CN109996233A - A kind of communication management-control method and device - Google Patents

A kind of communication management-control method and device Download PDF

Info

Publication number
CN109996233A
CN109996233A CN201810005578.4A CN201810005578A CN109996233A CN 109996233 A CN109996233 A CN 109996233A CN 201810005578 A CN201810005578 A CN 201810005578A CN 109996233 A CN109996233 A CN 109996233A
Authority
CN
China
Prior art keywords
user terminal
request
data
permission
base station
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810005578.4A
Other languages
Chinese (zh)
Inventor
崔士津
王利
张连栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Datang Mobile Communications Equipment Co Ltd
Original Assignee
Datang Mobile Communications Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Datang Mobile Communications Equipment Co Ltd filed Critical Datang Mobile Communications Equipment Co Ltd
Priority to CN201810005578.4A priority Critical patent/CN109996233A/en
Publication of CN109996233A publication Critical patent/CN109996233A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention provides a kind of communication management-control method and device, the method is applied to the first communication managing and control system, and the first communication managing and control system includes: mobile edge calculations MEC server, the first private network base station, the first user terminal and core net;The described method includes: MEC server receives the request of data of the first private network base station forwarding;Judge whether corresponding first user terminal of request of data has permission;If corresponding first user terminal of request of data has permission, request of data is sent to core net;If corresponding first user terminal of request of data does not have permission, generates request failure message and be sent to the first private network base station;First user terminal and the first private network base station are communicated using forth generation or the above order mobile communication technology of forth generation;And then the user terminal with permission can obtain corresponding data, the user terminal without permission can not obtain corresponding data, to carry out effective communication control to mobile terminal.

Description

A kind of communication management-control method and device
Technical field
The present invention relates to fields of communication technology, more particularly to a kind of communication management-control method and a kind of communication control device.
Background technique
With the continuous development of network technology and terminal technology, mobile terminal is also popularized therewith, and more and more parents are Convenience is contacted with students, is also equipped with mobile terminal for students, so that student can be used anytime and anywhere movement Terminal makes a phone call, browses webpage, chat online;And then the study etc. of student is affected, adverse effect is caused to student, therefore need The communication of the mobile terminal of student is managed.
School is using full system type pictorial full frequency band interference unit, although student for a kind of mode of the communication control of mobile phone at present The communication of mobile terminal managed, but the communication of the mobile terminal of all teachers is managed, and interference unit also disturbs Entire base station affects the non-campus user of access base station.It is that control is all installed at parent end and student side there are also a kind of mode APP (Application, the application program) parent of type can use the time to the online of student in its terminal, access right, lead to Words etc. are managed;But the mobile terminal of student can replace number by brush machine and manage to evade, ineffective.
Summary of the invention
The embodiment of the present invention is the technical problem to be solved is that a kind of communication management-control method is provided, to carry out mobile terminal Effective communication control.
Correspondingly, the embodiment of the invention also provides a kind of communication control device, to guarantee the above method realization and Using.
To solve the above-mentioned problems, the invention discloses a kind of communication management-control methods, are applied to the first communication managing and control system, The first communication managing and control system includes: mobile edge calculations MEC server, the first private network base station, the first user terminal and core Heart net, which comprises
MEC server receives the request of data of the first private network base station forwarding, and the request of data is the first private network base It stands received from the first user terminal;Judge whether corresponding first user terminal of the request of data has permission;If the number According to requesting corresponding first user terminal that there is permission, then the request of data is sent to core net, makes core net by the number Internet is sent to according to request to obtain corresponding data;If corresponding first user terminal of the request of data does not have permission, It then generates request failure message and is sent to first private network base station, so that first private network base station fails the request Message is sent to the user terminal;Wherein, first user terminal and the first private network base station are mobile using forth generation What the communication technology or the above order mobile communication technology of forth generation communicated.
Optionally, described to judge whether corresponding first user terminal of the request of data has permission, comprising: to obtain current Time and the international mobile subscriber identity IMSI that the first user terminal is obtained from the request of data;It is asked according to the data The IMSI and current time for seeking corresponding first user terminal, judge whether corresponding first user terminal of the request of data has power Limit.
Optionally, the IMSI and current time according to corresponding first user terminal of the request of data, described in judgement Whether corresponding first user terminal of request of data has permission, comprising: when judging whether the current time is in communication control Between section;If the current time is in the communication control period, it is determined that corresponding first user terminal of the request of data does not have It has permission;If the current time is not at the communication control period, judge the data whether are inquired from blacklist Request the matched IMSI of IMSI of corresponding first user terminal;If inquiring the matched IMSI from blacklist, it is determined that Corresponding first user terminal of the request of data does not have permission;If not inquiring the matched IMSI from blacklist, Then determine that corresponding first user terminal of the request of data has permission.
Optionally, further includes: if corresponding first user terminal of the request of data has permission, the data are asked It asks and is sent to local server, to obtain the corresponding data of the request of data from local server.
Optionally, further includes: according to the first user terminal in net information, the first user terminal of preset rules will be met IMSI be added in the blacklist.
The embodiment of the invention also discloses a kind of communication control devices, the mobile edge applied to the first communication managing and control system Calculate MEC server in, it is described first communication managing and control system include: mobile edge calculations MEC server, the first private network base station, First user terminal and core net;Described device includes:
First receiving module, for receiving the request of data of the first private network base station forwarding, the request of data is described the One private network base station is received from the first user terminal, wherein first user terminal and the first private network base station are using the What four third-generation mobile communication technologies or the above order mobile communication technology of forth generation communicated;First judgment module, it is described for judging Whether corresponding first user terminal of request of data has permission;First sending module, if for the request of data corresponding first User terminal has permission, then the request of data is sent to core net, is sent to core net mutually the request of data Networking is to obtain corresponding data;Second sending module, if not having power for corresponding first user terminal of the request of data Limit, then generate request failure message and be sent to first private network base station, so that first private network base station is by the request Failed message is sent to the user terminal.
Optionally, the first judgment module includes: the first acquisition submodule, for obtaining current time and from the number According to the international mobile subscriber identity IMSI for obtaining the first user terminal in request;First permission judging submodule is used for foundation The IMSI and current time of corresponding first user terminal of the request of data judge corresponding first user terminal of the request of data Whether there is permission.
Optionally, the first permission judging submodule, when for judging whether the current time is in communication control Between section;If the current time is in the communication control period, it is determined that corresponding first user terminal of the request of data does not have It has permission;If the current time is not at the communication control period, judge the data whether are inquired from blacklist Request the matched IMSI of IMSI of corresponding first user terminal;If inquiring the matched IMSI from blacklist, it is determined that Corresponding first user terminal of the request of data does not have permission;If not inquiring the matched IMSI from blacklist, Then determine that corresponding first user terminal of the request of data has permission.
Optionally, described device further include: third sending module, if whole for corresponding first user of the request of data End has permission, then the request of data is sent to local server, to obtain the request of data pair from local server The data answered.
Optionally, described device further include: blacklist generation module, for according to the first user terminal in net information, The IMSI for meeting the first user terminal of preset rules is added in the blacklist.
The embodiment of the invention also discloses a kind of communication management-control method, it is applied to the second communication managing and control system, described second Communicating managing and control system includes: the second private network base station and second user terminal, which comprises,
Second private network base station receives the access request that second user terminal is sent;Judge that the access request corresponding second is used Whether family terminal has permission;If the access request corresponds to second user terminal with permission, redirection instruction is generated simultaneously It is sent to the access request and corresponds to second user terminal, the redirection instruction is used to indicate the second user terminal access Public network base station;If the access request corresponds to second user terminal without permission, generation is successfully accessed information and sending extremely The access request corresponds to second user terminal, so as to reside in second private network base station corresponding for the second user terminal Cell;Wherein, the second user terminal and the second private network base station are moved using Generation Mobile Telecommunication System technology or the third generation Dynamic communication technology communication, the non-core network access in second private network base station.
Optionally, described to judge that the access request corresponds to whether user terminal has permission, comprising: to obtain current time With the international mobile subscriber identity IMS for obtaining second user terminal from the access request;According to the access request pair The IMSI and current time for answering second user terminal judge that the access request corresponds to whether second user terminal has permission.
Optionally, the IMSI and current time that second user terminal is corresponded to according to the access request, described in judgement Access request corresponds to whether second user terminal has permission, comprising: when judging whether the current time is in communication control Between section;If the current time is in the communication control period, it is determined that the access request, which corresponds to second user terminal, not to be had It has permission;If the current time is not at the communication control period, judge the data whether are inquired from blacklist Request the matched IMSI of IMSI of corresponding second user terminal;If inquiring the matched IMSI from blacklist, it is determined that The access request corresponds to second user terminal without permission;If not inquiring the matched IMSI from blacklist, Determine that the access request corresponds to second user terminal with permission.
Optionally, further includes: obtain the corresponding blacklist of second user terminal in advance.
The embodiment of the invention also discloses a kind of communication control devices, the second private network applied to the second communication managing and control system In base station, the second communication managing and control system includes: the second private network base station and second user terminal, described device include:
Second receiving module, for receiving the access request of second user terminal transmission, wherein the second user terminal It is to be communicated using Generation Mobile Telecommunication System technology or 3rd generation mobile communication technology with the second private network base station, described second specially Net the non-core network access in base station;Second judgment module, for judging that the access request corresponds to whether second user terminal has Permission;4th sending module generates redirection instruction if corresponding to second user terminal with permission for the access request And be sent to the access request and correspond to second user terminal, the redirection instruction is used to indicate the second user terminal and connects Enter public network base station;5th sending module, if corresponding to second user terminal without permission for the access request, generation is connect Enter success message and be sent to the access request and correspond to second user terminal so that the second user terminal reside in it is described The corresponding cell in second private network base station.
Optionally, second judgment module includes: the second acquisition submodule, for obtaining current time and connecing from described Enter to obtain the international mobile subscriber identity IMS of second user terminal in request;Second permission judging submodule, for according to institute IMSI and current time that access request corresponds to second user terminal are stated, judges that the access request corresponds to second user terminal and is It is no that there is permission.
Optionally, the second permission judging submodule, when for judging whether the current time is in communication control Between section;If the current time is in the communication control period, it is determined that the access request, which corresponds to second user terminal, not to be had It has permission;If the current time is not at the communication control period, judge the data whether are inquired from blacklist Request the matched IMSI of IMSI of corresponding second user terminal;If inquiring the matched IMSI from blacklist, it is determined that The access request corresponds to second user terminal without permission;If not inquiring the matched IMSI from blacklist, Determine that the access request corresponds to second user terminal with permission.
Optionally, described device further include: blacklist obtains module, corresponding black for obtaining second user terminal in advance List.
Compared with prior art, the embodiment of the present invention includes following advantages:
The embodiment of the present invention uses the first of fourth generation mobile communication technology or the above order mobile communication technology of forth generation User terminal, after sending request of data to corresponding first private network base station, the request of data is forwarded to by the first private network base station In mobile edge calculations MEC server, the MEC server receives the request of data of the first private network base station forwarding, then judges Whether corresponding first user terminal of the request of data has permission;If corresponding first user terminal of the request of data has power Limit, then be sent to core net for the request of data, make core net that the request of data is sent to internet to obtain correspondence Data so that the corresponding data of the request of data can be obtained with the first user terminal of permission.If the number According to requesting corresponding first user terminal not have permission, then generates request failure message and is sent to first private network base station, So that the request failure message is sent to the user terminal by first private network base station;So that not having permission First user terminal can not obtain the corresponding data of the request of data;To carry out effective communication control to mobile terminal.
Detailed description of the invention
Fig. 1 is the schematic diagram that one kind first of the invention communicates managing and control system;
Fig. 2 is a kind of step process applied to communication management-control method embodiment in the first communication managing and control system of the invention Figure;
Fig. 3 is that another kind of the invention is applied to the step of communicating management-control method embodiment in the first communication managing and control system stream Cheng Tu;
Fig. 4 is a kind of communication management-control method embodiment step flow chart applied to the second communication managing and control system of the present invention;
Fig. 5 is the schematic diagram that one kind second of the invention communicates managing and control system;
Fig. 6 is another communication management-control method embodiment step process for being applied to the second communication managing and control system of the invention Figure;
Fig. 7 is a kind of structural block diagram of the communication control Installation practice applied to MEC server of the present invention
Fig. 8 is the structural block diagram of another communication control Installation practice for being applied to MEC server of the invention;
Fig. 9 is a kind of structural block diagram of the communication control Installation practice applied to the second private network base station of the present invention;
Figure 10 is the structural block diagram of another communication control Installation practice for being applied to the second private network base station of the invention.
Specific embodiment
In order to make the foregoing objectives, features and advantages of the present invention clearer and more comprehensible, with reference to the accompanying drawing and specific real Applying mode, the present invention is described in further detail.
The embodiment of the present invention can pre-establish private network base station, accurately covered using private network base station and need to carry out communication tube The region of control, wherein inter-frequency networking can be used in the private network base station, to reduce the interference to public network signal of communication, the public network Refer to the network of other base stations (i.e. public network base station) composition in addition to private network base station;In addition, the frequency point of the private network base station may be used also To be configured to the high frequency point of priority, so that priority access private network base station simultaneously resides in after user enters communication control region The corresponding cell in private network base station;So that user terminal is communicated with private network base station.
One of the core concepts of the embodiments of the present invention is, after receiving the request of user terminal, can to it is described request into Row analysis, judges whether the corresponding user terminal of the request has permission;If described request corresponding user terminal to have power Limit, then allow the user terminal to be communicated, if the corresponding user terminal of the request of data does not have permission, does not allow The user terminal is communicated;The communication of user terminal is managed to realize.
The communication management-control method that the embodiment of the present invention proposes, can be to the user using the communication of low order mobile communication network technology Terminal carries out communication control, can also carry out communication control to the user terminal using the communication of high-order mobile communication network technology; Wherein, the high-order mobile communication network technology may include forth generation and the above order mobile communication technology, such as 4G (the 4th Generation communication system, the 4th third-generation mobile communication technology), 4.5G, 5G, 6G etc., it is described low Rank mobile communication network technology may include Generation Mobile Telecommunication System technology and 3rd generation mobile communication technology;The order is basis What the developing stage of mobile communication technology determined, e.g., the corresponding order of Generation Mobile Telecommunication System technology is 2 ranks, and the third generation is mobile The corresponding order of the communication technology is 3 ranks, and the corresponding order of fourth generation mobile communication technology is 4 ranks, the 5th third-generation mobile communication technology Corresponding order is 5 ranks etc..
Wherein, the embodiment of the present invention, which is directed to, uses fourth generation mobile communication technology or the above order mobile communication skill of forth generation The user terminal of art communication, proposes a kind of communication management-control method, to realize to the logical of such user terminal in telecommunication management region Letter is managed;And it is whole also directed to the user communicated using Generation Mobile Telecommunication System technology or 3rd generation mobile communication technology End, proposes a kind of communication management-control method, is managed with realizing to the communication of such user terminal in telecommunication management region.
To using fourth generation mobile communication technology or the user terminal of forth generation above order mobile communication technology communication into The method of row communication control is as follows:
Wherein, the user that can will be communicated using fourth generation mobile communication technology or the above order mobile communication technology of forth generation Terminal is known as the first user terminal, can be described as the first private network base station, i.e. institute with the private network base station of first user terminal communication Stating the first private network base station is also to be communicated using fourth generation mobile communication technology or the above order mobile communication technology of forth generation.
The communication management-control method of the embodiment of the present invention is applied in the first communication managing and control system, as shown in Figure 1, described the One communication managing and control system include the mobile edge calculations server of MEC (Mobile Edge Computing, mobile edge calculations), First private network base station, the first user terminal and core net, the core net include MME (Mobility Management Entity, key control node), S-GW (Serving GateWay, gateway) and P-GW (Packet Data Network Gate Way, packet data gateway).Wherein, first private network base station is connect with MEC server by aggregation node, with MEC Server carries out the interaction of business datum (such as data service, voice service), can also be connect by aggregation node with MME, Signalling exchange is carried out with MME;The MEC server is connect with S-GW, and P-GW is connect with internet.
Referring to Fig. 2, one kind of the invention is shown applied to communication management-control method embodiment in the first communication managing and control system Step flow chart, can specifically include following steps:
Step 201, MEC server receive the request of data of the first private network base station forwarding, and the request of data is described the One private network base station is received from the first user terminal.
In the embodiment of the present invention, after the first user terminal enters communication control region, that is, the first private network base station pair can access The cell answered, and then can be communicated with first private network base station;First user terminal can be according to the instruction of corresponding user It such as browses the instruction of webpage, instruction of making a phone call, generates corresponding request of data, and the request of data is sent to correspondence The first private network base station;After first private network base station receives the request of data of first user terminal, the data can be asked It asks and is forwarded to aggregation node, the request of data is sent to the MEC server by aggregation node;And then the MEC service Device can receive the request of data.
Step 202 judges whether corresponding first user terminal of the request of data has permission.
After the MEC server receives the request of data, the request of data can be analyzed, then to described Corresponding first user terminal of request of data is verified, and judges whether corresponding first user terminal of the request of data has power Limit;If corresponding first user terminal of the request of data has permission, allow corresponding first user of the request of data whole End is communicated, and step 203 can be performed, if corresponding first user terminal of the request of data does not have permission, does not allow institute It states corresponding first user terminal of request of data to be communicated, step 204 can be performed.
The request of data is sent to core net by step 203, makes core net that the request of data is sent to internet To obtain corresponding data.
It, can be by the data when MEC server determines that corresponding first user terminal of the request of data has permission Request is sent to core net, and the request of data can be sent to internet to obtain corresponding data by core net.Specifically, The request of data is sent to S-GW by MEC server, and the data are sent to P-GW by S-GW, and P-GW again asks the data It asks and is sent in internet;After internet receives the request of data, the corresponding data of the request of data can be searched, and will The corresponding data return to the P-GW, and then the corresponding data are returned to S-GW again by P-GW, and S-GW will be described Corresponding data return to MEC server, and the corresponding data are returned to the first private network base station by MEC server, finally by The corresponding data of the request of data are returned to corresponding first user terminal of the request of data by the first private network base station;Into And first user terminal is able to carry out communication.
Certainly, if the request of data is the request of data of voice service, core net receives the transmission of MEC server After request of data, the request of data can be sent to IMS system (IP MultimediaSubsystem, IP multimedia subsystem System), to establish corresponding voice pathway for first user terminal.
Step 204 generates request failure message and is sent to first private network base station, so that first private network base station The request failure message is sent to the user terminal.
It, can be according to described when the MEC server determines that corresponding first user terminal of the request of data does not have permission Request of data generates corresponding request failure message, and the request failure message is then sent to first private network base station, Then the request failure message is sent to corresponding first user terminal again by first private network base station;And then first use Family terminal can not obtain corresponding data, communication failure.
The embodiment of the present invention is used using fourth generation mobile communication technology or the above order mobile communication technology of forth generation First user terminal, after sending request of data to corresponding first private network base station, the first private network base station turns the request of data It is sent in mobile edge calculations server, the MEC server receives the request of data of the first private network base station forwarding, then judges Whether corresponding first user terminal of the request of data has permission;If corresponding first user terminal of the request of data has power Limit, then be sent to core net for the request of data, make core net that the request of data is sent to internet to obtain correspondence Data so that the corresponding data of the request of data can be obtained with the first user terminal of permission.If the number According to requesting corresponding first user terminal not have permission, then generates request failure message and is sent to first private network base station, So that the request failure message is sent to the user terminal by first private network base station;So that not having permission First user terminal can not obtain the corresponding data of the request of data;To carry out effective communication control to mobile terminal.
In another embodiment of the invention, the MEC server has self-learning capability, can be according to the first user terminal In net information, IMSI (the InternationalMobile Subscriber of the user terminal of preset rules will be met Identification Number, international mobile subscriber identity) it is added in the blacklist;Wherein, in the blacklist Corresponding first user terminal of IMSI is without permission, and the preset rules can be arranged as desired, such as according to communication tube Control the regulation setting in region.Specifically, available each first user terminal of MEC server in net information, it is described Net information may include much information such as in net time, the site information accessed;Then it is directed to each first user terminal, It is compared in net information with corresponding preset rules, judges whether first user's meets default rule in net information Then, if first user terminal meets preset rules in net information, it is determined that first user terminal needs to carry out communication tube The user terminal of system can obtain the IMSI of first user terminal, and the IMSI is added in blacklist.If first user Terminal is unsatisfactory for preset rules in net information, it is determined that the user that first user terminal does not need to carry out communication control is whole End, can continue to judge next first user terminal;It is subsequent in turn that user's end can be judged according to the IMSI in blacklist Whether end has permission.
For example, the regulation students of certain Middle School, which in afternoon on every Fridays, need to log in campus network, updates journal, then in advance If rule can be Friday afternoon and log in campus network;Therefore MEC server can obtain website that each first user terminal logs in and Corresponding login time, and then judge whether first user terminal has logged in campus network in Friday afternoon;If so, determine this The corresponding user of one user terminal is student, then the IMSI of first user terminal can be added into blacklist, if it is not, then Determine that the corresponding user of the first user terminal is not student, it can be without being added the IMSI of first user terminal to blacklist In.
Certainly, if the first user terminal with permission is relatively fewer, or, relatively fixed as (user of teaching and administrative staff is whole End), then the IMSI of these the first user terminals can be added in white list, then white list is saved to the MEC and is serviced In device, corresponding first user terminal of IMSI has permission in the white list.The MEC server of the embodiment of the present invention, The corresponding user terminal of the first user terminal such as parent that will can also enter once in a while communication control region, as in gray list First user terminal, corresponding first user terminal of IMSI is also to have permission in the gray list.
Referring to Fig. 3, the communication management-control method for showing another kind of the invention applied to the first communication managing and control system is implemented Example flow chart of steps, specifically comprises the following steps:
Step 301, MEC server receive the request of data of the first private network base station forwarding.
The MEC server receives the request of data of the first private network base station forwarding by aggregation node, then can be to described Request of data is analyzed, to judge whether corresponding first user terminal of the request of data has permission;It is specific as follows:
Step 302 obtains current time and obtains the international mobile subscriber of the first user terminal from the request of data Identification code IMSI.
In the embodiment of the present invention, communication control region may have the communication control period, within the communication control period such as Test time section, regardless of whether being that IMSI corresponds to the first user terminal in blacklist, which manages all first in region The communication of user terminal requires to manage, and within the non-communicating control period, then IMSI corresponding first is used only in blacklist Family terminal needs to manage, wherein the communication control period can be arranged as desired, and such as communication control region is campus, lead to The fuse tube control period can be the test time;Therefore the MEC server, can be from the data after obtaining the request of data The IMSI of the first user terminal is obtained in request, and obtains current time, according to corresponding first user of the request of data The IMSI and current time of terminal, judge whether corresponding first user terminal of the request of data has permission, specific as follows:
Step 303 judges whether the current time is in the communication control period.
It can first judge whether the current time is in the communication control period, if the current time is in communication control In period, it may be determined that the communication manages all first user terminals in region without permission, and step 306 can be performed;If institute It states current time to be not in the communication control time, then corresponding first user terminal of IMSI needs communication tube only in blacklist Control, therefore can determine whether corresponding first user terminal of the request of data, if it is IMSI corresponding first in the blacklist Step 304 can be performed in user terminal.
Step 304 judges IMSI that corresponding first user terminal of the request of data whether is inquired from blacklist The IMSI matched.
The IMSI that corresponding first user terminal of the request of data can be used is compared with IMSI each in blacklist, judges The matched IMSI of IMSI of corresponding first user terminal of the request of data whether is inquired from blacklist;If from blacklist The matched IMSI is inquired, that is, determines that corresponding first user terminal of the request of data does not have permission, then step can be performed Rapid 306;If not inquiring the matched IMSI from blacklist, it may be determined that the corresponding first user terminal tool of the request of data It has permission, then step 305 can be performed.
The request of data is sent to core net by step 305.
It, can be by the data when MEC server determines that corresponding first user terminal of the request of data has permission Request is sent to core net, is sent to core net in internet the request of data, and then from internet described in acquisition The corresponding data of request of data, and the MEC server is returned to, the MEC server can be corresponding by the request of data Data are sent to corresponding first user terminal of the request of data by the first private network base station;To the first user terminal energy Enough communication.
Optionally, in another embodiment of the invention, the MEC server can also connect such as school with local server Garden server, and then when the MEC server determines that corresponding first user terminal of the request of data has permission, can also will The request of data is sent to local server, to obtain corresponding data from local server;To realize local service It shunts.
Step 306 generates request failure message and is sent to first private network base station.
It, can be according to described when the MEC server determines that corresponding first user terminal of the request of data does not have permission Request of data generates corresponding request failure message, and the request failure message is then sent to first private network base station, The request failure message can be forwarded to corresponding first user terminal of the request of data by first private network base station;In turn First user terminal can not be communicated.
To sum up, the embodiment of the present invention is using fourth generation mobile communication technology or the above order mobile communication technology of forth generation First user terminal, after sending request of data to corresponding first private network base station, the first private network base station turns the request of data It is sent in mobile edge calculations server, the MEC server receives the request of data of the first private network base station forwarding, then judges Whether corresponding first user terminal of the request of data has permission;If corresponding first user terminal of the request of data has power Limit, then be sent to core net for the request of data, make core net that the request of data is sent to internet to obtain correspondence Data so that the corresponding data of the request of data can be obtained with the first user terminal of permission.If the number According to requesting corresponding first user terminal not have permission, then generates request failure message and is sent to first private network base station, So that the request failure message is sent to the user terminal by first private network base station;So that not having permission First user terminal can not obtain the corresponding data of the request of data;To carry out effective communication control to mobile terminal.
Further, the embodiment of the present invention judges whether corresponding first user terminal of the request of data has permission described When, it can first judge whether current time was in the control period, when determining that current time was not in the control period, Judge whether the IMSI of corresponding first user terminal of the request of data is IMSI in blacklist;And then in addition to can be to black name Corresponding first user terminal of IMSI carries out the control period can also being arranged, in the control period outside communication control in list All first user terminals carry out communication control, thus meet different communication control region individual demand.
Again, the MEC, can be by the data when determining that corresponding first user terminal of the request of data has permission Request is sent to local server, to obtain the corresponding data of the request of data from local server, to realize business It shunts.
Communication tube is carried out to the user terminal communicated using Generation Mobile Telecommunication System technology or 3rd generation mobile communication technology The method of control is as follows:
Wherein, the user terminal communicated using Generation Mobile Telecommunication System technology or 3rd generation mobile communication technology can be known as Second user terminal, the private network base station communicated with the second user terminal can be described as the second private network base station, i.e., described second specially Net base station is also to be communicated using Generation Mobile Telecommunication System technology or 3rd generation mobile communication technology.In the embodiment of the present invention, institute Stating the second private network base station is pseudo-base station, i.e., does not connect with core net, and it is corresponding small that second user terminal accesses the second private network base station Qu Hou, can not obtain business datum can not such as surf the Internet, can not make a phone call etc..
Referring to Fig. 4, a kind of communication management-control method embodiment step applied to the second communication managing and control system of the present invention is shown Rapid flow chart, can specifically include following steps:
Step 401, the second private network base station receive the access request that second user terminal is sent.
Step 402 judges that the access request corresponds to whether second user terminal has permission.
The communication management-control method of the embodiment of the present invention is applied to the second communication managing and control system, as shown in figure 5, described second Communicating managing and control system includes: the second private network base station and second user terminal.It, can after second user terminal enters communication control region Access request is sent to the second private network base station, second private network base station is accessed with request.Then second private network base station can The access request that second user terminal is sent is received, and the access request can be analyzed, judges the access request pair Answer whether second user terminal has permission.
If the access request corresponds to second user terminal with permission, due to second private network base station not with core net Connection, can not be communicated, therefore can indicate that the second user terminal accesses public network base station, so that the second user terminal passes through Public network base station carries out subsequent communication, then step 403 can be performed.If the access request, which corresponds to second user terminal, does not have power Limit, then can allow the second user terminal to reside in the corresponding cell in second private network base station, i.e., executable step 404.
Step 403, generation, which redirect to instruct and be sent to the access request, corresponds to second user terminal, the redirection Instruction is used to indicate second user terminal access public network base station.
It, can be according to public network when second private network base station determines that the access request corresponds to second user terminal with permission The corresponding frequency point in base station generates and redirects instruction, and the redirection instruction is used to indicate the second user terminal access public network Base station;Then redirection instruction is sent to the access request and corresponds to second user terminal, which connects After receiving the redirection instruction, it can be instructed according to the redirection and access to the corresponding cell in public network base station;And then it is subsequent can The corresponding data of communication acquisition are carried out with public network base station.
Step 404, generation are successfully accessed information and sending to the access request and correspond to second user terminal, so that described Second user terminal resides in the corresponding cell in the private network base station.
When second private network base station determines that the access request corresponds to second user terminal without permission, produces and connect Enter success message, then by it is described be successfully accessed message and be sent to the access request correspond to second user terminal, should with notice Second user terminal is successfully accessed the corresponding cell in the second private network base station;The second user terminal receives described be successfully accessed and disappears After breath, the corresponding cell in the second private network base station can reside in, at this point, the second user can not pass through the acquisition pair of the second private network base station The business datum answered.
To sum up, the embodiment of the present invention is using Generation Mobile Telecommunication System technology or the second user of 3rd generation mobile communication technology Terminal, after sending access request to corresponding second private network base station, the second private network base station receives the access request, then judges The access request corresponds to whether second user terminal has permission;If the access request, which corresponds to second user terminal, has power Limit then generates redirection and instructs and be sent to the access request and correspond to second user terminal, so that having the of permission Two user terminals have access to the corresponding cell in public network base station, obtain corresponding business datum subsequently through public network base station.If institute It states access request and corresponds to second user terminal without permission, then generate and be successfully accessed information and sending to the access request pair Second user terminal is answered, so that the second user terminal resides in the corresponding cell in the private network base station;Wherein, described second Private network base station is not no core network access, so that correspondence can not be obtained in candidate by not having the second user terminal of permission Business datum;To carry out effective communication control to mobile terminal.
Referring to Fig. 6, another communication management-control method embodiment for being applied to the second communication managing and control system of the invention is shown Flow chart of steps specifically includes:
Step 601 obtains the corresponding blacklist of second user terminal in advance.
The embodiment of the present invention can pre-generate the corresponding blacklist of second user terminal, then be allocated to the blacklist Second private network base station, and then second private network base station can get the corresponding list of second user terminal, according to institute State the permission that blacklist judges second user terminal.
Step 602, the second private network base station receive the access request that second user terminal is sent.
After second user terminal enters communication control region, access request can be sent to the second private network base station, be connect with request Enter second private network base station.Then second private network base station can receive the access request that second user terminal is sent, and can The access request is analyzed, judges that the access request corresponds to whether second user terminal has permission.
Step 603, the international mobile subscriber for obtaining current time and obtaining second user terminal from the access request Identification code IMS.
Step 604 is similar with above-mentioned steps 302, and details are not described herein;It then can be according to the access request corresponding second The IMSI and current time of user terminal judge that the access request corresponds to whether second user terminal has permission;Specifically such as Under:
Step 604 judges whether the current time is in the communication control period;If so, 607 are thened follow the steps, if It is no, then follow the steps 605.
Step 605 judges IMSI that the request of data corresponds to second user terminal whether is inquired from blacklist The IMSI matched;If so, 607 are thened follow the steps, if it is not, thening follow the steps 606.
Wherein, step 604- step 605, similar with above-mentioned steps 203- step 204, details are not described herein.
Step 606, generation, which redirect to instruct and be sent to the access request, corresponds to second user terminal.
It, can be according to public network when second private network base station determines that the access request corresponds to second user terminal with permission The corresponding frequency point in base station generates and redirects instruction, and redirection instruction is sent to the access request corresponding second and is used Family terminal;After the second user terminal receives the redirection instruction, it can be instructed according to the redirection and access to public network base station Corresponding cell;And then the corresponding data of communication acquisition can be carried out with public network base station subsequent.
Step 607, generation are successfully accessed information and sending to the access request and correspond to second user terminal.
When second private network base station determines that the access request corresponds to second user terminal without permission, produces and connect Enter success message, then by it is described be successfully accessed message and be sent to the access request correspond to second user terminal, should with notice Second user terminal is successfully accessed the corresponding cell in the second private network base station;The second user terminal receives described be successfully accessed and disappears After breath, the corresponding cell in the second private network base station can reside in, at this point, the second user can not pass through the acquisition pair of the second private network base station The business datum answered.
To sum up, the embodiment of the present invention is using Generation Mobile Telecommunication System technology or the second user of 3rd generation mobile communication technology Terminal, after sending access request to corresponding second private network base station, the second private network base station receives the access request, then judges The access request corresponds to whether second user terminal has permission;If the access request, which corresponds to second user terminal, has power Limit then generates redirection and instructs and be sent to the access request and correspond to second user terminal, so that having the of permission Two user terminals have access to the corresponding cell in public network base station, obtain corresponding business datum subsequently through public network base station.If institute It states access request and corresponds to second user terminal without permission, then generate and be successfully accessed information and sending to the access request pair Second user terminal is answered, so that the second user terminal resides in the corresponding cell in the private network base station;Wherein, described second Private network base station is not no core network access, so that correspondence can not be obtained in candidate by not having the second user terminal of permission Business datum;To carry out effective communication control to mobile terminal.
Further, the embodiment of the present invention judges that the access request corresponds to whether second user terminal has permission described When, it can first judge whether current time was in the control period, when determining that current time was not in the control period, Whether the IMSI for judging that the access request corresponds to second user terminal is IMSI in blacklist;And then in addition to can be to black name The corresponding second user terminal of IMSI carries out the control period can also being arranged, in the control period outside communication control in list All second user terminals carry out communication control, thus meet different communication control region individual demand.
It should be noted that for simple description, therefore, it is stated as a series of action groups for embodiment of the method It closes, but those skilled in the art should understand that, embodiment of that present invention are not limited by the describe sequence of actions, because according to According to the embodiment of the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also should Know, the embodiments described in the specification are all preferred embodiments, and the related movement not necessarily present invention is implemented Necessary to example.
Referring to Fig. 7, a kind of structural frames of the communication control Installation practice applied to MEC server of the present invention are shown Figure, can specifically include following module:
First receiving module 701, for receiving the request of data of the first private network base station forwarding, the request of data is described First private network base station is received from the first user terminal, wherein first user terminal and the first private network base station are to use What fourth generation mobile communication technology or the above order mobile communication technology of forth generation communicated;
First judgment module 702, for judging whether corresponding first user terminal of the request of data has permission;
First sending module 703, if there is permission for corresponding first user terminal of the request of data, by the number It is sent to core net according to request, makes core net that the request of data is sent to internet to obtain corresponding data;
Second sending module 704, if not having permission for corresponding first user terminal of the request of data, generation is asked It seeks failed message and is sent to first private network base station, so that first private network base station sends the request failure message To the user terminal.
Referring to Fig. 8, the structural frames of another communication control Installation practice for being applied to MEC server of the invention are shown Figure, of the invention one optionally in embodiment, described device further includes following module:
Third sending module 705 will be described if having permission for corresponding first user terminal of the request of data Request of data is sent to local server, to obtain the corresponding data of the request of data from local server.
Blacklist generation module 706, for according to the first user terminal, in net information, the first of preset rules will to be met The IMSI of user terminal is added in the blacklist.
In an alternative embodiment of the invention, the first judgment module 702 includes following submodule:
First acquisition submodule 7021, for obtaining current time and obtaining from the request of data the first user terminal International mobile subscriber identity IMSI;
First permission judging submodule 7022 for the IMSI according to corresponding first user terminal of the request of data and is worked as The preceding time, judge whether corresponding first user terminal of the request of data has permission.
In an alternative embodiment of the invention, the first permission judging submodule 7022 is described current for judging Whether the time is in the communication control period;If the current time is in the communication control period, it is determined that the data are asked Corresponding first user terminal is asked not have permission;If the current time is not at the communication control period, judge from black name Whether the IMSI matched IMSI of the request of data corresponding first user terminal is inquired in list;If being inquired from blacklist The matched IMSI, it is determined that corresponding first user terminal of the request of data does not have permission;If from blacklist not Inquire the matched IMSI, it is determined that corresponding first user terminal of the request of data has permission.
The embodiment of the present invention uses the first of fourth generation mobile communication technology or the above order mobile communication technology of forth generation User terminal, after sending request of data to corresponding first private network base station, the request of data is forwarded to by the first private network base station In mobile edge calculations server, the MEC server receives the request of data of the first private network base station forwarding, then described in judgement Whether corresponding first user terminal of request of data has permission;If corresponding first user terminal of the request of data has permission, The request of data is then sent to core net, makes core net that the request of data is sent to internet to obtain corresponding number According to so that the first user terminal with permission can obtain the corresponding data of the request of data.If the data are asked It asks corresponding first user terminal not have permission, then generates request failure message and be sent to first private network base station, so that The request failure message is sent to the user terminal by first private network base station;So that not having the first of permission User terminal can not obtain the corresponding data of the request of data;To carry out effective communication control to mobile terminal.
Referring to Fig. 9, a kind of structure of the communication control Installation practice applied to the second private network base station of the present invention is shown Block diagram can specifically include following module:
Second receiving module 901, for receiving the access request of second user terminal transmission, wherein the second user Terminal and the second private network base station are communicated using Generation Mobile Telecommunication System technology or 3rd generation mobile communication technology, described the The two non-core network access in private network base station;
Second judgment module 902, for judging that the access request corresponds to whether second user terminal has permission;
4th sending module 903, if corresponding to second user terminal with permission for the access request, generation is reset Second user terminal is corresponded to instructing and being sent to the access request, the redirection instruction is used to indicate the second user Terminal accesses public network base station;
5th sending module 904, if corresponding to second user terminal without permission for the access request, generation is connect Enter success message and be sent to the access request and correspond to second user terminal so that the second user terminal reside in it is described The corresponding cell in second private network base station.
Referring to Fig.1 0, show the knot of another communication control Installation practice for being applied to the second private network base station of the invention Structure block diagram, in an alternative embodiment of the invention, described device further include:
Blacklist obtains module 905, for obtaining the corresponding blacklist of second user terminal in advance.
In an alternative embodiment of the invention, second judgment module 902 includes following submodule:
Second acquisition submodule 9021, for obtaining current time and the acquisition second user terminal from the access request International mobile subscriber identity IMS;
Second permission judging submodule 9022, for corresponding to the IMSI of second user terminal according to the access request and working as The preceding time judges that the access request corresponds to whether second user terminal has permission.
In an alternative embodiment of the invention, the second permission judging submodule 9022 is described current for judging Whether the time is in the communication control period;If the current time is in the communication control period, it is determined that the access is asked Corresponding second user terminal is asked not have permission;If the current time is not at the communication control period, judge from black name Whether IMSI matched IMSI that the request of data correspond to second user terminal is inquired in list;If being inquired from blacklist The matched IMSI, it is determined that the access request corresponds to second user terminal without permission;If not looked into from blacklist Ask the matched IMSI, it is determined that the access request corresponds to second user terminal with permission.
To sum up, the embodiment of the present invention is using Generation Mobile Telecommunication System technology or the second user of 3rd generation mobile communication technology Terminal, after sending access request to corresponding second private network base station, the second private network base station receives the access request, then judges The access request corresponds to whether second user terminal has permission;If the access request, which corresponds to second user terminal, has power Limit then generates redirection and instructs and be sent to the access request and correspond to second user terminal, so that having the of permission Two user terminals have access to the corresponding cell in public network base station, obtain corresponding business datum subsequently through public network base station.If institute It states access request and corresponds to second user terminal without permission, then generate and be successfully accessed information and sending to the access request pair Second user terminal is answered, so that the second user terminal resides in the corresponding cell in the private network base station;Wherein, described second Private network base station is not no core network access, so that correspondence can not be obtained in candidate by not having the second user terminal of permission Business datum;To carry out effective communication control to mobile terminal.
For device embodiment, since it is basically similar to the method embodiment, related so being described relatively simple Place illustrates referring to the part of embodiment of the method.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
It should be understood by those skilled in the art that, the embodiment of the embodiment of the present invention can provide as method, apparatus or calculate Machine program product.Therefore, the embodiment of the present invention can be used complete hardware embodiment, complete software embodiment or combine software and The form of the embodiment of hardware aspect.Moreover, the embodiment of the present invention can be used one or more wherein include computer can With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code The form of the computer program product of implementation.
The embodiment of the present invention be referring to according to the method for the embodiment of the present invention, terminal device (system) and computer program The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions In each flow and/or block and flowchart and/or the block diagram in process and/or box combination.It can provide these Computer program instructions are set to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals Standby processor is to generate a machine, so that being held by the processor of computer or other programmable data processing terminal devices Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram The device of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing terminal devices In computer-readable memory operate in a specific manner, so that instruction stored in the computer readable memory generates packet The manufacture of command device is included, which realizes in one side of one or more flows of the flowchart and/or block diagram The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing terminal devices, so that Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus The instruction executed on computer or other programmable terminal equipments is provided for realizing in one or more flows of the flowchart And/or in one or more blocks of the block diagram specify function the step of.
Although the preferred embodiment of the embodiment of the present invention has been described, once a person skilled in the art knows bases This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as Including preferred embodiment and fall into all change and modification of range of embodiment of the invention.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap Those elements are included, but also including other elements that are not explicitly listed, or further includes for this process, method, article Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device for including the element.
Above to a kind of communication management-control method provided by the present invention and a kind of communication control device, detailed Jie has been carried out It continues, used herein a specific example illustrates the principle and implementation of the invention, and the explanation of above embodiments is only It is to be used to help understand method and its core concept of the invention;At the same time, for those skilled in the art, according to this hair Bright thought, there will be changes in the specific implementation manner and application range, in conclusion the content of the present specification should not manage Solution is limitation of the present invention.

Claims (18)

1. a kind of communication management-control method, which is characterized in that be applied to the first communication managing and control system, the first communication managing and control system It include: mobile edge calculations MEC server, the first private network base station, the first user terminal and core net, which comprises
MEC server receives the request of data of the first private network base station forwarding, the request of data be first private network base station from First user terminal is received;
Judge whether corresponding first user terminal of the request of data has permission;
If corresponding first user terminal of the request of data has permission, the request of data is sent to core net, makes core The request of data is sent to internet to obtain corresponding data by heart net;
If corresponding first user terminal of the request of data does not have permission, generates request failure message and be sent to described the One private network base station, so that the request failure message is sent to the user terminal by first private network base station;
Wherein, first user terminal and the first private network base station are using more than fourth generation mobile communication technology or forth generation The communication of order mobile communication technology.
2. the method according to claim 1, wherein corresponding first user terminal of the judgement request of data Whether there is permission, comprising:
It obtains current time and obtains the international mobile subscriber identity IMSI of the first user terminal from the request of data;
According to the IMSI and current time of corresponding first user terminal of the request of data, the request of data corresponding first is judged Whether user terminal has permission.
3. according to the method described in claim 2, it is characterized in that, described according to corresponding first user terminal of the request of data IMSI and current time, judge whether corresponding first user terminal of the request of data has permission, comprising:
Judge whether the current time is in the communication control period;
If the current time is in the communication control period, it is determined that corresponding first user terminal of the request of data does not have Permission;
If the current time is not at the communication control period, judge the request of data whether is inquired from blacklist The matched IMSI of IMSI of corresponding first user terminal;
If inquiring the matched IMSI from blacklist, it is determined that corresponding first user terminal of the request of data does not have It has permission;
If not inquiring the matched IMSI from blacklist, it is determined that the corresponding first user terminal tool of the request of data It has permission.
4. the method according to claim 1, wherein further include:
If corresponding first user terminal of the request of data has permission, the request of data is sent to local service Device, to obtain the corresponding data of the request of data from local server.
5. the method according to claim 1, wherein further include:
According to the first user terminal in net information, the IMSI for meeting the first user terminal of preset rules is added to described black In list.
6. a kind of communication management-control method, which is characterized in that be applied to the second communication managing and control system, the second communication managing and control system It include: the second private network base station and second user terminal, which comprises, the second private network base station receives second user terminal hair The access request sent;
Judge that the access request corresponds to whether second user terminal has permission;
If the access request corresponds to second user terminal with permission, generates redirection instruction and be sent to the access and ask Corresponding second user terminal is sought, the redirection instruction is used to indicate second user terminal access public network base station;
If the access request corresponds to second user terminal without permission, generation is successfully accessed information and sending and connects to described Enter and request corresponding second user terminal, so that the second user terminal resides in the corresponding cell in second private network base station;
Wherein, the second user terminal and the second private network base station are mobile using Generation Mobile Telecommunication System technology or the third generation Communication technology communication, the non-core network access in second private network base station.
7. according to the method described in claim 6, it is characterized in that, described judge whether the access request corresponds to user terminal With permission, comprising:
It obtains current time and obtains the international mobile subscriber identity IMS of second user terminal from the access request;
The IMSI and current time that second user terminal is corresponded to according to the access request judge the access request corresponding second Whether user terminal has permission.
8. the method according to the description of claim 7 is characterized in that described correspond to second user terminal according to the access request IMSI and current time, judge that the access request corresponds to whether second user terminal has permission, comprising:
Judge whether the current time is in the communication control period;
If the current time is in the communication control period, it is determined that the access request, which corresponds to second user terminal, not to be had Permission;
If the current time is not at the communication control period, judge the request of data whether is inquired from blacklist The matched IMSI of IMSI of corresponding second user terminal;
If inquiring the matched IMSI from blacklist, it is determined that the access request, which corresponds to second user terminal, not to be had Permission;
If not inquiring the matched IMSI from blacklist, it is determined that the access request, which corresponds to second user terminal, to be had Permission.
9. according to the method described in claim 6, it is characterized by further comprising:
The corresponding blacklist of second user terminal is obtained in advance.
10. a kind of communication control device, which is characterized in that the mobile edge calculations MEC clothes applied to the first communication managing and control system It is engaged in device, the first communication managing and control system includes: mobile edge calculations MEC server, the first private network base station, the first user end End and core net;Described device includes:
First receiving module, for receiving the request of data of the first private network base station forwarding, the request of data is described first special It is received from the first user terminal to net base station, wherein first user terminal and the first private network base station are using forth generation What mobile communication technology or the above order mobile communication technology of forth generation communicated;
First judgment module, for judging whether corresponding first user terminal of the request of data has permission;
First sending module, if there is permission for corresponding first user terminal of the request of data, by the request of data It is sent to core net, makes core net that the request of data is sent to internet to obtain corresponding data;
Second sending module generates request failure if not having permission for corresponding first user terminal of the request of data Information and sending to first private network base station so that first private network base station request failure message is sent to it is described User terminal.
11. device according to claim 10, which is characterized in that the first judgment module includes:
First acquisition submodule is moved for obtaining current time and obtaining the international of the first user terminal from the request of data Dynamic CUSTOMER ID IMSI;
First permission judging submodule, for corresponding to the IMSI and current time of the first user terminal according to the request of data, Judge whether corresponding first user terminal of the request of data has permission.
12. device according to claim 11, which is characterized in that
The first permission judging submodule, for judging whether the current time is in the communication control period;If described Current time is in the communication control period, it is determined that corresponding first user terminal of the request of data does not have permission;If institute It states current time and is not at the communication control period, then judge whether inquire the request of data corresponding first from blacklist The matched IMSI of the IMSI of user terminal;If inquiring the matched IMSI from blacklist, it is determined that the request of data Corresponding first user terminal does not have permission;If not inquiring the matched IMSI from blacklist, it is determined that the number There is permission according to corresponding first user terminal of request.
13. device according to claim 10, which is characterized in that described device further include:
Third sending module asks the data if having permission for corresponding first user terminal of the request of data It asks and is sent to local server, to obtain the corresponding data of the request of data from local server.
14. device according to claim 10, which is characterized in that described device further include:
Blacklist generation module, for according to the first user terminal, in net information, the first user end of preset rules will to be met The IMSI at end is added in the blacklist.
15. a kind of communication control device, which is characterized in that in the second private network base station applied to the second communication managing and control system, institute State that the second communication managing and control system includes: the second private network base station and second user terminal, described device include:
Second receiving module, for receiving the access request of second user terminal transmission, wherein the second user terminal and the Two private network base stations are communicated using Generation Mobile Telecommunication System technology or 3rd generation mobile communication technology, the second private network base It stands non-core network access;
Second judgment module, for judging that the access request corresponds to whether second user terminal has permission;
4th sending module generates redirection instruction if corresponding to second user terminal with permission for the access request And be sent to the access request and correspond to second user terminal, the redirection instruction is used to indicate the second user terminal and connects Enter public network base station;
5th sending module, if corresponding to second user terminal without permission for the access request, generation is successfully accessed Information and sending to the access request corresponds to second user terminal, so that the second user terminal resides in described second specially Net the corresponding cell in base station.
16. device according to claim 15, which is characterized in that second judgment module includes:
Second acquisition submodule is moved for obtaining current time and obtaining the international of second user terminal from the access request Dynamic CUSTOMER ID IMS;
Second permission judging submodule, for corresponding to the IMSI and current time of second user terminal according to the access request, Judge that the access request corresponds to whether second user terminal has permission.
17. device according to claim 16, which is characterized in that
The second permission judging submodule, for judging whether the current time is in the communication control period;If described Current time is in the communication control period, it is determined that the access request corresponds to second user terminal without permission;If institute It states current time and is not at the communication control period, then judge whether inquire the request of data corresponding second from blacklist The matched IMSI of the IMSI of user terminal;If inquiring the matched IMSI from blacklist, it is determined that the access request Corresponding second user terminal does not have permission;If not inquiring the matched IMSI from blacklist, it is determined that the access Request corresponding second user terminal that there is permission.
18. device according to claim 15, which is characterized in that described device further include:
Blacklist obtains module, for obtaining the corresponding blacklist of second user terminal in advance.
CN201810005578.4A 2018-01-03 2018-01-03 A kind of communication management-control method and device Pending CN109996233A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810005578.4A CN109996233A (en) 2018-01-03 2018-01-03 A kind of communication management-control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810005578.4A CN109996233A (en) 2018-01-03 2018-01-03 A kind of communication management-control method and device

Publications (1)

Publication Number Publication Date
CN109996233A true CN109996233A (en) 2019-07-09

Family

ID=67128454

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810005578.4A Pending CN109996233A (en) 2018-01-03 2018-01-03 A kind of communication management-control method and device

Country Status (1)

Country Link
CN (1) CN109996233A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110474956A (en) * 2019-07-10 2019-11-19 视联动力信息技术股份有限公司 Depending on networked devices title method, apparatus, electronic equipment and readable storage medium storing program for executing
CN110896537A (en) * 2019-12-19 2020-03-20 武汉虹信通信技术有限责任公司 Communication management and control method and device
CN112203305A (en) * 2020-09-30 2021-01-08 中国联合网络通信集团有限公司 Mobile terminal management method, terminal management platform, management network element and mobile terminal
CN112437080A (en) * 2020-11-20 2021-03-02 中国联合网络通信集团有限公司 Service authentication method and device
CN112788644A (en) * 2020-12-31 2021-05-11 西安抱朴通信科技有限公司 Edge distribution system and method for service data in mobile network
CN113596837A (en) * 2021-07-09 2021-11-02 长安大学 Method and system for determining core network selection
CN114071464A (en) * 2020-08-06 2022-02-18 中国移动通信集团上海有限公司 Private network implementation method, device, equipment and storage medium based on 5G message

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110474956A (en) * 2019-07-10 2019-11-19 视联动力信息技术股份有限公司 Depending on networked devices title method, apparatus, electronic equipment and readable storage medium storing program for executing
CN110896537A (en) * 2019-12-19 2020-03-20 武汉虹信通信技术有限责任公司 Communication management and control method and device
CN114071464A (en) * 2020-08-06 2022-02-18 中国移动通信集团上海有限公司 Private network implementation method, device, equipment and storage medium based on 5G message
CN114071464B (en) * 2020-08-06 2023-08-15 中国移动通信集团上海有限公司 Private network implementation method, device and equipment based on 5G message and storage medium
CN112203305A (en) * 2020-09-30 2021-01-08 中国联合网络通信集团有限公司 Mobile terminal management method, terminal management platform, management network element and mobile terminal
CN112437080A (en) * 2020-11-20 2021-03-02 中国联合网络通信集团有限公司 Service authentication method and device
CN112788644A (en) * 2020-12-31 2021-05-11 西安抱朴通信科技有限公司 Edge distribution system and method for service data in mobile network
CN112788644B (en) * 2020-12-31 2024-02-02 西安抱朴通信科技有限公司 Edge distribution system and method for service data in mobile network
CN113596837A (en) * 2021-07-09 2021-11-02 长安大学 Method and system for determining core network selection
CN113596837B (en) * 2021-07-09 2023-05-26 长安大学 Method and system for determining core network selection

Similar Documents

Publication Publication Date Title
CN109996233A (en) A kind of communication management-control method and device
US11477668B2 (en) Proactively adjusting network infrastructure in response to reporting of real-time network performance
CN103533189B (en) The distribution method and device of mobile agent call
CN106170008A (en) A kind of inter-network means of communication, device and load equalizer
CN104852937B (en) Method for network access and device for mobile application
US9521262B2 (en) Method and apparatus for calling terminal to join conference
CN107566429A (en) Base station, the response method of access request, apparatus and system
CN106941507A (en) The dispatching method and device of request message
CN108390955A (en) Domain Name acquisition method, Website access method and server
WO2018192149A1 (en) Dial testing method, apparatus and system
CN109547348A (en) A kind of communication, method for routing foundation and device
CN107404728A (en) A kind of method and device of network problem positioning
CN102014391B (en) Wireless network safety access method, system and wireless controller
US11349731B2 (en) Data collection for the evaluation of the quality of experience of a service over a communications network
CN112152879B (en) Network quality determination method, device, electronic equipment and readable storage medium
CN109462878A (en) A kind of method of network entry and device of same frequency terminal node
Mandalari et al. Measuring roaming in europe: Infrastructure and implications on users’ qoe
CN109219046A (en) Method for switching network and device
CN109819482A (en) A kind of data processing method and device
US20210092231A1 (en) Stack queuing customer care routing with vertical metrics
CN107995622A (en) A kind of method and system that network is accessed by portable router
CN105359494B (en) System, device, method and network server node is presented in mirror image between website
CN106303105A (en) The method of calling of dynamic more voice service number based on client identification module and system
Ndiaye et al. Contribution to improving the conditions of access to very high speed 5G internet for online education in developing African countries
CN106161051A (en) Custom end intelligent route selection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190709

RJ01 Rejection of invention patent application after publication