CN101990211B - Method for network access, device and system - Google Patents

Method for network access, device and system Download PDF

Info

Publication number
CN101990211B
CN101990211B CN200910089141.4A CN200910089141A CN101990211B CN 101990211 B CN101990211 B CN 101990211B CN 200910089141 A CN200910089141 A CN 200910089141A CN 101990211 B CN101990211 B CN 101990211B
Authority
CN
China
Prior art keywords
frequency spectrum
network
mobile subscriber
subscriber equipment
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN200910089141.4A
Other languages
Chinese (zh)
Other versions
CN101990211A (en
Inventor
毕晓宇
许怡娴
赵曙光
肖鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Honor Device Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN200910089141.4A priority Critical patent/CN101990211B/en
Publication of CN101990211A publication Critical patent/CN101990211A/en
Application granted granted Critical
Publication of CN101990211B publication Critical patent/CN101990211B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a kind of method for network access, device and system, relate to wireless communication field, take frequency real estate impact validated user for a long time for solution prior art CR user maliciously and use the problem of this frequency resource to invent.The method that the embodiment of the present invention provides, comprises the steps: mobile subscriber equipment perception the idle frequency spectrum information that reports are carried out authenticity verification;For distributing frequency spectrum resource by the mobile subscriber equipment of described authenticity verification, so that described mobile subscriber equipment carries out network insertion by above-mentioned distribution frequency spectrum resource.The present invention is applicable to GSM.

Description

Method for network access, device and system
Technical field
The present invention relates to wireless communication field, particularly relate to a kind of method for network access, device and system.
Background technology
Along with developing rapidly of radio communication, the demand of frequency band is improved constantly, and owing to existing frequency band divides It is fixing for joining strategy, and frequency spectrum is not fully utilized.According to FCC (Federal Communications Commission, FCC, is responsible for distribution and the authorization machine of frequency spectrum Structure) report, from space-time two-dimension add up, the existing utilization rate of frequency spectrum that dispensed is between 15%-85%. In order to make full use of frequency spectrum, existing fixed frequency spectrum distribution policy need to be changed, and use new technology to realize frequency The dynamic high-efficiency of spectrum utilizes.Therefore, it has been proposed that employing cognitive radio (CR, Cognitive Radio) Technology, CR is a kind of intelligent wireless communication network, and energy perception surrounding environment obtains information from surrounding environment, And such as launch power by real-time change, the transmission such as carrier frequency and modulation system parameter adapts to running environment Change, uses the idle frequency spectrum that other network in one's respective area is currently not used by and completes to communicate.
In order to better illustrate the operation principle of CR network, existing illustration: assume in certain CR network coverage In the range of exist 5 frequencies that can be used for radio communication, be A, B, C, D, E frequency respectively, wherein, A, B, C frequency is allocated to LTE (long time evolution, Long Term Evolution) network, and D, E frequency divides (WIMAX, Worldwide Interoperability for Microwave is accessed to worldwide interoperability for microwave Access) network.If now C frequency is idle, the mobile subscriber equipment of certain CR network, it is called for short CR user, Perception C frequency is idle, then this CR user uses C frequency to the request of CR management entity, and CR management entity will C frequency point allocation uses to CR user.After a period of time, LTE network needs to use C frequency, CR user Exit C frequency, find idle frequency separately and use.
Inventor finds, if above-mentioned CR user is malicious user, then may take this C frequency for a long time, Make validated user cannot use this C frequency resource;And prior art does not has offer prevent malice CR user The method of access network.
Summary of the invention
Embodiments of the invention provide a kind of method for network access, device and system, it is possible to prevent malice CR from using Family access network.
For reaching above-mentioned purpose, embodiments of the invention adopt the following technical scheme that
A kind of method for network access, including:
Mobile subscriber equipment perception the idle frequency spectrum information that reports are carried out authenticity verification;
For distributing frequency spectrum resource by the mobile subscriber equipment of described authenticity verification, so that described mobile subscriber Equipment carries out network insertion by this frequency spectrum resource.
A kind of network equipment, including:
Verification unit: for mobile subscriber equipment perception the idle frequency spectrum information that reports are carried out authenticity school Test;
Frequency spectrum allocation unit: for the mobile subscriber equipment distribution frequency spectrum resource for being verified by verification unit, So that described mobile subscriber equipment carries out network insertion by described frequency spectrum resource.
A kind of communication system, including:
CR server: the spectrum information in each region in storing belonging network compass of competency, and CR is managed Described mobile subscriber equipment perception the idle frequency spectrum information that reports that entity forwards carry out authenticity verification, for Frequency spectrum resource is distributed by the mobile subscriber equipment of authenticity verification.
Method for network access, device and the system that the embodiment of the present invention provides, to mobile subscriber equipment perception also The idle frequency spectrum information reported carries out authenticity verification, only by the access of the subscriber equipment of authenticity verification Network request is just allowed to carry out security credential, thus avoids malice CR user access network.
Accompanying drawing explanation
Fig. 1 is the flow chart of an embodiment of inventive network cut-in method.
Fig. 2 is the flow chart of an embodiment of inventive network cut-in method application scenarios 1.
Fig. 3 is the flow chart of another embodiment of inventive network cut-in method application scenarios 1.
Fig. 4 is the flow chart of another embodiment of inventive network cut-in method application scenarios 1.
Fig. 5 is the flow chart of an embodiment of inventive network cut-in method application scenarios 2.
Fig. 6 is the structural representation of an embodiment of inventive network device.
Fig. 7 is the structural representation of an embodiment of communication system of the present invention.
Fig. 8 is that the present invention shares safe floor schematic diagram.
Detailed description of the invention
The method for network access, the Apparatus and system that there is provided the embodiment of the present invention below in conjunction with the accompanying drawings are carried out in detail Describe.
One embodiment of inventive network cut-in method is as it is shown in figure 1, include:
S101, mobile subscriber equipment perception the idle frequency spectrum information that reports are carried out authenticity verification.
CR management entity can mobile subscriber equipment reports in the range of collection management idle frequency spectrum information, and will Above-mentioned information issues CR server, and CR server is by the movement of described idle frequency spectrum information with book server storage Real idle frequency spectrum information corresponding to subscriber equipment position is compared, if consistent, described movement Subscriber equipment passes through authenticity verification, and inconsistent, described mobile subscriber equipment does not passes through authenticity verification.
In said process, CR management entity can detect region, mobile subscriber equipment position, or also The information of the above-mentioned band of position of acquisition of information that can be reported by mobile subscriber equipment.And by this band of position Information be sent to CR server so that CR server can set according to the above-mentioned mobile subscriber of this acquisition of information The real idle frequency spectrum information that standby position is corresponding.
S102, it is to distribute frequency spectrum resource by the mobile subscriber equipment of authenticity verification, mobile uses so that described Family equipment carries out network insertion by this frequency spectrum resource.
The present embodiment carries out authenticity verification to mobile subscriber equipment perception the idle frequency spectrum information that reports, only The access network request having the subscriber equipment by authenticity verification is just allowed to carry out security credential, thus Avoid malice CR user access network, also and then avoid this malice CR user and take Internet resources for a long time and make Validated user cannot normally use Internet resources.
The application scenarios of CR network is divided into two classes at present: application scenarios 1, CR network is as a single net Network, the CR user in this CR network is accessed by the spectrum information of the perception other network in addition to this CR network To this CR network, and communicated by this CR network insertion master network;Or CR user utilizes other net The mandate frequency range of network, is communicated by other network insertion master network above-mentioned.Application scenarios 2, CR network Not as a single network, but depend on other network, such as: LTE, CDMA (Code-Division Multiple Access, CDMA) 2000 etc.;Can increase corresponding as required in these networks CR server, such as: frequency spectrum signing and authorization server, applies the security mechanism of depended on network to be authenticated Authorize.CR user utilizes the idle frequency spectrum of other network outside the depended on network of CR technical limit spacing to realize network Accessing, above-mentioned idle frequency spectrum is for authorizing frequency spectrum or unlicensed spectrum.
Difference below as application scenarios illustrates respectively.
Being illustrated in figure 2 an embodiment of application scenarios 1, its main process includes:
S201, CR user's perception idle frequency spectrum information.
This idle frequency spectrum information can be in the case of this CR network available free spectrum shortage, and CR user feels The idle frequency spectrum information of other network known.
S202, CR user reports this idle frequency spectrum information by CR management entity to CR server.
The authenticity of idle frequency spectrum information described in S203, CR server authentication.
CR management entity is in order to realize the functions such as the network connection establishment of CR user, switching control, and CR services Device is previously provided with the relevant parameter for authenticity verification, such as includes the frequency spectrum letter of CR user region Breath, this spectrum information can be previously stored on CR server or by believable CR management entity by sense The ability of knowing is collected the spectrum information of each user, then reports this CR server.CR management entity connects Receive CR user's perception the idle frequency spectrum information reported, issue CR server and carry out authenticity verification, if The idle frequency spectrum of the position of CR reporting of user is consistent with the idle frequency spectrum in this region that CR server stores, Described CR user's perception the idle frequency spectrum information reported pass through authenticity verification, and CR server is that this CR uses Family equipment distribution frequency spectrum resource;If the idle frequency spectrum of the position of CR reporting of user is deposited with CR server The idle frequency spectrum in this region of storage is inconsistent, and described CR user fully feels the idle frequency spectrum information known and report does not leads to Cross authenticity verification.
S204, CR server is that this CR user distributes frequency spectrum resource.
If above-mentioned authenticity verification passes through, CR server is can to distribute other network sky above-mentioned for CR user Ideler frequency spectrum resource.
S205, CR user utilizes the frequency spectrum resource of this distribution to send access network request message to CR management entity.
Described access network request can comprise the user identity of CR, the information such as access security mechanism of support.
S206, CR management entity is to CR server report of user identity, and searches negotiation CR user and network Between use security mechanism.
S207, CR server responds identity information and the security information of user to CR management entity, and it is right to complete The authentication of CR user and safety certification.
By step S206 and S207, between CR user and network, carry out two-way authentication and key Establishing process. Authentication protocol is carried out according to the result consulted in S203.Described authentication protocol can use well known in the art to be recognized Card agreement: such as: EAP-AKA (Extensible Authentication Protocol-Authentication And Key Agreement, Extensible Authentication Protocol-Authentication and Key Agreement) or EAP-SIM (Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules, global system for mobile communications is used The Extensible Authentication Protocol of family identity equipment) etc. as authentication mode.
S208, CR management entity sends access response to CR user.
S209, CR user accesses CR network.
Hereafter, it is also possible to including: if CR user exits CR network, CR user informs that CR management entity is released Put the frequency spectrum resource distributing to described CR user.
In the present embodiment, it is achieved that at CR network as under the scene of an individual networks, CR server pair The idle frequency spectrum information that CR user is reported carries out authenticity verification, only by the user of this authenticity verification The access network request of equipment is just allowed to carry out security credential, it is to avoid malice CR user access network, Also and then avoid this malice CR user and take Internet resources for a long time and make validated user cannot normally use network to provide Source.
Another embodiment of application scenarios 1, its main process includes:
At CR network and other master network and in the case of depositing, master network receives the access of mobile subscriber equipment please Asking, in the middle of reality, master network can be WLAN (Wireless Local Area Network, wireless local Net), WIMAX, CDMA 2000 and LTE network, and other uses the future network of CR technology.
Concrete as it is shown on figure 3, include:
Idle frequency spectrum information in S301, CR other master network of user's perception.
S302, CR user reports this idle frequency spectrum information by CR management entity to CR server.
The authenticity of idle frequency spectrum information described in S303, CR server authentication.
S304, CR server is that this CR user distributes frequency spectrum resource.
S305, CR user utilizes above-mentioned idle frequency spectrum resource to send access request message to master network.
Or, CR user is linked into master network by the instruction of CR management entity.
S306, master network server to the server request CR user profile of CR.
The User Identity of S307, CR whois lookup CR user, and produce user security contextual information And authorization message.
Key that described Security Context Information includes needing in identifying procedure, sequence number, counter, existence The information such as phase.
S308, CR server produces user profile response, is sent to the server of master network.
Described user profile respond packet contains User Identity, Security Context Information and authorization message.
S309, primary networking service device carry out authentication and close according to the user profile response obtained and CR user The flow process that key is set up.
Concrete authentication mechanism can select according to the authentication mechanism supported common between master network and CR user Select.
S310, master network response access request, completes registration or attachment.
S311, CR user enjoys the service that master network provides.
When the mobile subscriber equipment of master network needs to use the frequency spectrum resource distributing to CR user, change distribution To the frequency spectrum resource of CR user, during frequency spectrum resource changes, omit authenticity verification and safety certification, Frequency spectrum resource is distributed for this CR user from idle frequency spectrum.
S312, CR user is unregistered flow process at master network.
The triggering of CR user log off reason may is that: business service terminates, CR user exits, authorize terminate, The reasons such as network congestion.
S313, primary networking service device send notice message to CR server.
S314, CR server deletes the relevant information of CR user.
Described relevant information includes the frequency spectrum resource of CR CU.
The method provided by the present embodiment, at CR network and other master network and in the case of depositing, it is achieved that The verification to CR reporting of user information authenticity of the CR server, and at this authenticity verification by rear to the free time The distribution of frequency spectrum resource so that CR user accesses above-mentioned master network and by master network by this idle frequency spectrum resource Server carries out authentication etc.;Thus avoid malice CR user access network, also and then avoid this evil Meaning CR user takies Internet resources for a long time makes validated user cannot normally use Internet resources.
Another embodiment of application scenarios 1, it differs primarily in that with a upper embodiment, the present embodiment In carried out the authentication of CR user by CR server.Main process includes:
Concrete the most as shown in Figure 4, including:
Step S401-S405 is roughly the same with step S301-S305 in a upper embodiment, does not repeats them here.
After S406, primary networking service device receive the access request of CR user, determine to be completed by CR server Certification to CR user.
S407, primary networking service device send identity request to CR server.
Described identity request comprises the identity of CR and the security capabilities of CR.
CR user is authenticated by S408, CR server.
After S409, certification success, the authorization message of the server interaction user of CR server and master network.
S410, primary networking service device carry out authentication and close according to the user profile response obtained and CR user The flow process that key is set up.
S411, primary networking service device are to CR server for authentication information and the key material of response, as connecing The root key of incoming link protection.
Step S412-S416 is roughly the same with step S310-S314 in a upper embodiment, does not repeats them here.
The method provided by the present embodiment, at CR network and other master network and in the case of depositing, it is achieved that The verification to CR reporting of user information authenticity of the CR server, and at this authenticity verification by rear to the free time The distribution of frequency spectrum resource so that CR user accesses above-mentioned master network by this idle frequency spectrum resource and taken by CR Business device carries out authentication etc.;Thus avoid malice CR user access network, also and then avoid this malice CR user takies Internet resources for a long time makes validated user cannot normally use Internet resources.
In application scenarios 1, CR, as a single network, can comprise mobile subscriber in actual application and set Standby, the management entity of CR network, CR server, and the entity such as the customer data base of CR network.Described CR server can also be aaa server or other complete the server of security function.For realizing above-mentioned enforcement Method in example, the present invention proposes a kind of shared safe floor, in way of realization, can be in CR network The management entity of mobile subscriber equipment and CR network increases secure processing module, to realize sharing on safe floor The safe handling function supported.
Above-mentioned shared safe floor is formulated with CR management entity and CR server for CR user, main merit Can be the authenticity of the idle frequency spectrum information of checking CR reporting of user, provide certification, key to exchange, add password protection Protect, integrity protection function, as shown in Figure 8, be divided into three sublayers: access sublayer, safe handling layer and Abnormality processing layer.
Access sublayer for realizing CR management entity to the scheduling of idle frequency spectrum, CR user to ambient signals intensity Deng detection status information, spectrum information, the collection of positional information, the negotiation etc. between CR user.
Safe handling sublayer is primary layers, consults for realizing the service strategy between operator, CR user And the negotiation between CR management entity.At this layer, CR server completes CR reporting of user information true The verification of reality, and at this authenticity verification by the rear distribution to idle frequency spectrum resource, thus decision is No permission CR user uses and idle frequency spectrum resource detected.CR management entity and CR user and CR server Or the security function of other webservers includes two-way authentication, the exchange of key, encipherment protection, integrality The functions such as protection.
Abnormality processing layer, for processing the unusual condition of CR user security, monitors the abnormal behaviour of CR user.
Share safe floor position in protocol layer, can be deployed under Internet.Access sublayer and be responsible for place The spectrum information of reason low layer perception, and process the result of the negotiation of perception information between CR user, CR server According to its authenticity of the information checking reported, and the basis that the result of verification is processed as upper strata, as CR uses The spectrum information that spectrum information that family reports and CR management entity obtain or be saved in CR server exists There is the feature of obvious malicious attack in significantly error, or the information of CR reporting of user, or CR uses The positional information at family and the biggest difference of the existence of preservation, then CR server can directly refuse the access of CR, Do not send certification request, process as abnormal conditions.Security Sublayer is responsible for the negotiation of security mechanism, recognizes Card and key exchange, and the process of cryptographic integrity protection.Meanwhile, Security Sublayer can process different operation Security strategy between business, e.g., its security mechanism supported, the algorithm etc. of support.
Sharing in the entity involved by safe floor, CR management entity and CR user and CR server are joined jointly Close the perception of idle frequency spectrum, distributed and use;The process of Security Sublayer relates to CR user, and CR manages real The database that body, CR server and CR are relevant, completes authentication mode and consults, the security function of certification;Different Often processor processes the abnormal behaviour of CR user and relevant exception policy.In above-mentioned functions, abnormality processing Exception handling in sublayer is essential, the verification to CR reporting of user information authenticity of the CR server, And at this authenticity verification by the rear distribution to idle frequency spectrum resource, CR authenticating user identification, add password protection Protecting, integrity protection, key distribution management, the negotiation between CR user and management entity must be selected, fortune Between battalion business, service strategy is optional.Accessing sublayer hollow spare time dynamic spectrum resource management, signal strength detection is divided Analysis, location management is essential, and the negotiation between CR user is optional.
Share safe floor and be deployed in CR user, CR management entity and the service of CR as an independent level In device.Exception handler is deployed in CR management entity as a functional module.CR management entity is responsible for connecing Enter the management in territory, switching control, connection establishment etc..CR server comprise frequency spectrum deliver for a check, certification, charging, Authorize, user profile, policy control, the function such as spectrum management, distribution.
Interactive authentication between CR user and CR management entity and CR server, supports multiple safe mechanism, To support more terminal authentication means, including:
A, mode EAP authentication method (EAP-AKA/EAP-SIM) based on shared key etc., but on being not limited to State two ways;
B, mode based on certificate.
Encipherment protection and integrity protection use the key produced by certification to derive, and the encryption of support is calculated Method and identifying algorithm: DES (Data Encryption Standard, digital encryption standard), AES (Advanced Encryption Standard, Advanced Encryption Standard), RSA, HMAC (Hash Message Authentication Code, message error detection code based on Hash), 3-DES (Triple DES, triple des), SNOW 3G (should AES language integral algorithm for 3G system) etc..
CR management entity is consulted the content of the security mechanism of use between CR user and network and is specifically included that primary user Avoidance mechanism during appearance, frequency spectrum authorize use etc..If CR management entity perceives primary user, also Be exactly the validated user of the frequency spectrum resource that CR user is currently in use, then CR user exits;CR management entity is protected Deposit the list of CR user's request, depending on the priority of process can be according to corresponding strategy;CR user with Access authentication mode between CR management entity is determined according to the ability of CR user by CR management entity.But The concrete operations of safety certification are performed by CR server.
Above-mentioned shared safe floor supports the verification to CR reporting of user information authenticity of the CR server, Yi Ji This authenticity verification is by the rear distribution to idle frequency spectrum resource;Support multiple authentication mode and agreement simultaneously, Realize CR server to the certification of CR user and mandate by the authentication mode supported, and support and authenticating party The processing method of the multiple key that formula is corresponding.
One embodiment of application scenarios 2, in the present embodiment, CR is used in certain network as a kind of technology. If this network exists the equipment that can realize CR function, then directly these equipment can be used as CR management real Body and CR server, such as: above-mentioned CR management entity can be: the MME (Mobility in LTE network Management Entity, mobile management entity), or the ASN GW (Access in WIMAX network Service network, access business network) etc.;Above-mentioned CR server can be: the HSS in LTE network (Home Subscriber Server, home subscriber server), or the AAA in WIMAX network (Authorization, Authentication and Accounting, Authorization, Authentication and Accounting) takes Business device etc..If this network does not exist the equipment that can realize CR function originally, then can increase CR management newly real Body and CR server, to realize CR function.Mobile subscriber equipment UE utilizes the depended on net of CR technical limit spacing The idle frequency spectrum of other network outside network realizes network insertion, and the present embodiment is to be applied to WIMAX by CR technology Network also obtains as a example by idle frequency spectrum resource from LTE network, and wherein, WIMAX network and LTE network belong to one together Individual core net, the present embodiment is concrete as it is shown in figure 5, include:
S501, mobile subscriber equipment UE select to be attached to WIMAX network.
S502, UE perceive the idle frequency spectrum information in LTE network.
S503, UE report this idle frequency spectrum information by CR management entity to CR server.
If in actual process, idle frequency spectrum shortage available in present networks is so that UE can only perceive The idle frequency spectrum of other network of non-present networks, the idle frequency spectrum information perceived equally is passed through CR by UE Management entity reports to CR server.Corresponding, in S505, CR server can be by described non- The idle frequency spectrum of other network of network distributes to UE.As, in the present embodiment, although mobile subscriber equipment At WIMAX network, but the idle frequency spectrum information of equally perception LTE network.
The authenticity of idle frequency spectrum information described in S504, CR server authentication.
S505, CR server is that this UE distributes frequency spectrum resource.
S506, UE utilize the idle frequency spectrum of distribution to adhere at WIMAX network.
S507, UE carry out device authentication and user authentication at WIMAX network.
Above-mentioned user authentication can be complete authentication mode (full authentication) or rapid authentication Mode (fast re-authentication).
S508, UE enjoy the service that WIMAX network provides.
S509, UE are unregistered flow process at WIMAX network.
The triggering of mobile subscriber equipment UE deregistration reason may is that: business service terminates, UE exits, authorize knot The reasons such as bundle, network congestion.
S510, WIMAX network sends notice message to CR server.
S511, CR server deletes the relevant information of UE.
Described relevant information includes the frequency spectrum resource that UE takies.
S512, WIMAX network deletes Security Context Information.
When CR is applied to existing network or future network as a kind of enabling tool, apply the safe machine of former network System is authenticated the process authorized.User can use in other networks in certain band limits and perceive sky Ideler frequency spectrum access network carries out business service.The method provided by the present embodiment, is enabled as one at CR Technology is applied in the case of other network, it is achieved that CR server is to CR reporting of user information authenticity Verification, and at this authenticity verification by the rear distribution to idle frequency spectrum resource so that CR user is by being somebody's turn to do Idle frequency spectrum resource accesses above-mentioned network and is carried out authentication etc. by CR server;Thus avoid malice CR User access network, also and then avoid this malice CR user and take Internet resources for a long time and make the validated user cannot Normally use Internet resources.
In the embodiment that Fig. 5 is corresponding, this UE can also be after by above-mentioned authenticity verification, by accessing LTE Network enjoys service, and the method in the embodiment that concrete access way is corresponding with Fig. 4 is roughly the same, at this not Repeat again.
One embodiment of inventive network device as shown in Figure 6, including:
Verification unit 601: for mobile subscriber equipment perception the idle frequency spectrum information that reports are carried out authenticity Verification.
This verification unit 601 is by described idle frequency spectrum information and the mobile subscriber equipment position being previously stored Corresponding real idle frequency spectrum information is compared, if consistent, described mobile subscriber equipment is by true Property verification, inconsistent, described mobile subscriber equipment does not passes through authenticity verification.
Frequency spectrum allocation unit 602: provide for the mobile subscriber equipment distribution frequency spectrum for being verified by verification unit Source, so that described mobile subscriber equipment carries out network insertion by above-mentioned distribution frequency spectrum resource.
Wherein, described verification unit 601 may further include:
Storing sub-units 6011: the spectrum information in each region in storing belonging network compass of competency.
Described spectrum information can be obtained by the detection of CR management entity, is then forwarded to storing sub-units 6011, also Storing sub-units 6011 can be reported by other mobile subscriber equipment.
Receive subelement 6012: for receiving mobile subscriber equipment perception the idle frequency spectrum information reported.
Judge subelement 6013: for judging idle frequency spectrum and storage of position that mobile subscriber reports The idle frequency spectrum in this region of unit 6011 storage is the most consistent,
If consistent, then judge that described mobile subscriber equipment perception the idle frequency spectrum information reported are passed through true Property verification;
If it is inconsistent, judge that described mobile subscriber equipment perception the idle frequency spectrum information reported are not passed through Authenticity verification.
Above-mentioned network equipment can be the CR server in CR network, or can undertake CR in other network The entity of server capability, such as: the aaa server etc. in the HSS in LTE network, or WIMAX network.
Apparatus above is capable of whole mistakes of the inventive network cut-in method embodiment shown in Fig. 1 to Fig. 5 Journey, concrete steps are shown in embodiment of the method, do not repeat at this.
Mobile subscriber equipment perception the idle frequency spectrum information that reports are entered by this device embodiment by verification unit Row authenticity verification, only is just allowed to carry out by the access network request of the subscriber equipment of authenticity verification Security credential, thus avoid malice CR user access network, also and then avoid this malice CR and use the head of a household Phase takies Internet resources makes validated user cannot normally use Internet resources.
One embodiment of communication system of the present invention is as it is shown in fig. 7, this system can be entered with mobile subscriber equipment Row communication, including:
CR server 701: the spectrum information in each region in storing belonging network compass of competency, and to CR Described mobile subscriber equipment perception the idle frequency spectrum information that reports that management entity 702 forwards carry out authenticity Verification, for distributing frequency spectrum resource by the mobile subscriber equipment of authenticity verification.
System above is capable of whole mistakes of the inventive network cut-in method embodiment shown in Fig. 1 to Fig. 5 Journey, concrete steps are shown in embodiment of the method, do not repeat at this.
Mobile subscriber equipment perception the idle frequency spectrum information that reports are carried out truly by above communications system embodiment Property verification, only be just allowed to carry out security by the access network request of the subscriber equipment of authenticity verification Certification, thus avoid malice CR user access network, also and then avoid this malice CR user and take for a long time Internet resources make validated user cannot normally use Internet resources.
One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-described embodiment method, Can be by computer program and complete to instruct relevant hardware, described program can be stored in a calculating In machine read/write memory medium, this program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each method. Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory, Or random store-memory body (Random Access Memory, RAM) etc. ROM).
The above, the only detailed description of the invention of the present invention, but protection scope of the present invention is not limited to This, any those familiar with the art, in the technical scope that the invention discloses, can readily occur in Change or replacement, all should contain within protection scope of the present invention.Therefore, protection scope of the present invention should It is as the criterion with scope of the claims.

Claims (5)

1. a method for network access, it is characterised in that including:
Network equipment obtains the position of mobile subscriber equipment;
The idle frequency spectrum information by mobile subscriber equipment perception and reported and the mobile subscriber equipment institute of self storage The real idle frequency spectrum information corresponding in position is compared;If consistent, the most described mobile subscriber equipment Pass through authenticity verification;If it is inconsistent, described mobile subscriber equipment does not passes through authenticity verification;
Described network equipment is to distribute frequency spectrum resource by the mobile subscriber equipment of described authenticity verification, so that Described mobile subscriber equipment carries out network insertion by described frequency spectrum resource.
Method for network access the most according to claim 1, it is characterised in that described method for network access It is applied under the cognitive radio CR network scene as a single network, to described mobile subscriber equipment Perception the idle frequency spectrum information reported carry out authenticity verification, including:
CR server in described CR network receives the described mobile subscriber equipment perception that CR management entity forwards And the idle frequency spectrum information reported, and described idle frequency spectrum information is carried out authenticity verification.
Method for network access the most according to claim 1, it is characterised in that described method for network access Being applied in the network of use CR technology, described mobile subscriber equipment is in the network of described use CR technology In;
The most described mobile subscriber equipment perception the idle frequency spectrum information that reports are carried out authenticity verification, including:
By the network of described use CR technology to described mobile subscriber equipment perception the sky of other network that reports Ideler frequency spectrum information carries out authenticity verification.
4. a network equipment, it is characterised in that including:
Verification unit: include storing sub-units, receive subelement and judge subelement;
Wherein, storing sub-units: the spectrum information in each region in storing belonging network compass of competency;
Receive subelement: for receiving mobile subscriber equipment perception the idle frequency spectrum information reported;
Judge subelement: for judging idle frequency spectrum and storage of position that mobile subscriber equipment reports The idle frequency spectrum in this region of unit storage is the most consistent;If consistent, then judge described mobile subscriber equipment Perception the idle frequency spectrum information reported pass through authenticity verification;If it is inconsistent, judge described mobile use Family device-aware the idle frequency spectrum information reported do not pass through authenticity verification;
Frequency spectrum allocation unit: for the mobile subscriber equipment distribution frequency spectrum resource for being verified by verification unit, So that described mobile subscriber equipment carries out network insertion by the frequency spectrum resource of above-mentioned distribution.
5. a communication system, it is possible to communicate with mobile subscriber equipment, it is characterised in that including:
CR server: the spectrum information in each region in storing belonging network compass of competency, and CR is managed Mobile subscriber equipment perception the idle frequency spectrum information that reports that entity forwards set with the mobile subscriber self stored The real idle frequency spectrum information corresponding for position is compared;If consistent, the most described mobile subscriber Equipment passes through authenticity verification;If it is inconsistent, described mobile subscriber equipment does not passes through authenticity verification; And be to distribute frequency spectrum resource by the mobile subscriber equipment of authenticity verification.
CN200910089141.4A 2009-07-31 2009-07-31 Method for network access, device and system Active CN101990211B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910089141.4A CN101990211B (en) 2009-07-31 2009-07-31 Method for network access, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910089141.4A CN101990211B (en) 2009-07-31 2009-07-31 Method for network access, device and system

Publications (2)

Publication Number Publication Date
CN101990211A CN101990211A (en) 2011-03-23
CN101990211B true CN101990211B (en) 2016-08-24

Family

ID=43746481

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910089141.4A Active CN101990211B (en) 2009-07-31 2009-07-31 Method for network access, device and system

Country Status (1)

Country Link
CN (1) CN101990211B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102821441B (en) * 2011-06-09 2018-08-21 南京中兴新软件有限责任公司 A kind of access device, method and terminal
US9516531B2 (en) 2011-11-07 2016-12-06 Qualcomm Incorporated Assistance information for flexible bandwidth carrier mobility methods, systems, and devices
US9848339B2 (en) 2011-11-07 2017-12-19 Qualcomm Incorporated Voice service solutions for flexible bandwidth systems
CN103188711A (en) * 2011-12-31 2013-07-03 中兴通讯股份有限公司 Method and terminal of optimizing frequency spectrum resource using
CN103491604B (en) * 2012-06-14 2017-09-26 华为技术有限公司 In the method for database registration, terminal, access point, database and communication system
CN103634898B (en) * 2012-08-29 2017-07-14 华为技术有限公司 A kind of method of equipment cancellation, apparatus and system
CN105191384B (en) * 2014-01-14 2020-01-17 华为技术有限公司 Data transmission method, UE and base station
WO2015180117A1 (en) * 2014-05-30 2015-12-03 华为技术有限公司 Frequency spectrum resource scheduling device, method and system
JP6490188B2 (en) 2014-07-31 2019-03-27 華為技術有限公司Huawei Technologies Co.,Ltd. Data transmission method and communication device
US20180295507A1 (en) * 2014-11-12 2018-10-11 Telefonaktiebolaget Lm Ericsson (Publ) Radio Device Hardware Security System for Wireless Spectrum Usage

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101262288A (en) * 2007-03-01 2008-09-10 三星电机株式会社 Systems and methods for determining sensing thresholds of a multi-resolution spectrum sensing (MRSS) technique for cognitive radio (CR) systems
CN101420758A (en) * 2008-11-26 2009-04-29 北京科技大学 Method for resisting simulated main customer attack in cognitive radio
CN101459445A (en) * 2008-12-29 2009-06-17 浙江大学 Cooperative spectrum sensing method in cognitive radio system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101262288A (en) * 2007-03-01 2008-09-10 三星电机株式会社 Systems and methods for determining sensing thresholds of a multi-resolution spectrum sensing (MRSS) technique for cognitive radio (CR) systems
CN101420758A (en) * 2008-11-26 2009-04-29 北京科技大学 Method for resisting simulated main customer attack in cognitive radio
CN101459445A (en) * 2008-12-29 2009-06-17 浙江大学 Cooperative spectrum sensing method in cognitive radio system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Toward secure distributed spectrum sensing in cognitive radio;Ruiliang Chen等;《Communications Magazine, IEEE》;20080430;第46卷(第4期);第50-55页 *

Also Published As

Publication number Publication date
CN101990211A (en) 2011-03-23

Similar Documents

Publication Publication Date Title
CN101990211B (en) Method for network access, device and system
Cao et al. A survey on security aspects for 3GPP 5G networks
US11785466B2 (en) Method and system for IoT code and configuration using smart contracts
Jover et al. Security and protocol exploit analysis of the 5G specifications
US7461248B2 (en) Authentication and authorization in heterogeneous networks
US7822406B2 (en) Simplified dual mode wireless device authentication apparatus and method
CN102111766B (en) Network accessing method, device and system
CN103596173A (en) Wireless network authentication method, client wireless network authentication device, and server wireless network authentication device
US11496522B2 (en) Digital on-demand coupons for security service of communications system
CN107005927A (en) Cut-in method, equipment and the system of user equipment (UE)
CN107094127B (en) Processing method and device, and obtaining method and device of security information
US11412386B2 (en) Cybersecurity system for inbound roaming in a wireless telecommunications network
WO2013118096A1 (en) Method, apparatus and computer program for facilitating secure d2d discovery information
CN113518312B (en) Communication method, device and system
EP3324681B1 (en) Processing method and device for accessing to 3gpp network by terminal
KR20230011423A (en) Communication protection method and device
US20230247434A1 (en) Cybersecurity system for outbound roaming in a wireless telecommunications network
CN105763517A (en) Router security access and control method and system
KR101692917B1 (en) Apparatus and method for security management of home IoT device
US20230275921A1 (en) Cybersecurity system for services of interworking wireless telecommunications networks
Settembre A 5g core network challenge: Combining flexibility and security
CN103916849A (en) Method and apparatus for wireless LAN communication
CN115706997A (en) Authorization verification method and device
Michalas et al. From NEA and NIA to NESAS and SCAS: Demystifying the 5G Security Ecosystem
CN117255340B (en) Bluetooth communication method, device, system, storage medium and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210428

Address after: Unit 3401, unit a, building 6, Shenye Zhongcheng, No. 8089, Hongli West Road, Donghai community, Xiangmihu street, Futian District, Shenzhen, Guangdong 518040

Patentee after: Honor Device Co.,Ltd.

Address before: 518129 headquarters building of Bantian HUAWEI base, Longgang District, Guangdong, Shenzhen

Patentee before: HUAWEI TECHNOLOGIES Co.,Ltd.