[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN106131841A - A kind of access authentication method, equipment and system - Google Patents

A kind of access authentication method, equipment and system Download PDF

Info

Publication number
CN106131841A
CN106131841A CN201510251045.0A CN201510251045A CN106131841A CN 106131841 A CN106131841 A CN 106131841A CN 201510251045 A CN201510251045 A CN 201510251045A CN 106131841 A CN106131841 A CN 106131841A
Authority
CN
China
Prior art keywords
public safety
safety
base station
terminal
vectors
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510251045.0A
Other languages
Chinese (zh)
Inventor
游世林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201510251045.0A priority Critical patent/CN106131841A/en
Priority to PCT/CN2015/094607 priority patent/WO2016184057A1/en
Publication of CN106131841A publication Critical patent/CN106131841A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a kind of access authentication method, described method includes: when public safety base station can be connected with core net, receives and store the Safety Vectors for public safety terminal distribution issued by core net;When described public safety base station disconnects with core net, described public safety base station uses described Safety Vectors to be mutually authenticated with described public safety terminal.Meanwhile, the embodiment of the invention also discloses a kind of access authentication equipment and system.

Description

A kind of access authentication method, equipment and system
Technical field
The present invention relates to communication technical field, be specifically related to a kind of access authentication method, equipment and system.
Background technology
Fig. 1 is the network architecture schematic diagram of evolution block core net (EPC, Evolved Packet Core), As it is shown in figure 1, in the EPC network architecture, comprise home subscriber data server (HSS, Home Subscriber Server), Mobility Management Entity (MME, Mobility Management Entity), clothes Business gateway (S-GW, Serving Gateway), grouped data network gateway (P-GW, Packet work Gateway), service universal grouping wireless business supporting node (SGSN, Serving GPRS Support Node), strategy and charging regulation function entity (PCRF, Policy and Charging Enforcement Function), wherein:
HSS: be the permanent storage place of user contracting data, is positioned at the home network of user's signing;
MME: be the user contracting data storage place in current network, is responsible for the non-access of terminal to network Tracking under layer (NAS, Non-Access Stratum) signaling management, terminal idle mode and paging management Function and bearer management;
S-GW: be the core net gateway that arrives wireless system, is responsible for terminal to the user plane bearer of core net, end Data buffer storage, the function of network side initiating business request, lawful interception and grouped data under end idle pulley Route and forwarding capability;
P-GW: be the gateway of EPC and this its exterior network, be responsible for terminal Internet protocol (IP, Internet Protocol) address distribution, billing function, packet packet filtering, the strategy function such as application;
SGSN: be GSM EDGE Radio Access Network network (GERAN, GPRS EDGE Radio Access And UMTS Terrestrial radio access network (UTRAN, UMTS Terrestrial Radio Access Network) Network) user accesses the business support point of EPC network, functionally similar with MME, is responsible for user The function such as location updating, paging management and bearer management;Wherein, GSM is English Global System For The abbreviation of Mobile, i.e. global system for mobile communications;EDGE is English Enhanced Data Rate for GSM The abbreviation of Evolution, i.e. enhanced data rates for gsm evolution technology;UMTS is English Universal The abbreviation of Mobile Telecommunications System, i.e. UMTS;
PCRF: be responsible for strategy and charging execution function entity (PCEF, Policy and Charging Enforcement Function) policy control and charging regulation are provided.
Under some case of emergency, base station may disconnect with core net or keep limited connection (i.e. The message transmission of chain of command can ensure that, but the possibly of user face data cannot ensure), now in the middle part of network Divide special user, the personnel that such as country's public safety is relevant, need quickly to set up the net of an emergency communication Network, provides special business under special circumstances with guarantee.The network of emergency communication, is also called isolated network, The network architecture used there is no different from existing framework, and simply base station may be changed into and has public safety energy The base station of power, i.e. has the function of part EPC, and it is real that multiple logical functional entities are integrated in one or several In body public safety base station.
Owing to public safety base station enters public safety pattern, if common terminal needs to access public safety Base station carries out public safety business, then public safety base station and public safety terminal need to be mutually authenticated, existing Technology uses double international mobile subscriber identity (IMSI, International Mobile Subscriber Identification Number) technology, i.e. one IMSI accesses proper network, and an IMSI accesses public Secure network, but, this pair of IMSI technology has two defects: first is to need terminal to support double IMSI Technology, and select different IMSI according to different networks, second is to need public safety base station to join in advance Putting the security parameter of user, this mode has certain limitation, configures which public safety user's needs Knowing in advance, this is disadvantageous to some emergent occurred events of public safeties, and Consumer's Experience is very poor;It addition, one Public safety base station can be converted into a bit and be likely located at outlying district, if the peace of the most pre-configured user after suspension Population parameter all will be had a greatly reduced quality in the ageing of emergency scene and probability.
Summary of the invention
In view of this, embodiment of the present invention expectation provides a kind of access authentication method, equipment and system, can be fast Speed realizes the access authentication certification of isolated network, it is ensured that the feasibility of emergency communication.
For reaching above-mentioned purpose, the technical scheme of the embodiment of the present invention is achieved in that
Embodiments providing a kind of access authentication method, described method includes:
When public safety base station can be connected with core net, receive and store by core net issue for public The Safety Vectors of security terminal distribution;
When described public safety base station disconnects with core net, described public safety base station uses described peace Omnidirectional's amount is mutually authenticated with described public safety terminal.
Preferably, described public safety base station uses described Safety Vectors to carry out phase with described public safety terminal Certification mutually, including:
If described Safety Vectors for organizing more, one group of peace that described public safety base station prioritizing selection is not used by Omnidirectional's amount is mutually authenticated with described public safety terminal.
Preferably, described method also includes:
When receiving the Safety Vectors update notification that core net issues, public safety base station according to described safety to The Safety Vectors stored is updated by amount update notification.
Preferably, receive the Safety Vectors update notification that core net issues, including:
Again it is described public affairs in public safety terminal by public safety base station core network access again and core net Altogether during security terminal distribution Safety Vectors, receive the Safety Vectors update notification that core net issues.
The embodiment of the present invention additionally provides a kind of access authentication method, and described method includes:
Confirm public safety terminal, and be described public safety terminal distribution Safety Vectors;
Described Safety Vectors is issued to public safety base station, so that when described public safety base station and core net When disconnecting, described public safety base station uses described Safety Vectors to carry out phase with described public safety terminal Certification mutually.
Preferably, described confirmation public safety terminal, including:
Public safety terminal is confirmed according to user signing contract information;
Or, confirm public safety terminal according to user signing contract information and terminal ability information.
Preferably, described method also includes:
When being updated to the Safety Vectors of public safety terminal distribution, issue Safety Vectors more to public safety base station New notice, so that the Safety Vectors stored is updated by described public safety base station.
Preferably, described in be updated to the Safety Vectors of public safety terminal distribution, including:
When described public safety terminal being detected by described public safety base station core network access again, weight New is public safety terminal distribution Safety Vectors.
The embodiment of the present invention additionally provides a kind of access authentication method, and described method includes:
Public safety terminal distributes Safety Vectors by public safety base station to core network requests, so that described public affairs Safe base station receives and stores the Safety Vectors that described core net is described public safety terminal distribution altogether;
When public safety base station and core net disconnect, described public safety terminal by described safety to Amount is mutually authenticated with public safety base station.
Preferably, described public safety terminal distributes Safety Vectors by public safety base station to core network requests, Including:
Public safety terminal sends service request to public safety base station, so that described public safety base station is by institute State service request and be forwarded to core net;
Wherein, in described service request, carry user signing contract information or carry user signing contract information and end End ability information, so that core net is according to described user signing contract information or according to user signing contract information and end End ability information confirms public safety terminal.
The embodiment of the present invention additionally provides a kind of base station, and described base station includes:
Receive unit, for receiving the Safety Vectors for public safety terminal distribution issued by core net;
Memory element, is used for storing described Safety Vectors;
First authentication ' unit, for when described base station disconnects with core net, using described Safety Vectors It is mutually authenticated with described public safety terminal.
Preferably, described first authentication ' unit, it is additionally operable to:
If described Safety Vectors for organizing more, one group of Safety Vectors that prioritizing selection is not used by is public with described Security terminal is mutually authenticated.
Preferably, described reception unit, it is additionally operable to:
Receive the Safety Vectors update notification that core net issues;
Accordingly, described base station also includes:
Updating block, for being updated the Safety Vectors stored according to described Safety Vectors update notification.
Preferably, described reception unit, it is additionally operable to:
Again it is described public peace in public safety terminal by described base station again core network access and core net During full terminal distribution Safety Vectors, receive the Safety Vectors update notification that core net issues.
The embodiment of the present invention additionally provides a kind of network equipment, and the described network equipment includes:
Confirmation unit, is used for confirming public safety terminal;
Allocation unit, is used for as described public safety terminal distribution Safety Vectors;
Issue unit, for described Safety Vectors is issued to public safety base station, so that when described public peace When full base station disconnects with described core net, described public safety base station uses described Safety Vectors with described Public safety terminal is mutually authenticated.
Preferably, described confirmation unit, it is additionally operable to:
Public safety terminal is confirmed according to user signing contract information;
Or, confirm public safety terminal according to user signing contract information and terminal ability information.
Preferably, described allocation unit, it is additionally operable to: be updated to the Safety Vectors of public safety terminal distribution;
Described issue unit, be additionally operable to issue Safety Vectors update notification to public safety base station, so that described The Safety Vectors stored is updated by public safety base station.
Preferably, described allocation unit, it is additionally operable to:
When described public safety terminal being detected by described public safety base station core network access again, weight New is public safety terminal distribution Safety Vectors.
The embodiment of the present invention additionally provides a kind of terminal, and described terminal includes:
Request unit, for distributing Safety Vectors by public safety base station to core network requests;
Second authentication ' unit, for when public safety base station disconnects with core net, by described safety Vector is mutually authenticated with public safety base station.
Preferably, described request unit, it is additionally operable to:
Service request is sent, so that described service request is forwarded to by public safety base station to public safety base station Core net;
Wherein, in described service request, carry user signing contract information or carry user signing contract information and end End ability information, so that core net is according to described user signing contract information or according to user signing contract information and end End ability information confirms public safety terminal.
The embodiment of the present invention additionally provides a kind of access authentication system, and described system includes:
Public safety terminal, for distributing Safety Vectors by public safety base station to network device requests;
Public safety base station, for receive and store by the network equipment issue for public safety terminal distribution Safety Vectors;When described base station disconnects with core net, use described Safety Vectors and described public peace Full terminal is mutually authenticated;
The network equipment, is used for confirming public safety terminal, and is described public safety terminal distribution Safety Vectors; Described Safety Vectors is issued to public safety base station.
Preferably, described public safety terminal is terminal mentioned above;Described public safety base station is above Described base station;The described network equipment is the network equipment mentioned above.
Access authentication method, equipment and the system that the embodiment of the present invention provides, when public safety base station can be with When core net connects, receive and store the Safety Vectors for public safety terminal distribution issued by core net; When described public safety base station and core net disconnect, described public safety base station use described safety to Amount is mutually authenticated with described public safety terminal.So, the access authentication of isolated network can quickly be realized Certification, it is ensured that the feasibility of emergency communication, also improves the safety and reliability of authentication.Additionally, use Technical scheme of the present invention, reduces the requirement to terminal, solves in prior art and " to realize isolating Require during the access authentication certification of network that terminal supports double IMSI technology, and select according to different networks Different IMSI " problem;And, it is to avoid the security parameter of user it is pre-configured with by public safety base station Problem.
Accompanying drawing explanation
Fig. 1 is the network architecture schematic diagram of EPC;
The schematic flow sheet of a kind of access authentication method that Fig. 2 provides for the embodiment of the present invention;
The schematic flow sheet of the another kind of access authentication method that Fig. 3 provides for the embodiment of the present invention;
The schematic flow sheet of another access authentication method that Fig. 4 provides for the embodiment of the present invention;
The composition structural representation of the base station that Fig. 5 provides for the embodiment of the present invention;
The composition structural representation of the network equipment that Fig. 6 provides for the embodiment of the present invention;
The composition structural representation of the terminal that Fig. 7 provides for the embodiment of the present invention;
The composition structural representation of the access authentication system that Fig. 8 provides for the embodiment of the present invention;
Fig. 9 is that the public safety terminal access public safety base station that the embodiment of the present invention provides carries out authentication Schematic flow sheet one;
Figure 10 is that the public safety terminal that the embodiment of the present invention provides accesses public safety base station and carries out authentication and recognize The schematic flow sheet two of card.
Detailed description of the invention
The technical solution of the present invention is further elaborated with specific embodiment below in conjunction with the accompanying drawings.
The schematic flow sheet of a kind of access authentication method that Fig. 2 provides for the embodiment of the present invention;Described access is recognized Card method is applied to base station side, as in figure 2 it is shown, this access authentication method mainly comprises the steps that
Step 201: when public safety base station can be connected with core net, reception by what core net issued is The Safety Vectors of public safety terminal distribution.
Specifically, often group Safety Vectors at least includes:
Random number, authentication token, Expected Response value, intermediate key.
In the present embodiment, there are two kinds of mode of operations public safety base station, and one is normal mode, and one is public Safe mode altogether;Wherein, when public safety base station can be connected with core net, public safety is base station initiated Normal mode;When public safety base station disconnects with core net, the base station initiated public safety of public safety Pattern.
Step 202: when public safety base station disconnects with core net, public safety base station uses described Safety Vectors is mutually authenticated with public safety terminal.
Preferably, described public safety base station uses described Safety Vectors to carry out phase with described public safety terminal Certification mutually, may include that
If described Safety Vectors for organizing more, one group of peace that described public safety base station prioritizing selection is not used by Omnidirectional's amount is mutually authenticated with described public safety terminal.
Specifically, described public safety base station uses described Safety Vectors to recognize each other mutually with public safety terminal Card, may include that
Public safety terminal sends public safety service request to public safety base station;
Public safety base station uses the Safety Vectors stored that described public safety terminal is carried out authentication; If authentication passes through, send public safety service response message to public safety terminal.
In such scheme, it is preferable that described method can also include:
When receiving the Safety Vectors update notification that core net issues, described public safety base station is according to described peace The Safety Vectors stored is updated by omnidirectional's amount update notification.
Preferably, receive the Safety Vectors update notification that core net issues, may include that
Again it is described public affairs in public safety terminal by public safety base station core network access again and core net Altogether during security terminal distribution Safety Vectors, receive the Safety Vectors update notification that core net issues.
It is to say, during public safety base station under public safety terminal accesses normal mode again, public Safe base station will update, by the Safety Vectors of public safety terminal distribution, the safety stored again according to core net Vector.
Certainly, it is in and core net connection status in public safety base station, and core net has been that public safety is whole During end distribution Safety Vectors, if core net updates Safety Vectors, core net will issue to public safety base station Safety Vectors update notification, in order to public safety base station according to described Safety Vectors update notification in time to institute The Safety Vectors of storage is updated.In other words, public safety terminal access under normal mode public During safe base station, public safety base station updates, to more newly arriving of Safety Vectors, the peace stored along with core net Omnidirectional measures.
The access authentication method that the embodiment of the present invention is provided, public safety terminal during authentication, After being confirmed as public safety terminal by core net, core net issues public safety terminal peace to public safety base station Omnidirectional measures, when public safety base station transitions public safety pattern, public safety base station use the safety that preserves to Amount is mutually authenticated with public safety terminal;So, when public safety base station disconnects with core net, Also can quickly realize the access authentication certification of isolated network, it is ensured that the feasibility of emergency communication, also improve The safety and reliability of authentication.
The schematic flow sheet of the another kind of access authentication method that Fig. 3 provides for the embodiment of the present invention;Described access Authentication method is applied to core-network side, as it is shown on figure 3, this access authentication method mainly comprises the steps that
Step 301: confirm public safety terminal, and be described public safety terminal distribution Safety Vectors.
Preferably, described confirmation public safety terminal, may include that
Public safety terminal is confirmed according to user signing contract information;
Or, confirm public safety terminal according to user signing contract information and terminal ability information.
Specifically, often group Safety Vectors at least includes:
Random number, authentication token, Expected Response value, intermediate key.
Step 302: described Safety Vectors is issued to public safety base station, so that when described public safety base Standing when disconnecting with core net, described public safety base station uses described Safety Vectors and described public safety Terminal is mutually authenticated.
In such scheme, it is preferable that described method also includes:
When being updated to the Safety Vectors of public safety terminal distribution, issue Safety Vectors more to public safety base station New notice, so that the Safety Vectors stored is updated by described public safety base station.
It is to say, during public safety terminal accesses the public safety base station under normal mode, core net Safety Vectors can also be updated according to practical situation.
Preferably, described in be updated to the Safety Vectors of public safety terminal distribution, may include that
When described public safety terminal being detected by described public safety base station core network access again, weight New is public safety terminal distribution Safety Vectors.
It is to say, during public safety base station under public safety terminal accesses normal mode again, core Net is public safety terminal distribution Safety Vectors again.
Preferably, described public safety base station uses described Safety Vectors to carry out phase with described public safety terminal Certification mutually, may include that
If described Safety Vectors for organizing more, one group of peace that described public safety base station prioritizing selection is not used by Omnidirectional's amount is mutually authenticated with described public safety terminal.
The access authentication method that the embodiment of the present invention is provided, public safety terminal during authentication, After being confirmed as public safety terminal by core net, core net issues public safety terminal peace to public safety base station Omnidirectional measures, in order to when public safety base station transitions public safety pattern, and public safety base station uses and preserves Safety Vectors be mutually authenticated with public safety terminal;So, break with core net in public safety base station When opening connection, also can quickly realize the access authentication certification of isolated network, it is ensured that the feasibility of emergency communication, Also the safety and reliability of authentication is improved.
The schematic flow sheet of another access authentication method that Fig. 4 provides for the embodiment of the present invention;Described access Authentication method is applied to end side, and as shown in Figure 4, this access authentication method mainly comprises the steps that
Step 401: public safety terminal is described public safety by public safety base station to core network requests Terminal distribution Safety Vectors, so that it is described public that described public safety base station receives and store described core net The Safety Vectors of security terminal distribution.
Preferably, described public safety terminal is described public peace by public safety base station to core network requests Full terminal distribution Safety Vectors, may include that
Public safety terminal sends service request to public safety base station, so that described public safety base station is by institute State service request and be forwarded to core net;
Wherein, in described service request, carry user signing contract information or carry user signing contract information and end End ability information, so that core net is according to described user signing contract information or according to user signing contract information and end End ability information confirms public safety terminal.
Step 402: when public safety base station disconnects with core net, described public safety terminal is passed through Described Safety Vectors is mutually authenticated with public safety base station.
A kind of access authentication method that the embodiment of the present invention provides, terminal notification core network user CAMEL-Subscription-Information, Or notice core net terminal ability information and user signing contract information, in order to core net is known this terminal and had Public safety ability, and generate corresponding Safety Vectors for it, corresponding Safety Vectors is handed down to public peace Full base station, and then make when public safety base station transitions public safety pattern, public safety base station uses preservation Safety Vectors is mutually authenticated with public safety terminal;So, disconnect with core net in public safety base station During connection, also can quickly realize the access authentication certification of isolated network, it is ensured that the feasibility of emergency communication, Also the safety and reliability of authentication is improved.
The composition structural representation of the base station that Fig. 5 provides for the embodiment of the present invention, as it is shown in figure 5, described base Station includes:
Receive unit 51, for receiving the Safety Vectors for public safety terminal distribution issued by core net;
Memory element 52, is used for storing described Safety Vectors;
First authentication ' unit 53, for when described base station and core net disconnect, use described safety to Amount is mutually authenticated with described public safety terminal.
Preferably, described first authentication ' unit 53, specifically for:
If described Safety Vectors for organizing more, one group of Safety Vectors that prioritizing selection is not used by is public with described Security terminal is mutually authenticated.
Preferably, described reception unit 51, it is additionally operable to:
Receive the Safety Vectors update notification that core net issues;
Accordingly, described base station also includes:
Updating block 54, for carrying out more according to the described Safety Vectors update notification Safety Vectors to being stored Newly.
Preferably, described reception unit 51, specifically it is additionally operable to:
Again it is described public peace in public safety terminal by described base station again core network access and core net During full terminal distribution Safety Vectors, receive the Safety Vectors update notification that core net issues.
It will be appreciated by those skilled in the art that the function that realizes of each unit in the base station shown in Fig. 5 can refer to The associated description of aforementioned data access authentication method and understand.
In actual application, described reception unit 51, memory element the 52, first authentication ' unit 53, renewal list Unit 54 can by the central processing unit (CPU, Central Processing Unit) in base station, microprocessor (MPU, Micro Processor Unit), digital signal processor (DSP, Digital Signal Processor) or existing Field programmable gate arrays (FPGA, Field Programmable Gate Array) etc. realize.
The composition structural representation of the network equipment that Fig. 6 provides for the embodiment of the present invention, as shown in Figure 6, institute State the network equipment to include:
Confirmation unit 61, is used for confirming public safety terminal;
Allocation unit 62, is used for as described public safety terminal distribution Safety Vectors;
Issue unit 63, for described Safety Vectors is issued to public safety base station, so that when described public When safe base station and core net disconnect, described public safety base station uses described Safety Vectors and described public affairs Security terminal is mutually authenticated altogether.
Preferably, described confirmation unit 61, it is additionally operable to:
Public safety terminal is confirmed according to user signing contract information;
Or, confirm public safety terminal according to user signing contract information and terminal ability information.
Preferably, described allocation unit 62, it is additionally operable to: be updated to the Safety Vectors of public safety terminal distribution;
Described issue unit 63, be additionally operable to issue Safety Vectors update notification to public safety base station, so that institute State public safety base station the Safety Vectors stored is updated.
Preferably, described allocation unit 62, it is additionally operable to:
When described public safety terminal being detected by described public safety base station core network access again, weight New is public safety terminal distribution Safety Vectors.
It will be appreciated by those skilled in the art that the function that realizes of each unit in the network equipment shown in Fig. 6 can Understand with reference to the associated description of aforementioned data access authentication method.
In actual application, described confirmation unit 61, allocation unit 62, issuing unit 63 can be by the network equipment In CPU, MPU, DSP or FPGA etc. realize.
The composition structural representation of the terminal that Fig. 7 provides for the embodiment of the present invention, as it is shown in fig. 7, described end End includes:
Request unit 71, for distributing Safety Vectors by public safety base station to core network requests;
Second authentication ' unit 72, for when public safety base station disconnects with core net, by described peace Omnidirectional's amount is mutually authenticated with public safety base station.
Preferably, described request unit 71, it is additionally operable to:
Service request is sent, so that described service request is forwarded to by public safety base station to public safety base station Core net;
Wherein, in described service request, carry user signing contract information or carry user signing contract information and end End ability information, so that core net is according to described user signing contract information or according to user signing contract information and end End ability information confirms public safety terminal.
It will be appreciated by those skilled in the art that the function that realizes of each unit in the terminal shown in Fig. 7 can refer to The associated description of aforementioned data access authentication method and understand.
In actual application, described request unit the 71, second authentication ' unit 72 can be by the central authorities' process in terminal Device CPU, MPU, DSP or FPGA etc. realize.
The composition structural representation of the access authentication system that Fig. 8 provides for the embodiment of the present invention, as shown in Figure 8, Described system includes:
Public safety terminal 81, for by public safety base station to the network equipment 83 request distribution safety to Amount;
Public safety base station 82, for receive and store by the network equipment 83 issue for public safety terminal The Safety Vectors of 81 distribution;When described public safety base station 82 disconnects with core net, use described Safety Vectors is mutually authenticated with described public safety terminal 81;
The network equipment 83, is used for confirming public safety terminal 81, and distributes for described public safety terminal 81 Safety Vectors;Described Safety Vectors is issued to public safety base station 82.
Preferably, the described network equipment 83, it is additionally operable to:
It is updated to the Safety Vectors of public safety terminal 81 distribution, and issues safety to public safety base station 82 Vector update notification.
Preferably, described public safety base station 82, when being additionally operable to receive Safety Vectors update notification, to institute The Safety Vectors of storage is updated.
Specifically, the composition structural representation of described public safety terminal can be as shown in Figure 7;Described public The composition structural representation of safe base station can be as shown in Figure 5;The composition structural representation of the described network equipment Can be as shown in Figure 6;Do not repeat them here.
Fig. 9 is that the public safety terminal access public safety base station that the embodiment of the present invention provides carries out authentication Schematic flow sheet one, as it is shown in figure 9, this flow process mainly comprises the steps that
Step 901: public safety terminal sends service request to public safety base station.
Wherein, carrying terminal ability information in described service request, described terminal ability information is for table Levy this public safety terminal and there is the information of public safety ability.
Here, described service request can also be user's access request, wherein, in described user's access request Also terminal ability information is carried.
Step 902: after public safety base station receives service request, forwards described to Mobility Management Entity Service request.
Wherein, described service request carries terminal ability information.
Here, when in step 901, what public safety terminal sent to public safety base station is user accesses please When asking, after public safety base station receives described user's access request, forward described to Mobility Management Entity User's access request;Wherein, described user's access request also carries terminal ability information.
Step 903: Mobility Management Entity sends authentication request to home subscriber data server.
Wherein, also carried terminal ability information in the request of described authentication.
Step 904: home subscriber data server confirms to make according to terminal ability information and user signing contract information By this public safety terminal.
Specifically, home subscriber data server judges to send according to terminal ability information and user signing contract information Whether the terminal of service request (or user's access request) is public safety terminal, if it is, generate correspondence Safety Vectors.Here, the most how to generate the method that can refer to generate authentication vector in prior art, This repeats no more.
Owing to public safety base station has the function of part EPC, needing to set up the situation of Emergency Communications Network Under, if common terminal needs to access public safety base station carries out public safety business, then public safety base station Described Safety Vectors and public safety terminal is used to be mutually authenticated.
Step 905: home subscriber data server sends authentication request response to Mobility Management Entity Message.
Wherein, described authentication request response carries one or more groups Safety Vectors.
Here, often group Safety Vectors includes at least: random number, authentication token, Expected Response value and centre are close Key.
When described Safety Vectors for organizing more, a part can be designated the safety under public safety pattern Vector, remainder can be designated the Safety Vectors under normal mode, and now, described many groups are at least It it is 2 groups.
Step 906: according to network configuration, Mobility Management Entity determines that public safety base station has public safety Ability, sends service request response message to public safety base station.
Here, when described public safety base station receives authentication request response, described authentication is preserved One group or multigroup safety vector entrained in certification request response.
Wherein, described service request response message carries one group or multigroup safety vector, also carries IMSI, Described IMSI is used for associating Safety Vectors.
Step 907: public safety base station sends service request response message to public safety terminal.
So far, public safety terminal completes the service request under the normal mode of public safety base station, and ownership is used User data server, while updating Safety Vectors, also can inform public safety by Mobility Management Entity Base station updates the Safety Vectors preserved.
Here, initiate to public safety base station when public safety terminal in step 902 is user's access request Time, behind public safety base station and public safety terminal mutual authentication certification success, public safety base station is to public Security terminal sends user's access request response message.
Step 908: public safety base station and core net network suspension.
Under emergency scene, under the such as natural disaster such as earthquake, flood, due to public safety base station and movement Property the core net such as management entity between network connect and disconnect, core net can not be recovered within a period of time.
Step 909: the base station initiated contingency mode of public safety, is converted to public safety pattern.
Step 910: public safety base station is to its corresponding public safety network of terminal broadcast covered.
Step 911: public safety terminal detects public safety network.
Step 912: public safety terminal initiates public safety service request to public safety base station.
Here, described public safety service request can also be attachment public safety network request.
Step 913: public safety base station uses the Safety Vectors preserved and public safety terminal to carry out mutually Authentication.
If it should be noted that the Safety Vectors that public safety base station preserves is many groups, then public safety Base station polling one of which and public safety terminal carry out authentication.
Such as, when 5 groups of Safety Vectors are preserved in public safety base station, it is assumed that described 5 groups of Safety Vectors are used Serial number is expressed as NO1, NO2, NO3, NO4, NO5, when Serial No. NO1 Safety Vectors When being used, if again carry out authentication, Safety Vectors will be selected from other remaining Safety Vectors, In order to avoid avoiding stolen because using identical Safety Vectors or divulging a secret.
Step 914: behind public safety base station and public safety terminal mutual authentication certification success, public safety Base station sends public safety service request response message to public safety terminal.
Here, when public safety terminal in step 912 initiate to public safety base station be attachment public safety During network request, behind public safety base station and public safety terminal mutual authentication certification success, public safety base Stand and send attachment public safety network request response to public safety terminal.
Step 915: public safety base station is recovered network and connected, and closes public safety pattern, and is just converted into Norm formula.
Specifically, after a period of time, public safety base station is recovered network and is connected, and will close public safety pattern, It is converted into normal mode, and (here, the most also includes not possessing public affairs to the public safety terminal serviced The terminal of security capabilities altogether) broadcast proper network mark.
Step 916: public safety terminal initiates the request of attachment removal public safety network to public safety base station.
Here, described attachment removal public safety network actively can also be initiated by public safety base station.
Such as, at public safety terminal closedown, or when public safety terminal leaves public safety network one section Between when (such as 20 hours or 15 days), attachment removal public safety is actively initiated in public safety base station Network.
Step 917: public safety terminal is re-attached to core net by the normal mode of public safety base station Network, core network issues new Safety Vectors to public safety base station, and the renewal of public safety base station is stored Safety Vectors.
Figure 10 is that the public safety terminal that the embodiment of the present invention provides accesses public safety base station and carries out authentication and recognize The schematic flow sheet two of card, as shown in Figure 10, this flow process mainly comprises the steps that
Step 1001: public safety terminal sends service request to public safety base station.
Wherein, not carried terminal ability information in described service request.
Here, described service request can also be user's access request, wherein, in described user's access request The most not carried terminal ability information.
Step 1002: after public safety base station receives service request, forwards described to Mobility Management Entity Service request.
Here, send to public safety base station when public safety terminal in step 1001 is user's access request Time, after public safety base station receives described user's access request, forward described use to Mobility Management Entity Family access request.
Step 1003: Mobility Management Entity sends authentication request to home subscriber data server.
Step 1004: home subscriber data server confirms to use this public safety eventually according to user signing contract information End.
Specifically, home subscriber data server according to user signing contract information judge send service request (or use Family access request) terminal whether be public safety terminal, if it is, generate corresponding Safety Vectors.
Step 1005: home subscriber data server sends authentication request response to Mobility Management Entity Message.
Wherein, described authentication request response carries one or more groups Safety Vectors.
Here, often group Safety Vectors includes at least: random number, authentication token, Expected Response value and centre are close Key.
When described Safety Vectors for organizing more, a part can be designated the safety under public safety pattern Vector, remainder can be designated the Safety Vectors under normal mode, and now, described many groups are at least It it is 2 groups.
Step 1006: according to network configuration, Mobility Management Entity determines that public safety base station has public safety Ability, sends service request response message to public safety base station.
Here, when described public safety base station receives authentication request response, described authentication is preserved One group or multigroup safety vector entrained in certification request response.
Wherein, described service request response message carries one group or multigroup safety vector, also carries IMSI, Described IMSI is used for associating Safety Vectors.
Step 1007: public safety base station sends service request response message to public safety terminal.
So far, public safety terminal completes the service request under the normal mode of public safety base station, and ownership is used User data server, while updating Safety Vectors, also can inform public safety by Mobility Management Entity Base station updates the Safety Vectors preserved.
Here, initiate to public safety base station when public safety terminal in step 1002 is user's access request Time, behind public safety base station and public safety terminal mutual authentication certification success, public safety base station is to public Security terminal sends user's access request response message.
Step 1008: public safety base station and core net network suspension.
Under emergency scene, under the such as natural disaster such as earthquake, flood, due to public safety base station and movement Property the core net such as management entity between network connect and disconnect, core net can not be recovered within a period of time.
Step 1009: the base station initiated contingency mode of public safety, is converted to public safety pattern.
Step 1010: public safety base station is to its corresponding public safety network of terminal broadcast covered.
Step 1011: public safety terminal detects public safety network.
Step 1012: public safety terminal initiates public safety service request to public safety base station.
Here, described public safety service request can also be attachment public safety network request.
Step 1013: public safety base station uses the Safety Vectors preserved and public safety terminal to carry out mutually Authentication.
If it should be noted that the Safety Vectors that public safety base station preserves is many groups, then public safety Base station polling one of which and public safety terminal carry out authentication.
Such as, when 5 groups of Safety Vectors are preserved in public safety base station, it is assumed that described 5 groups of Safety Vectors are used Serial number is expressed as NO1, NO2, NO3, NO4, NO5, when Serial No. NO1 Safety Vectors When being used, if again carry out authentication, Safety Vectors will be selected from other remaining Safety Vectors, In order to avoid avoiding stolen because using identical Safety Vectors or divulging a secret.
Step 1014: behind public safety base station and public safety terminal mutual authentication certification success, public safety Base station sends public safety service request response message to public safety terminal.
Here, when public safety terminal in step 1012 initiate to public safety base station be attachment public safety During network request, behind public safety base station and public safety terminal mutual authentication certification success, public safety base Stand and send attachment public safety network request response to public safety terminal.
Step 1015: public safety base station is recovered network and connected, and closes public safety pattern, and is just converted into Norm formula.
Specifically, after a period of time, public safety base station is recovered network and is connected, and will close public safety pattern, It is converted into normal mode, and (here, the most also includes not possessing public affairs to the public safety terminal serviced The terminal of security capabilities altogether) broadcast proper network mark.
Step 1016: public safety terminal initiates the request of attachment removal public safety network to public safety base station.
Here, described attachment removal public safety network actively can also be initiated by public safety base station.
Such as, at public safety terminal closedown, or when public safety terminal leaves public safety network one section Between when (such as 5 hours or 2 days), attachment removal public safety net is actively initiated in public safety base station Network.
Step 1017: public safety terminal is re-attached to core net by the normal mode of public safety base station Network, core network issues new Safety Vectors to public safety base station, and the renewal of public safety base station is stored Safety Vectors.
The embodiment of the present invention has also stated that a kind of computer-readable storage medium, stores in described computer-readable storage medium Computer executable instructions, described computer executable instructions is had to be used for performing aforementioned such as Fig. 2 or Fig. 3 or figure Access authentication method shown in 4.
In several embodiments provided herein, it should be understood that disclosed equipment and method, can To realize by another way.Apparatus embodiments described above is only schematically, such as, and institute Stating the division of unit, be only a kind of logic function and divide, actual can have other dividing mode when realizing, As: multiple unit or assembly can be in conjunction with, or it is desirably integrated into another system, or some features can be neglected Slightly, or do not perform.It addition, the coupling each other of shown or discussed each ingredient or directly coupling Close or communication connection can be the INDIRECT COUPLING by some interfaces, equipment or unit or communication connection, can Be electrical, machinery or other form.
The above-mentioned unit illustrated as separating component can be or may not be physically separate, as The parts that unit shows can be or may not be physical location, i.e. may be located at a place, it is possible to To be distributed on multiple NE;Part or all of unit therein can be selected according to the actual needs Realize the purpose of the present embodiment scheme.
It addition, each functional unit in various embodiments of the present invention can be fully integrated in a processing unit, Can also be that each unit is individually as a unit, it is also possible to two or more unit are integrated in one In individual unit;Above-mentioned integrated unit both can realize to use the form of hardware, it would however also be possible to employ hardware adds soft The form of part functional unit realizes.
One of ordinary skill in the art will appreciate that: all or part of step realizing said method embodiment can Completing with the hardware relevant by programmed instruction, aforesaid program can be stored in an embodied on computer readable and deposit In storage media, this program upon execution, performs to include the step of said method embodiment;And aforesaid storage Medium includes: movable storage device, read only memory (ROM, Read-Only Memory), magnetic disc or The various media that can store program code such as person's CD.
Or, if the above-mentioned integrated unit of the present invention is using the form realization of SFU software functional unit and as independent Production marketing or use time, it is also possible to be stored in a computer read/write memory medium.Based on so Understanding, the part that prior art is contributed by the technical scheme of the embodiment of the present invention the most in other words can Embodying with the form with software product, this computer software product is stored in a storage medium, bag Include some instructions with so that a computer equipment (can be personal computer, server or network Equipment etc.) perform all or part of of method described in each embodiment of the present invention.And aforesaid storage medium bag Include: the various media that can store program code such as movable storage device, ROM, magnetic disc or CD.
The above, only presently preferred embodiments of the present invention, it is not intended to limit the protection model of the present invention Enclose.All any amendment, equivalent and improvement etc. made within the spirit and principles in the present invention, all should Within being included in protection scope of the present invention.

Claims (22)

1. an access authentication method, it is characterised in that described method includes:
When public safety base station can be connected with core net, receive and store by core net issue for public The Safety Vectors of security terminal distribution;
When described public safety base station disconnects with core net, described public safety base station uses described peace Omnidirectional's amount is mutually authenticated with described public safety terminal.
Method the most according to claim 1, it is characterised in that described public safety base station uses described Safety Vectors is mutually authenticated with described public safety terminal, including:
If described Safety Vectors for organizing more, one group of peace that described public safety base station prioritizing selection is not used by Omnidirectional's amount is mutually authenticated with described public safety terminal.
Method the most according to claim 1, it is characterised in that described method also includes:
When receiving the Safety Vectors update notification that core net issues, public safety base station according to described safety to The Safety Vectors stored is updated by amount update notification.
Method the most according to claim 3, it is characterised in that receive the Safety Vectors that core net issues Update notification, including:
Again it is described public affairs in public safety terminal by public safety base station core network access again and core net Altogether during security terminal distribution Safety Vectors, receive the Safety Vectors update notification that core net issues.
5. an access authentication method, it is characterised in that described method includes:
Confirm public safety terminal, and be described public safety terminal distribution Safety Vectors;
Described Safety Vectors is issued to public safety base station, so that when described public safety base station and core net When disconnecting, described public safety base station uses described Safety Vectors to carry out phase with described public safety terminal Certification mutually.
Method the most according to claim 5, it is characterised in that described confirmation public safety terminal, bag Include:
Public safety terminal is confirmed according to user signing contract information;
Or, confirm public safety terminal according to user signing contract information and terminal ability information.
Method the most according to claim 5, it is characterised in that described method also includes:
When being updated to the Safety Vectors of public safety terminal distribution, issue Safety Vectors more to public safety base station New notice, so that the Safety Vectors stored is updated by described public safety base station.
Method the most according to claim 7, it is characterised in that described in be updated to public safety terminal and divide The Safety Vectors joined, including:
When described public safety terminal being detected by described public safety base station core network access again, weight New is public safety terminal distribution Safety Vectors.
9. an access authentication method, it is characterised in that described method includes:
Public safety terminal distributes Safety Vectors by public safety base station to core network requests, so that described public affairs Safe base station receives and stores the Safety Vectors that described core net is described public safety terminal distribution altogether;
When public safety base station and core net disconnect, described public safety terminal by described safety to Amount is mutually authenticated with public safety base station.
Method the most according to claim 9, it is characterised in that described public safety terminal is by public affairs Safety Vectors is distributed to core network requests in safe base station altogether, including:
Public safety terminal sends service request to public safety base station, so that described public safety base station is by institute State service request and be forwarded to core net;
Wherein, in described service request, carry user signing contract information or carry user signing contract information and end End ability information, so that core net is according to described user signing contract information or according to user signing contract information and end End ability information confirms public safety terminal.
11. 1 kinds of base stations, it is characterised in that described base station includes:
Receive unit, for receiving the Safety Vectors for public safety terminal distribution issued by core net;
Memory element, is used for storing described Safety Vectors;
First authentication ' unit, for when described base station disconnects with core net, using described Safety Vectors It is mutually authenticated with described public safety terminal.
12. base stations according to claim 11, it is characterised in that described first authentication ' unit, also use In:
If described Safety Vectors for organizing more, one group of Safety Vectors that prioritizing selection is not used by is public with described Security terminal is mutually authenticated.
13. base stations according to claim 11, it is characterised in that described reception unit, are additionally operable to:
Receive the Safety Vectors update notification that core net issues;
Accordingly, described base station also includes:
Updating block, for being updated the Safety Vectors stored according to described Safety Vectors update notification.
14. base stations according to claim 13, it is characterised in that described reception unit, are additionally operable to:
Again it is described public peace in public safety terminal by described base station again core network access and core net During full terminal distribution Safety Vectors, receive the Safety Vectors update notification that core net issues.
15. 1 kinds of network equipments, it is characterised in that the described network equipment includes:
Confirmation unit, is used for confirming public safety terminal;
Allocation unit, is used for as described public safety terminal distribution Safety Vectors;
Issue unit, for described Safety Vectors is issued to public safety base station, so that when described public peace When full base station disconnects with described core net, described public safety base station uses described Safety Vectors with described Public safety terminal is mutually authenticated.
16. network equipments according to claim 15, it is characterised in that described confirmation unit, also use In:
Public safety terminal is confirmed according to user signing contract information;
Or, confirm public safety terminal according to user signing contract information and terminal ability information.
17. network equipments according to claim 15, it is characterised in that described allocation unit, also use In: it is updated to the Safety Vectors of public safety terminal distribution;
Described issue unit, be additionally operable to issue Safety Vectors update notification to public safety base station, so that described The Safety Vectors stored is updated by public safety base station.
18. network equipments according to claim 17, it is characterised in that described allocation unit, also use In:
When described public safety terminal being detected by described public safety base station core network access again, weight New is public safety terminal distribution Safety Vectors.
19. 1 kinds of terminals, it is characterised in that described terminal includes:
Request unit, for distributing Safety Vectors by public safety base station to core network requests;
Second authentication ' unit, for when public safety base station disconnects with core net, by described safety Vector is mutually authenticated with public safety base station.
20. terminals according to claim 19, it is characterised in that described request unit, are additionally operable to:
Service request is sent, so that described service request is forwarded to by public safety base station to public safety base station Core net;
Wherein, in described service request, carry user signing contract information or carry user signing contract information and end End ability information, so that core net is according to described user signing contract information or according to user signing contract information and end End ability information confirms public safety terminal.
21. 1 kinds of access authentication systems, it is characterised in that described system includes:
Public safety terminal, for distributing Safety Vectors by public safety base station to network device requests;
Public safety base station, for receive and store by the network equipment issue for public safety terminal distribution Safety Vectors;When described base station disconnects with core net, use described Safety Vectors and described public peace Full terminal is mutually authenticated;
The network equipment, is used for confirming public safety terminal, and is described public safety terminal distribution Safety Vectors; Described Safety Vectors is issued to public safety base station.
22. systems according to claim 21, it is characterised in that described public safety terminal is power Terminal described in 19 or 20;Described public safety base station is power base station described in 11 to 14 any one;Institute Stating the network equipment is the power network equipment described in 15 to 18 any one.
CN201510251045.0A 2015-05-15 2015-05-15 A kind of access authentication method, equipment and system Pending CN106131841A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510251045.0A CN106131841A (en) 2015-05-15 2015-05-15 A kind of access authentication method, equipment and system
PCT/CN2015/094607 WO2016184057A1 (en) 2015-05-15 2015-11-13 Access authentication method, apparatus, system, and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510251045.0A CN106131841A (en) 2015-05-15 2015-05-15 A kind of access authentication method, equipment and system

Publications (1)

Publication Number Publication Date
CN106131841A true CN106131841A (en) 2016-11-16

Family

ID=57319226

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510251045.0A Pending CN106131841A (en) 2015-05-15 2015-05-15 A kind of access authentication method, equipment and system

Country Status (2)

Country Link
CN (1) CN106131841A (en)
WO (1) WO2016184057A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110933612A (en) * 2019-12-25 2020-03-27 追信数字科技有限公司 Emergency communication method and device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113905379B (en) * 2021-10-15 2024-05-03 绍兴建元电力集团有限公司 Method for locally optimizing security communication authentication of 5G base station participation terminal

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1630405A (en) * 2003-12-18 2005-06-22 中国电子科技集团公司第三十研究所 Method of bidirectional authentication during subscriber switch in digital cellular mobile communication system
CN101374346A (en) * 2008-07-31 2009-02-25 华为技术有限公司 Method, system and equipment for implementing terminal communication
CN101466107A (en) * 2008-12-31 2009-06-24 华为技术有限公司 Method, device and base station for providing business
US20100122321A1 (en) * 2007-03-12 2010-05-13 Nokia Corporation System and method for authentication for wireless emergency services
CN104244297A (en) * 2013-06-14 2014-12-24 中国普天信息产业股份有限公司 Broadband cluster fail-soft communication method and base station based on TD-LTE
CN104349315A (en) * 2013-07-31 2015-02-11 普天信息技术研究院有限公司 Method and system for assuring information security for base station and user equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102056168A (en) * 2009-10-28 2011-05-11 中兴通讯股份有限公司 Access method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1630405A (en) * 2003-12-18 2005-06-22 中国电子科技集团公司第三十研究所 Method of bidirectional authentication during subscriber switch in digital cellular mobile communication system
US20100122321A1 (en) * 2007-03-12 2010-05-13 Nokia Corporation System and method for authentication for wireless emergency services
CN101374346A (en) * 2008-07-31 2009-02-25 华为技术有限公司 Method, system and equipment for implementing terminal communication
CN101466107A (en) * 2008-12-31 2009-06-24 华为技术有限公司 Method, device and base station for providing business
CN104244297A (en) * 2013-06-14 2014-12-24 中国普天信息产业股份有限公司 Broadband cluster fail-soft communication method and base station based on TD-LTE
CN104349315A (en) * 2013-07-31 2015-02-11 普天信息技术研究院有限公司 Method and system for assuring information security for base station and user equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110933612A (en) * 2019-12-25 2020-03-27 追信数字科技有限公司 Emergency communication method and device
CN110933612B (en) * 2019-12-25 2020-12-18 追信数字科技有限公司 Emergency communication method and device

Also Published As

Publication number Publication date
WO2016184057A1 (en) 2016-11-24

Similar Documents

Publication Publication Date Title
US11445406B2 (en) Communication system, communication control apparatus, node apparatus, and communication method for performing load balancing in a system
CA2976033C (en) Long term evolution (lte) communications over trusted hardware
CN107852601A (en) The network architecture and security with encrypted client device context
JP6164219B2 (en) Mobile communication system, control device, communication control method, and program
CN108632815A (en) Communication means and equipment
CN101931946B (en) Multi-access method of terminal in evolved packet system and system thereof
CN105491617A (en) Method for supporting local offloading of business and base station sub-system
CN106416338A (en) Apparatus, system and method for dedicated core network
CN101686520A (en) Method supporting home base station context management
CN101384015B (en) Distributed telecommunication apparatus and service processing method for distributed telecommunication apparatus
CN103237342A (en) Cross identity registration method for co-group users of time division-long term evolution-based (TD-LTE-based) public network and cluster
CN101018395B (en) Method for recovering the IP address and network resource occupied by the user device
CN103238345A (en) Communication method, device and system all based on mobile management entity pool (MME Pool)
EP1547352B1 (en) Mobile terminal identity protection through home location register modification
CN105744519B (en) A kind of intercepting method, equipment of the core network and base station
US20110044309A1 (en) Method and device for deploying tracking areas
CN111356163B (en) System information notification method, base station equipment and computer storage equipment
CN101754488B (en) Logic control class communication equipment and communication method therefor
CN110460961A (en) A kind of report method and system of group endpoints position
EP2717546B1 (en) Method and device for acquiring destination ip address
CN106131841A (en) A kind of access authentication method, equipment and system
CN102821385A (en) Methods and network entity for sending public warning system (PWS) key information to terminal
RU2668114C2 (en) Method of managing shared network users, corresponding device and system
CN101159625B (en) System and method of implementing monitor for police for WiMAX
CN102833743A (en) Sending method, updating method and corresponding equipment for key updating information of public warning system (PWS)

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20161116