CN109831783A - Open the method and system of micro-base station - Google Patents

Open the method and system of micro-base station Download PDF

Info

Publication number
CN109831783A
CN109831783A CN201711177458.4A CN201711177458A CN109831783A CN 109831783 A CN109831783 A CN 109831783A CN 201711177458 A CN201711177458 A CN 201711177458A CN 109831783 A CN109831783 A CN 109831783A
Authority
CN
China
Prior art keywords
base station
micro
information
opening
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711177458.4A
Other languages
Chinese (zh)
Other versions
CN109831783B (en
Inventor
段建祥
陈建刚
潘寅
王福荣
郑凯华
陈�峰
林明辉
黄晓明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201711177458.4A priority Critical patent/CN109831783B/en
Publication of CN109831783A publication Critical patent/CN109831783A/en
Application granted granted Critical
Publication of CN109831783B publication Critical patent/CN109831783B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

Present disclose provides a kind of method and systems for opening micro-base station, are related to wireless communication field.This method comprises: micro-base station sends opening base station request message to NM server, which carries the base station identification information and the information of the macro base station listened to of micro-base station;NM server is authenticated according to the base station identification information in opening base station request message, opening state is set by the state parameter of micro-base station, according to base station identification information and the information of macro base station, start-up parameter is set, and opening base station response message is returned to micro-base station, wherein the opening base station response message carries the information for allowing micro-base station to open;Micro-base station interacts with security gateway after obtaining the information for allowing micro-base station to open, establishes secure tunnel;Micro-base station is based on the secure tunnel, interacts with NM server, obtains start-up parameter;And the core net according to the start-up parameter access carrier, to realize the purpose for voluntarily opening micro-base station.

Description

Open the method and system of micro-base station
Technical field
This disclosure relates to wireless communication field, in particular to a kind of method and system for opening micro-base station.
Background technique
Traditional base station is sufficiently bulky, generally requires and is mounted on dedicated computer room, and is equipped with corresponding power supply, data transmission Equal facilities.After installation, the position of base station is just fixed, and will not generally be moved again.Traditional base station is generally all by operator Purchase, and by the installation of operator base station and open-minded.Due to the negligible amounts of traditional base station, operator is for base station Management cost it is not high.In addition, the puzzlement maximum bottleneck problem of operator is that depth covering is insufficient, this is just for wireless coverage Just it is limited by site inadequate resource and high construction lower deployment cost.
In view of the above problems, occurring a kind of very small base station of volume, i.e. micro-base station, such as entitled elfCell at present Micro-base station.ElfCell only has base station half A4 paper size, due to its compact, is highly convenient for towards personal, family and does Public room is used as in-door covering.This makes the quantity of the base station elfCell will be very huge.If the similar base station elfCell this The opening of the micro-base station of sample remains as traditional base station and is managed like that by operator, then management cost of the operator for base station It will be very big.For example, this, which will lead to, takes time and effort and raises operator if engineering staff is sent to go to open micro-base station to scene For micro-base station management cost the problem of.
Summary of the invention
The technical problem that the embodiment of the present disclosure solves is: a kind of method or system for opening micro-base station is provided, thus It can be realized user and voluntarily open micro-base station.
According to the one aspect of the embodiment of the present disclosure, a kind of method for opening micro-base station is provided, comprising: micro-base station is listened to The information of the macro base station of ambient network, and opening base station request message is sent to NM server, the opening base station request disappears Breath carries the base station identification information and the information of the macro base station listened to of the micro-base station;The NM server is according to Base station identification information in opening base station request message is authenticated, and is set as the state parameter of the micro-base station to open shape State is arranged start-up parameter according to the base station identification information and the information of the macro base station, and returns to base station to the micro-base station Response message is opened, wherein the opening base station response message carries the information for allowing the micro-base station to open;The micro-base station After obtaining the information for allowing the micro-base station to open, is interacted with security gateway, establish secure tunnel;The micro-base station is based on institute Secure tunnel is stated, is interacted with the NM server, the start-up parameter is obtained;And the micro-base station is joined according to the starting The core net of number access carrier.
Optionally, the micro-base station is with preserving the IP address of the NM server and the IP of the security gateway Location and/domain name;Wherein, IP address of the micro-base station based on the NM server sends opening base station to NM server and asks Seek message;IP address and/domain name of the micro-base station based on the security gateway are interacted with security gateway.
Optionally, the information of the macro base station includes: the tracing area coding and pseudo noise PN code of the macro base station;It is described Start-up parameter include: core network mobility management entity information, public land mobile network identity, the micro-base station with The community configured information of track regional code and the micro-base station.
Optionally, the step of micro-base station interacts with security gateway, establishes secure tunnel includes: the micro-base station to peace Full gateway sends security request message, and the security request message carries the base station identification information of the micro-base station;The safety Gateway authenticates the micro-base station according to the base station identification information in the security request message, is determining the micro-base station for conjunction Secure answer message is returned to the micro-base station in the case where method base station;And the micro-base station is receiving the secure answer After message, secure tunnel is established with the security gateway.
Optionally, the method also includes: it is corresponding with the micro-base station to answer after the micro-base station core network access It is obtained with program servers from the micro-base station and is currently accessed the user information of the micro-base station and by the micro-base station Data on flows information.
Optionally, the method also includes user terminal downloads application program modules corresponding with the micro-base station;And The user terminal is interacted by the application program module with the apps server, thus obtain be currently accessed it is described The user information of micro-base station and data on flows information Jing Guo the micro-base station.
According to the other side of the embodiment of the present disclosure, a kind of system for opening micro-base station is provided, comprising: micro-base station, Opening base station request message is sent for listening to the information of the macro base station of ambient network, and to NM server, the base station is opened Logical request message carries the base station identification information of the micro-base station and the information of the macro base station listened to;Described in being allowed It after the information that micro-base station is opened, is interacted with security gateway, establishes secure tunnel;Based on the secure tunnel, taken with the network management Business device interaction, obtains the start-up parameter;And according to the core net of the start-up parameter access carrier;And the network management clothes Business device, for being authenticated according to the base station identification information in the opening base station request message, by the state of the micro-base station Parameter is set as opening state, is arranged start-up parameter according to the base station identification information and the information of the macro base station, and to institute It states micro-base station and returns to opening base station response message, wherein the opening base station response message carries what the permission micro-base station was opened Information.
Optionally, the micro-base station is with preserving the IP address of the NM server and the IP of the security gateway Location and/domain name;Wherein, IP address of the micro-base station based on the NM server sends opening base station to NM server and asks Seek message;IP address and/domain name of the micro-base station based on the security gateway are interacted with security gateway.
Optionally, the information of the macro base station includes: the tracing area coding and pseudo noise PN code of the macro base station;It is described Start-up parameter include: core network mobility management entity information, public land mobile network identity, the micro-base station with The community configured information of track regional code and the micro-base station.
Optionally, the micro-base station is used to send security request message to security gateway, and the security request message carries The base station identification information of the micro-base station;It is receiving after the secure answer message that security gateway returns, with the safety net Secure tunnel is established in pass;The system also includes: the security gateway, for being marked according to the base station in the security request message Know information to authenticate the micro-base station, returns to safety to the micro-base station in the case where determining that the micro-base station is legitimate base station Response message.
Optionally, the system also includes apps servers corresponding with the micro-base station, in micro- base It stands after core network access, the user information for being currently accessed the micro-base station is obtained from the micro-base station and passes through micro- base The data on flows information stood.
Optionally, the system also includes user terminals, for downloading application program mould corresponding with the micro-base station Block is interacted by the application program module with the apps server, is currently accessed the micro-base station to obtain User information and data on flows information Jing Guo the micro-base station.
According to the other side of the embodiment of the present disclosure, a kind of system for opening micro-base station is provided, comprising: memory; And it is coupled to the processor of the memory, the processor is configured to based on the instruction execution for being stored in the memory Foregoing method.
According to the other side of the embodiment of the present disclosure, a kind of computer readable storage medium is provided, is stored thereon with The step of computer program instructions, which realizes foregoing method when being executed by processor.
In the embodiments of the present disclosure, micro-base station sends base station identification information and the institute for carrying micro-base station to NM server The opening base station request message of the information of the macro base station listened to;NM server is authenticated according to base station identification information, will The state parameter of micro-base station is set as opening state, and start-up parameter is arranged, and returns to opening base station response message to micro-base station;It is micro- Base station interacts after obtaining the information for allowing micro-base station to open with security gateway, establishes secure tunnel, and be based on secure tunnel, Start-up parameter is obtained from NM server, and according to the core net of the start-up parameter access carrier, to realize user The purpose for voluntarily opening micro-base station has saved the costs such as manpower, time and management.
By the detailed description referring to the drawings to the exemplary embodiment of the disclosure, the other feature of the disclosure and its Advantage will become apparent.
Detailed description of the invention
The attached drawing for constituting part of specification describes embodiment of the disclosure, and together with the description for solving Release the principle of the disclosure.
The disclosure can be more clearly understood according to following detailed description referring to attached drawing, in which:
Fig. 1 is the flow chart for showing the method for opening micro-base station according to some embodiments of the disclosure.
Fig. 2 is the flow chart for showing the method for opening micro-base station according to the disclosure other embodiments.
Fig. 3 is the structure chart for schematically showing the system for opening micro-base station according to some embodiments of the disclosure.
Fig. 4 is the structure chart for schematically showing the system for opening micro-base station according to the disclosure other embodiments.
Fig. 5 is the structure chart for schematically showing the system for opening micro-base station according to the disclosure other embodiments.
Fig. 6 is the structure chart for schematically showing the system for opening micro-base station according to the disclosure other embodiments.
Specific embodiment
The various exemplary embodiments of the disclosure are described in detail now with reference to attached drawing.It should also be noted that unless in addition having Body explanation, the unlimited system of component and the positioned opposite of step, numerical expression and the numerical value otherwise illustrated in these embodiments is originally Scope of disclosure.
Simultaneously, it should be appreciated that for ease of description, the size of various pieces shown in attached drawing is not according to reality Proportionate relationship draw.
Be to the description only actually of at least one exemplary embodiment below it is illustrative, never as to the disclosure And its application or any restrictions used.
Technology, method and apparatus known to person of ordinary skill in the relevant may be not discussed in detail, but suitable In the case of, the technology, method and apparatus should be considered as part of specification.
It is shown here and discuss all examples in, any occurrence should be construed as merely illustratively, without It is as limitation.Therefore, the other examples of exemplary embodiment can have different values.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, then in subsequent attached drawing does not need that it is further discussed.
Fig. 1 is the flow chart for showing the method for opening micro-base station according to some embodiments of the disclosure.
In step S102, micro-base station listens to the information of the macro base station of ambient network, and sends base station to NM server and open Logical request message, the opening base station request message carry base station identification information (such as No. SN (Serial of base station of the micro-base station Number, sequence number)) and the information of macro base station that is listened to.
In some embodiments, micro-base station can listen to the information of the macro base station in ambient network preset range.For example, should The information of macro base station may include: the tracing area coding and PN code (Pseudo-Noise Code, pseudo noise of the macro base station Code).
In some embodiments, micro-base station can preserve IP (Internet Protocol, the interconnection of NM server FidonetFido) address.The micro-base station sends opening base station request message to NM server based on the IP address of NM server.
In step S104, NM server is authenticated according to the base station identification information in opening base station request message, will The state parameter of micro-base station is set as opening state, and start-up parameter is arranged according to base station identification information and the information of macro base station, and Opening base station response message is returned to micro-base station, wherein opening base station response message carries the information for allowing micro-base station to open.
In some embodiments, which may include: core net MME (Mobility Management Entity, mobility management entity) information, PLMN ID (Public Land Mobile Network ID, public land movement Network identity mark), the TAC of micro-base station (Tracking Area Code, tracing area coding) and the cell of micro-base station match Confidence breath.
In further embodiments, which can also include: the SCTP of the IP address of security gateway, exterior gateway (Stream Control Transmission Protocol, Flow Control Transmission Protocol) service IP address, exterior gateway SCTP service port number, physical district ID (identity) list and cell ID (such as 28 cell ID) etc..
In step S106, micro-base station is interacted after obtaining the information for allowing micro-base station to open with security gateway, establishes safety Tunnel.In step s 106, micro-base station receives opening base station response message from NM server, thus the opening base station response The information for allowing the micro-base station to open is got in message.
In some embodiments, micro-base station can preserve the IP address and/domain name of security gateway.Micro-base station can be based on The IP address of the security gateway and/domain name are interacted with security gateway.
In some embodiments, the step of micro-base station is interacted with security gateway, establishes secure tunnel may include: micro-base station Security request message is sent to security gateway, which carries the base station identification information of micro-base station;Security gateway root According to the base station identification information in the security request message to micro-base station authenticate, determine micro-base station be legitimate base station in the case where to Micro-base station returns to secure answer message;And micro-base station establishes safe tunnel with security gateway after receiving secure answer message Road.By establishing secure tunnel, be conducive to guarantee to interact in micro-base station and the interaction of other equipment (such as NM server) The safety of data or information.
In step S108, micro-base station is based on secure tunnel, interacts with NM server, obtains start-up parameter.
In step S110, micro-base station is according to the core net of start-up parameter access carrier.
In the method for opening micro-base station of above-described embodiment, micro-base station carries micro-base station to NM server transmission The opening base station request message of base station identification information and the information of the macro base station listened to;NM server is according to Base Station Identification Information is authenticated, and sets opening state for the state parameter of micro-base station, and start-up parameter is arranged, and returns to base station to micro-base station Open response message;Micro-base station interacts with security gateway after obtaining the information for allowing micro-base station to open, establishes secure tunnel, And it is based on secure tunnel, start-up parameter is obtained from NM server, and according to the core net of the start-up parameter access carrier, To realizing the purpose that user voluntarily opens micro-base station, so there is no need to operator send engineering staff to scene go to open it is micro- The costs such as manpower, time and management have been saved in base station.
In some embodiments, the method for opening micro-base station can also include: after micro-base station core network access, with The corresponding apps server of micro-base station (such as APP server) obtains the user information for being currently accessed micro-base station from micro-base station And the data on flows information Jing Guo micro-base station.This is conducive to dock the flow into the user information of micro-base station and Jing Guo micro-base station Data information is monitored.
In some embodiments, which can also include: that user terminal downloads are corresponding with micro-base station Application program module (such as APP);The user terminal is interacted by the application program module with apps server, thus Obtain the user information for being currently accessed micro-base station and the data on flows information Jing Guo micro-base station.In this embodiment, Yong Hutong Cross downloading APP, so as to obtained from APP server access micro-base station user information and flow number Jing Guo micro-base station it is believed that Breath.
Fig. 2 is the flow chart for showing the method for opening micro-base station according to the disclosure other embodiments.
In step S202, micro-base station sends opening base station request message to NM server.For example, micro-base station listens to surrounding The information of the macro base station of network, and opening base station request message is sent to NM server.The opening base station request message carries The information of the base station identification information of the micro-base station and the macro base station listened to.The NM server can be belonging to the micro-base station The specified NM server of operator.
For example, manufacturer can be by the IP address of the corresponding NM server of micro-base station to match before micro-base station factory The form of confidence breath is stored in micro-base station.In this way, micro-base station is after the power-up, so that it may get corresponding network management clothes from local The IP address of business device, to send opening base station request message to NM server.
In step S204, NM server is authenticated according to the base station identification information in opening base station request message, will The state parameter of micro-base station is set as opening state, and start-up parameter is arranged according to base station identification information and the information of macro base station.
In step S206, NM server returns to opening base station response message to micro-base station.The opening base station response message Carry the information for allowing micro-base station to open.
In step S208, micro-base station therefrom obtains what permission micro-base station was opened after receiving opening base station response message Then information sends security request message to security gateway.The security request message carries the base station identification information of the micro-base station.
For example, manufacturer can be by the IP address of the corresponding security gateway of micro-base station and/or domain before micro-base station factory Name is stored in micro-base station in the form of configuration information.In this way, micro-base station can get corresponding security gateway from local IP address and/or domain name, to send security request message to security gateway.
In step S210, security gateway authenticates micro-base station according to the base station identification information in security request message, true Secure answer message is returned to micro-base station in the case where determining micro-base station for legitimate base station.
In step S212, micro-base station establishes secure tunnel after receiving secure answer message, with security gateway.
In some embodiments, digital certificates can be used in the verification process of micro-base station access security gateway.Digital certificates It can be a software carrier being previously installed in micro-base station, interacted with security gateway, to identify whether being legal micro- base Core net has been accessed at station.The complexity of micro-base station can be reduced by using digital certificates.
In step S214, micro-base station is based on secure tunnel, interacts with NM server, obtains start-up parameter.That is, micro-base station Start-up parameter is obtained from NM server by the security gateway of operator.
In step S216, micro-base station is according to the core net of start-up parameter access carrier.That is, micro-base station is according to start-up parameter Pass through the core net of security gateway access carrier.
So far, step S202~S216 realizes the process that micro-base station automatically accesses core net.
In some embodiments, this method may also comprise the following steps::
In step S218, apps server (such as APP server) is obtained from micro-base station is currently accessed micro-base station User information and data on flows information Jing Guo micro-base station.
In step S220, user terminal downloads application program module (such as APP) corresponding with micro-base station.
In step S222, user terminal is interacted by application program module with apps server, to obtain current Access the user information of micro-base station and the data on flows information Jing Guo micro-base station.
For example, the sequence number information of the micro-base station, user can be indicated on the outer surface of micro-base station (such as the base station elfCell) The sequence number information of micro-base station can be manually entered into the APP of terminal (such as smart phone), or with mobile phone to base station Two dimensional code is scanned and obtains base station identification information.Terminal APP is interacted with apps server, and user can be from terminal In APP obtain be currently accessed micro-base station user information (such as access number of users and accessed which user) and warp Cross the data on flows information of the micro-base station.It is handed over by user terminal A PP (or using wechat public platform) with apps server Mutually, O&M efficiency is improved, realizing user being capable of real-time awareness micro-base station state.
In the method for above-described embodiment, micro-base station sends the base station identification information for carrying micro-base station to NM server With the opening base station request message of the information of the macro base station listened to;NM server carries out automatic according to base station identification information Networking legitimate verification, for legitimate device, automatic planning and configuration parameter;Micro-base station is interacted with security gateway, establishes safety Tunnel, and it is based on secure tunnel, start-up parameter, and the core according to the start-up parameter access carrier are obtained from NM server Heart net;User terminal is interacted by application program module with apps server, to obtain the use for being currently accessed micro-base station Family information and data on flows information Jing Guo micro-base station.The method of the embodiment of the present disclosure not only realize user voluntarily open it is micro- The purpose of base station, and realize flow number of the user to the user information for being currently accessed micro-base station and Jing Guo micro-base station it is believed that The monitoring of breath.
The embodiment of the present disclosure assesses the collection of the information of macro base station around using micro-base station, and it is micro- to go out this by hind computation The configuration parameter appropriate of base station realizes the voluntarily open-minded of micro-base station, and is connected to core net by home broadband, is rapidly completed LTE network covering extends and depth covering.Since the above method can open micro-base station automatically in a plug-and-play manner, Reduce operator NM server be management micro-base station needed for operation, thus reduce Carrier Management micro-base station at This, therefore, solve and micro-base station actively opened by operator in the prior art, cause operator for micro-base station management at This higher problem.And the above method realizes accurate covering with a definite target in view, depth covering and tight in a manner of flexibly and fast Anxious hot spot mends blind effect.
Existing 4G network and 5G network from now on will use more high frequency spectrums, lead to the reduction of base station coverage distance and wear Permeability reduces.And FTTH (Fiber To The Home, optical fiber directly arrive family) resource that operator is ubiquitous can very just The passback of micro-base station is provided sharply.There to be more and more indoor micro-base stations to be used as towards domestic consumer, medium and small commercial accounts, quotient The in-door covering means of the indoor applications such as industry hot spot region or commercial building.And the method for opening micro-base station of the embodiment of the present disclosure Can be with plug and play, customers' responsiveness is good.Open front and back, KQI (the Key Quality of periphery macro base station user in comparison small station Indicators, Key Quality Indicator) index deteriorates without obvious, on the contrary, improving whole network users experience.
Additionally by the broadband access of the different operators in different cities (for example, Fujian connection, Beijing connection, Beijing Telecommunications, Beijing movement, Jiangsu Telecom, Jiangsu connection, Jiangsu broadcasting and TV, Taiwan U.S. broadband etc.), demonstrate a variety of broadband internets The feasibility of passback scheme.Wireless network construction and business development mode based on " society builds together, income is shared ", by operation The smart phone of quotient ubiquitous FTTH resource and user is accomplished the micro-base station plug and play of user side and is managed at any time.
Fig. 3 is the structure chart for schematically showing the system for opening micro-base station according to some embodiments of the disclosure.Such as Fig. 3 Shown, which may include: micro-base station 302 and NM server 304.
The micro-base station 302 can be used for listening to the information of the macro base station of ambient network, and send base to NM server 304 Open request message in station.The opening base station request message carries the base station identification information of the micro-base station and the macro base station listened to Information.The micro-base station is also used to after obtaining the information for allowing micro-base station to open, and is interacted with security gateway 306, and safety is established Tunnel.The micro-base station 302 is based on the secure tunnel, interacts with NM server 304, obtains start-up parameter, and according to the starting The core net 308 of parameter access carrier.
For example, the information of macro base station may include: the tracing area coding and PN code of macro base station.
For example, start-up parameter may include: core network mobility management entity information, public land mobile network identity mark Know, the tracing area of micro-base station encodes and the community configured information of micro-base station.
The NM server 304 can be used for being authenticated according to the base station identification information in opening base station request message, Opening state is set by the state parameter of micro-base station 302, according to base station identification information and the information of macro base station setting starting ginseng Number, and opening base station response message is returned to micro-base station 302.The opening base station response message carries the letter for allowing micro-base station to open Breath.
In the system for opening micro-base station of above-described embodiment, micro-base station carries micro-base station to NM server transmission The opening base station request message of base station identification information and the information of the macro base station listened to;NM server is according to Base Station Identification Information is authenticated, and sets opening state for the state parameter of micro-base station, and start-up parameter is arranged, and returns to base station to micro-base station Open response message;Micro-base station interacts with security gateway after obtaining the information for allowing micro-base station to open, establishes secure tunnel, And it is based on secure tunnel, start-up parameter is obtained from NM server, and according to the core net of the start-up parameter access carrier, To realizing the purpose that user voluntarily opens micro-base station, so there is no need to operator send engineering staff to scene go to open it is micro- The costs such as manpower, time and management have been saved in base station.
In some embodiments, micro-base station 302 can be used for sending security request message, the safety to security gateway 306 Request message carries the base station identification information of the micro-base station 302.The micro-base station 302 can be used for receiving from security gateway After the 306 secure answer message returned, secure tunnel is established with the security gateway 306.In some embodiments, as shown in figure 3, The system can also include: security gateway 306, for according to the base station identification information in security request message to micro-base station 302 Authentication returns to secure answer message to the micro-base station 302 in the case where determining that the micro-base station 302 is legitimate base station.
In some embodiments, micro-base station 302 can preserve the IP address and security gateway of NM server 304 306 IP address and/domain name.The micro-base station 302 sends base station to NM server 304 based on the IP address of the NM server Open request message.IP address and/domain name of the micro-base station 302 based on the security gateway are interacted with security gateway 306.
In some embodiments, as shown in figure 3, the system can also include core net 308.The core net 308 is that this is micro- The core net of 302 operator of base station.
In some embodiments, as shown in figure 3, the system can also include application program clothes corresponding with micro-base station 302 Business device 310, for being obtained from micro-base station 302 and being currently accessed the micro-base station 302 after 302 core network access 308 of micro-base station User information and data on flows information Jing Guo the micro-base station 302.
In some embodiments, as shown in figure 3, the system can also include user terminal 312, for downloading and micro-base station 302 corresponding application program modules are interacted by the application program module with apps server 310, to obtain current Access the user information of micro-base station 302 and the data on flows information Jing Guo the micro-base station 302.
In some embodiments, the equipment such as the NM server of network side and security gateway establish cloud platform (such as electricity Believe cloud platform), so as to reduce operator network side investment.
Fig. 4 is the structure chart for schematically showing the system for opening micro-base station according to the disclosure other embodiments.
As shown in figure 4, the system includes: micro-base station 402, NM server 404, security gateway 406, core net 408, answers With program servers 410 and user terminal 412.These equipment respectively in Fig. 3 micro-base station 302, NM server 304, peace Full gateway 306, core net 308, apps server 310 and user terminal 312 are same or similar, and which is not described herein again.
In some embodiments, as shown in figure 4, the system can also include: interchanger 414, Metropolitan Area Network (MAN) 415, DNS (Domain Name System, domain name system) server 416, traffic statistics server 417 and video server 418.Such as Fig. 4 Shown, by Metropolitan Area Network (MAN) 415 and interchanger 414, micro-base station 402 is built with security gateway 406 (being properly termed as the first security gateway) The first secure tunnel 431 is found.First secure tunnel is similar with mentioned-above secure tunnel.Dns server 416 is for mentioning For domain name supervising service.Traffic statistics server 417 is for counting flow information.Video server 418 is for providing video counts According to.
In some embodiments, as shown in figure 4, the system can also include: that gateway 420, security gateway 422 (can claim For the second security gateway), MME 424 and SAE-GW (System Architecture Evolution Gateway, system tray Structure evolution gateway) 426.Here the second secure tunnel 432 is established between gateway 420 and security gateway 422.Micro-base station is by building Vertical the first secure tunnel 431 and the second secure tunnel 432 is connected to wireless access network (IP-RAN), is then attached to MME 424 and SAE-GW 426, thus core network access 408.
In addition, as shown in figure 4, having also set up third secure tunnel between apps server 410 and security gateway 406 433, so as to interact.
Fig. 5 is the structure chart for schematically showing the system for opening micro-base station according to the disclosure other embodiments.It should System includes memory 510 and processor 520.Wherein:
Memory 510 can be disk, flash memory or other any non-volatile memory mediums.Memory is for storing Fig. 1 And/or the instruction in embodiment corresponding to Fig. 2.
Processor 520 is coupled to memory 510, can be used as one or more integrated circuits to implement, such as micro process Device or microcontroller.The processor 520 voluntarily opens micro-base station to realize for executing the instruction stored in memory Purpose.
It should be noted that the system in the embodiment of the present disclosure may include multiple memories 510 and multiple processors 520.Each group of memory 510 and processor 520 can be arranged in different position or equipment, thus realize Fig. 1 and/ Or the method in embodiment corresponding to Fig. 2.
It in one embodiment, can be as shown in fig. 6, the system 600 includes memory 610 and processor 620.Processing Device 620 is coupled to memory 610 by BUS bus 630.The system 600 can also be connected to outside by memory interface 640 and deposit Storage device 650 can also be connected to network or an other department of computer science to call external data by network interface 660 System (not shown), no longer describes in detail herein.
In this embodiment, it is instructed by memory stores data, then above-metioned instruction is handled by processor, to realize Voluntarily open the purpose of micro-base station.
In another embodiment, the disclosure additionally provides a kind of computer readable storage medium, is stored thereon with calculating The step of machine program instruction, which realizes the method in embodiment corresponding to Fig. 1 and/or Fig. 2 when being executed by processor.Ability Technical staff in domain is it should be appreciated that embodiment of the disclosure can provide as method, apparatus or computer program product.Therefore, originally The open form that complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used.And And the disclosure can be used and can be deposited with non-transient in the computer that one or more wherein includes computer usable program code The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
The disclosure is reference according to the method for the embodiment of the present disclosure, the flow chart of equipment (system) and computer program product And/or block diagram describes.It should be understood that each process in flowchart and/or the block diagram can be realized by computer program instructions And/or the combination of the process and/or box in box and flowchart and/or the block diagram.It can provide these computer programs to refer to Enable the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to generate One machine so that by the instruction that the processor of computer or other programmable data processing devices executes generate for realizing The device for the function of being specified in one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
So far, the disclosure is described in detail.In order to avoid covering the design of the disclosure, it is public that this field institute is not described The some details known.Those skilled in the art as described above, completely it can be appreciated how implementing technology disclosed herein Scheme.
Disclosed method and system may be achieved in many ways.For example, can by software, hardware, firmware or Software, hardware, firmware any combination realize disclosed method and system.The said sequence of the step of for the method Merely to be illustrated, the step of disclosed method, is not limited to sequence described in detail above, special unless otherwise It does not mentionlet alone bright.
Although being described in detail by some specific embodiments of the example to the disclosure, the skill of this field Art personnel it should be understood that above example merely to be illustrated, rather than in order to limit the scope of the present disclosure.The skill of this field Art personnel are it should be understood that can modify to above embodiments in the case where not departing from the scope of the present disclosure and spirit.This public affairs The range opened is defined by the following claims.

Claims (14)

1. a kind of method for opening micro-base station, comprising:
Micro-base station listens to the information of the macro base station of ambient network, and sends opening base station request message to NM server, described Opening base station request message carries the base station identification information of the micro-base station and the information of the macro base station listened to;
The NM server is authenticated according to the base station identification information in the opening base station request message, by micro- base The state parameter stood is set as opening state, according to the base station identification information and the information of macro base station setting starting ginseng Number, and opening base station response message is returned to the micro-base station, wherein opening base station response message carrying permission is described micro- The information of opening base station;
The micro-base station interacts with security gateway after obtaining the information for allowing the micro-base station to open, establishes secure tunnel;
The micro-base station is based on the secure tunnel, interacts with the NM server, obtains the start-up parameter;And
The micro-base station is according to the core net of the start-up parameter access carrier.
2. according to the method described in claim 1, wherein,
The micro-base station preserves the IP address of the NM server and the IP address of the security gateway and/domain name;
Wherein, IP address of the micro-base station based on the NM server sends opening base station request to NM server and disappears Breath;
IP address and/domain name of the micro-base station based on the security gateway are interacted with security gateway.
3. according to the method described in claim 1, wherein,
The information of the macro base station includes: the tracing area coding and pseudo noise PN code of the macro base station;
The start-up parameter includes: core network mobility management entity information, public land mobile network identity, described micro- The tracing area of base station encodes and the community configured information of the micro-base station.
4. establishing the step of secure tunnel according to the method described in claim 1, wherein, the micro-base station is interacted with security gateway Suddenly include:
The micro-base station sends security request message to security gateway, and the security request message carries the base station of the micro-base station Identification information;
The security gateway authenticates the micro-base station according to the base station identification information in the security request message, determining Secure answer message is returned to the micro-base station in the case where micro-base station is stated as legitimate base station;And
The micro-base station establishes secure tunnel after receiving the secure answer message, with the security gateway.
5. according to the method described in claim 1, further include:
After the micro-base station core network access, apps server corresponding with the micro-base station is obtained from the micro-base station The user information of the micro-base station and the data on flows information Jing Guo the micro-base station must be currently accessed.
6. according to the method described in claim 5, further include:
User terminal downloads application program module corresponding with the micro-base station;And
The user terminal is interacted by the application program module with the apps server, to be currently accessed The user information of the micro-base station and data on flows information Jing Guo the micro-base station.
7. a kind of system for opening micro-base station, comprising:
Micro-base station, the information of the macro base station for listening to ambient network, and opening base station request message is sent to NM server, The opening base station request message carries the base station identification information of the micro-base station and the information of the macro base station listened to;It is obtaining It after the information that the micro-base station must be allowed to open, is interacted with security gateway, establishes secure tunnel;Based on the secure tunnel, with The NM server interaction, obtains the start-up parameter;And according to the core net of the start-up parameter access carrier;And
The NM server, for being authenticated according to the base station identification information in the opening base station request message, by institute The state parameter for stating micro-base station is set as opening state, is opened according to the base station identification information and the setting of the information of the macro base station Dynamic parameter, and opening base station response message is returned to the micro-base station, wherein the opening base station response message, which carries, allows institute State the information that micro-base station is opened.
8. system according to claim 7, wherein
The micro-base station preserves the IP address of the NM server and the IP address of the security gateway and/domain name;
Wherein, IP address of the micro-base station based on the NM server sends opening base station request to NM server and disappears Breath;
IP address and/domain name of the micro-base station based on the security gateway are interacted with security gateway.
9. system according to claim 7, wherein
The information of the macro base station includes: the tracing area coding and pseudo noise PN code of the macro base station;
The start-up parameter includes: core network mobility management entity information, public land mobile network identity, described micro- The tracing area of base station encodes and the community configured information of the micro-base station.
10. system according to claim 7, wherein
The micro-base station is used to send security request message to security gateway, and the security request message carries the micro-base station Base station identification information;It is receiving after the secure answer message that security gateway returns, is establishing safe tunnel with the security gateway Road;
The system also includes:
The security gateway, for being authenticated according to the base station identification information in the security request message to the micro-base station, Secure answer message is returned to the micro-base station in the case where determining the micro-base station for legitimate base station.
11. system according to claim 7, further includes:
Apps server corresponding with the micro-base station, for after the micro-base station core network access, from described micro- Base station obtains the user information for being currently accessed the micro-base station and the data on flows information Jing Guo the micro-base station.
12. system according to claim 11, further includes:
User terminal passes through the application program module and institute for downloading application program module corresponding with the micro-base station Apps server interaction is stated, to obtain the user information for being currently accessed the micro-base station and by the micro-base station Data on flows information.
13. a kind of system for opening micro-base station, comprising:
Memory;And
It is coupled to the processor of the memory, the processor is configured to based on the instruction execution for being stored in the memory Method as described in claim 1 to 6 any one.
14. a kind of computer readable storage medium, is stored thereon with computer program instructions, real when which is executed by processor Now the step of method as described in claim 1 to 6 any one.
CN201711177458.4A 2017-11-23 2017-11-23 Method and system for opening micro base station Active CN109831783B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711177458.4A CN109831783B (en) 2017-11-23 2017-11-23 Method and system for opening micro base station

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711177458.4A CN109831783B (en) 2017-11-23 2017-11-23 Method and system for opening micro base station

Publications (2)

Publication Number Publication Date
CN109831783A true CN109831783A (en) 2019-05-31
CN109831783B CN109831783B (en) 2022-03-04

Family

ID=66858183

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711177458.4A Active CN109831783B (en) 2017-11-23 2017-11-23 Method and system for opening micro base station

Country Status (1)

Country Link
CN (1) CN109831783B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112105024A (en) * 2020-11-12 2020-12-18 新华三技术有限公司 Base station identity authentication method, device and equipment
CN112188529A (en) * 2020-10-22 2021-01-05 中国联合网络通信集团有限公司 Micro base station operation method and micro base station
CN112188612A (en) * 2020-10-22 2021-01-05 中国联合网络通信集团有限公司 Micro base station registration method, server and micro base station
CN112188527A (en) * 2020-10-22 2021-01-05 中国联合网络通信集团有限公司 Micro base station reward method, macro base station and micro base station management server
CN112399449A (en) * 2020-12-09 2021-02-23 中国联合网络通信集团有限公司 Base station opening method and device
CN113556740A (en) * 2020-04-07 2021-10-26 中移(成都)信息通信科技有限公司 Identity authentication system and method
CN114567548A (en) * 2022-01-26 2022-05-31 三维通信股份有限公司 Base station security gateway configuration management method, system and electronic device
WO2023103598A1 (en) * 2021-12-06 2023-06-15 中兴通讯股份有限公司 Base station activation method and apparatus, electronic device, and computer-readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101335984A (en) * 2007-06-25 2008-12-31 华为技术有限公司 Household miniature base station access control method and system
US20100041387A1 (en) * 2008-08-15 2010-02-18 Amit Khetawat Method and Apparatus for Inter Home Node B Cell Update Handling
CN102474731A (en) * 2009-08-19 2012-05-23 松下电器产业株式会社 Mobile communication system, network management apparatus, macrocell base station apparatus, and interference control method
CN102739570A (en) * 2012-06-15 2012-10-17 烽火通信科技股份有限公司 Method for opening home gateway through wireless fidelity (WiFi) of smart phone
CN104581875A (en) * 2015-01-14 2015-04-29 广州杰赛科技股份有限公司 Miniature base station accessing method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101335984A (en) * 2007-06-25 2008-12-31 华为技术有限公司 Household miniature base station access control method and system
US20100041387A1 (en) * 2008-08-15 2010-02-18 Amit Khetawat Method and Apparatus for Inter Home Node B Cell Update Handling
CN102474731A (en) * 2009-08-19 2012-05-23 松下电器产业株式会社 Mobile communication system, network management apparatus, macrocell base station apparatus, and interference control method
CN102739570A (en) * 2012-06-15 2012-10-17 烽火通信科技股份有限公司 Method for opening home gateway through wireless fidelity (WiFi) of smart phone
CN104581875A (en) * 2015-01-14 2015-04-29 广州杰赛科技股份有限公司 Miniature base station accessing method and system

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113556740A (en) * 2020-04-07 2021-10-26 中移(成都)信息通信科技有限公司 Identity authentication system and method
CN113556740B (en) * 2020-04-07 2024-03-19 中移(成都)信息通信科技有限公司 Identity authentication system and method
CN112188527A (en) * 2020-10-22 2021-01-05 中国联合网络通信集团有限公司 Micro base station reward method, macro base station and micro base station management server
CN112188612A (en) * 2020-10-22 2021-01-05 中国联合网络通信集团有限公司 Micro base station registration method, server and micro base station
CN112188612B (en) * 2020-10-22 2022-07-22 中国联合网络通信集团有限公司 Micro base station registration method, server and micro base station
CN112188527B (en) * 2020-10-22 2023-05-05 中国联合网络通信集团有限公司 Micro base station rewarding method, macro base station and micro base station management server
CN112188529B (en) * 2020-10-22 2023-05-16 中国联合网络通信集团有限公司 Micro base station operation method and micro base station
CN112188529A (en) * 2020-10-22 2021-01-05 中国联合网络通信集团有限公司 Micro base station operation method and micro base station
CN112105024A (en) * 2020-11-12 2020-12-18 新华三技术有限公司 Base station identity authentication method, device and equipment
CN112105024B (en) * 2020-11-12 2021-03-23 新华三技术有限公司 Base station identity authentication method, device and equipment
CN112399449A (en) * 2020-12-09 2021-02-23 中国联合网络通信集团有限公司 Base station opening method and device
CN112399449B (en) * 2020-12-09 2023-07-18 中国联合网络通信集团有限公司 Base station opening method and device
WO2023103598A1 (en) * 2021-12-06 2023-06-15 中兴通讯股份有限公司 Base station activation method and apparatus, electronic device, and computer-readable storage medium
CN114567548A (en) * 2022-01-26 2022-05-31 三维通信股份有限公司 Base station security gateway configuration management method, system and electronic device
CN114567548B (en) * 2022-01-26 2023-11-07 三维通信股份有限公司 Security gateway configuration management method, system and electronic device of base station

Also Published As

Publication number Publication date
CN109831783B (en) 2022-03-04

Similar Documents

Publication Publication Date Title
CN109831783A (en) Open the method and system of micro-base station
CN104486835B (en) A kind of positioner based on WAP and video monitoring
US9374840B2 (en) Verification method for the verification of a connection request from a roaming mobile entity
CN105704718A (en) Method and device for identifying pseudo base stations
CN107889194B (en) Obtain, provide method, equipment and the medium of wireless access point access information
CN101836474A (en) Self-configuring small scale base station
CN108040356A (en) Obtain, provide method, equipment and the medium of wireless access point access information
CN106101995A (en) Location-authentication method and system
CN103957580A (en) Rapid WIFI networking matching method and module for smart hardware
CN104144491B (en) A kind of method and system to the real-time positioning of WiFi terminal
CN107124715B (en) Safety protection performance evaluation method suitable for electric power wireless private network terminal
CN104661283A (en) Sharing-type wireless cell coverage method and sharing-type wireless cell coverage system
CN111770094B (en) Access control method of wireless network and related device
TW201640928A (en) User equipment, mobile hotspot equipment, backhaul device and method for establishing a path loss model database
CN108738023A (en) Prevent method, Internet of Things server and the system of internet-of-things terminal access pseudo-base station
CN107733707A (en) The multi-platform cut-in method of standard WIFI agreements
CN109587121B (en) Security policy control method and device
CN103888923A (en) Call proceeding method, system and device applied to virtual private mobile network
CN101790176B (en) Interference solution of indoor covering equipment based on cognitive technique
CN104468801A (en) Free wireless value-added platform and service method thereof
CN108419238A (en) A kind of method and device of detection rogue AP
US8170559B1 (en) Communication service handover processing system for femtocells and method thereof
CN108513297A (en) Position the method and device that wlan network mobile terminal user belongs to the positions AP
CN105659645B (en) UE authority checking method, short distance business function entity, server and system
CN104639321B (en) A kind of identity identifying method, equipment and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant