CN101938809A - Method and system for processing access control list - Google Patents

Method and system for processing access control list Download PDF

Info

Publication number
CN101938809A
CN101938809A CN2009101684229A CN200910168422A CN101938809A CN 101938809 A CN101938809 A CN 101938809A CN 2009101684229 A CN2009101684229 A CN 2009101684229A CN 200910168422 A CN200910168422 A CN 200910168422A CN 101938809 A CN101938809 A CN 101938809A
Authority
CN
China
Prior art keywords
terminal
base station
access control
control lists
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2009101684229A
Other languages
Chinese (zh)
Inventor
谢峰
宋建全
吕开颖
鲁照华
刘扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2009101684229A priority Critical patent/CN101938809A/en
Priority to CN201610375587.3A priority patent/CN105939534A/en
Publication of CN101938809A publication Critical patent/CN101938809A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/10Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities

Abstract

The invention discloses a method for processing an access control list, which comprises the following steps that: a base station transmits indication information to a terminal; and the terminal processes the access control list according to the received indication information. The invention also discloses a system for processing the access control list. The method and the system have the advantages of realizing the synchronization and updating of the access control list on the terminal side and the network side and reducing the cost for accessing, reentering and switching in a wireless communication system.

Description

A kind of processing method of access control lists and system
Technical field
The present invention relates to the user's access technology in the radio communication, relate in particular to a kind of processing method and system of access control lists.
Background technology
In wireless communication system, the base station is meant the equipment that service is provided for terminal, carries out radio communication by electromagnetic wave between base station and the terminal.Wireless communication system can provide wireless coverage for the terminal of managing definitely in the scope by the base station, and this geographic range promptly is called the sub-district.
Existing wireless communication system as shown in Figure 1, in order to provide radio communication for the user on a large scale, need to dispose the big base station of coverage, this base station is commonly referred to macro base station (Macro BS, Macro Base Station), the sub-district of its covering is commonly referred to Hong Qu (Macro Cell).In addition, consider user's different demands and different environments for use, wireless communication system need be for the user provides higher-quality radio communication service under some environment or scene, so the small base station that some coverages are little, transmitting power is lower is used.These small base stations comprise little base station (Micro BS), little base station (Pico BS) and sub-base stations (Femto BS, Femtocell BS, WFAP, WiMax Femtocell Access Point), wherein sub-base stations also can be called Home eNodeB, femto base station or fly the base station.By in wireless communication system, disposing sub-base stations, can provide at a high speed and/or proprietary radio communication service for family or family office.The sub-district that sub-base stations is served is called young district (Femto Cell), the son district in, accept the terminal of serving normally static or only with low-speed motion, for example move with walking speed.
The maximum coverage range of a macro base station is at the 2-3 kilometer, and the coverage of sub-base stations then is no more than 30 meters.Because the huge difference of their coverages may be deployed with a large amount of sub-base stations to improve the telecommunication service quality in the young district in the coverage of macro base station.
Sub-base stations is divided into open (Open or Open Subscriber Group are called for short OSG), proprietary (CSG-Closed usually, Closed Subscriber Group-Closed) (the CSG-Open of (or sealing), proprietary double opening, Closed Subscriber Group-Open) (or semi-enclosed) three types also can be described as three kinds of networking types (subscription type).Usually, proprietaryly also can be referred to as the CSG sub-base stations with sub-base stations proprietary double opening.Three types sub-base stations adopts different Access Control Policys, and promptly all users' terminal can insert open sub-base stations; Proprietary sub-base stations is only to the privileged user, and promptly proprietary user's group (CSG, Closed Subscriber Group) member's open-destination is even other users' terminal can not insert proprietary sub-base stations at the proprietary sub-base stations area of coverage; And the sub-base stations of proprietary double opening at first guarantees privileged user's service, can provide service for unauthorized user under the prerequisite that does not influence privileged user's service.
Because the sub-base stations of proprietary and proprietary double opening defines user's access behavior, need safeguard a access control lists (ACL at network side, Access Control List) belong to the member terminal (being privileged user's terminal) that proprietary member organizes with record, this access control lists can be described as proprietary membership table; And also need to safeguard a access control lists in end side, with the access of limiting terminal to sub-base stations proprietary and proprietary double opening.Yet, the access control lists of network side and the access control lists of end side all are dynamically changeables, the information inconsistency that this access control lists that just causes network side easily and the access control lists of end side are preserved, thereby the expense in increase terminal and base station scans, the access.Thereby, the synchronous and replacement problem of the access control lists of needs solution network side and the access control lists of end side.
In addition, prior art is not considered to occur when unusual the respective handling of access control lists at the base station state as yet, and this also can increase the expense in terminal and base station scans, the access.Also have, when terminal under manual mode during access base station, the access request of terminal may be accepted or refuse in the base station, terminal also needs access control lists is upgraded thus, so that synchronous and renewal with the access control lists of network side, and avoid attempting continually inserting same base station, yet prior art also can't provide corresponding synchronous and new solution more.
Summary of the invention
In view of this, main purpose of the present invention is to provide a kind of processing method and system of access control lists, with the access control lists of realizing end side and network side synchronously and upgrade, and reduce the expense of terminal and base station.
For achieving the above object, technical scheme of the present invention is achieved in that
The invention provides a kind of processing method of access control lists, this method comprises:
The base station sends Indication message to terminal;
Described terminal is carried out the processing of access control lists according to the Indication message that receives.
Described access control lists comprises white table, promptly speciallys permit base station and/or proprietary member's Groups List that terminal inserts, comprising Base Station Identification and/or proprietary member's group id.
Described Indication message is the access control lists updating message, comprise following one of at least: Neighboring Cell List message, the scanning response message, switching command message, specific list message, this method further comprises:
Described base station sends the access control lists updating message of clean culture to terminal;
Described terminal generates self access control lists according to described updating message, or self access control lists is upgraded.
Described access control lists updating message comprises base station and/or proprietary member's Groups List, comprising Base Station Identification and/or proprietary member's group id.
The special permission effective time that the described terminal of indication special permission inserts in the described access control lists updating message.
Carry the base station of the described terminal access of special permission and/or the system information and/or the positional information of proprietary member group in the described access control lists updating message.
Before described base station sent the access control lists updating message of clean culture to terminal, this method further comprises: described terminal request base station provided access control lists.
Described Indication message comprise following one of at least, Neighboring Cell List message, scanning response message, switch indicating information, described terminal is upgraded sub-base stations and/or the proprietary member's Groups List that the special permission terminal inserts according to Indication message.
Described access control lists comprises the system information and/or the positional information of sub-base stations and/or proprietary member group, and described terminal is upgraded the sub-base stations of special permission terminal access and/or the system information and/or the positional information of proprietary member group according to Indication message.
Described access control lists comprises black table, promptly forbid base station and/or proprietary member's Groups List that described terminal inserts, described Indication message comprise following one of at least, Neighboring Cell List message, scanning response message, switch indicating information, described terminal is upgraded black table according to Indication message.
Described Indication message is the state indication, and this method further comprises:
Indicate to the terminal transmit status base station;
Described terminal is upgraded according to the access control lists of the state indication that receives to self.
Described state indication is used to indicate the state of described base station, perhaps indicates the state of adjacent base station.
Described state is designated as to be forbidden inserting indication or leaves the service indication or the load too high indication;
If terminal receives to forbid inserting and is designated as very, then terminal adds indicated base station and forbids access list;
Be designated as vacation if terminal receives to forbid inserting, and indicated base station forbids in the access list that in terminal then terminal is forbidden the access list this base station deletion from described;
If terminal receives the service left and is designated as very, then terminal adds indicated base station and forbids access list;
If terminal receives the service left and is designated as vacation, and indicated base station is in the forbidding in the access list of terminal, and then terminal is forbidden the access list this base station deletion from described;
If terminal receives load too high and is designated as very, then terminal adds indicated base station and forbids access list;
If terminal receives load too high and is designated as vacation, and indicated base station is in the forbidding in the access list of terminal, and then terminal is forbidden the access list this base station deletion from described.
Carry time parameter in the described state indication.
Described Indication message is for inserting response message, and this method further comprises:
The base station is returned the access response message according to the access request message of terminal to described terminal;
Described terminal is upgraded according to the access control lists of the access response message that receives to self.
The access request message of described terminal comprise following one of at least: distance measurement request message, insertion authority request message, message for requesting capability negotiation, login request message; The response message that the base station is returned to terminal is corresponding with the request message of terminal, comprise following one of at least: ranging response message, insertion authority response message, response message of capability negotiation, registration reply message.
Described request and/or response message indicate described terminal to insert with privileged user or unauthorized user identity.
Described response message indicating terminal is organized adding special permission access list with the proprietary member of described base station and/or described base station correspondence;
Described response message indicating terminal is organized the proprietary member of described base station and/or described base station correspondence to add and is forbidden access list and/or proprietary member's group of described base station and/or described base station correspondence is deleted from the special permission access list.
This method further comprises: behind the request message of base station receiving terminal, the access control lists of the proprietary member group of described base station and/or described base station correspondence is upgraded.
Described base station is macro base station or little base station or little base station or sub-base stations or relay station.
The present invention also provides a kind of treatment system of access control lists, and this system comprises: base station and terminal, wherein,
Described base station is used for sending Indication message to described terminal;
Described terminal is used for carrying out according to the Indication message that receives the processing of access control lists.
Described Indication message is the access control lists updating message, and described base station is further used for, and sends the access control lists updating message of clean culture to described terminal; Accordingly, described terminal is further used for, and generates self access control lists according to the access control lists in the updating message that receives, or self access control lists is upgraded.
Described Indication message is the state indication, and described base station is further used for, to described terminal broadcast status indication; Accordingly, described terminal is further used for, and upgrades according to the access control lists of the state indication that receives to self.
Described Indication message is a response message, and described base station is further used for, and according to the request message of described terminal, returns response message to described terminal; Accordingly, described terminal is further used for, and send a request message to described base station, and the response message that returns according to described base station upgrades self access control lists.
Described base station is further used for, according to the request message of terminal, to self and/or the access control lists of corresponding proprietary member's group upgrade.
Described base station is macro base station or little base station or little base station or sub-base stations or relay station.
The processing method of a kind of access control lists provided by the present invention and system send Indication message by the base station to terminal, and terminal is carried out the processing of access control lists according to the Indication message that receives.Not only realized by the present invention end side and network side access control lists synchronously and upgrade, and since the access control lists of end side and network side can reach synchronously, thereby reduced to insert in the wireless communication system, reentry and the expense of switching.
Description of drawings
Fig. 1 is the structural representation of wireless communication system in the prior art;
Fig. 2 is the flow chart of the processing method of a kind of access control lists of the present invention;
Fig. 3 is the flow chart of processing method of the access control lists of the embodiment of the invention one;
Fig. 4 is the flow chart of processing method of the access control lists of the embodiment of the invention three;
Fig. 5 is the flow chart of processing method of the access control lists of the embodiment of the invention four;
Fig. 6 is the composition structural representation of the treatment system of a kind of access control lists of the present invention.
Embodiment
The technical solution of the present invention is further elaborated below in conjunction with the drawings and specific embodiments.
Macro base station inserts (WiMAX in worldwide interoperability for microwave, Worldwide Interoperability for Microwave Access) is called Macro BS in the network, at global system for mobile communications (GSM, Global System for Mobile Communications) is called base transceiver station (BTS in the network, Base Transceiver Station), at universal mobile telecommunications system (UMTS, Universal Mobile Telecommunications System), Long Term Evolution (LTE, Long Term Evolution) is called NodeB in the network, (LTE-A LTE-Advanced) is called eNodeB in the network at senior Long Term Evolution.Sub-base stations is called femtocell BS or femto BS or WFAP (WiMax Femtocell Access Point) in the WiMAX network, in the GSM network, be called young access point (FAP, Femto Access Point), in UMTS, LTE network, be called HNB (Home NodeB), in the LTE-A network, be called HeNB.In cordless communication network, macro base station provides large-scale coverage rate, and sub-base stations then is provided at fast communication service flexibly in family or the telecommuting environment for the user.
Terminal is docked into behavior by access control lists and is controlled, access control lists can be by special permission access list (White List, Allowed Femto BS List, Allowed CSG List, Accessible CSG Femtocell List, Subscribed CSG Femto BS List also can be described as white table or white list or allows access list) and forbid access list (Black List also can be described as Hei Biao or blacklist) composition.Special permission inserts and means that terminal is proprietary or the special permission member of the sub-base stations of proprietary double opening and/or proprietary member group (CSG), for proprietary sub-base stations, has only the special permission terminal could enjoy service; For the sub-base stations of proprietary double opening, the special permission terminal can be enjoyed preferential service.Forbid inserting and mean that terminal can not insert certain or some sub-base stations, but (it forbids the reason that inserts to forbid in the access list forbidding the sub-base stations that inserts or proprietary member organizing mark to each can to allow terminal to initiate urgent call in some occasion of forbidding inserting, concrete reason comprises to be forbidden inserting indication and/or leaves the service indication and/or load too high indication and/or refusal insert response, such as forbidding inserting former because can allow terminal to initiate urgent call during the load too high indication).Therefore, from the angle of terminal, following several situation is arranged: 1, obtain the sub-base stations proprietary or proprietary double opening (and/or CSG) of special permission for terminal, terminal can be initiated the request that inserts and insert with the identity of speciallyying permit member (CSG-member); 2, do not obtain the sub-base stations (and/or CSG) or the open sub-base stations of the proprietary double opening of speciallyying permit for terminal, these base stations are not in the white table that terminal is safeguarded, (if having black table then require them also not in black table), then terminal allows to insert these base stations in the crucial moment of keeping connection with the identity of unauthorized user; 3, for open sub-base stations, terminal inserts these base stations in due form; 4, for the proprietary sub-base stations (and/or CSG) beyond the white table of terminal, perhaps (deceive under the situation of table) sub-base stations (and/or CSG) in the black table of safeguarding for terminal in existence, terminal can't insert.What specify is, except that the 1st, 2 two kind of situation, other two kinds of situations also can be applied to other base station beyond the sub-base stations, comprise macro base station.Specifically, for macro base station, because macro base station acquiescence is open, thereby they can be in the white table that terminal is safeguarded, and if they also not in black showing, then terminal inserts in due form; And if they are in black table, then terminal can't insert.
Supplementary notes, the access control lists of end side is mainly used in the access control (Access Control) of end side, comprising the restriction (being a kind of Access Control Policy) of terminal being attempted the access behavior, for example: 1) terminal does not allow attempt to insert (comprising that initial network enters and/or network is reentried and/or switch and/or the position is upgraded) to proprietary sub-base stations and/or the CSG in showing in vain, unless under emergency call situations or the manual mode with not ing; 2) terminal does not allow to attempt being linked into the sub-base stations and/or the CSG of the not proprietary double opening in white table, unless emergency call situations, manual mode, based on base station indication or the situation that is in the crucial moment of keeping connection and/or do not have other to be fit to the situation of the base stations inserted and/or not detect other base stations, the base station that wherein is fit to insert is except the condition of signal strength signal intensity aspect such as RSSI, CINR, need consider also whether base station type and/or terminal obtain special permission, promptly the base station is non-CSG sub-base stations or the base station CSG sub-base stations for having authorized); 3) terminal does not allow to attempt inserting base station and/or the CSG that deceives in the table, unless emergency call situations.The access control lists of network side is used for the access control (Admission Control) of network side, comprising the restriction (being a kind of Access Control Policy) that terminal is inserted, for example: 1) proprietary sub-base stations and/or CSG do not allow the terminal outside the white table to insert, and remove nonemergency; 2) sub-base stations of proprietary double opening and/or CSG can provide service for unauthorized user (or having under the situation of unnecessary resource) under the situation that does not influence privileged user's service quality; 3) the base station terminal that is necessary for urgent access provides service.Especially, initiate authorization requests to upgrade access control lists in the terminal of white off-balancesheet (if there is black table in network side, then also require this terminal not in black table) situation under, authoring program should be initiated to the manager of base station and/or CSG by network side in the base station, so that the request of response terminal, the concrete grammar reference example.
In addition, the access control lists of end side can also use in terminal scanning and/or handoff procedure, and terminal is initiated scanning according to the information of white table, selects the base station and/or initiate to switch.For example, have in the white table of terminal sub-base stations sign, sub-base stations system information and the positional information thereof that the special permission terminal inserts (can represent in different ways: for example represent with its adjacent and/or overlapping base station, and/or with the geographical position represent such as longitude and latitude and/or with the RSSI signal with reference to information representation); When terminal enter with white table in the adjacent and/or overlapping base station (for example macro base station) of sub-base stations the time and/or based on the position proximity of the sub-base stations in terminal and the white table (when for example the distance of the geographical position that provides according to the GPS location and the geographical position calculating gained of sub-base stations is less than a certain threshold value, this threshold value can be decided according to the coverage of sub-base stations), terminal is initiated the scanning of the sub-base stations in the dialogue table, so that switching, reentry, position are updated to this sub-base stations.Supplementary notes, when positional information had more than a kind of method for expressing, positional information comprised the positional information type.In addition, overlapping and/or adjacent Base Station Identification with sub-base stations is a kind of relative position indication, promptly indicates the position of sub-base stations by the relation (mapping) of two base stations, means that another base station also nearby when finding one of them base station.
Synchronous for the access control lists of the access control lists of realizing end side and network side, reduce the expense of terminal and base station, the processing method of a kind of access control lists provided by the present invention as shown in Figure 2, mainly may further comprise the steps:
Step 201, the base station sends Indication message to terminal.
Step 202, terminal are carried out the processing of access control lists according to the Indication message that receives.
It is pointed out that the demand according to different application scene in the reality, the Indication message of base station can initiatively send to terminal, also can send to terminal after the request that receives terminal, and then terminal is carried out corresponding the processing according to the indication that receives.
The Indication message of base station can be the access control lists updating message, for example, the base station can initiatively send the access control lists updating message to terminal, also can after the request that receives terminal, send the access control lists updating message, and then terminal is according to the synchronous renewal operation of the execution of the access control lists in the updating message self access control lists to terminal.Renewal operation synchronously is specially: if terminal does not have access control lists (perhaps access control lists is for empty), then need the access control lists according to the access control lists generation that receives self; If terminal has been safeguarded the access control lists of self, then need to upgrade according to the access control lists of the access control lists that receives to self, renewal comprises update all and partial update.So-called update all is meant that promptly terminal covers the access control lists of self fully with the access control lists that receives; So-called partial update promptly is meant terminal according to the access control lists that receives, to operations such as the execution of the partial information in the access control lists of self increase or deletions.Indicating terminal is carried out the information of update all or partial update, can carry in the access control lists updating message.
In the practical application, the base station also comprises other polytypes to the Indication message that terminal sends, for example: the state indication of base station broadcast, response message that the base station is returned according to the access request of terminal or the like.The present invention does not limit the type of Indication message.
Embodiment one
Be that the access control lists updating message is an example with Indication message below, access control lists processing method of the present invention is elaborated.As shown in Figure 3, the processing method of access control lists mainly may further comprise the steps in the embodiment of the invention one:
Step 301, base station send the access control lists updating message of clean culture to terminal.
Comprise sub-base stations and/or proprietary member group that the special permission terminal inserts in this access control lists.
Step 302, terminal generates self access control lists according to the access control lists in the updating message, or self access control lists is upgraded.
Embodiments of the invention one mainly are the processing at terminal dialogue table, and suitable scene is after the domestic consumer buys the sub-base stations of proprietary sub-base stations or proprietary double opening, how to dispose white table, so that the household can specially permit the use sub-base stations; After considering that perhaps corporate user buys the sub-base stations of proprietary sub-base stations or proprietary double opening, how for the office worker of company disposes white table, so that the office worker of company can specially permit the use sub-base stations.Certainly, this method is equally applicable to the processing to black table of the reconfiguring of the white table mandate again of terminal (promptly to) and terminal.Specify that mode of unicast is for sending the preferred mode of access control lists, the base station also can use multicast or broadcast mode to send access control lists, and the processing of terminal is similar.
It is pointed out that flow process shown in Figure 2 both can be initiated by end side, also can initiatively initiate by network side.
Example 1
Situation about initiating at end side, when the access control lists of terminal be under sky or the indication of terminal the user near available sub-base stations (being that signal can satisfy service request) initiate to upgrade the request of access control lists.Terminal at first asks network side that access control lists (only needing to ask white table usually) is provided, for example by access control lists request message (AAI_ACL-REQ).After the request of terminal is received in the base station, need obtain the white table of this terminal, comprise in the white table that terminal can specially permit the sub-base stations list of the proprietary and proprietary double opening of access (and/or CSG list) from the server of preserving access control information.The sign (for example one of BS ID, Cell ID, CSG ID, Preamble Index, PA-preamble Index, SA-preamble Index and/or its combination) that in this list, comprises sub-base stations, and/or proprietary member's group id (being CSG ID).The white table that to obtain by eating dishes without rice or wine of base station sends to terminal with the form of clean culture then, and for example by access control lists response message (AAI_ACL-RSP), terminal receives that this white table back just can generate or upgrade the white table of self.
Preferable, can indicate in the white table that the base station sends and specially permit effective time, promptly terminal can insert the time of certain sub-base stations (and/or CSG).Expired effective time when the special permission of certain sub-base stations (and/or CSG), and terminal is at the service area of this sub-base stations (and/or CSG), and then terminal is deleted this sub-base stations (and/or CSG) from white table.When terminal in the service area of certain sub-base stations (and/or CSG) and its special permission effective time will be expired the time, terminal can send request and prolong its special permission effective time to the base station with the request network side.The request of terminal can be accepted or refuse to network according to the strategy decision of operator, perhaps network sends the keeper of message to sub-base stations (and/or CSG), whether prolong special permission effective time by keeper decision then,, set the time that prolongs if prolong to this terminal.It is pointed out that speciallyying permit effective time can be a limited time, also can be untimed, promptly effectively (up to being instructed to deletion) forever.
If the white table clause that terminal can be preserved is limited, limit and will exceed this storage behind the white table that the reception base station sends, then terminal is screened clauses and subclauses according to certain priority policy, for example: proprietary sub-base stations is more higher than the sub-base stations priority of proprietary double opening, nearest use sub-base stations priority is higher, and the sub-base stations priority that frequency of utilization is high is higher.This priority policy can be configured according to actual needs.In addition, the user also can manually select to keep and/or deletion by the dialogue table clause.This priority also can be decided according to operator's policy, for example based on networking (subscription) situation of base station type and/or terminal.
In addition, system information and/or other information that can also have sub-base stations (and/or CSG) in the white table, for example: carrier frequency, leading (A-Preamble, comprise the main leading PA-preamble Index and/or the second leading SA-Preamble Index), Base Station Identification (BS ID for example, Cell ID, CSG ID, Preamble Index, PA-preamble Index, one of SA-preamble Index and/or its combination), base station title (can for the title of reading under the manual preference pattern of user), MAC (MediaAccess Control) version, the TDD/FDD sign, multi-carrier capability and configuration, base station title (can for the title of reading under the manual preference pattern of user), base station type (BS Type and/or Subscription Type), base station mode of operation information (for example whether being in the pattern pattern of low energy mode Low-Duty-Operational Mode and/or low energy mode), base station location indication (geographical position for example, and/or the sign overlay/neighboring macro BS ID of overlapping and/or adjacent macro base station, and/or the position of use RSSI is with reference to information) etc., to make things convenient for terminal scanning and/or to insert sub-base stations (and/or CSG).Supplementary notes, when positional information had more than a kind of method for expressing, positional information comprised the positional information type.In addition, overlapping and/or adjacent Base Station Identification with sub-base stations is a kind of relative position indication, promptly indicates the position of sub-base stations by the relation (mapping) of two base stations, means that another base station also nearby when finding one of them base station.That is to say that using overlapping and/or adjacent Base Station Identification is the sub-base stations in the white table and the mapping relations information (mapping information) of peripheral base station as base station location indication representative.
Example 2
At the situation that network side is initiated, i.e. the renewal of access control lists is initiated by network side.For example: after the keeper of sub-base stations (and/or CSG) increases or has deleted the special permission member (keeper can on the sub-base stations or finish on its handheld device increase or the operation of deletion) or after the keeper revised special permission effective time, at first can carry out (herein i.e. white table synchronously) synchronously of access control lists between the server of network side.Synchronous as carrying out between sub-base stations management server and the sub-base stations (the perhaps gateway of sub-base stations), to generate new access control lists, the access control lists after will upgrading then sends to affected terminal.If end is in connection status, then network side sends the updating message of (mode of unicast) access control lists by the serving BS of terminal; If end is at idle (Idle) state, then network allows accessing terminal to network, the updating message of transmission (mode of unicast) access control lists again by paging (paging) mode.Terminal is just carried out the processing that message is indicated after receiving updating message, for example: increase or the white clauses and subclauses of showing of deletion.
Preferable, can indicate in the updating message that the base station sends and specially permit effective time, promptly terminal can insert the time of certain sub-base stations (and/or CSG).When special permission effective time when expired, perhaps specially permit effective time will be expired the time, whether the webserver (for example sub-base stations management server) inquiry keeper prolongs mandate, if the keeper refuses to prolong, then terminal will be crossed after date in special permission effective time, and (and/or CSG) deletes from white table with expired sub-base stations; If the keeper agrees that then terminal will be speciallyyed permit effective time by the Indication message prolongation that the base station sends, to continue to use the service of sub-base stations (and/or CSG).In addition, the keeper also can initiatively revise special permission effective time, comprise prolonging or shorten special permission effective time, otherwise for example from unlimited time change in limited time or.
Of particular note, in end side is initiated to show in vain more news, also can adopt network side to initiate to prolong the flow process of authorizing; And in network side is initiated to show in vain more news, also can adopt terminal to initiate to prolong the flow process of authorizing.Promptly prolong the flow process of authorizing and whose (network side or terminal) to initiate not depending on how initial authorization obtains, not limited by the more new technological process of access control lists by whose initiation by.In addition, this method can be used for the renewal of black table equally, and its method is similar to the more new situation of white table.For example, the manager when sub-base stations (and/or CSG) adds certain terminal to Hei Biao or after the deletion, also can use the updating message of access control lists to come the access control lists of terminal is upgraded from black table.
Embodiment two
Example 3
Terminal can be obtained the information of neighbor cell from the base station, for example by Neighboring Cell List message (AAI_NBR-ADV).It may be initiatively to send also may send based on terminal request that serving BS sends message, for example, sends Neighboring Cell List message based on Neighboring Cell List request (AAI_NBR-REQ).It may also may be clean culture or multicast for broadcasting that serving BS sends adjacent area list information.Receive the Neighboring Cell List message of base station transmission when terminal after, can be according to system information and/or other information of the sub-base stations (and/or CSG) in the white table of Neighboring Cell List information updating, for example: carrier frequency, leading (A-Preamble Index, comprise the main leading PA-preamble Index and/or the second leading SA-Preamble Index), Base Station Identification (BS ID for example, Cell ID, CSG ID, Preamble Index, PA-preamble Index, one of SA-preamble Index and/or its combination), MAC (Media Access Control) version, the TDD/FDD sign, multi-carrier capability and configuration, base station title (can for the title of reading under the manual preference pattern of user), base station type (BS Type and/or Subscription Type), base station mode of operation information (for example whether being in the pattern pattern of low energy mode Low-Duty-Operational Mode and/or low energy mode), base station location indication (geographical position for example, and/or overlapping and/or adjacent macro base station sign overlay/neighboring macro BS ID, and/or the position of use RSSI is with reference to information) etc., to make things convenient for terminal scanning and/or to insert sub-base stations (and/or CSG).Specify that what uses overlapping and/or adjacent Base Station Identification indication is represented as base station location is the sub-base stations in the white table and the mapping relations information (mapping information) of peripheral base station.Such as, during sub-base stations in the white table of terminal is arranged in the Neighboring Cell List message that base station (as macro base station) sends, the sub-base stations during the terminal renewal is shown in vain and the mapping relations information (mapping information) of peripheral base station, the positional information (sign of promptly adjacent/overlapping base station herein) of the sub-base stations in just this Base Station Identification (as the macro base station sign) adding being shown in vain.After, when terminal enter one with white table in sub-base stations adjacent/during overlapping base station (sub-base stations in the white table adjacent/overlapping base station is marking matched with the base station that is entered), terminal can be initiated scanning.Supplementary notes, when positional information had more than a kind of method for expressing, positional information comprised the positional information type.In addition, the geographical position can be regarded the indication of a kind of absolute position as, and overlapping and/or adjacent Base Station Identification with sub-base stations is a kind of relative position indication, promptly indicate the position of sub-base stations, when finding one of them base station, mean that another base station also nearby by the relation (mapping information) of two base stations.
Except Neighboring Cell List message, terminal can also be upgraded system information and/or other information of the sub-base stations (and/or CSG) in the white table according to scanning response message (AAI_SCN-RSP) and/or switching command message (AAI_HO-CMD) message.Similar, it may be initiatively to send also to be based on terminal scanning request (AAI_SCN-REQ) transmission that the base station sends the scanning response message; It may be initiatively to send or send based on terminal handoff request (AAI_HO-REQ) that the base station sends switching command message.
Example 4
The terminal that is in connection status can be obtained the information of neighbor cell from serving BS, gives under the situation of terminal for the serving BS clean culture in the information of neighbor cell, then the information of the serving BS adjacent base station that should unicast terminal can insert.The unicast messages of serving BS (use AAI_NBR-ADV) may be initiatively to send to terminal, perhaps in response to the request (use AAI_NBR-REQ) of terminal.From the terminal angle, after terminal had been received the information of adjacent base station of serving BS clean culture, if adjacent base station is proprietary sub-base stations, then this proprietary sub-base stations should be that terminal can insert, and upgraded its white table based on this terminal.Concrete grammar is, if terminal is received the information of the proprietary sub-base stations of base station clean culture, then terminal adds white table (if this base station is not originally at Bai Biaonei) with this base station, the system information and/or other information that add this base station simultaneously, for example: carrier frequency, leading (A-Preamble Index, comprise the main leading PA-preamble Index and/or the second leading SA-Preamble Index), Base Station Identification (BS ID for example, Cell ID, CSG ID, Preamble Index, PA-preamble Index, one of SA-preamble Index and/or its combination), MAC (Media Access Control) version, the TDD/FDD sign, multi-carrier capability and configuration, base station title (can for the title of reading under the manual preference pattern of user), base station type (BS Type such as femto/macro and/or Subscription Type such as CSG-Closed/CSG-Open/OSG), base station mode of operation information (for example whether being in the pattern pattern of low energy mode Low-Duty-Operational Mode and/or low energy mode), base station location indication (geographical position for example, and/or overlapping and/or adjacent macro base station sign overlay/neighboring macro BS ID, and/or the position of use RSSI is with reference to information) etc., to make things convenient for terminal scanning and/or to insert sub-base stations (and/or CSG); If this base station is at Bai Biaonei, then terminal is upgraded system information and/or other information of this base station of Bai Biaonei.If terminal has Hei Biao and this base station at Hei Biaonei, then terminal is deleted it and it is added in the white table from black table.Supplementary notes, when positional information had more than a kind of method for expressing, positional information comprised the positional information type.In addition, overlapping and/or adjacent Base Station Identification with sub-base stations is a kind of relative position indication, promptly indicates the position of sub-base stations by the relation (mapping) of two base stations, means that another base station also nearby when finding one of them base station.That is to say that using overlapping and/or adjacent Base Station Identification is the sub-base stations in the white table and the mapping relations information (mapping information) of peripheral base station as base station location indication representative.
Supplementary notes, in the request of terminal, can carry request type, promptly ask the information of the base station of which kind of type (BS Type and/or Subscription Type), for example (non-sub-base stations is asked in first bit representative, sub-base stations is asked in second bit representative) or (0x01 representative request macro base station/little base station/little base station/relay station, 0x02 representative request obtains the CSG sub-base stations of special permission, the adjacent sub-base stations that 0x03 representative request is fit to, comprise open sub-base stations and the CSG sub-base stations that obtains special permission, all adjacent sub-base stations of 0x04 representative request).The positional information of all right carried terminal in the request of terminal is so that the Neighboring Cell List that macro base station returns based on this positional information optimization.Request based on terminal, macro base station sends corresponding adjacent base station to terminal, wherein in response message (AAI_NBR-ADV), can indicate the priority of base station, this priority can be decided according to operator's policy, for example based on networking (subscription) situation of base station type and/or terminal.If macro base station is known the position of terminal and/or terminal has reported self in request message position, then macro base station can also send to the Neighboring Cell List of terminal according to the position optimization of terminal, promptly only needs to send near the station list of terminal location.
In addition, after terminal had been received the information of adjacent base station of serving BS clean culture, if adjacent base station is the sub-base stations of proprietary double opening, then terminal need be carried out the renewal of white table according to the indication in request and/or the response message.For example, be that terminal is obtained the authorization if request message and/or response message imply or clearly indicate the CSG sub-base stations in the response message, then terminal is upgraded white table according to response message.Specifically, if the sub-base stations of the proprietary double opening in the response message not in white table, then terminal adds white table with it.If terminal has Hei Biao and this base station in black table, then terminal is with its deletion from black table.If the base station in the response message is in the white table of terminal, then terminal is according to base station in the response message renewal access control lists and/or system information and/or other information of CSG.
Example 5
Similar with example 4, the terminal that is in connection status can be upgraded access control lists according to the indication information in the scanning response message (AAI_SCN-RSP).Accordingly, the base station initiatively or based on terminal scanning request (AAI_SCN-REQ) sends the scanning response message.But concrete grammar reference example 4.After upgrading access control lists, terminal can be carried out next step processing, for example begins scanning.
Example 6
Similar with example 4, the terminal that is in connection status can be upgraded access control lists according to the indication information in the switching command message (AAI_HO-CMD).Accordingly, the base station initiatively or based on terminal handoff request (AAI_HO-REQ) sends switching command message.But concrete grammar reference example 4.After upgrading access control lists, terminal can be carried out next step processing, for example begins to switch.
Example 7
The terminal that is in connection status can be obtained the information of neighbor cell from serving BS, gives under the situation of terminal for the serving BS clean culture in the information of neighbor cell, then the information of the serving BS adjacent base station that should unicast terminal can insert.The unicast messages of serving BS (use AAI_NBR-ADV) may be initiatively to send to terminal, perhaps in response to the request (use AAI_NBR-REQ) of terminal.From the terminal angle, after terminal had been received the information of adjacent base station of serving BS clean culture, if adjacent base station is proprietary or the sub-base stations of proprietary double opening, then this sub-base stations should be that terminal can insert, and upgraded its black table based on this terminal.Concrete grammar is, if terminal is received the information of the sub-base stations of base station clean culture, then terminal is with the deletion (if this base station is originally at Hei Biaonei) from black table of this base station.In addition, terminal can also be upgraded white table according to AAI_NBR-ADV, and concrete grammar and example 4 are similar, do not repeat them here.
Except Neighboring Cell List message, terminal can also be upgraded the sub-base stations (and/or CSG) of deceiving in the table according to scanning response message (AAI_SCN-RSP) and/or switching command message (AAI_HO-CMD) message.Similar, it may be initiatively to send also to be based on terminal scanning request (AAI_SCN-REQ) transmission that the base station sends the scanning response message; It may be initiatively to send or send based on terminal handoff request (AAI_HO-REQ) that the base station sends switching command message.
Embodiment three
Be designated as example with the base station broadcast state more below, access control lists processing method of the present invention is elaborated.As shown in Figure 4, the indication of base station broadcast state realizes that the method that access control lists is handled mainly may further comprise the steps in the embodiment of the invention three:
Step 401, indicate to the terminal transmit status base station.
Step 402, terminal is upgraded according to the access control lists of the state indication that receives to self.
Present embodiment is primarily aimed at the processing of terminal to black table, the scene that is suitable for be the state of base station be shown as forbid inserting that (cell bar) is designated as very, leaves that service (out-of-service) is designated as very, during state that load too high is designated as very etc. is not suitable for inserting (and for example cell reserved is very), how terminal disposes black table, to avoid scanning, these base stations of selection/reselection as target BS.In actual applications, the state indication (in system message) of self can be broadcasted in the base station, also can broadcast or the state indication (in the message of adjacent area) of clean culture adjacent base station, and then terminal pins is carried out corresponding the processing to indicated base station.
Example 8
Situation at the indication of the state of base station broadcast self, in terminal receives the state indication of base station broadcast, forbid inserting and be designated as true time, terminal joins this base station in the black table, and terminal can be used one of Base Station Identification number (BS ID), Cell Identity CI (Cell ID), secondary synchronization sequences (SA-Preamble), proprietary member's group id (CSG ID) of this base station and/or its combination sign as the base station.After this base station added black table, terminal did not allow to attempt inserting this base station.Optionally, if this base station of forbidding inserting in the white table of terminal, then terminal can be deleted this base station from white table.
When the state that receives base station broadcast when terminal is designated as and allows to insert (promptly forbid inserting and be designated as vacation), and this base station is in the black table of terminal, then terminal from black table with this base station deletion.
Be designated as true time when terminal receives the service left, terminal adds indicated base station and forbids access list; Optionally, if this leaves serving base station in the white table of terminal, then terminal can be deleted this base station from white table.Be designated as fictitious time when terminal receives the service left, and indicated base station is in the forbidding in the access list of terminal, then terminal from forbid access list with this base station deletion.
Be designated as true time when terminal receives load too high, terminal adds indicated base station and forbids access list; Optionally, if the base station of this load too high in the white table of terminal, then terminal can be deleted this base station from white table.Be designated as fictitious time when terminal receives load too high, and indicated base station is in the forbidding in the access list of terminal, then terminal from forbid access list with this base station deletion.
Preferable, the state indication of base station broadcast also may have a time parameter, shows the term of validity of this state.Terminal can be provided with a timer according to this time parameter, works as timer expiry, and terminal can reexamine the state indication of this base station broadcast.For example: when the finite time of forbidding inserting expires, if this moment base station broadcast state be designated as and do not forbid inserting (promptly forbid inserting and be designated as vacation), then terminal can be with the deletion from black table of this base station; If this moment, the state indication of base station broadcast still inserted for forbidding, then terminal is reset timer to check the base station state after waiting for a period of time once more.
The state that it is pointed out that base station broadcast is designated as load too high or full load, and the processing of terminal can depend on the circumstances.If the indication of broadcasting load too high is proprietary or proprietary double open sub-base stations, and terminal does not obtain special permission, the terminal that does not then insert this base station adds black table with this base station.Add after the black table, terminal does not allow to attempt initiating to insert, and removes nonemergency, for example dials police emergency call.
If the indication of broadcasting load too high is proprietary or proprietary double open sub-base stations, and terminal has the special permission of acquisition, does not then limit terminal behavior, does not for example access terminal to decide in its sole discretion whether insert this base station.
If the indication of broadcasting load too high is open base station (comprising macro base station, sub-base stations), for the terminal that does not insert following several option is arranged: first kind is the not behavior of limiting terminal, and terminal is decided in its sole discretion; Second kind is not allow terminal to attempt inserting sub-base stations, but can attempts inserting macro base station; The third is for these base stations, and terminal does not allow to attempt inserting.Under these three kinds of situations, if the limiting terminal behavior, then terminal is carried out the operation that adds black table, otherwise, then do not carry out the operation that adds black table.For the terminal that has inserted, then need not any processing.
State at base station broadcast or clean culture adjacent base station is indicated (as passing through adjacent area message, such as MOB_NBR-ADV or AAI_NBR-ADV) situation, the processing of the state indication of concrete condition and base station broadcast self is similar, difference is that the processing of terminal will carry out at adjacent base station, for example indicated adjacent base station is added black table or deletion from black table.
Embodiment four
Again this base station being inserted to terminal in the base station below authorizes the processing method of the access control lists in the process of (comprising the cancellation mandate) to be elaborated.Of particular note, the base station is inserted this base station to terminal and is authorized, and normally authorizes in the terminal access procedure, but also can authorize after terminal inserts or before the terminal access.As shown in Figure 5, the method that access control lists is handled in the embodiment of the invention four mainly may further comprise the steps:
Step 501, terminal send request and insert message to the base station.
Step 502, base station send and insert response message to terminal.
Step 503, terminal is upgraded according to the access control lists of the access response message that receives to self.
This embodiment can at terminal under manual mode when select target base station (and/or CSG) to the processing of access control lists, also going for terminal can not discern base station type (base station is sub-base stations or other base station, and/or the base station is proprietary, proprietary double opening or open) situation, two kinds of situations are similar for the processing method of access control lists, below only are that example is set forth with the manual mode.Specifically, the user can start the pattern of the manual selection access target BS of terminal, under this pattern, terminal will scan the frequency range of system's support, to find may be that terminal provides serving base station (and/or CSG), terminal will show the base station (title that for example shows the base station that finds on user interface afterwards, identification number, and/or proprietary member such as organizes at sign, the type and/or the networking type that also have these base stations, the base station that whether obtains to specially permit, network insertion/service provider, signal power etc.) and/or CSG, manually select for the user.Have the sub-base stations (and/or CSG) that terminal has obtained to specially permit access in these base stations, also have the not sub-base stations (and/or CSG) of the proprietary or proprietary double opening of special permission of terminal.If the user wants to select this two kinds of sub-base stations (and/or CSG), then relate to the processing of access control lists.
Example 9
Wish that at terminal access (comprises that initial network enters, network is reentried, switch, the position is upgraded) proprietary sub-base stations, and this terminal is not speciallyyed permit this situation of qualification, terminal according to a user side's of user's indication configuration white table (in this case, terminal has two parts of white tables, a white table from network side, a white table), use this white table to initiate to insert request (as at initial ranging then to proprietary sub-base stations (and/or CSG) from the user, or switching range finding, or bandwidth request range finding, or initiate to insert request by AAI_RNG-REQ distance measurement request message in the renewal of position).Network side may be inquired the whether access request of receiving terminal of manager of sub-base stations (and/or CSG), by the base station request response (as by the AAI_RNG-RSP ranging response message) is issued terminal then, this its request of message indicating terminal is to be accepted or to be rejected (i.e. success or failure).When the terminal request of receiving during accepted response message, then terminal adds this base station (base station that promptly give tacit consent to this base station) (and/or CSG of acquiescence) in (from network side) white table; Otherwise then terminal is deleted this base station from user side's white table, and optionally, terminal adds this base station in the black table.
In addition, terminal also can not need adopt the mode of user side's white table, but directly initiate to insert request to sub-base stations (and/or CSG), this situation and above-mentioned processing method are similar, after unique request that is not both terminal is rejected, because terminal does not have user side's white table, does not then need this base station is deleted from user side's white table.
Need to prove that the base station is after the access request that receives self terminal, the webserver also needs the access control lists of himself safeguarding is upgraded, and is specially:
If the manager of sub-base stations (and/or CSG) and/or operator have accepted the access request (i.e. special permission inserts request) of terminal, then add the terminal and/or the user of the request of transmission in the white table of in network side server (such as Femto-AAA) and/or sub-base stations, preserving.If having specified, the manager speciallys permit the time that this terminal inserts, then also corresponding setting special permission turn-on time or timer on server.If the manager of sub-base stations (and/or CSG) has refused the access request (i.e. special permission inserts request) of terminal, two kinds of possibilities are then arranged, do not need to upgrade the access control lists of network side preservation at (promptly only the situation of the white table of network enabled side under) under the situation of the black table of network enabled side not, and unaccepted terminal and/or user are added in the black table that network side server (such as Femto-AAA) and/or sub-base stations preserve for the situation of the black table of network enabled side is next.Supplementary notes, the sign of terminal can be used MAC ID, user's sign can use network access Identifier (Network Access Identifier, NAI).
Specify, above flow process is that terminal is upgraded access control lists and/or network side renewal access control lists can be implemented in the different step of access procedure, in different step, can (comprise that range finding message (AAI_RNG-REQ/AAI_RNG-RSP), capability negotiation message (AAI_SBC-REQ/AAI_SBC-RSP), insertion authority message, login request message (AAI_REG-REQ/AAI_REG-RSP) realize by different requests and/or response message, though the message difference of its carrying, but its process is similar, does not repeat them here.In addition, this method is applicable to other following request message in fact too, includes but not limited to handoff request message (for example AAI_HO-REQ or AAI_MSHO-REQ), scan request message (for example AAI_SCN-REQ), Neighboring Cell List request message (for example AAI_NBR-REQ).And whether this method also can independently be used in the renewal of access control lists of network side, does not promptly rely on the access control lists that whether has end side, also the access control lists of end side is not handled with regard to relying on.
Preferable, refuse information can also be carried an indication, to indicate whether terminal needs this base station (and/or CSG) added in the black table, adds black table if refuse information is clearly indicated, and then terminal adds black table with this base station (and/or CSG).Specify that the terminal of not having special permission does not at the beginning need proprietary or proprietary double open sub-base stations (and/or CSG) is added black table, (when not obtaining special permission) these sub-base stations (and/or CSG) are neither in white table, also not in black table in the time of promptly initial.
Example 10
Insert this situation of sub-base stations of proprietary double opening at terminal request with the identity of special permission, terminal can use distance measurement request (AAI_RNG-REQ) or other message (for example AAI_SBC-REQ, AAI_REG-REQ) to carry this indication (promptly indicating the sub-base stations that inserts proprietary double opening with the special permission identity).After this request message is received by the base station, can send the server of corresponding message to core net, core net can be inquired the whether request of receiving terminal of manager of sub-base stations (and/or CSG), by the base station response message (as AAI_RNG-RSP message) is issued terminal then, its access request of this message indicating terminal is to be accepted or to be rejected (i.e. success or failure), can also indicate to be accepted in which way or to be rejected.
Request has been accepted two kinds of possibilities, is promptly inserted and inserts with Non-Patent identity (non-CSG-member) with the special permission identity.Request is rejected also two kinds of possibilities, promptly whether lists black table in.When the terminal request of receiving had been accepted and be the response message that inserts with the special permission identity, then terminal added this base station in the white table, and special permission inserts in the response message effective time of can carried terminal being speciallyyed permit access, and then terminal is provided with timer according to this time; When terminal was only received the response message that inserts with the Non-Patent identity, then terminal can only be enjoyed the grade of service of Non-Patent identity.When the terminal request of receiving is rejected and lists in black table, then terminal adds this base station in the black table, and deletion and/or deletion from user side's white table from white table (for the situation that this base station is arranged the white table) (for the white table of user side is arranged and comprising the situation of this base station); When the terminal request of receiving is rejected but does not list black table in, terminal with this base station from user side's white list deletion (for the white table of user side is arranged and comprising the situation of this base station), but do not need this base station is added black table.
Receive the request of terminal at the sub-base stations of proprietary double opening after, the more new situation of the white table of network side is similar with the situation (example 9) of proprietary sub-base stations, just need the white table on the server be upgraded when promptly only having accepted request that terminal inserts with the special permission identity in manager and/or operator, other situation then need not the white table on the update service device, on the other hand, under the situation of the black table of network enabled side, then refused just to need the black table on the server is upgraded after the request of terminal in manager and/or operator.
Example 11
9 and 10 replenish as an example, preferable, the terminal that is in idle mode (Idle Mode) under can have been selected sub-base stations (and/or CSG) afterwards the user, initiates position renewal (Location Update also can be described as Location Registration).Like this, terminal can enter and/or the sub-base stations of reentrying (and/or CSG) is asked the processing of authorizing before at network, causes the delay of access to avoid licensing process.Processing in the access procedure of its processing mode and example 9 (at proprietary sub-base stations) and example 10 (at the sub-base stations of proprietary double opening) narration is similar, can be in position updating process realizes the mandate (comprise authorizing and upgrade) to terminal and/or the processing of access control lists by distance measurement request and response message (AAI_RNG-REQ/AAI_RNG-RSP).Attempt an example, in AAI_RNG-REQ message, can in range finding reason (Ranging Purpose) information, upgrade and/or ask to obtain proprietary member and organize mandate (promptly adding proprietary member's group) by indicating positions, and in AAI_RNG-RSP message, can upgrade in the position and carry in response (Location Update Response) information that the position is upgraded and proprietary member organizes that mandate is successfully indicated and/or the indication of failing (being that authorization requests is accepted or is rejected).
In addition, under handoff scenario, base station and terminal also can be passed through switching response message (switching command message just, for example AAI_BSHO-CMD or AAI_HO-CMD) come the more access control lists of new terminal, base station can send switching response message on one's own initiative or receiving that terminal handoff request message (for example AAI_MSHO-REQ or AAI_HO-REQ) back sends switching response message (base station is no longer described in detail by server and sub-base stations and/or the gerentocratic insertion authority process of CSG at network side after receiving terminal request).This message is carried the insertion authority indication, be that indicating terminal is speciallyyed permit the sub-base stations (and/or special permission inserts CSG) that is linked into proprietary sub-base stations or is linked into proprietary double opening with special permission or non-privileged mode/state, terminal can be carried out corresponding the processing according to this message after receiving switching response message, such as target BS (being base station indicated in the message) (and/or CSG) being added table in vain.Similarly, base station and terminal also can be in scanning process by scan request (AAI_SCN-REQ) and response message (AAI_SCN-RSP) or in obtaining the process of Neighboring Cell List, realize the processing of access control lists by Neighboring Cell List request (AAI_NBR-REQ) and response message (AAI_NBR-ADV of clean culture), do not repeat them here.
Example 12
After inserting, terminal authorize the process and the process among the embodiment one of (promptly authorize and upgrade) similar again, can initiatively initiate or initiate by network side (serving BS) by user's (terminal), difference mainly is the difference of message, in the present embodiment, because terminal has inserted this base station (and/or CSG), then base station (and/or CSG) can use response message (at example 9,10, in 11 outside the pointed response message, can also in cycle range finding, use ranging response message) come terminal inserted and authorize again, comprise authority change and/or the change of mandate time.Specify that the authority change is meant the change to authorization terminal, includes but not limited to change to the privileged user from unauthorized user, perhaps changes to unauthorized user from the privileged user; For mandate time change, the mandate time can prolong also and can shorten, on the contrary for example from unlimited time in limited time or.The base station can be used ranging response message (may be Perodic ranging or bandwidth request range finding etc.), insertion authority response message or other message to carry and be authorized indication again.
Supplementary notes, in embodiment four, (comprise example 9 to 12) request or response message in may with the acquiescence mode or explicit mode indicate base station corresponding and/or CSG with access control.Preferable, in distance measurement request and response message, capability negotiation request and response message, register requirement and response message, can be defaulted as indicated base station (and/or CSG) with receiving the base station (and/or its corresponding CSG) of request message or the base station (and/or its corresponding CSG) of transmission response message; And for scan request and response message, handoff request and response message, Neighboring Cell List request and response message, when the base station sends response message with active mode, then can in response message, indicate base station corresponding and/or CSG with access control by explicit mode, indication base station and/or the CSG corresponding with access control that (being under the situation of terminal request) then need show in request message under non-base station active situation, both can adopt the mode of demonstration in response message can be that one or more modes that adopt acquiescence or show are indicated according to target BS also.In addition, (comprising example 9 to 12) in embodiment four equally can be similar with embodiment one and embodiment three, set the time parameter of access control, this time parameter can carry in response message, so that terminal is according to base station in this parameter setting and/or the white table of renewal and/or the special permission turn-on time of CSG, and/or according to this parameter setting and/or upgrade base station in the black table and/or the forbidding turn-on time of CSG, but concrete grammar reference example one and embodiment three do not repeat them here.
Specify, more than method among four embodiment can comprehensively use, for example, before terminal inserts, can adopt the method among the embodiment one to allow terminal upgrade access control lists, so that can insert certain sub-base stations (and/or CSG) by the access control lists updating message; And after terminal inserts sub-base stations (and/or CSG), can make terminal can continue to obtain the service of this sub-base stations (and/or CSG) by the method for authorizing again among the embodiment four.
Need to prove, the processing method of access control lists among the present invention, its applied environment is not limited to realize that the access control lists of sub-base stations and terminal is synchronous; According to actual needs, the access control lists that can also expand to macro base station or little base station or little base station or relay station and terminal is synchronous, and the implementation method of its implementation and above-mentioned sub-base stations is similar, repeats no more herein.Not only realize the synchronous and renewal of the access control lists of end side and network side by the present invention, and reduced the expense of scanning in the wireless communication system, access, reentry and switching.
For realizing the processing method of above-mentioned access control lists, the present invention also provides a kind of treatment system of access control lists, and as shown in Figure 6, this system comprises: base station 10 and terminal 20.Base station 10 is used for sending Indication message to terminal 20.Terminal 20 is used for carrying out the synchronous of access control lists and/or upgrading operation according to the Indication message that receives.
When Indication message was the access control lists updating message, base station 10 was further used for, and sent the access control lists updating message of clean culture to terminal 20; Accordingly, terminal 20 is further used for, and generates self access control lists according to the access control lists in the updating message that receives, or self access control lists is upgraded.
When Indication message was the state indication, base station 10 was further used for, to terminal 20 broadcast status indication; Accordingly, terminal 20 is further used for, and upgrades according to the access control lists of the state indication that receives to self.
When Indication message is a response message, base station 10 is further used for, and on one's own initiative or behind the request message of receiving terminal 20, sends response messages to terminal 20; Accordingly, terminal 20 is further used for, and send a request message to base station 10, and the response message that sends according to base station 10 upgrades self access control lists.Base station 10 also is used for the request message according to terminal, and the access control lists of indicated base station and/or proprietary member group is upgraded.
The base station 10 of indication of the present invention can be macro base station or little base station or little base station or sub-base stations or relay station.
The above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention.

Claims (27)

1. the processing method of an access control lists is characterized in that, this method comprises:
The base station sends Indication message to terminal;
Described terminal is carried out the processing of access control lists according to the Indication message that receives.
2. according to the processing method of the described access control lists of claim 1, it is characterized in that described access control lists comprises white table, promptly specially permit base station and/or proprietary member's Groups List that terminal inserts, comprising Base Station Identification and/or proprietary member's group id.
3. according to the processing method of the described access control lists of claim 2, it is characterized in that described Indication message is the access control lists updating message, this method further comprises:
Described base station sends the access control lists updating message of clean culture to terminal;
Described terminal generates self access control lists according to described updating message, and/or self access control lists is upgraded.
4. according to the processing method of the described access control lists of claim 3, it is characterized in that described access control lists updating message comprises base station and/or proprietary member's Groups List, comprising Base Station Identification and/or proprietary member's group id.
5. according to the processing method of the described access control lists of claim 4, it is characterized in that the special permission effective time that the described terminal of indication special permission inserts in the described access control lists updating message.
6. according to the processing method of claim 4 or 5 described access control listses, it is characterized in that, carry the base station of the described terminal access of special permission and/or the system information and/or the positional information of proprietary member group in the described access control lists updating message.
7. according to the processing method of claim 4 or 5 described access control listses, it is characterized in that before described base station sent the access control lists updating message of clean culture to terminal, this method further comprises: described terminal request base station provided access control lists.
8. according to the processing method of the described access control lists of claim 2, it is characterized in that, described Indication message comprise following one of at least, Neighboring Cell List message, scanning response message, switch indicating information, described terminal is upgraded sub-base stations and/or the proprietary member's Groups List that the special permission terminal inserts according to Indication message.
9. according to the processing method of claim 2 or 8 described access control listses, it is characterized in that, described access control lists comprises the system information and/or the positional information of sub-base stations and/or proprietary member group, and described terminal is upgraded the sub-base stations of special permission terminal access and/or the system information and/or the positional information of proprietary member group according to Indication message.
10. according to the processing method of claim 2 or 8 described access control listses, it is characterized in that, described access control lists comprises black table, promptly forbid base station and/or proprietary member's Groups List that described terminal inserts, described Indication message comprise following one of at least, Neighboring Cell List message, scanning response message, switch indicating information, described terminal is upgraded black table according to Indication message.
11. the processing method according to the described access control lists of claim 2 is characterized in that, described Indication message is the state indication, and this method further comprises:
Indicate to the terminal transmit status base station;
Described terminal is upgraded according to the access control lists of the state indication that receives to self.
12. the processing method according to the described access control lists of claim 11 is characterized in that, described state indication is used to indicate the state of described base station, perhaps indicates the state of adjacent base station.
13. the processing method according to the described access control lists of claim 12 is characterized in that, described state is designated as to be forbidden inserting indication or leaves the service indication or the load too high indication;
If terminal receives to forbid inserting and is designated as very, then terminal adds indicated base station and forbids access list;
Be designated as vacation if terminal receives to forbid inserting, and indicated base station forbids in the access list that in terminal then terminal is forbidden the access list this base station deletion from described;
If terminal receives the service left and is designated as very, then terminal adds indicated base station and forbids access list;
If terminal receives the service left and is designated as vacation, and indicated base station is in the forbidding in the access list of terminal, and then terminal is forbidden the access list this base station deletion from described;
If terminal receives load too high and is designated as very, then terminal adds indicated base station and forbids access list;
If terminal receives load too high and is designated as vacation, and indicated base station is in the forbidding in the access list of terminal, and then terminal is forbidden the access list this base station deletion from described.
14. the processing method according to the described access control lists of claim 11 to 13 is characterized in that, carries time parameter in the described state indication.
15. the processing method according to the described access control lists of claim 2 is characterized in that, described Indication message is for inserting response message, and this method further comprises:
The base station is returned the access response message according to the access request message of terminal to described terminal;
Described terminal is upgraded according to the access control lists of the access response message that receives to self.
16. the processing method according to the described access control lists of claim 15 is characterized in that, the access request message of described terminal comprise following one of at least: distance measurement request message, insertion authority request message, message for requesting capability negotiation, login request message; The response message that the base station is returned to terminal is corresponding with the request message of terminal, comprise following one of at least: ranging response message, insertion authority response message, response message of capability negotiation, registration reply message.
17. the processing method according to the described access control lists of claim 16 is characterized in that, described request and/or response message indicate described terminal to insert with privileged user or unauthorized user identity.
18. the processing method according to claim 16 or 17 described access control listses is characterized in that, described response message indicating terminal is organized adding special permission access list with the proprietary member of described base station and/or described base station correspondence.
19. processing method according to claim 16 or 17 described access control listses, it is characterized in that described response message indicating terminal is organized the proprietary member of described base station and/or described base station correspondence to add and forbidden access list and/or proprietary member's group of described base station and/or described base station correspondence is deleted from the special permission access list.
20. processing method according to claim 16 or 17 described access control listses, it is characterized in that, this method further comprises: behind the request message of base station receiving terminal, the access control lists of the proprietary member group of described base station and/or described base station correspondence is upgraded.
21. the processing method according to each described access control lists in claim 1 to 5 or 8 or 1 to 13 or 15 to 17 is characterized in that, described base station is macro base station or little base station or little base station or sub-base stations or relay station.
22. the treatment system of an access control lists is characterized in that, this system comprises: base station and terminal, wherein,
Described base station is used for sending Indication message to described terminal;
Described terminal is used for carrying out according to the Indication message that receives the processing of access control lists.
23. the treatment system according to the described access control lists of claim 22 is characterized in that, described Indication message is the access control lists updating message, and described base station is further used for, and sends the access control lists updating message of clean culture to described terminal; Accordingly, described terminal is further used for, and generates self access control lists according to the access control lists in the updating message that receives, or self access control lists is upgraded.
24. the treatment system according to the described access control lists of claim 22 is characterized in that, described Indication message is the state indication, and described base station is further used for, to described terminal broadcast status indication; Accordingly, described terminal is further used for, and upgrades according to the access control lists of the state indication that receives to self.
25. the treatment system according to the described access control lists of claim 22 is characterized in that, described Indication message is a response message, and described base station is further used for, and according to the request message of described terminal, returns response message to described terminal; Accordingly, described terminal is further used for, and send a request message to described base station, and the response message that returns according to described base station upgrades self access control lists.
26. the treatment system according to the described access control lists of claim 25 is characterized in that, described base station is further used for, according to the request message of terminal, to self and/or the access control lists of corresponding proprietary member's group upgrade.
27. the treatment system according to each described access control lists in the claim 22 to 26 is characterized in that, described base station is macro base station or little base station or little base station or sub-base stations or relay station.
CN2009101684229A 2009-06-30 2009-08-16 Method and system for processing access control list Pending CN101938809A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2009101684229A CN101938809A (en) 2009-06-30 2009-08-16 Method and system for processing access control list
CN201610375587.3A CN105939534A (en) 2009-06-30 2009-08-16 Method and system for processing access control list

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN200910088606 2009-06-30
CN200910088606.4 2009-06-30
CN2009101684229A CN101938809A (en) 2009-06-30 2009-08-16 Method and system for processing access control list

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201610375587.3A Division CN105939534A (en) 2009-06-30 2009-08-16 Method and system for processing access control list

Publications (1)

Publication Number Publication Date
CN101938809A true CN101938809A (en) 2011-01-05

Family

ID=43355887

Family Applications (2)

Application Number Title Priority Date Filing Date
CN2009101684229A Pending CN101938809A (en) 2009-06-30 2009-08-16 Method and system for processing access control list
CN201610375587.3A Withdrawn CN105939534A (en) 2009-06-30 2009-08-16 Method and system for processing access control list

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201610375587.3A Withdrawn CN105939534A (en) 2009-06-30 2009-08-16 Method and system for processing access control list

Country Status (2)

Country Link
CN (2) CN101938809A (en)
WO (1) WO2010145604A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102158844A (en) * 2011-05-13 2011-08-17 中国联合网络通信集团有限公司 Method and system for updating position of base station
CN103179641A (en) * 2011-12-23 2013-06-26 华为技术有限公司 Method for terminal to select networks and terminal
CN103188684A (en) * 2011-12-27 2013-07-03 中国电信股份有限公司 Adjacent cell configuration method and system based on terminal location
CN105704782A (en) * 2011-11-09 2016-06-22 财团法人工业技术研究院 Method and apparatus for notifying access control information
CN108307475A (en) * 2016-08-09 2018-07-20 中兴通讯股份有限公司 The control method and device of network insertion
WO2019061423A1 (en) * 2017-09-30 2019-04-04 深圳市云中飞网络科技有限公司 Abnormal frequency point detection method and apparatus, and computer storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3524001A1 (en) * 2016-10-04 2019-08-14 Telefonaktiebolaget LM Ericsson (PUBL) Detection of potential system reference conflicts

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101296451A (en) * 2008-06-03 2008-10-29 中兴通讯股份有限公司 Method for updating inside user group list of terminal
CN101330714A (en) * 2007-06-20 2008-12-24 华为技术有限公司 Wireless access method, system and apparatus
CN101400107A (en) * 2007-09-27 2009-04-01 华为技术有限公司 Method and apparatus for completing user adding

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1671240A (en) * 2004-03-19 2005-09-21 华为技术有限公司 A method for implementing mobile network access limitation
US20080200146A1 (en) * 2007-01-30 2008-08-21 Interdigital Technology Corporation Cell access restriction and wtru access class optimization in lte system information
CN101400106A (en) * 2007-09-27 2009-04-01 华为技术有限公司 Method for household base station access control
US9572089B2 (en) * 2007-09-28 2017-02-14 Interdigital Patent Holdings, Inc. Method and apparatus for supporting home Node B services
CN101400189A (en) * 2007-09-30 2009-04-01 华为技术有限公司 Method, system, base station and management node for core network node access

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101330714A (en) * 2007-06-20 2008-12-24 华为技术有限公司 Wireless access method, system and apparatus
CN101400107A (en) * 2007-09-27 2009-04-01 华为技术有限公司 Method and apparatus for completing user adding
CN101296451A (en) * 2008-06-03 2008-10-29 中兴通讯股份有限公司 Method for updating inside user group list of terminal

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102158844A (en) * 2011-05-13 2011-08-17 中国联合网络通信集团有限公司 Method and system for updating position of base station
CN105704782A (en) * 2011-11-09 2016-06-22 财团法人工业技术研究院 Method and apparatus for notifying access control information
CN103179641A (en) * 2011-12-23 2013-06-26 华为技术有限公司 Method for terminal to select networks and terminal
CN103179641B (en) * 2011-12-23 2016-08-03 华为技术有限公司 Terminal chooses method and the terminal of network
CN103188684A (en) * 2011-12-27 2013-07-03 中国电信股份有限公司 Adjacent cell configuration method and system based on terminal location
CN108307475A (en) * 2016-08-09 2018-07-20 中兴通讯股份有限公司 The control method and device of network insertion
WO2019061423A1 (en) * 2017-09-30 2019-04-04 深圳市云中飞网络科技有限公司 Abnormal frequency point detection method and apparatus, and computer storage medium

Also Published As

Publication number Publication date
WO2010145604A1 (en) 2010-12-23
CN105939534A (en) 2016-09-14

Similar Documents

Publication Publication Date Title
US10448252B2 (en) Apparatus and method for controlling access to a telecommunications network
CN102326429B (en) Method and apparatus in communication network
CN102057725B (en) Registration and access control in femto cell deployments
KR101410371B1 (en) Access terminal configuration and access control
KR101216086B1 (en) Provisioning communication nodes
KR101290186B1 (en) Access management for wireless communication
CN101960887B (en) In coexisted wireless communication system, the efficient frequency of mobile device is distributed
US9042866B2 (en) Method for accessing a CSG femtocell
CN101938809A (en) Method and system for processing access control list
KR20110111366A (en) Femto cell handover in wireless communications
CN101926200A (en) The frequency that is used for cellular communication inserts the method and apparatus of restriction
KR20100039345A (en) Handover between wireless cellular network and private network in wireless communications
US20100216426A1 (en) User-Customized Mobility Method and System in a Mobile Communication System
CN101998579A (en) Method and system for providing cell information of home base station for user equipment
WO2010104076A1 (en) Wireless communication system, base station apparatus, wireless communication terminal, gateway apparatus and communication method
US9191816B2 (en) Method of managing authorization of private node B in a wireless communication system and related device
CN104869598A (en) Mobile communication system, gateway apparatus, base stations, communication method and program
EP2448327A1 (en) System and method for obtaining subscriber access information by core network in switch process
WO2012046831A1 (en) Network apparatus, base station and mobile station control method
AU2015202885A1 (en) Provisioning communication nodes
EP2320703A1 (en) A method for selecting and reselecting a cell based on number of services available
AU2012247065B2 (en) Access management for wireless communication
KR101600629B1 (en) System and method for controlling indoor base station remotely
EP2712250A1 (en) A small cell base station, a macrocell base station controller, a telecommunications network, and a method of handover

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110105