safe base station will update, by the Safety Vectors of public safety terminal distribution, the safety stored again according to core net
Vector.
Certainly, it is in and core net connection status in public safety base station, and core net has been that public safety is whole
During end distribution Safety Vectors, if core net updates Safety Vectors, core net will issue to public safety base station
Safety Vectors update notification, in order to public safety base station according to described Safety Vectors update notification in time to institute
The Safety Vectors of storage is updated.In other words, public safety terminal access under normal mode public
During safe base station, public safety base station updates, to more newly arriving of Safety Vectors, the peace stored along with core net
Omnidirectional measures.
The access authentication method that the embodiment of the present invention is provided, public safety terminal during authentication,
After being confirmed as public safety terminal by core net, core net issues public safety terminal peace to public safety base station
Omnidirectional measures, when public safety base station transitions public safety pattern, public safety base station use the safety that preserves to
Amount is mutually authenticated with public safety terminal;So, when public safety base station disconnects with core net,
Also can quickly realize the access authentication certification of isolated network, it is ensured that the feasibility of emergency communication, also improve
The safety and reliability of authentication.
The schematic flow sheet of the another kind of access authentication method that Fig. 3 provides for the embodiment of the present invention;Described access
Authentication method is applied to core-network side, as it is shown on figure 3, this access authentication method mainly comprises the steps that
Step 301: confirm public safety terminal, and be described public safety terminal distribution Safety Vectors.
Preferably, described confirmation public safety terminal, may include that
Public safety terminal is confirmed according to user signing contract information;
Or, confirm public safety terminal according to user signing contract information and terminal ability information.
Specifically, often group Safety Vectors at least includes:
Random number, authentication token, Expected Response value, intermediate key.
Step 302: described Safety Vectors is issued to public safety base station, so that when described public safety base
Standing when disconnecting with core net, described public safety base station uses described Safety Vectors and described public safety
Terminal is mutually authenticated.
In such scheme, it is preferable that described method also includes:
When being updated to the Safety Vectors of public safety terminal distribution, issue Safety Vectors more to public safety base station
New notice, so that the Safety Vectors stored is updated by described public safety base station.
It is to say, during public safety terminal accesses the public safety base station under normal mode, core net
Safety Vectors can also be updated according to practical situation.
Preferably, described in be updated to the Safety Vectors of public safety terminal distribution, may include that
When described public safety terminal being detected by described public safety base station core network access again, weight
New is public safety terminal distribution Safety Vectors.
It is to say, during public safety base station under public safety terminal accesses normal mode again, core
Net is public safety terminal distribution Safety Vectors again.
Preferably, described public safety base station uses described Safety Vectors to carry out phase with described public safety terminal
Certification mutually, may include that
If described Safety Vectors for organizing more, one group of peace that described public safety base station prioritizing selection is not used by
Omnidirectional's amount is mutually authenticated with described public safety terminal.
The access authentication method that the embodiment of the present invention is provided, public safety terminal during authentication,
After being confirmed as public safety terminal by core net, core net issues public safety terminal peace to public safety base station
Omnidirectional measures, in order to when public safety base station transitions public safety pattern, and public safety base station uses and preserves
Safety Vectors be mutually authenticated with public safety terminal;So, break with core net in public safety base station
When opening connection, also can quickly realize the access authentication certification of isolated network, it is ensured that the feasibility of emergency communication,
Also the safety and reliability of authentication is improved.
The schematic flow sheet of another access authentication method that Fig. 4 provides for the embodiment of the present invention;Described access
Authentication method is applied to end side, and as shown in Figure 4, this access authentication method mainly comprises the steps that
Step 401: public safety terminal is described public safety by public safety base station to core network requests
Terminal distribution Safety Vectors, so that it is described public that described public safety base station receives and store described core net
The Safety Vectors of security terminal distribution.
Preferably, described public safety terminal is described public peace by public safety base station to core network requests
Full terminal distribution Safety Vectors, may include that
Public safety terminal sends service request to public safety base station, so that described public safety base station is by institute
State service request and be forwarded to core net;
Wherein, in described service request, carry user signing contract information or carry user signing contract information and end
End ability information, so that core net is according to described user signing contract information or according to user signing contract information and end
End ability information confirms public safety terminal.
Step 402: when public safety base station disconnects with core net, described public safety terminal is passed through
Described Safety Vectors is mutually authenticated with public safety base station.
A kind of access authentication method that the embodiment of the present invention provides, terminal notification core network user CAMEL-Subscription-Information,
Or notice core net terminal ability information and user signing contract information, in order to core net is known this terminal and had
Public safety ability, and generate corresponding Safety Vectors for it, corresponding Safety Vectors is handed down to public peace
Full base station, and then make when public safety base station transitions public safety pattern, public safety base station uses preservation
Safety Vectors is mutually authenticated with public safety terminal;So, disconnect with core net in public safety base station
During connection, also can quickly realize the access authentication certification of isolated network, it is ensured that the feasibility of emergency communication,
Also the safety and reliability of authentication is improved.
The composition structural representation of the base station that Fig. 5 provides for the embodiment of the present invention, as it is shown in figure 5, described base
Station includes:
Receive unit 51, for receiving the Safety Vectors for public safety terminal distribution issued by core net;
Memory element 52, is used for storing described Safety Vectors;
First authentication ' unit 53, for when described base station and core net disconnect, use described safety to
Amount is mutually authenticated with described public safety terminal.
Preferably, described first authentication ' unit 53, specifically for:
If described Safety Vectors for organizing more, one group of Safety Vectors that prioritizing selection is not used by is public with described
Security terminal is mutually authenticated.
Preferably, described reception unit 51, it is additionally operable to:
Receive the Safety Vectors update notification that core net issues;
Accordingly, described base station also includes:
Updating block 54, for carrying out more according to the described Safety Vectors update notification Safety Vectors to being stored
Newly.
Preferably, described reception unit 51, specifically it is additionally operable to:
Again it is described public peace in public safety terminal by described base station again core network access and core net
During full terminal distribution Safety Vectors, receive the Safety Vectors update notification that core net issues.
It will be appreciated by those skilled in the art that the function that realizes of each unit in the base station shown in Fig. 5 can refer to
The associated description of aforementioned data access authentication method and understand.
In actual application, described reception unit 51, memory element the 52, first authentication ' unit 53, renewal list
Unit 54 can by the central processing unit (CPU, Central Processing Unit) in base station, microprocessor (MPU,
Micro Processor Unit), digital signal processor (DSP, Digital Signal Processor) or existing
Field programmable gate arrays (FPGA, Field Programmable Gate Array) etc. realize.
The composition structural representation of the network equipment that Fig. 6 provides for the embodiment of the present invention, as shown in Figure 6, institute
State the network equipment to include:
Confirmation unit 61, is used for confirming public safety terminal;
Allocation unit 62, is used for as described public safety terminal distribution Safety Vectors;
Issue unit 63, for described Safety Vectors is issued to public safety base station, so that when described public
When safe base station and core net disconnect, described public safety base station uses described Safety Vectors and described public affairs
Security terminal is mutually authenticated altogether.
Preferably, described confirmation unit 61, it is additionally operable to:
Public safety terminal is confirmed according to user signing contract information;
Or, confirm public safety terminal according to user signing contract information and terminal ability information.
Preferably, described allocation unit 62, it is additionally operable to: be updated to the Safety Vectors of public safety terminal distribution;
Described issue unit 63, be additionally operable to issue Safety Vectors update notification to public safety base station, so that institute
State public safety base station the Safety Vectors stored is updated.
Preferably, described allocation unit 62, it is additionally operable to:
When described public safety terminal being detected by described public safety base station core network access again, weight
New is public safety terminal distribution Safety Vectors.
It will be appreciated by those skilled in the art that the function that realizes of each unit in the network equipment shown in Fig. 6 can
Understand with reference to the associated description of aforementioned data access authentication method.
In actual application, described confirmation unit 61, allocation unit 62, issuing unit 63 can be by the network equipment
In CPU, MPU, DSP or FPGA etc. realize.
The composition structural representation of the terminal that Fig. 7 provides for the embodiment of the present invention, as it is shown in fig. 7, described end
End includes:
Request unit 71, for distributing Safety Vectors by public safety base station to core network requests;
Second authentication ' unit 72, for when public safety base station disconnects with core net, by described peace
Omnidirectional's amount is mutually authenticated with public safety base station.
Preferably, described request unit 71, it is additionally operable to:
Service request is sent, so that described service request is forwarded to by public safety base station to public safety base station
Core net;
Wherein, in described service request, carry user signing contract information or carry user signing contract information and end
End ability information, so that core net is according to described user signing contract information or according to user signing contract information and end
End ability information confirms public safety terminal.
It will be appreciated by those skilled in the art that the function that realizes of each unit in the terminal shown in Fig. 7 can refer to
The associated description of aforementioned data access authentication method and understand.
In actual application, described request unit the 71, second authentication ' unit 72 can be by the central authorities' process in terminal
Device CPU, MPU, DSP or FPGA etc. realize.
The composition structural representation of the access authentication system that Fig. 8 provides for the embodiment of the present invention, as shown in Figure 8,
Described system includes:
Public safety terminal 81, for by public safety base station to the network equipment 83 request distribution safety to
Amount;
Public safety base station 82, for receive and store by the network equipment 83 issue for public safety terminal
The Safety Vectors of 81 distribution;When described public safety base station 82 disconnects with core net, use described
Safety Vectors is mutually authenticated with described public safety terminal 81;
The network equipment 83, is used for confirming public safety terminal 81, and distributes for described public safety terminal 81
Safety Vectors;Described Safety Vectors is issued to public safety base station 82.
Preferably, the described network equipment 83, it is additionally operable to:
It is updated to the Safety Vectors of public safety terminal 81 distribution, and issues safety to public safety base station 82
Vector update notification.
Preferably, described public safety base station 82, when being additionally operable to receive Safety Vectors update notification, to institute
The Safety Vectors of storage is updated.
Specifically, the composition structural representation of described public safety terminal can be as shown in Figure 7;Described public
The composition structural representation of safe base station can be as shown in Figure 5;The composition structural representation of the described network equipment
Can be as shown in Figure 6;Do not repeat them here.
Fig. 9 is that the public safety terminal access public safety base station that the embodiment of the present invention provides carries out authentication
Schematic flow sheet one, as it is shown in figure 9, this flow process mainly comprises the steps that
Step 901: public safety terminal sends service request to public safety base station.
Wherein, carrying terminal ability information in described service request, described terminal ability information is for table
Levy this public safety terminal and there is the information of public safety ability.
Here, described service request can also be user's access request, wherein, in described user's access request
Also terminal ability information is carried.
Step 902: after public safety base station receives service request, forwards described to Mobility Management Entity
Service request.
Wherein, described service request carries terminal ability information.
Here, when in step 901, what public safety terminal sent to public safety base station is user accesses please
When asking, after public safety base station receives described user's access request, forward described to Mobility Management Entity
User's access request;Wherein, described user's access request also carries terminal ability information.
Step 903: Mobility Management Entity sends authentication request to home subscriber data server.
Wherein, also carried terminal ability information in the request of described authentication.
Step 904: home subscriber data server confirms to make according to terminal ability information and user signing contract information
By this public safety terminal.
Specifically, home subscriber data server judges to send according to terminal ability information and user signing contract information
Whether the terminal of service request (or user's access request) is public safety terminal, if it is, generate correspondence
Safety Vectors.Here, the most how to generate the method that can refer to generate authentication vector in prior art,
This repeats no more.
Owing to public safety base station has the function of part EPC, needing to set up the situation of Emergency Communications Network
Under, if common terminal needs to access public safety base station carries out public safety business, then public safety base station
Described Safety Vectors and public safety terminal is used to be mutually authenticated.
Step 905: home subscriber data server sends authentication request response to Mobility Management Entity
Message.
Wherein, described authentication request response carries one or more groups Safety Vectors.
Here, often group Safety Vectors includes at least: random number, authentication token, Expected Response value and centre are close
Key.
When described Safety Vectors for organizing more, a part can be designated the safety under public safety pattern
Vector, remainder can be designated the Safety Vectors under normal mode, and now, described many groups are at least
It it is 2 groups.
Step 906: according to network configuration, Mobility Management Entity determines that public safety base station has public safety
Ability, sends service request response message to public safety base station.
Here, when described public safety base station receives authentication request response, described authentication is preserved
One group or multigroup safety vector entrained in certification request response.
Wherein, described service request response message carries one group or multigroup safety vector, also carries IMSI,
Described IMSI is used for associating Safety Vectors.
Step 907: public safety base station sends service request response message to public safety terminal.
So far, public safety terminal completes the service request under the normal mode of public safety base station, and ownership is used
User data server, while updating Safety Vectors, also can inform public safety by Mobility Management Entity
Base station updates the Safety Vectors preserved.
Here, initiate to public safety base station when public safety terminal in step 902 is user's access request
Time, behind public safety base station and public safety terminal mutual authentication certification success, public safety base station is to public
Security terminal sends user's access request response message.
Step 908: public safety base station and core net network suspension.
Under emergency scene, under the such as natural disaster such as earthquake, flood, due to public safety base station and movement
Property the core net such as management entity between network connect and disconnect, core net can not be recovered within a period of time.
Step 909: the base station initiated contingency mode of public safety, is converted to public safety pattern.
Step 910: public safety base station is to its corresponding public safety network of terminal broadcast covered.
Step 911: public safety terminal detects public safety network.
Step 912: public safety terminal initiates public safety service request to public safety base station.
Here, described public safety service request can also be attachment public safety network request.
Step 913: public safety base station uses the Safety Vectors preserved and public safety terminal to carry out mutually
Authentication.
If it should be noted that the Safety Vectors that public safety base station preserves is many groups, then public safety
Base station polling one of which and public safety terminal carry out authentication.
Such as, when 5 groups of Safety Vectors are preserved in public safety base station, it is assumed that described 5 groups of Safety Vectors are used
Serial number is expressed as NO1, NO2, NO3, NO4, NO5, when Serial No. NO1 Safety Vectors
When being used, if again carry out authentication, Safety Vectors will be selected from other remaining Safety Vectors,
In order to avoid avoiding stolen because using identical Safety Vectors or divulging a secret.
Step 914: behind public safety base station and public safety terminal mutual authentication certification success, public safety
Base station sends public safety service request response message to public safety terminal.
Here, when public safety terminal in step 912 initiate to public safety base station be attachment public safety
During network request, behind public safety base station and public safety terminal mutual authentication certification success, public safety base
Stand and send attachment public safety network request response to public safety terminal.
Step 915: public safety base station is recovered network and connected, and closes public safety pattern, and is just converted into
Norm formula.
Specifically, after a period of time, public safety base station is recovered network and is connected, and will close public safety pattern,
It is converted into normal mode, and (here, the most also includes not possessing public affairs to the public safety terminal serviced
The terminal of security capabilities altogether) broadcast proper network mark.
Step 916: public safety terminal initiates the request of attachment removal public safety network to public safety base station.
Here, described attachment removal public safety network actively can also be initiated by public safety base station.
Such as, at public safety terminal closedown, or when public safety terminal leaves public safety network one section
Between when (such as 20 hours or 15 days), attachment removal public safety is actively initiated in public safety base station
Network.
Step 917: public safety terminal is re-attached to core net by the normal mode of public safety base station
Network, core network issues new Safety Vectors to public safety base station, and the renewal of public safety base station is stored
Safety Vectors.
Figure 10 is that the public safety terminal that the embodiment of the present invention provides accesses public safety base station and carries out authentication and recognize
The schematic flow sheet two of card, as shown in Figure 10, this flow process mainly comprises the steps that
Step 1001: public safety terminal sends service request to public safety base station.
Wherein, not carried terminal ability information in described service request.
Here, described service request can also be user's access request, wherein, in described user's access request
The most not carried terminal ability information.
Step 1002: after public safety base station receives service request, forwards described to Mobility Management Entity
Service request.
Here, send to public safety base station when public safety terminal in step 1001 is user's access request
Time, after public safety base station receives described user's access request, forward described use to Mobility Management Entity
Family access request.
Step 1003: Mobility Management Entity sends authentication request to home subscriber data server.
Step 1004: home subscriber data server confirms to use this public safety eventually according to user signing contract information
End.
Specifically, home subscriber data server according to user signing contract information judge send service request (or use
Family access request) terminal whether be public safety terminal, if it is, generate corresponding Safety Vectors.
Step 1005: home subscriber data server sends authentication request response to Mobility Management Entity
Message.
Wherein, described authentication request response carries one or more groups Safety Vectors.
Here, often group Safety Vectors includes at least: random number, authentication token, Expected Response value and centre are close
Key.
When described Safety Vectors for organizing more, a part can be designated the safety under public safety pattern
Vector, remainder can be designated the Safety Vectors under normal mode, and now, described many groups are at least
It it is 2 groups.
Step 1006: according to network configuration, Mobility Management Entity determines that public safety base station has public safety
Ability, sends service request response message to public safety base station.
Here, when described public safety base station receives authentication request response, described authentication is preserved
One group or multigroup safety vector entrained in certification request response.
Wherein, described service request response message carries one group or multigroup safety vector, also carries IMSI,
Described IMSI is used for associating Safety Vectors.
Step 1007: public safety base station sends service request response message to public safety terminal.
So far, public safety terminal completes the service request under the normal mode of public safety base station, and ownership is used
User data server, while updating Safety Vectors, also can inform public safety by Mobility Management Entity
Base station updates the Safety Vectors preserved.
Here, initiate to public safety base station when public safety terminal in step 1002 is user's access request
Time, behind public safety base station and public safety terminal mutual authentication certification success, public safety base station is to public
Security terminal sends user's access request response message.
Step 1008: public safety base station and core net network suspension.
Under emergency scene, under the such as natural disaster such as earthquake, flood, due to public safety base station and movement
Property the core net such as management entity between network connect and disconnect, core net can not be recovered within a period of time.
Step 1009: the base station initiated contingency mode of public safety, is converted to public safety pattern.
Step 1010: public safety base station is to its corresponding public safety network of terminal broadcast covered.
Step 1011: public safety terminal detects public safety network.
Step 1012: public safety terminal initiates public safety service request to public safety base station.
Here, described public safety service request can also be attachment public safety network request.
Step 1013: public safety base station uses the Safety Vectors preserved and public safety terminal to carry out mutually
Authentication.
If it should be noted that the Safety Vectors that public safety base station preserves is many groups, then public safety
Base station polling one of which and public safety terminal carry out authentication.
Such as, when 5 groups of Safety Vectors are preserved in public safety base station, it is assumed that described 5 groups of Safety Vectors are used
Serial number is expressed as NO1, NO2, NO3, NO4, NO5, when Serial No. NO1 Safety Vectors
When being used, if again carry out authentication, Safety Vectors will be selected from other remaining Safety Vectors,
In order to avoid avoiding stolen because using identical Safety Vectors or divulging a secret.
Step 1014: behind public safety base station and public safety terminal mutual authentication certification success, public safety
Base station sends public safety service request response message to public safety terminal.
Here, when public safety terminal in step 1012 initiate to public safety base station be attachment public safety
During network request, behind public safety base station and public safety terminal mutual authentication certification success, public safety base
Stand and send attachment public safety network request response to public safety terminal.
Step 1015: public safety base station is recovered network and connected, and closes public safety pattern, and is just converted into
Norm formula.
Specifically, after a period of time, public safety base station is recovered network and is connected, and will close public safety pattern,
It is converted into normal mode, and (here, the most also includes not possessing public affairs to the public safety terminal serviced
The terminal of security capabilities altogether) broadcast proper network mark.
Step 1016: public safety terminal initiates the request of attachment removal public safety network to public safety base station.
Here, described attachment removal public safety network actively can also be initiated by public safety base station.
Such as, at public safety terminal closedown, or when public safety terminal leaves public safety network one section
Between when (such as 5 hours or 2 days), attachment removal public safety net is actively initiated in public safety base station
Network.
Step 1017: public safety terminal is re-attached to core net by the normal mode of public safety base station
Network, core network issues new Safety Vectors to public safety base station, and the renewal of public safety base station is stored
Safety Vectors.
The embodiment of the present invention has also stated that a kind of computer-readable storage medium, stores in described computer-readable storage medium
Computer executable instructions, described computer executable instructions is had to be used for performing aforementioned such as Fig. 2 or Fig. 3 or figure
Access authentication method shown in 4.
In several embodiments provided herein, it should be understood that disclosed equipment and method, can
To realize by another way.Apparatus embodiments described above is only schematically, such as, and institute
Stating the division of unit, be only a kind of logic function and divide, actual can have other dividing mode when realizing,
As: multiple unit or assembly can be in conjunction with, or it is desirably integrated into another system, or some features can be neglected
Slightly, or do not perform.It addition, the coupling each other of shown or discussed each ingredient or directly coupling
Close or communication connection can be the INDIRECT COUPLING by some interfaces, equipment or unit or communication connection, can
Be electrical, machinery or other form.
The above-mentioned unit illustrated as separating component can be or may not be physically separate, as
The parts that unit shows can be or may not be physical location, i.e. may be located at a place, it is possible to
To be distributed on multiple NE;Part or all of unit therein can be selected according to the actual needs
Realize the purpose of the present embodiment scheme.
It addition, each functional unit in various embodiments of the present invention can be fully integrated in a processing unit,
Can also be that each unit is individually as a unit, it is also possible to two or more unit are integrated in one
In individual unit;Above-mentioned integrated unit both can realize to use the form of hardware, it would however also be possible to employ hardware adds soft
The form of part functional unit realizes.
One of ordinary skill in the art will appreciate that: all or part of step realizing said method embodiment can
Completing with the hardware relevant by programmed instruction, aforesaid program can be stored in an embodied on computer readable and deposit
In storage media, this program upon execution, performs to include the step of said method embodiment;And aforesaid storage
Medium includes: movable storage device, read only memory (ROM, Read-Only Memory), magnetic disc or
The various media that can store program code such as person's CD.
Or, if the above-mentioned integrated unit of the present invention is using the form realization of SFU software functional unit and as independent
Production marketing or use time, it is also possible to be stored in a computer read/write memory medium.Based on so
Understanding, the part that prior art is contributed by the technical scheme of the embodiment of the present invention the most in other words can
Embodying with the form with software product, this computer software product is stored in a storage medium, bag
Include some instructions with so that a computer equipment (can be personal computer, server or network
Equipment etc.) perform all or part of of method described in each embodiment of the present invention.And aforesaid storage medium bag
Include: the various media that can store program code such as movable storage device, ROM, magnetic disc or CD.
The above, only presently preferred embodiments of the present invention, it is not intended to limit the protection model of the present invention
Enclose.All any amendment, equivalent and improvement etc. made within the spirit and principles in the present invention, all should
Within being included in protection scope of the present invention.
Claims (22)
1. an access authentication method, it is characterised in that described method includes:
When public safety base station can be connected with core net, receive and store by core net issue for public
The Safety Vectors of security terminal distribution;
When described public safety base station disconnects with core net, described public safety base station uses described peace
Omnidirectional's amount is mutually authenticated with described public safety terminal.
Method the most according to claim 1, it is characterised in that described public safety base station uses described
Safety Vectors is mutually authenticated with described public safety terminal, including:
If described Safety Vectors for organizing more, one group of peace that described public safety base station prioritizing selection is not used by
Omnidirectional's amount is mutually authenticated with described public safety terminal.
Method the most according to claim 1, it is characterised in that described method also includes:
When receiving the Safety Vectors update notification that core net issues, public safety base station according to described safety to
The Safety Vectors stored is updated by amount update notification.
Method the most according to claim 3, it is characterised in that receive the Safety Vectors that core net issues
Update notification, including:
Again it is described public affairs in public safety terminal by public safety base station core network access again and core net
Altogether during security terminal distribution Safety Vectors, receive the Safety Vectors update notification that core net issues.
5. an access authentication method, it is characterised in that described method includes:
Confirm public safety terminal, and be described public safety terminal distribution Safety Vectors;
Described Safety Vectors is issued to public safety base station, so that when described public safety base station and core net
When disconnecting, described public safety base station uses described Safety Vectors to carry out phase with described public safety terminal
Certification mutually.
Method the most according to claim 5, it is characterised in that described confirmation public safety terminal, bag
Include:
Public safety terminal is confirmed according to user signing contract information;
Or, confirm public safety terminal according to user signing contract information and terminal ability information.
Method the most according to claim 5, it is characterised in that described method also includes:
When being updated to the Safety Vectors of public safety terminal distribution, issue Safety Vectors more to public safety base station
New notice, so that the Safety Vectors stored is updated by described public safety base station.
Method the most according to claim 7, it is characterised in that described in be updated to public safety terminal and divide
The Safety Vectors joined, including:
When described public safety terminal being detected by described public safety base station core network access again, weight
New is public safety terminal distribution Safety Vectors.
9. an access authentication method, it is characterised in that described method includes:
Public safety terminal distributes Safety Vectors by public safety base station to core network requests, so that described public affairs
Safe base station receives and stores the Safety Vectors that described core net is described public safety terminal distribution altogether;
When public safety base station and core net disconnect, described public safety terminal by described safety to
Amount is mutually authenticated with public safety base station.
Method the most according to claim 9, it is characterised in that described public safety terminal is by public affairs
Safety Vectors is distributed to core network requests in safe base station altogether, including:
Public safety terminal sends service request to public safety base station, so that described public safety base station is by institute
State service request and be forwarded to core net;
Wherein, in described service request, carry user signing contract information or carry user signing contract information and end
End ability information, so that core net is according to described user signing contract information or according to user signing contract information and end
End ability information confirms public safety terminal.
11. 1 kinds of base stations, it is characterised in that described base station includes:
Receive unit, for receiving the Safety Vectors for public safety terminal distribution issued by core net;
Memory element, is used for storing described Safety Vectors;
First authentication ' unit, for when described base station disconnects with core net, using described Safety Vectors
It is mutually authenticated with described public safety terminal.
12. base stations according to claim 11, it is characterised in that described first authentication ' unit, also use
In:
If described Safety Vectors for organizing more, one group of Safety Vectors that prioritizing selection is not used by is public with described
Security terminal is mutually authenticated.
13. base stations according to claim 11, it is characterised in that described reception unit, are additionally operable to:
Receive the Safety Vectors update notification that core net issues;
Accordingly, described base station also includes:
Updating block, for being updated the Safety Vectors stored according to described Safety Vectors update notification.
14. base stations according to claim 13, it is characterised in that described reception unit, are additionally operable to:
Again it is described public peace in public safety terminal by described base station again core network access and core net
During full terminal distribution Safety Vectors, receive the Safety Vectors update notification that core net issues.
15. 1 kinds of network equipments, it is characterised in that the described network equipment includes:
Confirmation unit, is used for confirming public safety terminal;
Allocation unit, is used for as described public safety terminal distribution Safety Vectors;
Issue unit, for described Safety Vectors is issued to public safety base station, so that when described public peace
When full base station disconnects with described core net, described public safety base station uses described Safety Vectors with described
Public safety terminal is mutually authenticated.
16. network equipments according to claim 15, it is characterised in that described confirmation unit, also use
In:
Public safety terminal is confirmed according to user signing contract information;
Or, confirm public safety terminal according to user signing contract information and terminal ability information.
17. network equipments according to claim 15, it is characterised in that described allocation unit, also use
In: it is updated to the Safety Vectors of public safety terminal distribution;
Described issue unit, be additionally operable to issue Safety Vectors update notification to public safety base station, so that described
The Safety Vectors stored is updated by public safety base station.
18. network equipments according to claim 17, it is characterised in that described allocation unit, also use
In:
When described public safety terminal being detected by described public safety base station core network access again, weight
New is public safety terminal distribution Safety Vectors.
19. 1 kinds of terminals, it is characterised in that described terminal includes:
Request unit, for distributing Safety Vectors by public safety base station to core network requests;
Second authentication ' unit, for when public safety base station disconnects with core net, by described safety
Vector is mutually authenticated with public safety base station.
20. terminals according to claim 19, it is characterised in that described request unit, are additionally operable to:
Service request is sent, so that described service request is forwarded to by public safety base station to public safety base station
Core net;
Wherein, in described service request, carry user signing contract information or carry user signing contract information and end
End ability information, so that core net is according to described user signing contract information or according to user signing contract information and end
End ability information confirms public safety terminal.
21. 1 kinds of access authentication systems, it is characterised in that described system includes:
Public safety terminal, for distributing Safety Vectors by public safety base station to network device requests;
Public safety base station, for receive and store by the network equipment issue for public safety terminal distribution
Safety Vectors;When described base station disconnects with core net, use described Safety Vectors and described public peace
Full terminal is mutually authenticated;
The network equipment, is used for confirming public safety terminal, and is described public safety terminal distribution Safety Vectors;
Described Safety Vectors is issued to public safety base station.
22. systems according to claim 21, it is characterised in that described public safety terminal is power
Terminal described in 19 or 20;Described public safety base station is power base station described in 11 to 14 any one;Institute
Stating the network equipment is the power network equipment described in 15 to 18 any one.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510251045.0A CN106131841A (en) | 2015-05-15 | 2015-05-15 | A kind of access authentication method, equipment and system |
PCT/CN2015/094607 WO2016184057A1 (en) | 2015-05-15 | 2015-11-13 | Access authentication method, apparatus, system, and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510251045.0A CN106131841A (en) | 2015-05-15 | 2015-05-15 | A kind of access authentication method, equipment and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106131841A true CN106131841A (en) | 2016-11-16 |
Family
ID=57319226
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510251045.0A Pending CN106131841A (en) | 2015-05-15 | 2015-05-15 | A kind of access authentication method, equipment and system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106131841A (en) |
WO (1) | WO2016184057A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110933612A (en) * | 2019-12-25 | 2020-03-27 | 追信数字科技有限公司 | Emergency communication method and device |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113905379B (en) * | 2021-10-15 | 2024-05-03 | 绍兴建元电力集团有限公司 | Method for locally optimizing security communication authentication of 5G base station participation terminal |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1630405A (en) * | 2003-12-18 | 2005-06-22 | 中国电子科技集团公司第三十研究所 | Method of bidirectional authentication during subscriber switch in digital cellular mobile communication system |
CN101374346A (en) * | 2008-07-31 | 2009-02-25 | 华为技术有限公司 | Method, system and equipment for implementing terminal communication |
CN101466107A (en) * | 2008-12-31 | 2009-06-24 | 华为技术有限公司 | Method, device and base station for providing business |
US20100122321A1 (en) * | 2007-03-12 | 2010-05-13 | Nokia Corporation | System and method for authentication for wireless emergency services |
CN104244297A (en) * | 2013-06-14 | 2014-12-24 | 中国普天信息产业股份有限公司 | Broadband cluster fail-soft communication method and base station based on TD-LTE |
CN104349315A (en) * | 2013-07-31 | 2015-02-11 | 普天信息技术研究院有限公司 | Method and system for assuring information security for base station and user equipment |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102056168A (en) * | 2009-10-28 | 2011-05-11 | 中兴通讯股份有限公司 | Access method and device |
-
2015
- 2015-05-15 CN CN201510251045.0A patent/CN106131841A/en active Pending
- 2015-11-13 WO PCT/CN2015/094607 patent/WO2016184057A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1630405A (en) * | 2003-12-18 | 2005-06-22 | 中国电子科技集团公司第三十研究所 | Method of bidirectional authentication during subscriber switch in digital cellular mobile communication system |
US20100122321A1 (en) * | 2007-03-12 | 2010-05-13 | Nokia Corporation | System and method for authentication for wireless emergency services |
CN101374346A (en) * | 2008-07-31 | 2009-02-25 | 华为技术有限公司 | Method, system and equipment for implementing terminal communication |
CN101466107A (en) * | 2008-12-31 | 2009-06-24 | 华为技术有限公司 | Method, device and base station for providing business |
CN104244297A (en) * | 2013-06-14 | 2014-12-24 | 中国普天信息产业股份有限公司 | Broadband cluster fail-soft communication method and base station based on TD-LTE |
CN104349315A (en) * | 2013-07-31 | 2015-02-11 | 普天信息技术研究院有限公司 | Method and system for assuring information security for base station and user equipment |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110933612A (en) * | 2019-12-25 | 2020-03-27 | 追信数字科技有限公司 | Emergency communication method and device |
CN110933612B (en) * | 2019-12-25 | 2020-12-18 | 追信数字科技有限公司 | Emergency communication method and device |
Also Published As
Publication number | Publication date |
---|---|
WO2016184057A1 (en) | 2016-11-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11445406B2 (en) | Communication system, communication control apparatus, node apparatus, and communication method for performing load balancing in a system | |
CA2976033C (en) | Long term evolution (lte) communications over trusted hardware | |
CN107852601A (en) | The network architecture and security with encrypted client device context | |
JP6164219B2 (en) | Mobile communication system, control device, communication control method, and program | |
CN108632815A (en) | Communication means and equipment | |
CN101931946B (en) | Multi-access method of terminal in evolved packet system and system thereof | |
CN105491617A (en) | Method for supporting local offloading of business and base station sub-system | |
CN106416338A (en) | Apparatus, system and method for dedicated core network | |
CN101686520A (en) | Method supporting home base station context management | |
CN101384015B (en) | Distributed telecommunication apparatus and service processing method for distributed telecommunication apparatus | |
CN103237342A (en) | Cross identity registration method for co-group users of time division-long term evolution-based (TD-LTE-based) public network and cluster | |
CN101018395B (en) | Method for recovering the IP address and network resource occupied by the user device | |
CN103238345A (en) | Communication method, device and system all based on mobile management entity pool (MME Pool) | |
EP1547352B1 (en) | Mobile terminal identity protection through home location register modification | |
CN105744519B (en) | A kind of intercepting method, equipment of the core network and base station | |
US20110044309A1 (en) | Method and device for deploying tracking areas | |
CN111356163B (en) | System information notification method, base station equipment and computer storage equipment | |
CN101754488B (en) | Logic control class communication equipment and communication method therefor | |
CN110460961A (en) | A kind of report method and system of group endpoints position | |
EP2717546B1 (en) | Method and device for acquiring destination ip address | |
CN106131841A (en) | A kind of access authentication method, equipment and system | |
CN102821385A (en) | Methods and network entity for sending public warning system (PWS) key information to terminal | |
RU2668114C2 (en) | Method of managing shared network users, corresponding device and system | |
CN101159625B (en) | System and method of implementing monitor for police for WiMAX | |
CN102833743A (en) | Sending method, updating method and corresponding equipment for key updating information of public warning system (PWS) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20161116 |