CN109996233A - A kind of communication management-control method and device - Google Patents
A kind of communication management-control method and device Download PDFInfo
- Publication number
- CN109996233A CN109996233A CN201810005578.4A CN201810005578A CN109996233A CN 109996233 A CN109996233 A CN 109996233A CN 201810005578 A CN201810005578 A CN 201810005578A CN 109996233 A CN109996233 A CN 109996233A
- Authority
- CN
- China
- Prior art keywords
- user terminal
- request
- data
- permission
- base station
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention provides a kind of communication management-control method and device, the method is applied to the first communication managing and control system, and the first communication managing and control system includes: mobile edge calculations MEC server, the first private network base station, the first user terminal and core net;The described method includes: MEC server receives the request of data of the first private network base station forwarding;Judge whether corresponding first user terminal of request of data has permission;If corresponding first user terminal of request of data has permission, request of data is sent to core net;If corresponding first user terminal of request of data does not have permission, generates request failure message and be sent to the first private network base station;First user terminal and the first private network base station are communicated using forth generation or the above order mobile communication technology of forth generation;And then the user terminal with permission can obtain corresponding data, the user terminal without permission can not obtain corresponding data, to carry out effective communication control to mobile terminal.
Description
Technical field
The present invention relates to fields of communication technology, more particularly to a kind of communication management-control method and a kind of communication control device.
Background technique
With the continuous development of network technology and terminal technology, mobile terminal is also popularized therewith, and more and more parents are
Convenience is contacted with students, is also equipped with mobile terminal for students, so that student can be used anytime and anywhere movement
Terminal makes a phone call, browses webpage, chat online;And then the study etc. of student is affected, adverse effect is caused to student, therefore need
The communication of the mobile terminal of student is managed.
School is using full system type pictorial full frequency band interference unit, although student for a kind of mode of the communication control of mobile phone at present
The communication of mobile terminal managed, but the communication of the mobile terminal of all teachers is managed, and interference unit also disturbs
Entire base station affects the non-campus user of access base station.It is that control is all installed at parent end and student side there are also a kind of mode
APP (Application, the application program) parent of type can use the time to the online of student in its terminal, access right, lead to
Words etc. are managed;But the mobile terminal of student can replace number by brush machine and manage to evade, ineffective.
Summary of the invention
The embodiment of the present invention is the technical problem to be solved is that a kind of communication management-control method is provided, to carry out mobile terminal
Effective communication control.
Correspondingly, the embodiment of the invention also provides a kind of communication control device, to guarantee the above method realization and
Using.
To solve the above-mentioned problems, the invention discloses a kind of communication management-control methods, are applied to the first communication managing and control system,
The first communication managing and control system includes: mobile edge calculations MEC server, the first private network base station, the first user terminal and core
Heart net, which comprises
MEC server receives the request of data of the first private network base station forwarding, and the request of data is the first private network base
It stands received from the first user terminal;Judge whether corresponding first user terminal of the request of data has permission;If the number
According to requesting corresponding first user terminal that there is permission, then the request of data is sent to core net, makes core net by the number
Internet is sent to according to request to obtain corresponding data;If corresponding first user terminal of the request of data does not have permission,
It then generates request failure message and is sent to first private network base station, so that first private network base station fails the request
Message is sent to the user terminal;Wherein, first user terminal and the first private network base station are mobile using forth generation
What the communication technology or the above order mobile communication technology of forth generation communicated.
Optionally, described to judge whether corresponding first user terminal of the request of data has permission, comprising: to obtain current
Time and the international mobile subscriber identity IMSI that the first user terminal is obtained from the request of data;It is asked according to the data
The IMSI and current time for seeking corresponding first user terminal, judge whether corresponding first user terminal of the request of data has power
Limit.
Optionally, the IMSI and current time according to corresponding first user terminal of the request of data, described in judgement
Whether corresponding first user terminal of request of data has permission, comprising: when judging whether the current time is in communication control
Between section;If the current time is in the communication control period, it is determined that corresponding first user terminal of the request of data does not have
It has permission;If the current time is not at the communication control period, judge the data whether are inquired from blacklist
Request the matched IMSI of IMSI of corresponding first user terminal;If inquiring the matched IMSI from blacklist, it is determined that
Corresponding first user terminal of the request of data does not have permission;If not inquiring the matched IMSI from blacklist,
Then determine that corresponding first user terminal of the request of data has permission.
Optionally, further includes: if corresponding first user terminal of the request of data has permission, the data are asked
It asks and is sent to local server, to obtain the corresponding data of the request of data from local server.
Optionally, further includes: according to the first user terminal in net information, the first user terminal of preset rules will be met
IMSI be added in the blacklist.
The embodiment of the invention also discloses a kind of communication control devices, the mobile edge applied to the first communication managing and control system
Calculate MEC server in, it is described first communication managing and control system include: mobile edge calculations MEC server, the first private network base station,
First user terminal and core net;Described device includes:
First receiving module, for receiving the request of data of the first private network base station forwarding, the request of data is described the
One private network base station is received from the first user terminal, wherein first user terminal and the first private network base station are using the
What four third-generation mobile communication technologies or the above order mobile communication technology of forth generation communicated;First judgment module, it is described for judging
Whether corresponding first user terminal of request of data has permission;First sending module, if for the request of data corresponding first
User terminal has permission, then the request of data is sent to core net, is sent to core net mutually the request of data
Networking is to obtain corresponding data;Second sending module, if not having power for corresponding first user terminal of the request of data
Limit, then generate request failure message and be sent to first private network base station, so that first private network base station is by the request
Failed message is sent to the user terminal.
Optionally, the first judgment module includes: the first acquisition submodule, for obtaining current time and from the number
According to the international mobile subscriber identity IMSI for obtaining the first user terminal in request;First permission judging submodule is used for foundation
The IMSI and current time of corresponding first user terminal of the request of data judge corresponding first user terminal of the request of data
Whether there is permission.
Optionally, the first permission judging submodule, when for judging whether the current time is in communication control
Between section;If the current time is in the communication control period, it is determined that corresponding first user terminal of the request of data does not have
It has permission;If the current time is not at the communication control period, judge the data whether are inquired from blacklist
Request the matched IMSI of IMSI of corresponding first user terminal;If inquiring the matched IMSI from blacklist, it is determined that
Corresponding first user terminal of the request of data does not have permission;If not inquiring the matched IMSI from blacklist,
Then determine that corresponding first user terminal of the request of data has permission.
Optionally, described device further include: third sending module, if whole for corresponding first user of the request of data
End has permission, then the request of data is sent to local server, to obtain the request of data pair from local server
The data answered.
Optionally, described device further include: blacklist generation module, for according to the first user terminal in net information,
The IMSI for meeting the first user terminal of preset rules is added in the blacklist.
The embodiment of the invention also discloses a kind of communication management-control method, it is applied to the second communication managing and control system, described second
Communicating managing and control system includes: the second private network base station and second user terminal, which comprises,
Second private network base station receives the access request that second user terminal is sent;Judge that the access request corresponding second is used
Whether family terminal has permission;If the access request corresponds to second user terminal with permission, redirection instruction is generated simultaneously
It is sent to the access request and corresponds to second user terminal, the redirection instruction is used to indicate the second user terminal access
Public network base station;If the access request corresponds to second user terminal without permission, generation is successfully accessed information and sending extremely
The access request corresponds to second user terminal, so as to reside in second private network base station corresponding for the second user terminal
Cell;Wherein, the second user terminal and the second private network base station are moved using Generation Mobile Telecommunication System technology or the third generation
Dynamic communication technology communication, the non-core network access in second private network base station.
Optionally, described to judge that the access request corresponds to whether user terminal has permission, comprising: to obtain current time
With the international mobile subscriber identity IMS for obtaining second user terminal from the access request;According to the access request pair
The IMSI and current time for answering second user terminal judge that the access request corresponds to whether second user terminal has permission.
Optionally, the IMSI and current time that second user terminal is corresponded to according to the access request, described in judgement
Access request corresponds to whether second user terminal has permission, comprising: when judging whether the current time is in communication control
Between section;If the current time is in the communication control period, it is determined that the access request, which corresponds to second user terminal, not to be had
It has permission;If the current time is not at the communication control period, judge the data whether are inquired from blacklist
Request the matched IMSI of IMSI of corresponding second user terminal;If inquiring the matched IMSI from blacklist, it is determined that
The access request corresponds to second user terminal without permission;If not inquiring the matched IMSI from blacklist,
Determine that the access request corresponds to second user terminal with permission.
Optionally, further includes: obtain the corresponding blacklist of second user terminal in advance.
The embodiment of the invention also discloses a kind of communication control devices, the second private network applied to the second communication managing and control system
In base station, the second communication managing and control system includes: the second private network base station and second user terminal, described device include:
Second receiving module, for receiving the access request of second user terminal transmission, wherein the second user terminal
It is to be communicated using Generation Mobile Telecommunication System technology or 3rd generation mobile communication technology with the second private network base station, described second specially
Net the non-core network access in base station;Second judgment module, for judging that the access request corresponds to whether second user terminal has
Permission;4th sending module generates redirection instruction if corresponding to second user terminal with permission for the access request
And be sent to the access request and correspond to second user terminal, the redirection instruction is used to indicate the second user terminal and connects
Enter public network base station;5th sending module, if corresponding to second user terminal without permission for the access request, generation is connect
Enter success message and be sent to the access request and correspond to second user terminal so that the second user terminal reside in it is described
The corresponding cell in second private network base station.
Optionally, second judgment module includes: the second acquisition submodule, for obtaining current time and connecing from described
Enter to obtain the international mobile subscriber identity IMS of second user terminal in request;Second permission judging submodule, for according to institute
IMSI and current time that access request corresponds to second user terminal are stated, judges that the access request corresponds to second user terminal and is
It is no that there is permission.
Optionally, the second permission judging submodule, when for judging whether the current time is in communication control
Between section;If the current time is in the communication control period, it is determined that the access request, which corresponds to second user terminal, not to be had
It has permission;If the current time is not at the communication control period, judge the data whether are inquired from blacklist
Request the matched IMSI of IMSI of corresponding second user terminal;If inquiring the matched IMSI from blacklist, it is determined that
The access request corresponds to second user terminal without permission;If not inquiring the matched IMSI from blacklist,
Determine that the access request corresponds to second user terminal with permission.
Optionally, described device further include: blacklist obtains module, corresponding black for obtaining second user terminal in advance
List.
Compared with prior art, the embodiment of the present invention includes following advantages:
The embodiment of the present invention uses the first of fourth generation mobile communication technology or the above order mobile communication technology of forth generation
User terminal, after sending request of data to corresponding first private network base station, the request of data is forwarded to by the first private network base station
In mobile edge calculations MEC server, the MEC server receives the request of data of the first private network base station forwarding, then judges
Whether corresponding first user terminal of the request of data has permission;If corresponding first user terminal of the request of data has power
Limit, then be sent to core net for the request of data, make core net that the request of data is sent to internet to obtain correspondence
Data so that the corresponding data of the request of data can be obtained with the first user terminal of permission.If the number
According to requesting corresponding first user terminal not have permission, then generates request failure message and is sent to first private network base station,
So that the request failure message is sent to the user terminal by first private network base station;So that not having permission
First user terminal can not obtain the corresponding data of the request of data;To carry out effective communication control to mobile terminal.
Detailed description of the invention
Fig. 1 is the schematic diagram that one kind first of the invention communicates managing and control system;
Fig. 2 is a kind of step process applied to communication management-control method embodiment in the first communication managing and control system of the invention
Figure;
Fig. 3 is that another kind of the invention is applied to the step of communicating management-control method embodiment in the first communication managing and control system stream
Cheng Tu;
Fig. 4 is a kind of communication management-control method embodiment step flow chart applied to the second communication managing and control system of the present invention;
Fig. 5 is the schematic diagram that one kind second of the invention communicates managing and control system;
Fig. 6 is another communication management-control method embodiment step process for being applied to the second communication managing and control system of the invention
Figure;
Fig. 7 is a kind of structural block diagram of the communication control Installation practice applied to MEC server of the present invention
Fig. 8 is the structural block diagram of another communication control Installation practice for being applied to MEC server of the invention;
Fig. 9 is a kind of structural block diagram of the communication control Installation practice applied to the second private network base station of the present invention;
Figure 10 is the structural block diagram of another communication control Installation practice for being applied to the second private network base station of the invention.
Specific embodiment
In order to make the foregoing objectives, features and advantages of the present invention clearer and more comprehensible, with reference to the accompanying drawing and specific real
Applying mode, the present invention is described in further detail.
The embodiment of the present invention can pre-establish private network base station, accurately covered using private network base station and need to carry out communication tube
The region of control, wherein inter-frequency networking can be used in the private network base station, to reduce the interference to public network signal of communication, the public network
Refer to the network of other base stations (i.e. public network base station) composition in addition to private network base station;In addition, the frequency point of the private network base station may be used also
To be configured to the high frequency point of priority, so that priority access private network base station simultaneously resides in after user enters communication control region
The corresponding cell in private network base station;So that user terminal is communicated with private network base station.
One of the core concepts of the embodiments of the present invention is, after receiving the request of user terminal, can to it is described request into
Row analysis, judges whether the corresponding user terminal of the request has permission;If described request corresponding user terminal to have power
Limit, then allow the user terminal to be communicated, if the corresponding user terminal of the request of data does not have permission, does not allow
The user terminal is communicated;The communication of user terminal is managed to realize.
The communication management-control method that the embodiment of the present invention proposes, can be to the user using the communication of low order mobile communication network technology
Terminal carries out communication control, can also carry out communication control to the user terminal using the communication of high-order mobile communication network technology;
Wherein, the high-order mobile communication network technology may include forth generation and the above order mobile communication technology, such as 4G (the
4th Generation communication system, the 4th third-generation mobile communication technology), 4.5G, 5G, 6G etc., it is described low
Rank mobile communication network technology may include Generation Mobile Telecommunication System technology and 3rd generation mobile communication technology;The order is basis
What the developing stage of mobile communication technology determined, e.g., the corresponding order of Generation Mobile Telecommunication System technology is 2 ranks, and the third generation is mobile
The corresponding order of the communication technology is 3 ranks, and the corresponding order of fourth generation mobile communication technology is 4 ranks, the 5th third-generation mobile communication technology
Corresponding order is 5 ranks etc..
Wherein, the embodiment of the present invention, which is directed to, uses fourth generation mobile communication technology or the above order mobile communication skill of forth generation
The user terminal of art communication, proposes a kind of communication management-control method, to realize to the logical of such user terminal in telecommunication management region
Letter is managed;And it is whole also directed to the user communicated using Generation Mobile Telecommunication System technology or 3rd generation mobile communication technology
End, proposes a kind of communication management-control method, is managed with realizing to the communication of such user terminal in telecommunication management region.
To using fourth generation mobile communication technology or the user terminal of forth generation above order mobile communication technology communication into
The method of row communication control is as follows:
Wherein, the user that can will be communicated using fourth generation mobile communication technology or the above order mobile communication technology of forth generation
Terminal is known as the first user terminal, can be described as the first private network base station, i.e. institute with the private network base station of first user terminal communication
Stating the first private network base station is also to be communicated using fourth generation mobile communication technology or the above order mobile communication technology of forth generation.
The communication management-control method of the embodiment of the present invention is applied in the first communication managing and control system, as shown in Figure 1, described the
One communication managing and control system include the mobile edge calculations server of MEC (Mobile Edge Computing, mobile edge calculations),
First private network base station, the first user terminal and core net, the core net include MME (Mobility Management
Entity, key control node), S-GW (Serving GateWay, gateway) and P-GW (Packet Data Network
Gate Way, packet data gateway).Wherein, first private network base station is connect with MEC server by aggregation node, with MEC
Server carries out the interaction of business datum (such as data service, voice service), can also be connect by aggregation node with MME,
Signalling exchange is carried out with MME;The MEC server is connect with S-GW, and P-GW is connect with internet.
Referring to Fig. 2, one kind of the invention is shown applied to communication management-control method embodiment in the first communication managing and control system
Step flow chart, can specifically include following steps:
Step 201, MEC server receive the request of data of the first private network base station forwarding, and the request of data is described the
One private network base station is received from the first user terminal.
In the embodiment of the present invention, after the first user terminal enters communication control region, that is, the first private network base station pair can access
The cell answered, and then can be communicated with first private network base station;First user terminal can be according to the instruction of corresponding user
It such as browses the instruction of webpage, instruction of making a phone call, generates corresponding request of data, and the request of data is sent to correspondence
The first private network base station;After first private network base station receives the request of data of first user terminal, the data can be asked
It asks and is forwarded to aggregation node, the request of data is sent to the MEC server by aggregation node;And then the MEC service
Device can receive the request of data.
Step 202 judges whether corresponding first user terminal of the request of data has permission.
After the MEC server receives the request of data, the request of data can be analyzed, then to described
Corresponding first user terminal of request of data is verified, and judges whether corresponding first user terminal of the request of data has power
Limit;If corresponding first user terminal of the request of data has permission, allow corresponding first user of the request of data whole
End is communicated, and step 203 can be performed, if corresponding first user terminal of the request of data does not have permission, does not allow institute
It states corresponding first user terminal of request of data to be communicated, step 204 can be performed.
The request of data is sent to core net by step 203, makes core net that the request of data is sent to internet
To obtain corresponding data.
It, can be by the data when MEC server determines that corresponding first user terminal of the request of data has permission
Request is sent to core net, and the request of data can be sent to internet to obtain corresponding data by core net.Specifically,
The request of data is sent to S-GW by MEC server, and the data are sent to P-GW by S-GW, and P-GW again asks the data
It asks and is sent in internet;After internet receives the request of data, the corresponding data of the request of data can be searched, and will
The corresponding data return to the P-GW, and then the corresponding data are returned to S-GW again by P-GW, and S-GW will be described
Corresponding data return to MEC server, and the corresponding data are returned to the first private network base station by MEC server, finally by
The corresponding data of the request of data are returned to corresponding first user terminal of the request of data by the first private network base station;Into
And first user terminal is able to carry out communication.
Certainly, if the request of data is the request of data of voice service, core net receives the transmission of MEC server
After request of data, the request of data can be sent to IMS system (IP MultimediaSubsystem, IP multimedia subsystem
System), to establish corresponding voice pathway for first user terminal.
Step 204 generates request failure message and is sent to first private network base station, so that first private network base station
The request failure message is sent to the user terminal.
It, can be according to described when the MEC server determines that corresponding first user terminal of the request of data does not have permission
Request of data generates corresponding request failure message, and the request failure message is then sent to first private network base station,
Then the request failure message is sent to corresponding first user terminal again by first private network base station;And then first use
Family terminal can not obtain corresponding data, communication failure.
The embodiment of the present invention is used using fourth generation mobile communication technology or the above order mobile communication technology of forth generation
First user terminal, after sending request of data to corresponding first private network base station, the first private network base station turns the request of data
It is sent in mobile edge calculations server, the MEC server receives the request of data of the first private network base station forwarding, then judges
Whether corresponding first user terminal of the request of data has permission;If corresponding first user terminal of the request of data has power
Limit, then be sent to core net for the request of data, make core net that the request of data is sent to internet to obtain correspondence
Data so that the corresponding data of the request of data can be obtained with the first user terminal of permission.If the number
According to requesting corresponding first user terminal not have permission, then generates request failure message and is sent to first private network base station,
So that the request failure message is sent to the user terminal by first private network base station;So that not having permission
First user terminal can not obtain the corresponding data of the request of data;To carry out effective communication control to mobile terminal.
In another embodiment of the invention, the MEC server has self-learning capability, can be according to the first user terminal
In net information, IMSI (the InternationalMobile Subscriber of the user terminal of preset rules will be met
Identification Number, international mobile subscriber identity) it is added in the blacklist;Wherein, in the blacklist
Corresponding first user terminal of IMSI is without permission, and the preset rules can be arranged as desired, such as according to communication tube
Control the regulation setting in region.Specifically, available each first user terminal of MEC server in net information, it is described
Net information may include much information such as in net time, the site information accessed;Then it is directed to each first user terminal,
It is compared in net information with corresponding preset rules, judges whether first user's meets default rule in net information
Then, if first user terminal meets preset rules in net information, it is determined that first user terminal needs to carry out communication tube
The user terminal of system can obtain the IMSI of first user terminal, and the IMSI is added in blacklist.If first user
Terminal is unsatisfactory for preset rules in net information, it is determined that the user that first user terminal does not need to carry out communication control is whole
End, can continue to judge next first user terminal;It is subsequent in turn that user's end can be judged according to the IMSI in blacklist
Whether end has permission.
For example, the regulation students of certain Middle School, which in afternoon on every Fridays, need to log in campus network, updates journal, then in advance
If rule can be Friday afternoon and log in campus network;Therefore MEC server can obtain website that each first user terminal logs in and
Corresponding login time, and then judge whether first user terminal has logged in campus network in Friday afternoon;If so, determine this
The corresponding user of one user terminal is student, then the IMSI of first user terminal can be added into blacklist, if it is not, then
Determine that the corresponding user of the first user terminal is not student, it can be without being added the IMSI of first user terminal to blacklist
In.
Certainly, if the first user terminal with permission is relatively fewer, or, relatively fixed as (user of teaching and administrative staff is whole
End), then the IMSI of these the first user terminals can be added in white list, then white list is saved to the MEC and is serviced
In device, corresponding first user terminal of IMSI has permission in the white list.The MEC server of the embodiment of the present invention,
The corresponding user terminal of the first user terminal such as parent that will can also enter once in a while communication control region, as in gray list
First user terminal, corresponding first user terminal of IMSI is also to have permission in the gray list.
Referring to Fig. 3, the communication management-control method for showing another kind of the invention applied to the first communication managing and control system is implemented
Example flow chart of steps, specifically comprises the following steps:
Step 301, MEC server receive the request of data of the first private network base station forwarding.
The MEC server receives the request of data of the first private network base station forwarding by aggregation node, then can be to described
Request of data is analyzed, to judge whether corresponding first user terminal of the request of data has permission;It is specific as follows:
Step 302 obtains current time and obtains the international mobile subscriber of the first user terminal from the request of data
Identification code IMSI.
In the embodiment of the present invention, communication control region may have the communication control period, within the communication control period such as
Test time section, regardless of whether being that IMSI corresponds to the first user terminal in blacklist, which manages all first in region
The communication of user terminal requires to manage, and within the non-communicating control period, then IMSI corresponding first is used only in blacklist
Family terminal needs to manage, wherein the communication control period can be arranged as desired, and such as communication control region is campus, lead to
The fuse tube control period can be the test time;Therefore the MEC server, can be from the data after obtaining the request of data
The IMSI of the first user terminal is obtained in request, and obtains current time, according to corresponding first user of the request of data
The IMSI and current time of terminal, judge whether corresponding first user terminal of the request of data has permission, specific as follows:
Step 303 judges whether the current time is in the communication control period.
It can first judge whether the current time is in the communication control period, if the current time is in communication control
In period, it may be determined that the communication manages all first user terminals in region without permission, and step 306 can be performed;If institute
It states current time to be not in the communication control time, then corresponding first user terminal of IMSI needs communication tube only in blacklist
Control, therefore can determine whether corresponding first user terminal of the request of data, if it is IMSI corresponding first in the blacklist
Step 304 can be performed in user terminal.
Step 304 judges IMSI that corresponding first user terminal of the request of data whether is inquired from blacklist
The IMSI matched.
The IMSI that corresponding first user terminal of the request of data can be used is compared with IMSI each in blacklist, judges
The matched IMSI of IMSI of corresponding first user terminal of the request of data whether is inquired from blacklist;If from blacklist
The matched IMSI is inquired, that is, determines that corresponding first user terminal of the request of data does not have permission, then step can be performed
Rapid 306;If not inquiring the matched IMSI from blacklist, it may be determined that the corresponding first user terminal tool of the request of data
It has permission, then step 305 can be performed.
The request of data is sent to core net by step 305.
It, can be by the data when MEC server determines that corresponding first user terminal of the request of data has permission
Request is sent to core net, is sent to core net in internet the request of data, and then from internet described in acquisition
The corresponding data of request of data, and the MEC server is returned to, the MEC server can be corresponding by the request of data
Data are sent to corresponding first user terminal of the request of data by the first private network base station;To the first user terminal energy
Enough communication.
Optionally, in another embodiment of the invention, the MEC server can also connect such as school with local server
Garden server, and then when the MEC server determines that corresponding first user terminal of the request of data has permission, can also will
The request of data is sent to local server, to obtain corresponding data from local server;To realize local service
It shunts.
Step 306 generates request failure message and is sent to first private network base station.
It, can be according to described when the MEC server determines that corresponding first user terminal of the request of data does not have permission
Request of data generates corresponding request failure message, and the request failure message is then sent to first private network base station,
The request failure message can be forwarded to corresponding first user terminal of the request of data by first private network base station;In turn
First user terminal can not be communicated.
To sum up, the embodiment of the present invention is using fourth generation mobile communication technology or the above order mobile communication technology of forth generation
First user terminal, after sending request of data to corresponding first private network base station, the first private network base station turns the request of data
It is sent in mobile edge calculations server, the MEC server receives the request of data of the first private network base station forwarding, then judges
Whether corresponding first user terminal of the request of data has permission;If corresponding first user terminal of the request of data has power
Limit, then be sent to core net for the request of data, make core net that the request of data is sent to internet to obtain correspondence
Data so that the corresponding data of the request of data can be obtained with the first user terminal of permission.If the number
According to requesting corresponding first user terminal not have permission, then generates request failure message and is sent to first private network base station,
So that the request failure message is sent to the user terminal by first private network base station;So that not having permission
First user terminal can not obtain the corresponding data of the request of data;To carry out effective communication control to mobile terminal.
Further, the embodiment of the present invention judges whether corresponding first user terminal of the request of data has permission described
When, it can first judge whether current time was in the control period, when determining that current time was not in the control period,
Judge whether the IMSI of corresponding first user terminal of the request of data is IMSI in blacklist;And then in addition to can be to black name
Corresponding first user terminal of IMSI carries out the control period can also being arranged, in the control period outside communication control in list
All first user terminals carry out communication control, thus meet different communication control region individual demand.
Again, the MEC, can be by the data when determining that corresponding first user terminal of the request of data has permission
Request is sent to local server, to obtain the corresponding data of the request of data from local server, to realize business
It shunts.
Communication tube is carried out to the user terminal communicated using Generation Mobile Telecommunication System technology or 3rd generation mobile communication technology
The method of control is as follows:
Wherein, the user terminal communicated using Generation Mobile Telecommunication System technology or 3rd generation mobile communication technology can be known as
Second user terminal, the private network base station communicated with the second user terminal can be described as the second private network base station, i.e., described second specially
Net base station is also to be communicated using Generation Mobile Telecommunication System technology or 3rd generation mobile communication technology.In the embodiment of the present invention, institute
Stating the second private network base station is pseudo-base station, i.e., does not connect with core net, and it is corresponding small that second user terminal accesses the second private network base station
Qu Hou, can not obtain business datum can not such as surf the Internet, can not make a phone call etc..
Referring to Fig. 4, a kind of communication management-control method embodiment step applied to the second communication managing and control system of the present invention is shown
Rapid flow chart, can specifically include following steps:
Step 401, the second private network base station receive the access request that second user terminal is sent.
Step 402 judges that the access request corresponds to whether second user terminal has permission.
The communication management-control method of the embodiment of the present invention is applied to the second communication managing and control system, as shown in figure 5, described second
Communicating managing and control system includes: the second private network base station and second user terminal.It, can after second user terminal enters communication control region
Access request is sent to the second private network base station, second private network base station is accessed with request.Then second private network base station can
The access request that second user terminal is sent is received, and the access request can be analyzed, judges the access request pair
Answer whether second user terminal has permission.
If the access request corresponds to second user terminal with permission, due to second private network base station not with core net
Connection, can not be communicated, therefore can indicate that the second user terminal accesses public network base station, so that the second user terminal passes through
Public network base station carries out subsequent communication, then step 403 can be performed.If the access request, which corresponds to second user terminal, does not have power
Limit, then can allow the second user terminal to reside in the corresponding cell in second private network base station, i.e., executable step 404.
Step 403, generation, which redirect to instruct and be sent to the access request, corresponds to second user terminal, the redirection
Instruction is used to indicate second user terminal access public network base station.
It, can be according to public network when second private network base station determines that the access request corresponds to second user terminal with permission
The corresponding frequency point in base station generates and redirects instruction, and the redirection instruction is used to indicate the second user terminal access public network
Base station;Then redirection instruction is sent to the access request and corresponds to second user terminal, which connects
After receiving the redirection instruction, it can be instructed according to the redirection and access to the corresponding cell in public network base station;And then it is subsequent can
The corresponding data of communication acquisition are carried out with public network base station.
Step 404, generation are successfully accessed information and sending to the access request and correspond to second user terminal, so that described
Second user terminal resides in the corresponding cell in the private network base station.
When second private network base station determines that the access request corresponds to second user terminal without permission, produces and connect
Enter success message, then by it is described be successfully accessed message and be sent to the access request correspond to second user terminal, should with notice
Second user terminal is successfully accessed the corresponding cell in the second private network base station;The second user terminal receives described be successfully accessed and disappears
After breath, the corresponding cell in the second private network base station can reside in, at this point, the second user can not pass through the acquisition pair of the second private network base station
The business datum answered.
To sum up, the embodiment of the present invention is using Generation Mobile Telecommunication System technology or the second user of 3rd generation mobile communication technology
Terminal, after sending access request to corresponding second private network base station, the second private network base station receives the access request, then judges
The access request corresponds to whether second user terminal has permission;If the access request, which corresponds to second user terminal, has power
Limit then generates redirection and instructs and be sent to the access request and correspond to second user terminal, so that having the of permission
Two user terminals have access to the corresponding cell in public network base station, obtain corresponding business datum subsequently through public network base station.If institute
It states access request and corresponds to second user terminal without permission, then generate and be successfully accessed information and sending to the access request pair
Second user terminal is answered, so that the second user terminal resides in the corresponding cell in the private network base station;Wherein, described second
Private network base station is not no core network access, so that correspondence can not be obtained in candidate by not having the second user terminal of permission
Business datum;To carry out effective communication control to mobile terminal.
Referring to Fig. 6, another communication management-control method embodiment for being applied to the second communication managing and control system of the invention is shown
Flow chart of steps specifically includes:
Step 601 obtains the corresponding blacklist of second user terminal in advance.
The embodiment of the present invention can pre-generate the corresponding blacklist of second user terminal, then be allocated to the blacklist
Second private network base station, and then second private network base station can get the corresponding list of second user terminal, according to institute
State the permission that blacklist judges second user terminal.
Step 602, the second private network base station receive the access request that second user terminal is sent.
After second user terminal enters communication control region, access request can be sent to the second private network base station, be connect with request
Enter second private network base station.Then second private network base station can receive the access request that second user terminal is sent, and can
The access request is analyzed, judges that the access request corresponds to whether second user terminal has permission.
Step 603, the international mobile subscriber for obtaining current time and obtaining second user terminal from the access request
Identification code IMS.
Step 604 is similar with above-mentioned steps 302, and details are not described herein;It then can be according to the access request corresponding second
The IMSI and current time of user terminal judge that the access request corresponds to whether second user terminal has permission;Specifically such as
Under:
Step 604 judges whether the current time is in the communication control period;If so, 607 are thened follow the steps, if
It is no, then follow the steps 605.
Step 605 judges IMSI that the request of data corresponds to second user terminal whether is inquired from blacklist
The IMSI matched;If so, 607 are thened follow the steps, if it is not, thening follow the steps 606.
Wherein, step 604- step 605, similar with above-mentioned steps 203- step 204, details are not described herein.
Step 606, generation, which redirect to instruct and be sent to the access request, corresponds to second user terminal.
It, can be according to public network when second private network base station determines that the access request corresponds to second user terminal with permission
The corresponding frequency point in base station generates and redirects instruction, and redirection instruction is sent to the access request corresponding second and is used
Family terminal;After the second user terminal receives the redirection instruction, it can be instructed according to the redirection and access to public network base station
Corresponding cell;And then the corresponding data of communication acquisition can be carried out with public network base station subsequent.
Step 607, generation are successfully accessed information and sending to the access request and correspond to second user terminal.
When second private network base station determines that the access request corresponds to second user terminal without permission, produces and connect
Enter success message, then by it is described be successfully accessed message and be sent to the access request correspond to second user terminal, should with notice
Second user terminal is successfully accessed the corresponding cell in the second private network base station;The second user terminal receives described be successfully accessed and disappears
After breath, the corresponding cell in the second private network base station can reside in, at this point, the second user can not pass through the acquisition pair of the second private network base station
The business datum answered.
To sum up, the embodiment of the present invention is using Generation Mobile Telecommunication System technology or the second user of 3rd generation mobile communication technology
Terminal, after sending access request to corresponding second private network base station, the second private network base station receives the access request, then judges
The access request corresponds to whether second user terminal has permission;If the access request, which corresponds to second user terminal, has power
Limit then generates redirection and instructs and be sent to the access request and correspond to second user terminal, so that having the of permission
Two user terminals have access to the corresponding cell in public network base station, obtain corresponding business datum subsequently through public network base station.If institute
It states access request and corresponds to second user terminal without permission, then generate and be successfully accessed information and sending to the access request pair
Second user terminal is answered, so that the second user terminal resides in the corresponding cell in the private network base station;Wherein, described second
Private network base station is not no core network access, so that correspondence can not be obtained in candidate by not having the second user terminal of permission
Business datum;To carry out effective communication control to mobile terminal.
Further, the embodiment of the present invention judges that the access request corresponds to whether second user terminal has permission described
When, it can first judge whether current time was in the control period, when determining that current time was not in the control period,
Whether the IMSI for judging that the access request corresponds to second user terminal is IMSI in blacklist;And then in addition to can be to black name
The corresponding second user terminal of IMSI carries out the control period can also being arranged, in the control period outside communication control in list
All second user terminals carry out communication control, thus meet different communication control region individual demand.
It should be noted that for simple description, therefore, it is stated as a series of action groups for embodiment of the method
It closes, but those skilled in the art should understand that, embodiment of that present invention are not limited by the describe sequence of actions, because according to
According to the embodiment of the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also should
Know, the embodiments described in the specification are all preferred embodiments, and the related movement not necessarily present invention is implemented
Necessary to example.
Referring to Fig. 7, a kind of structural frames of the communication control Installation practice applied to MEC server of the present invention are shown
Figure, can specifically include following module:
First receiving module 701, for receiving the request of data of the first private network base station forwarding, the request of data is described
First private network base station is received from the first user terminal, wherein first user terminal and the first private network base station are to use
What fourth generation mobile communication technology or the above order mobile communication technology of forth generation communicated;
First judgment module 702, for judging whether corresponding first user terminal of the request of data has permission;
First sending module 703, if there is permission for corresponding first user terminal of the request of data, by the number
It is sent to core net according to request, makes core net that the request of data is sent to internet to obtain corresponding data;
Second sending module 704, if not having permission for corresponding first user terminal of the request of data, generation is asked
It seeks failed message and is sent to first private network base station, so that first private network base station sends the request failure message
To the user terminal.
Referring to Fig. 8, the structural frames of another communication control Installation practice for being applied to MEC server of the invention are shown
Figure, of the invention one optionally in embodiment, described device further includes following module:
Third sending module 705 will be described if having permission for corresponding first user terminal of the request of data
Request of data is sent to local server, to obtain the corresponding data of the request of data from local server.
Blacklist generation module 706, for according to the first user terminal, in net information, the first of preset rules will to be met
The IMSI of user terminal is added in the blacklist.
In an alternative embodiment of the invention, the first judgment module 702 includes following submodule:
First acquisition submodule 7021, for obtaining current time and obtaining from the request of data the first user terminal
International mobile subscriber identity IMSI;
First permission judging submodule 7022 for the IMSI according to corresponding first user terminal of the request of data and is worked as
The preceding time, judge whether corresponding first user terminal of the request of data has permission.
In an alternative embodiment of the invention, the first permission judging submodule 7022 is described current for judging
Whether the time is in the communication control period;If the current time is in the communication control period, it is determined that the data are asked
Corresponding first user terminal is asked not have permission;If the current time is not at the communication control period, judge from black name
Whether the IMSI matched IMSI of the request of data corresponding first user terminal is inquired in list;If being inquired from blacklist
The matched IMSI, it is determined that corresponding first user terminal of the request of data does not have permission;If from blacklist not
Inquire the matched IMSI, it is determined that corresponding first user terminal of the request of data has permission.
The embodiment of the present invention uses the first of fourth generation mobile communication technology or the above order mobile communication technology of forth generation
User terminal, after sending request of data to corresponding first private network base station, the request of data is forwarded to by the first private network base station
In mobile edge calculations server, the MEC server receives the request of data of the first private network base station forwarding, then described in judgement
Whether corresponding first user terminal of request of data has permission;If corresponding first user terminal of the request of data has permission,
The request of data is then sent to core net, makes core net that the request of data is sent to internet to obtain corresponding number
According to so that the first user terminal with permission can obtain the corresponding data of the request of data.If the data are asked
It asks corresponding first user terminal not have permission, then generates request failure message and be sent to first private network base station, so that
The request failure message is sent to the user terminal by first private network base station;So that not having the first of permission
User terminal can not obtain the corresponding data of the request of data;To carry out effective communication control to mobile terminal.
Referring to Fig. 9, a kind of structure of the communication control Installation practice applied to the second private network base station of the present invention is shown
Block diagram can specifically include following module:
Second receiving module 901, for receiving the access request of second user terminal transmission, wherein the second user
Terminal and the second private network base station are communicated using Generation Mobile Telecommunication System technology or 3rd generation mobile communication technology, described the
The two non-core network access in private network base station;
Second judgment module 902, for judging that the access request corresponds to whether second user terminal has permission;
4th sending module 903, if corresponding to second user terminal with permission for the access request, generation is reset
Second user terminal is corresponded to instructing and being sent to the access request, the redirection instruction is used to indicate the second user
Terminal accesses public network base station;
5th sending module 904, if corresponding to second user terminal without permission for the access request, generation is connect
Enter success message and be sent to the access request and correspond to second user terminal so that the second user terminal reside in it is described
The corresponding cell in second private network base station.
Referring to Fig.1 0, show the knot of another communication control Installation practice for being applied to the second private network base station of the invention
Structure block diagram, in an alternative embodiment of the invention, described device further include:
Blacklist obtains module 905, for obtaining the corresponding blacklist of second user terminal in advance.
In an alternative embodiment of the invention, second judgment module 902 includes following submodule:
Second acquisition submodule 9021, for obtaining current time and the acquisition second user terminal from the access request
International mobile subscriber identity IMS;
Second permission judging submodule 9022, for corresponding to the IMSI of second user terminal according to the access request and working as
The preceding time judges that the access request corresponds to whether second user terminal has permission.
In an alternative embodiment of the invention, the second permission judging submodule 9022 is described current for judging
Whether the time is in the communication control period;If the current time is in the communication control period, it is determined that the access is asked
Corresponding second user terminal is asked not have permission;If the current time is not at the communication control period, judge from black name
Whether IMSI matched IMSI that the request of data correspond to second user terminal is inquired in list;If being inquired from blacklist
The matched IMSI, it is determined that the access request corresponds to second user terminal without permission;If not looked into from blacklist
Ask the matched IMSI, it is determined that the access request corresponds to second user terminal with permission.
To sum up, the embodiment of the present invention is using Generation Mobile Telecommunication System technology or the second user of 3rd generation mobile communication technology
Terminal, after sending access request to corresponding second private network base station, the second private network base station receives the access request, then judges
The access request corresponds to whether second user terminal has permission;If the access request, which corresponds to second user terminal, has power
Limit then generates redirection and instructs and be sent to the access request and correspond to second user terminal, so that having the of permission
Two user terminals have access to the corresponding cell in public network base station, obtain corresponding business datum subsequently through public network base station.If institute
It states access request and corresponds to second user terminal without permission, then generate and be successfully accessed information and sending to the access request pair
Second user terminal is answered, so that the second user terminal resides in the corresponding cell in the private network base station;Wherein, described second
Private network base station is not no core network access, so that correspondence can not be obtained in candidate by not having the second user terminal of permission
Business datum;To carry out effective communication control to mobile terminal.
For device embodiment, since it is basically similar to the method embodiment, related so being described relatively simple
Place illustrates referring to the part of embodiment of the method.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with
The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
It should be understood by those skilled in the art that, the embodiment of the embodiment of the present invention can provide as method, apparatus or calculate
Machine program product.Therefore, the embodiment of the present invention can be used complete hardware embodiment, complete software embodiment or combine software and
The form of the embodiment of hardware aspect.Moreover, the embodiment of the present invention can be used one or more wherein include computer can
With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code
The form of the computer program product of implementation.
The embodiment of the present invention be referring to according to the method for the embodiment of the present invention, terminal device (system) and computer program
The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions
In each flow and/or block and flowchart and/or the block diagram in process and/or box combination.It can provide these
Computer program instructions are set to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals
Standby processor is to generate a machine, so that being held by the processor of computer or other programmable data processing terminal devices
Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram
The device of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing terminal devices
In computer-readable memory operate in a specific manner, so that instruction stored in the computer readable memory generates packet
The manufacture of command device is included, which realizes in one side of one or more flows of the flowchart and/or block diagram
The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing terminal devices, so that
Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus
The instruction executed on computer or other programmable terminal equipments is provided for realizing in one or more flows of the flowchart
And/or in one or more blocks of the block diagram specify function the step of.
Although the preferred embodiment of the embodiment of the present invention has been described, once a person skilled in the art knows bases
This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as
Including preferred embodiment and fall into all change and modification of range of embodiment of the invention.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap
Those elements are included, but also including other elements that are not explicitly listed, or further includes for this process, method, article
Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited
Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device for including the element.
Above to a kind of communication management-control method provided by the present invention and a kind of communication control device, detailed Jie has been carried out
It continues, used herein a specific example illustrates the principle and implementation of the invention, and the explanation of above embodiments is only
It is to be used to help understand method and its core concept of the invention;At the same time, for those skilled in the art, according to this hair
Bright thought, there will be changes in the specific implementation manner and application range, in conclusion the content of the present specification should not manage
Solution is limitation of the present invention.
Claims (18)
1. a kind of communication management-control method, which is characterized in that be applied to the first communication managing and control system, the first communication managing and control system
It include: mobile edge calculations MEC server, the first private network base station, the first user terminal and core net, which comprises
MEC server receives the request of data of the first private network base station forwarding, the request of data be first private network base station from
First user terminal is received;
Judge whether corresponding first user terminal of the request of data has permission;
If corresponding first user terminal of the request of data has permission, the request of data is sent to core net, makes core
The request of data is sent to internet to obtain corresponding data by heart net;
If corresponding first user terminal of the request of data does not have permission, generates request failure message and be sent to described the
One private network base station, so that the request failure message is sent to the user terminal by first private network base station;
Wherein, first user terminal and the first private network base station are using more than fourth generation mobile communication technology or forth generation
The communication of order mobile communication technology.
2. the method according to claim 1, wherein corresponding first user terminal of the judgement request of data
Whether there is permission, comprising:
It obtains current time and obtains the international mobile subscriber identity IMSI of the first user terminal from the request of data;
According to the IMSI and current time of corresponding first user terminal of the request of data, the request of data corresponding first is judged
Whether user terminal has permission.
3. according to the method described in claim 2, it is characterized in that, described according to corresponding first user terminal of the request of data
IMSI and current time, judge whether corresponding first user terminal of the request of data has permission, comprising:
Judge whether the current time is in the communication control period;
If the current time is in the communication control period, it is determined that corresponding first user terminal of the request of data does not have
Permission;
If the current time is not at the communication control period, judge the request of data whether is inquired from blacklist
The matched IMSI of IMSI of corresponding first user terminal;
If inquiring the matched IMSI from blacklist, it is determined that corresponding first user terminal of the request of data does not have
It has permission;
If not inquiring the matched IMSI from blacklist, it is determined that the corresponding first user terminal tool of the request of data
It has permission.
4. the method according to claim 1, wherein further include:
If corresponding first user terminal of the request of data has permission, the request of data is sent to local service
Device, to obtain the corresponding data of the request of data from local server.
5. the method according to claim 1, wherein further include:
According to the first user terminal in net information, the IMSI for meeting the first user terminal of preset rules is added to described black
In list.
6. a kind of communication management-control method, which is characterized in that be applied to the second communication managing and control system, the second communication managing and control system
It include: the second private network base station and second user terminal, which comprises, the second private network base station receives second user terminal hair
The access request sent;
Judge that the access request corresponds to whether second user terminal has permission;
If the access request corresponds to second user terminal with permission, generates redirection instruction and be sent to the access and ask
Corresponding second user terminal is sought, the redirection instruction is used to indicate second user terminal access public network base station;
If the access request corresponds to second user terminal without permission, generation is successfully accessed information and sending and connects to described
Enter and request corresponding second user terminal, so that the second user terminal resides in the corresponding cell in second private network base station;
Wherein, the second user terminal and the second private network base station are mobile using Generation Mobile Telecommunication System technology or the third generation
Communication technology communication, the non-core network access in second private network base station.
7. according to the method described in claim 6, it is characterized in that, described judge whether the access request corresponds to user terminal
With permission, comprising:
It obtains current time and obtains the international mobile subscriber identity IMS of second user terminal from the access request;
The IMSI and current time that second user terminal is corresponded to according to the access request judge the access request corresponding second
Whether user terminal has permission.
8. the method according to the description of claim 7 is characterized in that described correspond to second user terminal according to the access request
IMSI and current time, judge that the access request corresponds to whether second user terminal has permission, comprising:
Judge whether the current time is in the communication control period;
If the current time is in the communication control period, it is determined that the access request, which corresponds to second user terminal, not to be had
Permission;
If the current time is not at the communication control period, judge the request of data whether is inquired from blacklist
The matched IMSI of IMSI of corresponding second user terminal;
If inquiring the matched IMSI from blacklist, it is determined that the access request, which corresponds to second user terminal, not to be had
Permission;
If not inquiring the matched IMSI from blacklist, it is determined that the access request, which corresponds to second user terminal, to be had
Permission.
9. according to the method described in claim 6, it is characterized by further comprising:
The corresponding blacklist of second user terminal is obtained in advance.
10. a kind of communication control device, which is characterized in that the mobile edge calculations MEC clothes applied to the first communication managing and control system
It is engaged in device, the first communication managing and control system includes: mobile edge calculations MEC server, the first private network base station, the first user end
End and core net;Described device includes:
First receiving module, for receiving the request of data of the first private network base station forwarding, the request of data is described first special
It is received from the first user terminal to net base station, wherein first user terminal and the first private network base station are using forth generation
What mobile communication technology or the above order mobile communication technology of forth generation communicated;
First judgment module, for judging whether corresponding first user terminal of the request of data has permission;
First sending module, if there is permission for corresponding first user terminal of the request of data, by the request of data
It is sent to core net, makes core net that the request of data is sent to internet to obtain corresponding data;
Second sending module generates request failure if not having permission for corresponding first user terminal of the request of data
Information and sending to first private network base station so that first private network base station request failure message is sent to it is described
User terminal.
11. device according to claim 10, which is characterized in that the first judgment module includes:
First acquisition submodule is moved for obtaining current time and obtaining the international of the first user terminal from the request of data
Dynamic CUSTOMER ID IMSI;
First permission judging submodule, for corresponding to the IMSI and current time of the first user terminal according to the request of data,
Judge whether corresponding first user terminal of the request of data has permission.
12. device according to claim 11, which is characterized in that
The first permission judging submodule, for judging whether the current time is in the communication control period;If described
Current time is in the communication control period, it is determined that corresponding first user terminal of the request of data does not have permission;If institute
It states current time and is not at the communication control period, then judge whether inquire the request of data corresponding first from blacklist
The matched IMSI of the IMSI of user terminal;If inquiring the matched IMSI from blacklist, it is determined that the request of data
Corresponding first user terminal does not have permission;If not inquiring the matched IMSI from blacklist, it is determined that the number
There is permission according to corresponding first user terminal of request.
13. device according to claim 10, which is characterized in that described device further include:
Third sending module asks the data if having permission for corresponding first user terminal of the request of data
It asks and is sent to local server, to obtain the corresponding data of the request of data from local server.
14. device according to claim 10, which is characterized in that described device further include:
Blacklist generation module, for according to the first user terminal, in net information, the first user end of preset rules will to be met
The IMSI at end is added in the blacklist.
15. a kind of communication control device, which is characterized in that in the second private network base station applied to the second communication managing and control system, institute
State that the second communication managing and control system includes: the second private network base station and second user terminal, described device include:
Second receiving module, for receiving the access request of second user terminal transmission, wherein the second user terminal and the
Two private network base stations are communicated using Generation Mobile Telecommunication System technology or 3rd generation mobile communication technology, the second private network base
It stands non-core network access;
Second judgment module, for judging that the access request corresponds to whether second user terminal has permission;
4th sending module generates redirection instruction if corresponding to second user terminal with permission for the access request
And be sent to the access request and correspond to second user terminal, the redirection instruction is used to indicate the second user terminal and connects
Enter public network base station;
5th sending module, if corresponding to second user terminal without permission for the access request, generation is successfully accessed
Information and sending to the access request corresponds to second user terminal, so that the second user terminal resides in described second specially
Net the corresponding cell in base station.
16. device according to claim 15, which is characterized in that second judgment module includes:
Second acquisition submodule is moved for obtaining current time and obtaining the international of second user terminal from the access request
Dynamic CUSTOMER ID IMS;
Second permission judging submodule, for corresponding to the IMSI and current time of second user terminal according to the access request,
Judge that the access request corresponds to whether second user terminal has permission.
17. device according to claim 16, which is characterized in that
The second permission judging submodule, for judging whether the current time is in the communication control period;If described
Current time is in the communication control period, it is determined that the access request corresponds to second user terminal without permission;If institute
It states current time and is not at the communication control period, then judge whether inquire the request of data corresponding second from blacklist
The matched IMSI of the IMSI of user terminal;If inquiring the matched IMSI from blacklist, it is determined that the access request
Corresponding second user terminal does not have permission;If not inquiring the matched IMSI from blacklist, it is determined that the access
Request corresponding second user terminal that there is permission.
18. device according to claim 15, which is characterized in that described device further include:
Blacklist obtains module, for obtaining the corresponding blacklist of second user terminal in advance.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810005578.4A CN109996233A (en) | 2018-01-03 | 2018-01-03 | A kind of communication management-control method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810005578.4A CN109996233A (en) | 2018-01-03 | 2018-01-03 | A kind of communication management-control method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109996233A true CN109996233A (en) | 2019-07-09 |
Family
ID=67128454
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810005578.4A Pending CN109996233A (en) | 2018-01-03 | 2018-01-03 | A kind of communication management-control method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109996233A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110474956A (en) * | 2019-07-10 | 2019-11-19 | 视联动力信息技术股份有限公司 | Depending on networked devices title method, apparatus, electronic equipment and readable storage medium storing program for executing |
CN110896537A (en) * | 2019-12-19 | 2020-03-20 | 武汉虹信通信技术有限责任公司 | Communication management and control method and device |
CN112203305A (en) * | 2020-09-30 | 2021-01-08 | 中国联合网络通信集团有限公司 | Mobile terminal management method, terminal management platform, management network element and mobile terminal |
CN112437080A (en) * | 2020-11-20 | 2021-03-02 | 中国联合网络通信集团有限公司 | Service authentication method and device |
CN112788644A (en) * | 2020-12-31 | 2021-05-11 | 西安抱朴通信科技有限公司 | Edge distribution system and method for service data in mobile network |
CN113596837A (en) * | 2021-07-09 | 2021-11-02 | 长安大学 | Method and system for determining core network selection |
CN114071464A (en) * | 2020-08-06 | 2022-02-18 | 中国移动通信集团上海有限公司 | Private network implementation method, device, equipment and storage medium based on 5G message |
-
2018
- 2018-01-03 CN CN201810005578.4A patent/CN109996233A/en active Pending
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110474956A (en) * | 2019-07-10 | 2019-11-19 | 视联动力信息技术股份有限公司 | Depending on networked devices title method, apparatus, electronic equipment and readable storage medium storing program for executing |
CN110896537A (en) * | 2019-12-19 | 2020-03-20 | 武汉虹信通信技术有限责任公司 | Communication management and control method and device |
CN114071464A (en) * | 2020-08-06 | 2022-02-18 | 中国移动通信集团上海有限公司 | Private network implementation method, device, equipment and storage medium based on 5G message |
CN114071464B (en) * | 2020-08-06 | 2023-08-15 | 中国移动通信集团上海有限公司 | Private network implementation method, device and equipment based on 5G message and storage medium |
CN112203305A (en) * | 2020-09-30 | 2021-01-08 | 中国联合网络通信集团有限公司 | Mobile terminal management method, terminal management platform, management network element and mobile terminal |
CN112437080A (en) * | 2020-11-20 | 2021-03-02 | 中国联合网络通信集团有限公司 | Service authentication method and device |
CN112788644A (en) * | 2020-12-31 | 2021-05-11 | 西安抱朴通信科技有限公司 | Edge distribution system and method for service data in mobile network |
CN112788644B (en) * | 2020-12-31 | 2024-02-02 | 西安抱朴通信科技有限公司 | Edge distribution system and method for service data in mobile network |
CN113596837A (en) * | 2021-07-09 | 2021-11-02 | 长安大学 | Method and system for determining core network selection |
CN113596837B (en) * | 2021-07-09 | 2023-05-26 | 长安大学 | Method and system for determining core network selection |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109996233A (en) | A kind of communication management-control method and device | |
US11477668B2 (en) | Proactively adjusting network infrastructure in response to reporting of real-time network performance | |
CN103533189B (en) | The distribution method and device of mobile agent call | |
CN106170008A (en) | A kind of inter-network means of communication, device and load equalizer | |
CN104852937B (en) | Method for network access and device for mobile application | |
US9521262B2 (en) | Method and apparatus for calling terminal to join conference | |
CN107566429A (en) | Base station, the response method of access request, apparatus and system | |
CN106941507A (en) | The dispatching method and device of request message | |
CN108390955A (en) | Domain Name acquisition method, Website access method and server | |
WO2018192149A1 (en) | Dial testing method, apparatus and system | |
CN109547348A (en) | A kind of communication, method for routing foundation and device | |
CN107404728A (en) | A kind of method and device of network problem positioning | |
CN102014391B (en) | Wireless network safety access method, system and wireless controller | |
US11349731B2 (en) | Data collection for the evaluation of the quality of experience of a service over a communications network | |
CN112152879B (en) | Network quality determination method, device, electronic equipment and readable storage medium | |
CN109462878A (en) | A kind of method of network entry and device of same frequency terminal node | |
Mandalari et al. | Measuring roaming in europe: Infrastructure and implications on users’ qoe | |
CN109219046A (en) | Method for switching network and device | |
CN109819482A (en) | A kind of data processing method and device | |
US20210092231A1 (en) | Stack queuing customer care routing with vertical metrics | |
CN107995622A (en) | A kind of method and system that network is accessed by portable router | |
CN105359494B (en) | System, device, method and network server node is presented in mirror image between website | |
CN106303105A (en) | The method of calling of dynamic more voice service number based on client identification module and system | |
Ndiaye et al. | Contribution to improving the conditions of access to very high speed 5G internet for online education in developing African countries | |
CN106161051A (en) | Custom end intelligent route selection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190709 |
|
RJ01 | Rejection of invention patent application after publication |