CN104427578A - Method and device for performing access control - Google Patents

Method and device for performing access control Download PDF

Info

Publication number
CN104427578A
CN104427578A CN201310369786.XA CN201310369786A CN104427578A CN 104427578 A CN104427578 A CN 104427578A CN 201310369786 A CN201310369786 A CN 201310369786A CN 104427578 A CN104427578 A CN 104427578A
Authority
CN
China
Prior art keywords
base station
access
identifier
described base
registration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310369786.XA
Other languages
Chinese (zh)
Inventor
衷柳生
张静茹
蔡晓
徐颖
陈长明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Comba Network Systems Co Ltd
Original Assignee
Comba Telecom Systems China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Comba Telecom Systems China Ltd filed Critical Comba Telecom Systems China Ltd
Priority to CN201310369786.XA priority Critical patent/CN104427578A/en
Publication of CN104427578A publication Critical patent/CN104427578A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the technical field of mobile terminals, and in particular relates to a method and device for performing access control. The problems that an UE access semi-closed base station must be set through manual work and an user cannot performing setting when the user does not know an identity number of UE or does not master a base station setting flow in the prior art are solved. The embodiment of the invention provides a method for performing access control. The method comprises the following steps: after receiving a request for accessing registration into a base station or cancelling registration into the base station sent by the UE, the base station acquiring the identity number of the UE, and then registering or cancelling the request of accessing the UE into the base station according to the acquired identity number; and performing access control on the UE according to the registering or cancelling result when the access control needs to be implemented on the UE. The method and device disclosed by the embodiment of the invention is free from manual setting, and the problem that the user cannot finish the setting since the user cannot acquire the identity number of the UE or does not master the setting flow of the semi-closed base station is avoided.

Description

A kind of method and device carrying out access control
Technical field
The present invention relates to mobile communication technology field, particularly relate to a kind of method and the device that carry out access control.
Background technology
Along with the development of mobile communication technology, femto cell obtains applying more and more widely, and femto cell comprises Home eNodeB (Home NodeB), bold and unconstrained picocell (Femto Cell) base station, enterprise-level base station (Enterprise Node) etc.The access module of femto cell is divided into open, closed and semi-enclosed three kinds of access modules usually; Wherein, if the access module of base station is open, all subscriber equipmenies (UE) then in this base station range can be linked into this base station, if the access module of base station is closed, then only have special permission UE can access this base station, if the access module of base station is semi-enclosed, then under the prerequisite not affecting special permission UE access base station, Non-Patent UE can be allowed to access this base station, namely specially permit the qualification that UE has this base station of priority access.
Generally, take base station resource in order to avoid other UE outside special permission UE and cause special permission UE to can not get optimal service, base station resource can be made full use of again simultaneously, can the access module of femto cell be set to semi-enclosed, semi-enclosed base station generally carries out access control according to the access control list of base station side to UE, and the UE listing access control list in has the qualification of priority access base station.
At present, the half-and-half setting of closed base station access control list, need the artificial WEB(network in base station) management page is added or is deleted the identifier of UE, except the PC(personal computer be connected with base station, Personal Computer) outside machine, also need at least possess following condition when manually arranging: the identifier 1) having known UE, as international mobile subscriber identity (International Mobile Subscriber Identity, IMSI), International Mobile Equipment Identity code (International Mobile Equipment Identity, IMEI), interim identity (Temporary Mobile Subscriber Identity, TMSI) etc., user generally needs to obtain these identifiers by special intelligent software, 2) base station setting procedure is grasped.
Based on this, in existing artificial set-up mode, user must at the identifier being obtained UE by related software, and after grasping basic base station setting procedure, specifically could arrange in the WEB management page of semi-enclosed base station according to the identifier obtained, if user cannot obtain the identifier of UE or not grasp base station setting procedure, just cannot access semi-enclosed base station to UE and arrange, semi-enclosed base station also just cannot carry out access control according to arranging result to UE.
Summary of the invention
The embodiment of the present invention provides a kind of method and the device that carry out access control, must arrange by manually accessing semi-enclosed base station to UE in order to solve in prior art, and the problem that arranges cannot be carried out when user does not know the identifier of UE or do not grasp base station setting procedure.
A kind of method of carrying out access control that the embodiment of the present invention provides, comprising:
Base station, after the registration receiving user equipment (UE) transmission accesses described base station or nullifies the request of the described base station of access, obtains the identifier of described UE;
Described base station, according to the identifier obtained, is registered described UE access base station or is nullified;
Access control, when needs carry out access control to described UE, according to registration or deregistration, is carried out to described UE in described base station.
In above-described embodiment, base station is after the registration receiving UE transmission or de-registration request, just can according to the request of UE, after the identifier obtaining UE, automatically UE access base station registered or nullify setting, owing to not needing artificial setting, user does not need the identifier oneself going to obtain UE, also without the need to grasping the WEB setting procedure of base station, avoiding and cannot obtain the identifier of UE because of user or not grasp the setting procedure of base station, and cannot half-and-half carry out accessing the problem arranged in closed base station.
Preferably, in above-described embodiment, base station can obtain the identifier of described UE according to following steps: described base station sends the solicited message of the identifier obtaining described UE to described UE, and receives the identifier of described UE transmission.Adopt in this way, base station only need send to UE the identifier that the solicited message obtaining identifier just can obtain UE, and efficiency is higher.
Preferably, described base station, according to the identifier obtained, is registered described UE access base station, being comprised: the identifier of acquisition adds in the access control list of described base station by described base station; Described base station, according to the identifier obtained, is nullified described UE access base station, being comprised: the identifier of acquisition is deleted in described base station from access control list.Adopt in this way, the identifier of acquisition is being added to access control list or after deleting from control list, amended access control list just can utilized to control UE access base station by base station.
Preferably, described base station according to registration or deregistration, access control is carried out to described UE, comprising: described base station determine current there is not idle base station resource time, if determine the described base station of the registered access of described UE, then allow described UE to access described base station.Adopt in this way, base station can allow described UE access base station when determining the idle base station resource of current existence, determine current there is not idle base station resource time, only allow registered UE access base station, both ensure that the priority of registered UE access base station, can base station resource have been made full use of again.
Preferably, described base station is determined current when there is not idle base station resource, allow before described UE accesses described base station, also comprise: what described base station determined that current existence at least one and described base station connect does not register the UE accessing described base station, and force described at least one, not register the UE accessing described base station and be switched to adjacent base station.Adopt in this way, normally carrying out of the business of registered UE can be ensured.
A kind of method of carrying out access control that the embodiment of the present invention provides, comprising:
User equipment (UE), to the transmission registration described base station of access, base station or the request of nullifying the described base station of access, obtains the solicited message of the identifier of described UE to make described base station to described UE transmission;
The identifier of self, according to the information received, is sent to described base station, to make described base station according to described identifier, registers described UE access base station or nullify by described UE, and according to registration or deregistration, carries out access control to described UE.
Adopt above-described embodiment, UE only need send registration or de-registration request to base station, and the identifier of self is sent to base station, base station just can be made to carry out access control according to registration or deregistration to this UE, owing to not needing artificial setting, user does not need the identifier oneself going to obtain UE, without the need to grasping the WEB setting procedure of base station yet, avoid and cannot obtain the identifier of UE because of user or not grasp the setting procedure of base station, and cannot half-and-half carry out accessing the problem arranged in closed base station.
Preferably, described UE sends the request of the registration described base station of access or the described base station of cancellation access to base station, comprising: described UE sends the request of the registration described base station of access or the described base station of cancellation access to base station with note form.Because base station can parse the concrete operations request corresponding to short message content relatively easily, therefore, UE can send described registration or de-registration request with note form.
A kind of base station of carrying out access control that the embodiment of the present invention provides, comprising:
Acquisition module, for after the request of the registration access base station or cancellation access base station that receive user equipment (UE) transmission, obtains the identifier of described UE;
Control module, for according to the identifier obtained, registers described UE access base station or nullifies, and when needs carry out access control to described UE, according to registration or deregistration, carries out access control to described UE.
In above-described embodiment, acquisition module is after the registration receiving UE transmission or de-registration request, just can according to the request of UE, obtain the identifier of UE, thus the identifier that control module can obtain according to acquisition module is automatically registered UE access base station or nullifies setting, owing to not needing artificial setting, user does not need the identifier oneself going to obtain UE, also without the need to grasping the WEB setting procedure of base station, avoid and cannot obtain the identifier of UE because of user or not grasp the setting procedure of base station, and cannot half-and-half carry out accessing the problem arranged in closed base station.
Preferably, described acquisition module specifically for the solicited message sending the identifier obtaining described UE to described UE, and receives the identifier that described UE sends.Because acquisition module only need send to UE the identifier that the solicited message obtaining identifier just can obtain UE, the mode efficiency of the identifier of this acquisition UE is higher.
Preferably, described control module is specifically for registering described UE access base station according to following steps: added to by the identifier of acquisition in the access control list of described base station; Described control module is specifically for nullifying described UE access base station according to following steps: the identifier deleting acquisition from the access control list of described base station.Adopt in this way, the identifier of acquisition is being added to access control list or after deleting from control list, amended access control list just can utilized to control UE access base station by control module.
Preferably, described control module specifically for: receive described UE send access request after, determine current there is not idle base station resource time, if determine the described base station of the registered access of described UE, then allow described UE to access described base station.Adopt in this way, control module can allow described UE access base station when determining the idle base station resource of current existence, determine current there is not idle base station resource time, only allow registered UE access base station, both ensure that the priority of registered UE access base station, can base station resource have been made full use of again.
Preferably, described control module determine current there is not idle base station resource time, allow before described UE accesses described base station, also comprise: that determines that current existence at least one and described base station connect does not register the UE accessing described base station, and force described at least one, not register the UE accessing described base station and be switched to adjacent base station.Adopt in this way, normally carrying out of the business of registered UE can be ensured.
A kind of user equipment (UE) carrying out access control that the embodiment of the present invention provides, comprising:
First sending module, for the transmission registration described base station of access, base station or the request of nullifying the described base station of access, obtains the solicited message of the identifier of described UE to make described base station to described UE transmission;
Second sending module, for according to the information received, sends to described base station by the identifier of self, to make described base station according to described identifier, described UE access base station is registered or nullified, and according to registration or deregistration, access control is carried out to described UE.
Adopt above-described embodiment, first sending module only need send registration or de-registration request to base station, the identifier of self only need be sent to base station by the second sending module, base station just can be made to carry out access control according to registration or deregistration to this UE, owing to not needing artificial setting, user does not need the identifier oneself going to obtain UE, also without the need to grasping the WEB setting procedure of base station, avoid and cannot obtain the identifier of UE because of user or not grasp the setting procedure of base station, and cannot half-and-half carry out accessing the problem arranged in closed base station.
Preferably, described first sending module specifically for: with note form to base station send registration access described base station or nullify access described base station request.Because base station can parse the concrete operations request corresponding to short message content relatively easily, therefore, the first sending module can send described registration or de-registration request with note form.
Accompanying drawing explanation
Fig. 1 is for base station that the embodiment of the present invention provides carrying out the method flow diagram of access control;
The method flow diagram carrying out access control that Fig. 2 provides for the embodiment of the present invention;
The method flow diagram of the BTS management access control list that Fig. 3 provides for the embodiment of the present invention;
The base station connection control method flow chart of the semiclosed pattern that Fig. 4 provides for the embodiment of the present invention;
The architecture of base station schematic diagram carrying out access control that Fig. 5 provides for the embodiment of the present invention;
The UE structural representation carrying out access control that Fig. 6 provides for the embodiment of the present invention.
Embodiment
In the embodiment of the present invention base station receive UE send registration access described base station or nullify access described base station request after, obtain the identifier of described UE, and according to the identifier obtained, described UE access base station is registered or nullified, according to registration or deregistration, access control is carried out to described UE; Therefore, adopt the embodiment of the present invention, UE only need send registration or de-registration request, semi-enclosed base station just can according to the request of UE, after the identifier obtaining UE, automatically UE access base station registered or nullify setting, owing to not needing artificial setting, user does not need the identifier oneself going to obtain UE, also without the need to grasping the WEB setting procedure of semi-enclosed base station, avoid and cannot obtain the identifier of UE because of user or not grasp the setting procedure of semi-enclosed base station, and the problem of setting cannot be completed.
Base station in the embodiment of the present invention can be 2G, 3G, Home eNodeB (HomeNodeB in 4G network, HNB), enterprise-level base station (Enterprise Node, the femto cell such as ENB), as, can be global system for mobile telecommunications (Global System For Mobile Communication, GSM) system, TD SDMA (Time Division-Synchronous Code Division Multiple Access, TD-SCDMA) system, Wideband Code Division Multiple Access (WCDMA) (Wideband Code Division Multiple Access, WCDMA) system, code division multiple access (Code Division Multiple Access, CDMA) system, Long Term Evolution (LongTermEvolution, LTE) Home eNodeB in system, enterprise-level base station etc.,
Below in conjunction with Figure of description, the embodiment of the present invention is described in further detail.
As shown in Figure 1, the method flow diagram of access control is carried out in the base station provided for the embodiment of the present invention, comprises the following steps:
S101: base station, after the registration receiving UE transmission accesses this base station or nullifies the request of this base station of access, obtains the identifier of this UE;
In specific implementation process, base station in the embodiment of the present invention can be semi-enclosed base station, namely when the access module of base station is semi-enclosed, the request (hereinafter referred to as registration request) of this base station of access can be registered in base station according to above-mentioned steps process UE, also can access the request (hereinafter referred to as de-registration request) of this base station according to above-mentioned steps process UE deregistration; Except this, when the access module of base station is closed, the access module of base station can, according to the de-registration request of above-mentioned steps process UE, generally, in order to the convenience processed, can be set to semi-enclosed by base station; Wherein, if the access module of base station is semi-enclosed, then this registration request obtains the request comparing the qualification of unregistered this base station of UE priority access, and this de-registration request is the request of the qualification cancelling this base station of priority access; If the access module of this base station is closed, then this de-registration request is the request of the qualification cancelling this base station of access;
In specific implementation process, the concrete mode that UE sends registration or de-registration request can be preset, such as send request with note form, e.g., UE sends short message content ZC, represent and need to register access base station, send ZX, represent and need to nullify access base station, except this, UE can also send CX, represents the login state needing to inquire about current UE; In concrete enforcement, also need to set the identification number that base station receives this note, such as, 123456 etc.; Here, the identification number that base station receives this note that is to say that in base station, concrete management accesses the identification number of the module (can be called base station user administrative center here) arranged, in order to avoid other users except the validated user of this base station usurp the service of this base station, the validated user of this base station can also according to this number of rules modification of arranging with base station, such as, here UE is specially mobile phone, the rule of making an appointment as: the number of amendment can not be identical with phone number figure place, can not be mutually equal with the Service Phones such as 10086,110; Base station is after the note receiving UE transmission, first judge whether the identification number receiving note is base station user administrative center, if, then carry out registering according to the embodiment of the present invention or the operation such as cancellation, if not, such as, may be the identification number (as cell-phone number) of other UE, then note is transmitted to core net, continues process by core net.
S102: base station, according to the identifier obtained, is registered this UE access base station or nullified;
S103: access control, when needs carry out access control to UE, according to registration or deregistration, is carried out to this UE in base station.
Here, if the access module of base station is semi-enclosed, then UE access base station is registered to the qualification being and making UE acquisition than unregistered UE priority access base station, UE access base station is nullified to the qualification being and making UE cancellation than unregistered UE priority access base station; If the access module of base station is closed, then UE access base station is nullified to the qualification being and making UE cancel access base station.
In specific implementation process, if base station receive for de-registration request, then this base station of the registered access of UE before illustrating, at this moment, no matter the access module of base station is closed or semi-enclosed, can according to the de-registration request of above-mentioned steps process UE; And the mode registered UE access base station before can adopt the mode of background technology, the mode in the embodiment of the present invention also can be adopted;
If what base station received is registration request, then when the access module of this base station is semi-enclosed, can according to this registration request of above-mentioned steps process, UE may access base station (access when base station resource is idle) when sending this registration request, also may not have access base station; Wherein, if UE access base station when sending registration request, then base station is after receiving this registration request, and the information that can parse reception is registration request, thus according to the embodiment of the present invention, can register UE access base station; If UE does not also have access base station when sending registration request, then base station is after receiving this registration request, if determine, current base station resource is idle, then allow UE access, after UE access, the information parsing reception is registration request, afterwards can according to the embodiment of the present invention, UE access base station is registered, also, namely, in above-mentioned steps S101, base station is after the registration request receiving UE transmission, obtain the identifier of this UE, specifically comprise:
If UE does not also have access base station when sending registration request, then base station is after receiving this registration request, if allow this UE access base station, then obtains the identifier of this UE.
In specific implementation process, base station is being registered UE access base station or is being nullified successfully, to the registration of UE feedback or can also nullify successful information; If base station receives the information of UE transmission for the request of inquiry login state, then after the identifier obtaining UE, the login state (registered or unregistered) of this UE can be determined according to the identifier of UE, and the login state determined sent to UE.
Preferably, in step S102, base station obtains the identifier of UE, comprising:
Base station sends the solicited message of the identifier obtaining this UE to UE, and receives the identifier of this UE transmission;
In specific implementation process, base station user administrative center is after receiving the operation of UE transmission (register or nullify or inquiry) request, parse current concrete operations (namely determining that current operation request is registration, nullifies or inquiry request), what if determine, UE sent is registration or de-registration request, then send the solicited message of the identifier obtaining this UE to UE, and receive the identifier of UE reply; Here identifier is specifically as follows international mobile subscriber identity (International Mobile Subscriber Identity, IMSI), International Mobile Equipment Identity code (International Mobile Equipment Identity, IMEI), interim identity (Temporary Mobile Subscriber Identity, TMSI) etc.; According to prior art, UE can the identifier of automatic acquisition self, and the detailed process that therefore embodiment of the present invention obtains self identifier about UE no longer describes in detail.
Preferably, base station, according to the identifier obtained, is registered UE access base station, being comprised:
The identifier of acquisition adds in access control list by base station;
Base station, according to the identifier obtained, is nullified UE access base station, being comprised:
The identifier of acquisition is deleted in base station from access control list;
In specific implementation process, if what UE sent is registration request, then the identifier of acquisition adds in access control list by base station, if what UE sent is de-registration request, then the identifier of acquisition is deleted by base station from access control list, and this base station carries out access control according to amended access control list to UE.
Preferably, base station, according to registration or deregistration, is carried out access control to UE, being comprised:
Base station current there is not idle base station resource time, if determine the registered access base station of this UE, then allow this UE to access this base station.
Here base station resource can comprise channel resource of eating dishes without rice or wine, base station operating load resource etc., and base station operating load resource refers to the software and hardware resources of base station self, as CPU usage, memory usage etc.;
In specific implementation process, for semi-enclosed base station, this base station is when receiving the access request that UE sends, if determine the idle base station resource of current existence, then regardless of the whether registered access base station of UE, this UE access base station can be allowed, and be this UE Resources allocation; Currently there is not idle base station resource if determine, then must, after determining this base station of the registered access of UE, this UE could be allowed to access this base station.Also namely, base station carries out access control according to priority principle to UE, the registered UE access base station of preferential permission.
Preferably, base station is determined current when there is not idle base station resource, before allowing UE access base station, also comprises:
What base station determined that current existence at least one and base station connect does not register the UE accessing this base station, and the UE forcing at least one not register this base station of access is switched to adjacent base station.
In specific implementation process, if base station determines currently there is not idle base station resource, in order to ensure carrying out smoothly of registered UE business, first check the current UE not having to register that whether there is access base station, if exist, then select the UE that at least one is not registered, force this UE to discharge the connection with this base station, and other base station making this UE adjacent with this base station connect, as adjacent macro cell base station etc., afterwards, this resource that UE do not registered discharges can be distributed for the UE of new access.
Correspondingly, if base station determines currently there is not idle base station resource, and determine current do not exist connect with base station do not register the UE accessing this base station, then base station can refuse to ask the UE of access to access this base station;
Here, because femto cell coverage is less, registered users because of access base station is more and possibility that is that cause base station resource congested is little, therefore, determine current when there is not idle base station resource in base station, generally can find the UE of at least one this base station of access of not registering, if there is in particular cases, registered users because of access base station is more and cause base station resource congested, at this moment, if there is UE request again, base station is according to priority principle, in order to ensure the service quality of the registered UE of priority access, refusal can be selected to access this base station at the UE of rear request.
As shown in Figure 2, be the method flow diagram carrying out access control that the embodiment of the present invention provides, comprise:
S201:UE, to transmission registration this base station of access, base station or the request of nullifying this base station of access, obtains the solicited message of the identifier of this UE to make base station to UE transmission;
The identifier of self, according to the information received, is sent to this base station by S202:UE, to make this base station according to the identifier received, registers this UE access base station or nullifies, and according to registration or deregistration, carry out access control to this UE.
Here, corresponding with the method that base station side carries out access control, registration or de-registration request can be sent to base station with the form of note or voice by UE, and further, UE can also receive registration or the deregistration of base station transmission, such as succeeds in registration; Except this, UE can also send the request of inquiry login state to base station, base station is according to the inquiry request received, send the solicited message of the identifier obtaining this UE to UE, after the identifier of self is sent to this base station by UE, the Query Result that this base station is replied can be received, UE can also be for further processing according to Query Result, such as, if determine current this base station of unregistered access, then registration operation is carried out.
Preferably, UE sends registration access base station or nullifies the request of access base station to base station, comprising:
UE sends the request of registration this base station of access or this base station of cancellation access to base station with note form;
In specific implementation process, UE according to the agreement with base station, with the form such as note or voice to base station transmit operation (registration, cancellation, inquiry etc.) request, can consider based on process easily, generally, setting adopts note form to send registration or de-registration request to base station.
Carrying out the method for access control in order to further illustrate the embodiment of the present invention, being described in detail below by several preferred embodiment;
As shown in Figure 3, be the method flow diagram of the BTS management access control list that the embodiment of the present invention provides, comprise:
S301: base station receives the note that UE sends;
S302: base station judges that whether the reception identification number of this note is the identification number of base station user administrative center, if so, then enters step S303, otherwise, enter step S305;
S303: the note that base station sends according to UE, what if determine, UE sent is registration request, then the identifier of the UE of acquisition is added in the access control list of current base station, what if determine, UE sent is de-registration request, then the identifier of the UE of acquisition is deleted from the access control list of current base station, what if determine, UE sent is the request of inquiry current registration status, then according to the identifier of UE, and the login state that inquiry UE is current;
In concrete enforcement, also likely occur that base station receives the situation of forbidden character, base station, after determining that the transmit operation of UE is illegal operation, can point out user to send correct operational order;
S304: the operating result performed by the note sent according to UE is sent to UE by base station;
As, add at the identifier of the UE by acquisition after in the access control list of current base station, successful to UE reply registration; After the identifier of the UE obtained is deleted from the access control list of current base station, nullify successful to UE reply; After inquiring the current login state of UE, Query Result is fed back to UE;
S305: the note that UE sends is transmitted to core net by base station.
As shown in Figure 4, be the base station connection control method flow chart of the semiclosed pattern that the embodiment of the present invention provides, comprise:
S401: base station receives the access request that UE sends;
S402: judge that whether current base station resource is congested, if so, enter step S403, otherwise, enter step S406;
S403: the identifier obtaining UE, according to the identifier obtained, judges whether registered this base station of access of UE, if so, then enters step S404, otherwise, enter step S407;
In specific implementation process, judge the step whether current base station resource is congested and judge that the step of whether registered this base station of access of UE does not have strict sequencing, first base station can also judge whether registered this base station of access of UE, judge that whether current base station resource is congested again, even, when conditions permit, this two steps can also be performed simultaneously, base station is according to the result of carrying out judging in these two steps, determine next step process, such as, as long as base station resource is idle, then determine to allow this UE to access; Congested at base station resource, but, when determining that this UE is registered, perform step S404; Congested at base station resource, meanwhile, when determining that UE does not register, then perform step S407;
S404: judge whether exist with this base station connect do not register the UE accessing this base station, if so, then enter step S405, otherwise, enter step S407;
S405: that selects one to connect with this base station does not register the UE accessing this base station, forces this UE not registering this base station of access to switch to adjacent base station, and enters step S406;
S406: allow UE access base station, and be this UE Resources allocation;
S407: refusal UE access base station.
Based on same inventive concept, the base station of carrying out access control corresponding to a kind of method with carrying out access control and UE is additionally provided in the embodiment of the present invention, the principle of dealing with problems due to this base station and UE is similar to the method that the embodiment of the present invention carries out access control, therefore the enforcement of this base station and UE see the enforcement of method, can repeat part and repeats no more.
As shown in Figure 5, be the architecture of base station figure carrying out access control that the embodiment of the present invention provides, comprise:
Acquisition module 51, for after the request of the registration access base station or cancellation access base station that receive user equipment (UE) transmission, obtains the identifier of this UE;
Control module 52, for the identifier obtained according to acquisition module 41, registers this UE access base station or nullifies, and when needs carry out access control to this UE, according to registration or deregistration, carries out access control to this UE.
Preferably, acquisition module 51 specifically for:
Send the solicited message of the identifier obtaining this UE to UE, and receive the identifier of this UE transmission.
Preferably, control module 52 is specifically for registering described UE access base station according to following steps:
The identifier of acquisition is added in the access control list of base station;
Control module 52 is specifically for nullifying UE access base station according to following steps:
The identifier of acquisition is deleted from the access control list of base station.
Preferably, control module 52 specifically for:
Determine current there is not idle base station resource time, if determine this base station of the registered access of this UE, then allow this UE access base station.
Preferably, control module 52 determine current there is not idle base station resource time, before allowing this UE access base station, also comprise:
That determines that current existence at least one and this base station connect does not register the UE accessing this base station, and forces the UE not registering this base station of access described at least one to be switched to adjacent base station.
As shown in Figure 6, be the UE structure chart carrying out access control that the embodiment of the present invention provides, comprise:
First sending module 61, for the transmission registration described base station of access, base station or the request of nullifying the described base station of access, obtains the solicited message of the identifier of described UE to make described base station to described UE transmission;
Second sending module 62, for according to the information received, sends to described base station by the identifier of self, to make described base station according to described identifier, described UE access base station is registered or nullified, and according to registration or deregistration, access control is carried out to described UE.
Preferably, the first sending module 61 specifically for:
Send the request of the registration described base station of access or the described base station of cancellation access to base station with note form.
Those skilled in the art should understand, embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.And the present invention can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disc store, CD-ROM, optical memory etc.) of computer usable program code.
The present invention describes with reference to according to the flow chart of the method for the embodiment of the present invention, device (system) and computer program and/or block diagram.Should understand can by the combination of the flow process in each flow process in computer program instructions realization flow figure and/or block diagram and/or square frame and flow chart and/or block diagram and/or square frame.These computer program instructions can being provided to the processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device to produce a machine, making the instruction performed by the processor of computer or other programmable data processing device produce device for realizing the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
These computer program instructions also can be stored in can in the computer-readable memory that works in a specific way of vectoring computer or other programmable data processing device, the instruction making to be stored in this computer-readable memory produces the manufacture comprising command device, and this command device realizes the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, make on computer or other programmable devices, to perform sequence of operations step to produce computer implemented process, thus the instruction performed on computer or other programmable devices is provided for the step realizing the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
Although describe the preferred embodiments of the present invention, those skilled in the art once obtain the basic creative concept of cicada, then can make other change and amendment to these embodiments.So claims are intended to be interpreted as comprising preferred embodiment and falling into all changes and the amendment of the scope of the invention.
Obviously, those skilled in the art can carry out various change and modification to the present invention and not depart from the spirit and scope of the present invention.Like this, if these amendments of the present invention and modification belong within the scope of the claims in the present invention and equivalent technologies thereof, then the present invention is also intended to comprise these change and modification.

Claims (14)

1. carry out a method for access control, it is characterized in that, the method comprises:
Base station, after the registration receiving user equipment (UE) transmission accesses described base station or nullifies the request of the described base station of access, obtains the identifier of described UE;
Described base station, according to the identifier obtained, is registered described UE access base station or is nullified;
Access control, when needs carry out access control to described UE, according to registration or deregistration, is carried out to described UE in described base station.
2. the method for claim 1, is characterized in that, described base station obtains the identifier of described UE, comprising:
Described base station sends the solicited message of the identifier obtaining described UE to described UE, and receives the identifier of described UE transmission.
3. the method for claim 1, is characterized in that, described base station, according to the identifier obtained, is registered described UE access base station, being comprised:
The identifier of acquisition adds in the access control list of described base station by described base station;
Described base station, according to the identifier obtained, is nullified described UE access base station, being comprised:
The identifier of acquisition is deleted in described base station from access control list.
4. the method for claim 1, is characterized in that, described base station, according to registration or deregistration, is carried out access control to described UE, being comprised:
Described base station determine current there is not idle base station resource time, if determine the described base station of the registered access of described UE, then allow described UE to access described base station.
5. method as claimed in claim 4, is characterized in that, described base station determine current there is not idle base station resource time, allow before described UE accesses described base station, also to comprise:
What described base station determined that current existence at least one and described base station connect does not register the UE accessing described base station, and forces not register the UE accessing described base station described at least one and be switched to adjacent base station.
6. carry out a method for access control, it is characterized in that, the method comprises:
User equipment (UE), to the transmission registration described base station of access, base station or the request of nullifying the described base station of access, obtains the solicited message of the identifier of described UE to make described base station to described UE transmission;
The identifier of self, according to the information received, is sent to described base station, to make described base station according to described identifier, registers described UE access base station or nullify by described UE, and according to registration or deregistration, carries out access control to described UE.
7. method as claimed in claim 6, is characterized in that, described UE sends the registration described base station of access or nullifies the request of the described base station of access to base station, comprising:
Described UE sends the request of the registration described base station of access or the described base station of cancellation access to base station with note form.
8. carry out a base station for access control, it is characterized in that, this base station comprises:
Acquisition module, for after the request of the registration access base station or cancellation access base station that receive user equipment (UE) transmission, obtains the identifier of described UE;
Control module, for according to the identifier obtained, registers described UE access base station or nullifies, and when needs carry out access control to described UE, according to registration or deregistration, carries out access control to described UE.
9. base station as claimed in claim 8, is characterized in that, described acquisition module specifically for:
Send the solicited message of the identifier obtaining described UE to described UE, and receive the identifier of described UE transmission.
10. base station as claimed in claim 8, it is characterized in that, described control module is specifically for registering described UE access base station according to following steps:
The identifier of acquisition is added in the access control list of described base station;
Described control module is specifically for nullifying described UE access base station according to following steps:
The identifier of acquisition is deleted from the access control list of described base station.
11. base stations as claimed in claim 8, is characterized in that, described control module specifically for:
Determine current there is not idle base station resource time, if determine the described base station of the registered access of described UE, then allow described UE to access described base station.
12. base stations as claimed in claim 11, is characterized in that, described control module determine current there is not idle base station resource time, allow before described UE accesses described base station, also to comprise:
That determines that current existence at least one and described base station connect does not register the UE accessing described base station, and forces not register the UE accessing described base station described at least one and be switched to adjacent base station.
13. 1 kinds of user equipment (UE)s carrying out access control, it is characterized in that, this UE comprises:
First sending module, for the transmission registration described base station of access, base station or the request of nullifying the described base station of access, obtains the solicited message of the identifier of described UE to make described base station to described UE transmission;
Second sending module, for according to the information received, sends to described base station by the identifier of self, to make described base station according to described identifier, described UE access base station is registered or nullified, and according to registration or deregistration, access control is carried out to described UE.
14. UE as claimed in claim 13, is characterized in that, described first sending module specifically for:
Send the request of the registration described base station of access or the described base station of cancellation access to base station with note form.
CN201310369786.XA 2013-08-22 2013-08-22 Method and device for performing access control Pending CN104427578A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310369786.XA CN104427578A (en) 2013-08-22 2013-08-22 Method and device for performing access control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310369786.XA CN104427578A (en) 2013-08-22 2013-08-22 Method and device for performing access control

Publications (1)

Publication Number Publication Date
CN104427578A true CN104427578A (en) 2015-03-18

Family

ID=52975251

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310369786.XA Pending CN104427578A (en) 2013-08-22 2013-08-22 Method and device for performing access control

Country Status (1)

Country Link
CN (1) CN104427578A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105376836A (en) * 2015-11-24 2016-03-02 京信通信技术(广州)有限公司 Access control method and system for UE (User Equipment) terminal equipment
WO2023045823A1 (en) * 2021-09-27 2023-03-30 华为技术有限公司 Association method in wlan, and ap, and sta

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101730155A (en) * 2009-04-30 2010-06-09 中兴通讯股份有限公司 System and method for performing resource control on user
CN101808363A (en) * 2009-02-17 2010-08-18 华为技术有限公司 Overload control method for access network element and related devices
CN101841912A (en) * 2009-01-09 2010-09-22 华为技术有限公司 User service source management method and device
US20120039214A1 (en) * 2009-05-04 2012-02-16 Hyun-Sook Kim Method for providing connection type information and method for controlling radio resource of home (e)nodeb
CN102547913A (en) * 2010-12-14 2012-07-04 上海贝尔股份有限公司 Method and equipment for user equipment access control

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101841912A (en) * 2009-01-09 2010-09-22 华为技术有限公司 User service source management method and device
CN101808363A (en) * 2009-02-17 2010-08-18 华为技术有限公司 Overload control method for access network element and related devices
CN101730155A (en) * 2009-04-30 2010-06-09 中兴通讯股份有限公司 System and method for performing resource control on user
US20120039214A1 (en) * 2009-05-04 2012-02-16 Hyun-Sook Kim Method for providing connection type information and method for controlling radio resource of home (e)nodeb
CN102547913A (en) * 2010-12-14 2012-07-04 上海贝尔股份有限公司 Method and equipment for user equipment access control

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105376836A (en) * 2015-11-24 2016-03-02 京信通信技术(广州)有限公司 Access control method and system for UE (User Equipment) terminal equipment
CN105376836B (en) * 2015-11-24 2019-04-09 京信通信系统(中国)有限公司 The connection control method and system of UE terminal device
WO2023045823A1 (en) * 2021-09-27 2023-03-30 华为技术有限公司 Association method in wlan, and ap, and sta

Similar Documents

Publication Publication Date Title
US20200221370A1 (en) Radio terminal, base station, and method therefor
CN110881185B (en) Communication method and device
CN110519709B (en) Context management method and device
JP6995976B2 (en) Core network access method by terminal, base station and terminal
US11902379B2 (en) Method for determining SSC mode and apparatus
WO2021188351A1 (en) Improved selection of slice-supporting plmns while roaming away from home network
CN108810988B (en) Message transmission method and device
KR102074110B1 (en) Common process implementation methods, devices and systems
CN108990132B (en) Access control method and device
KR20140028100A (en) Network joining method and apparatus thereof for relay node
CN109792599B (en) Session management method and network element
US11997751B2 (en) Method for supporting UE association and communications device
CN109246853A (en) A kind of conversation processing method, apparatus and system
CN111757312A (en) Session processing method and device
CN106063321A (en) User equipment transition method, core network device, access network device and system
CN110913437B (en) Communication method and network element
CN111356140A (en) Network access method, device, storage medium and network equipment
CN112312493A (en) Switching method and device
JP2021508418A (en) How to connect network components, communication terminals, communication terminals and how to use communication networks
CN112291845B (en) Paging method and communication device
CN104427578A (en) Method and device for performing access control
CN107333322B (en) Parent control method and base station
CN107770787B (en) Method and device for determining target operator network
CN114389943A (en) Network configuration method, device, equipment and computer storage medium
KR20220163439A (en) Initiate network request registration process

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150318

RJ01 Rejection of invention patent application after publication