CN113347169B - Communication system based on wireless mobile and wired discontinuous mobile - Google Patents
Communication system based on wireless mobile and wired discontinuous mobile Download PDFInfo
- Publication number
- CN113347169B CN113347169B CN202110582021.9A CN202110582021A CN113347169B CN 113347169 B CN113347169 B CN 113347169B CN 202110582021 A CN202110582021 A CN 202110582021A CN 113347169 B CN113347169 B CN 113347169B
- Authority
- CN
- China
- Prior art keywords
- access
- module
- network
- mobile
- wireless
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/37—Managing security policies for mobile devices or for controlling mobile applications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Abstract
The invention provides a communication system based on wireless mobile and wired discontinuous mobile, comprising: a network access unit and a mobile core network; the network access unit is used for a user to carry and connect to the mobile core network by adopting an optical fiber, a LAN, an MSTP/PTN and a PON access mode through a service data and control signaling interface; the mobile core network comprises an authentication module, a backup module and an external network interaction module, wherein the authentication module is used for setting an access area and an access resource for a legal access object and identifying accessed network users to ensure that the network access users are authorized users and forbid unauthorized users from accessing the system, the backup module is used for backing up data resources, and the external network interaction module is used for connecting with another mobile core network and carrying out data interaction.
Description
Technical Field
The invention relates to the technical field of communication, in particular to a communication system based on wireless mobile and wired discontinuous mobile.
Background
The field of communication technology is divided into wired communication and wireless communication. Wire communication refers to information transmission by using tangible media such as metal wires and optical fibers, and information exchange and transmission are realized through a wire network, and modern wire communication mainly refers to optical fiber communication, for example, voice signals are transmitted in cables through a modulation and demodulation technology, and wire communication needs a specific transmission medium, usually uses an electric wire or an optical cable as a communication medium, and provides a criss-cross information channel for remote wire communication. The wire communication is high in safety and good in confidentiality, and is not prone to electromagnetic interference. In the current social life, wireless communication has become an indispensable communication means, for example, bluetooth devices, mobile phones, some wireless devices and the like all need to perform data transmission, and the advantages of mobility, no cable limitation and the like bring great convenience to the use of communication terminal devices. The combination of wired and wireless technologies provides convenient communication connections for users.
In summary, it is very important for those skilled in the art to provide a communication system based on wireless mobility and wired discontinuous mobility, which enables different wireless mobile communication technologies to realize convergence and sharing in a wired communication environment.
Disclosure of Invention
In view of the above-mentioned problems and needs, the present invention provides a communication system based on wireless mobile and wired discontinuous mobile, which can solve the above technical problems due to the following technical solutions.
In order to achieve the purpose, the invention provides the following technical scheme: a communication system based on wireless mobile and wired discontinuous mobile, comprising: a network access unit and a mobile core network;
the network access unit is used for a user to bear and connect to the mobile core network by adopting an optical fiber, LAN, MSTP/PTN and PON access mode through a service data and control signaling interface;
the mobile core network comprises an authentication module, a backup module and an external network interaction module, wherein the authentication module is used for setting an access area and an access resource for a legal access object, identifying accessed network users, ensuring that the network access users are authorized users, and forbidding unauthorized users to access the system, the backup module is used for backing up data resources, and the external network interaction module is used for connecting with another mobile core network and performing data interaction.
Further, the network access unit comprises a network access device and an access sub-network module;
the network access equipment comprises integrated access equipment IAD, an optical transceiver, a router and a user side switch, small-scale application can be directly accessed to a mobile core network through the integrated access equipment IAD, a user is connected with the integrated access equipment IAD through a telephone line arranged on an equipment side distribution frame, the integrated access equipment IAD is connected with the optical transceiver through an FE electrical interface and is transmitted to an IP metropolitan area network in an MSTP mode, and the integrated access equipment IAD is connected to the mobile IMS core network through the IP metropolitan area network to realize fixed voice access of the user; the optical transceiver is connected to the base station transmission equipment through a dual-route optical cable so as to access a mobile transmission network, user equipment is connected to the optical transceiver through the user side switch in an FE electrical interface mode through a router additionally arranged in the machine room, and is connected to a CMNET network through the mobile transmission network so as to provide internet surfing service for users;
the access subnet module comprises an access control module, a resource management module, an authorization judgment module and an information encryption module, wherein the access control module is used for controlling the access of wireless/wired services and the transmission management of loaded software and hardware resources and monitoring the data security; the resource management module is used for managing and controlling communication and access resources, the resource management module comprises a base station and a base station controller, and the information encryption module is used for encrypting data information by an authorized user by using a wireless encryption protocol, so that the information of the authorized user is prevented from being changed and stolen by an illegal user.
Furthermore, the access control module comprises a monitoring module and a data security module;
the monitoring module is used for monitoring a user network access list, setting the user access list in a wireless mobile communication system and a wired discontinuous mobile communication system through a wireless communication and mobile internet security device access point and a wired communication security device access point, only allowing an authorized user to access a corresponding network and regularly clearing unauthorized users and illegal users;
the data security module is used for managing data security and comprises an isolation module, a virus killing prevention module and a wireless data packet filtering module;
when a wireless mobile communication system or a wired discontinuous mobile communication system is infected by viruses, the data security module immediately isolates virus infected areas to block further propagation ways of the viruses, a multi-level antivirus strategy is established by the antivirus prevention module, a multi-level antivirus system is established according to different virus infection capacities, and a user can automatically start a core-level virus prevention strategy and a deep virus prevention strategy by setting;
the wireless data packet filtering module is used for comparing, analyzing and judging data in the data packet, comparing and analyzing the data packet according to the characteristics of the virus database, analyzing a communication data sending port, an IP destination address, a data packet protocol type and an IP source address of wireless mobile communication data, and acquiring the filtered and analyzed data packet.
Furthermore, the authorization judging module is used for judging whether the accessed wireless network user is an authorized user, and if the accessed wireless network user is an unauthorized user, the access is refused.
Furthermore, the information encryption module comprises an encryption module and a security parameter setting module, the encryption module is used for performing corresponding private key password encryption and public key password encryption on services in the mobile communication service, and the security parameter setting module is used for setting security parameters and regional data of wireless mobile communication according to user requirements.
Further, the mobile core network further comprises a wired transmission device management module, and the wired transmission device management module is used for monitoring and managing states of the wired transmission device and the emergency communication device.
Furthermore, the access subnetwork module further comprises a network switching management module, and the network switching management module is used for establishing a new link connection for the original communication at a new wired access position or a new wireless mobile coverage area and releasing the original link connection and wired or wireless access resources when the user equipment switches between the wireless mobile communication and the wired discontinuous mobile communication access mode.
The mobile core network also includes a service management module, the user equipment realizes information communication transmission by the wireless access resource, the wired access resource, the wireless access bearer and each wireless and wired access service provided by the network access unit, the network access unit is connected with the mobile core network, and the service management module performs access port and position registration, switching and roaming management on legal user equipment and performs communication management on voice, data and multimedia communication services of a packet domain.
According to the technical scheme, the invention has the beneficial effects that: the invention realizes the fusion and sharing of different wireless mobile communication technologies in a wired communication environment, improves the communication quality and reduces the communication cost.
In addition to the above objects, features and advantages, preferred embodiments of the present invention will be described in more detail below with reference to the accompanying drawings so that the features and advantages of the present invention can be easily understood.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments of the present invention or the prior art will be briefly described, wherein the drawings are only used for illustrating some embodiments of the present invention and do not limit the whole embodiments of the present invention.
Fig. 1 is a schematic diagram of a communication system based on wireless mobile and wired discontinuous mobile according to the present invention.
Fig. 2 is a schematic diagram of a structure of a network access device according to the present invention.
Fig. 3 is a schematic diagram of the structure of an access subnetwork module in the present invention.
Fig. 4 is a schematic diagram of a data security module according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings of specific embodiments of the present invention. Like reference symbols in the various drawings indicate like elements. It should be noted that the described embodiments are only some embodiments of the invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the described embodiments of the invention without inventive step, are within the scope of protection of the invention.
The integrated communication system can bear various communication services including voice service, data service, image transmission service and the like, a wired network and a wireless network can be connected to a plurality of nodes, the wireless nodes can be normally used on the premise of normal work of the wired network, the number of the wireless nodes can be continuously increased along with the continuous increase of network requirements, and a large number of wireless nodes need to be provided with more lines to provide wider bandwidth for the wireless nodes. The invention provides a communication system based on wireless mobile and wired discontinuous mobile, which enables different wireless mobile communication technologies to realize fusion and sharing in a wired communication environment. As shown in fig. 1 to 4, the system includes: a network access unit and a mobile core network. The network access unit is used for a user to bear and connect to the mobile core network by adopting an optical fiber, LAN, MSTP/PTN and PON access mode through a service data and control signaling interface; the mobile core network comprises an authentication module, a backup module and an external network interaction module, wherein the authentication module is used for setting an access area and access resources for a legal access object, authenticating and identifying the accessed network users, ensuring that the network access users are authorized users, and forbidding unauthorized users to access the system, the backup module is used for backing up data resources, and the external network interaction module is used for connecting with another mobile core network and carrying out data interaction.
The network access unit comprises network access equipment and an access sub-network module. The network access equipment comprises integrated access equipment IAD, an optical transceiver, a router and a user side switch, small-scale application can be directly accessed to a mobile core network through the integrated access equipment IAD, a user is connected with the integrated access equipment IAD through a telephone line distributed on an equipment side distribution frame, the integrated access equipment IAD is connected with the optical transceiver through an FE (user FE) electrical interface and is transmitted to an IP metropolitan area network in an MSTP (multiple spanning tree protocol), and link redundancy and load balance can be realized by using the MSTP protocol on data flow between the same VLAN at the same physical position. The IP metropolitan area network is connected to a mobile IMS core network to realize the fixed voice access of users, wherein, an Integrated Access Device (IAD) is an access device which can deliver the traditional PSTN voice service, data packet voice service, data service on a single WAN link (through a LAN port) and the like at the same time. The IAD aggregates multiple voice and data channels across a single shared access link into a carrier or service provider POP; the optical transceiver is connected to the base station transmission equipment through a double-route optical cable and then is accessed to a mobile transmission network, the user equipment is connected to the optical transceiver through the user side switch in an FE electrical interface mode through a router additionally arranged in the machine room, and is connected to a CMNET network through the mobile transmission network, so that internet access service is provided for users. In the embodiment, the system communication architecture is a hierarchical structure, and comprises 3 layers of a core layer, a convergence layer and an access layer, and the load capacity and stability of the network are greatly enhanced by the hierarchical structural design. The core layer uses gigabit optical fiber link aggregation binding to greatly increase the exchange capacity between the network interiors through an optical transmitter and a switch, and the like, the convergence layer adopts the convergence switch to connect to the optical transmitter in an FE mode, the user side switch connects to the newly added convergence switch in an up mode to realize the broadband access requirement of a user side, the access layer adopts the switch, and access control to an access user can be realized through access authentication, so that the client, the access equipment, a third-party server, a security policy server and the like are integrated into a linked security defense system. And the access switch to the convergence switch and the convergence switch to the optical terminal both use dual optical fiber links, the two optical fiber links are backup for each other, only one link is in active use under normal conditions through an MSTP algorithm, the other link is in a blocking state, and once the active link fails, the flow can be automatically switched to the standby link.
In the system, the access subnet module comprises an access control module, a resource management module, an authorization judgment module, an information encryption module and a network switching management module, wherein the access control module is used for controlling the access of wireless/wired services and the transmission management of loaded software and hardware resources and monitoring the data security; the resource management module is used for managing and controlling communication and access resources, the resource management module comprises a base station and a base station controller, and the information encryption module is used for encrypting data information by using a wireless encryption protocol by an authorized user so as to prevent the authorized user information from being changed and stolen by an illegal user. The authorization judging module is used for judging whether the accessed wireless network user is an authorized user or not, and refusing access if the accessed wireless network user is an unauthorized user.
Specifically, the access control module comprises a monitoring module and a data security module; the monitoring module is used for monitoring a user network access list, setting the user access list in a wireless mobile communication system and a wired discontinuous mobile communication system through a wireless communication and mobile internet security device access point and a wired communication security device access point, only allowing an authorized user to access a corresponding network and regularly clearing unauthorized users and illegal users; the data security module is used for managing data security and comprises an isolation module, a virus killing and preventing module and a wireless data packet filtering module; when a wireless mobile communication system or a wired discontinuous mobile communication system is infected by viruses, the data security module immediately isolates virus infection areas to block further propagation paths of the viruses, a layered antivirus strategy is established by the antivirus prevention module, a multi-layered antivirus system is established according to different virus infection capacities, and a user can automatically start a core-level virus prevention strategy and a deep virus prevention strategy by setting; the wireless data packet filtering module is used for comparing, analyzing and judging data in the data packet, comparing and analyzing the data packet according to the characteristics of the virus database, analyzing a communication data sending port, an IP destination address, a data packet protocol type and an IP source address of wireless mobile communication data, and acquiring the filtered and analyzed data packet.
In this embodiment, the antivirus module periodically checks security holes of the terminal, installation of antivirus software of the terminal, and update of a virus database, and restricts software installed and operated by the terminal through black and white software management, and at the same time, the monitoring module manages and controls network access rights of the terminal user through a unified access policy and a security policy.
The information encryption module comprises an encryption module and a security parameter setting module, the encryption module is used for carrying out corresponding private key password encryption and public key password encryption on services in mobile communication services, and the security parameter setting module is used for setting security parameters and regional data of wireless mobile communication according to user requirements.
The network switching management module is used for establishing new link connection for the original communication at a new wired access position or a new wireless mobile coverage area when the user equipment is switched between the wireless mobile communication and the wired discontinuous mobile communication access mode, and releasing the original link connection and wired or wireless access resources.
The mobile core network also comprises a wired transmission equipment management module and a service management module, wherein the wired transmission equipment management module is used for monitoring and managing the states of wired transmission equipment and emergency communication equipment. The user equipment realizes information communication transmission by the wireless access resource, the wired access resource, the wireless access bearer and each wireless and wired access service provided by the network access unit, the network access unit is connected with a mobile core network, and the service management module performs access port and position registration, switching and roaming management on legal user equipment and performs communication management on voice, data and multimedia communication services of a packet domain.
It should be noted that the described embodiments of the invention are only preferred ways of implementing the invention, and that all obvious modifications, which are within the scope of the invention, are all included in the present general inventive concept.
Claims (6)
1. A communication system based on wireless mobile and wired discontinuous mobile, comprising: a network access unit and a mobile core network;
the network access unit is used for a user to bear and connect to the mobile core network by adopting an optical fiber, LAN, MSTP/PTN and PON access mode through a service data and control signaling interface;
the mobile core network comprises an authentication module, a backup module and an extranet interaction module, wherein the authentication module is used for setting an access area and an access resource for a legal access object, identifying accessed network users, ensuring that the network access users are authorized users, and forbidding unauthorized users to access the system, the backup module is used for backing up data resources, and the extranet interaction module is used for connecting with another mobile core network and performing data interaction;
the network access unit comprises network access equipment and an access subnet module;
the network access equipment comprises integrated access equipment IAD, an optical transceiver, a router and a user side switch, small-scale application can be directly accessed to a mobile core network through the integrated access equipment IAD, a user is connected with the integrated access equipment IAD through a telephone line arranged on an equipment side distribution frame, the integrated access equipment IAD is connected with the optical transceiver through an FE electrical interface and is transmitted to an IP metropolitan area network in an MSTP mode, and the integrated access equipment IAD is connected to the mobile IMS core network through the IP metropolitan area network to realize fixed voice access of the user; the optical transmitter and receiver is connected to the base station transmission equipment through a dual-route optical cable so as to access a mobile transmission network, the user equipment is connected to the optical transmitter and receiver through the user side switch through a router additionally arranged in the machine room in an FE electrical interface mode, and is connected to a CMNET network through the mobile transmission network so as to provide internet surfing service for users;
the access subnet module comprises an access control module, a resource management module, an authorization judgment module and an information encryption module, wherein the access control module is used for controlling the access of wireless/wired services and the transmission management of loaded software and hardware resources and monitoring the data security; the resource management module is used for managing and controlling communication and access resources, the resource management module comprises a base station and a base station controller, and the information encryption module is used for encrypting data information by using a wireless encryption protocol by an authorized user so as to prevent the authorized user information from being changed and stolen by an illegal user;
the access control module comprises a monitoring module and a data security module;
the monitoring module is used for monitoring a user network access list, setting the user access list in a wireless mobile communication system and a wired discontinuous mobile communication system through a wireless communication and mobile internet security device access point and a wired communication security device access point, only allowing an authorized user to access a corresponding network and regularly clearing unauthorized users and illegal users;
the data security module is used for managing data security and comprises an isolation module, a virus killing and preventing module and a wireless data packet filtering module;
when a wireless mobile communication system or a wired discontinuous mobile communication system is infected by viruses, the data security module immediately isolates virus infection areas to block further propagation paths of the viruses, a layered antivirus strategy is established by the antivirus prevention module, a multi-layered antivirus system is established according to different virus infection capacities, and a user can automatically start a core-level virus prevention strategy and a deep virus prevention strategy by setting;
the wireless data packet filtering module is used for comparing, analyzing and judging data in the data packet, comparing and analyzing the data packet according to the characteristics of the virus database, analyzing a communication data sending port, an IP destination address, a data packet protocol type and an IP source address of wireless mobile communication data, and acquiring the filtered and analyzed data packet.
2. The system of claim 1, wherein the authorization determination module is configured to determine whether a wireless network user accessing the system is an authorized user, and deny access if the wireless network user accessing the system is an unauthorized user.
3. The wireless mobile and wired discontinuous mobile communication system according to claim 2, wherein the information encryption module comprises an encryption module and a security parameter setting module, the encryption module is used for performing corresponding private key cipher encryption and public key cipher encryption on the services in the mobile communication service, and the security parameter setting module is used for setting security parameters and regional data of wireless mobile communication according to user requirements.
4. The wireless mobile and wired discontinuous mobile based communication system according to claim 1, wherein the mobile core network further comprises a wired transmission device management module for monitoring and managing states of wired transmission devices and emergency communication devices.
5. The wireless mobile and wired discontinuous mobile based communication system according to claim 1, wherein the access subnetwork module further comprises a network handover management module, and the network handover management module is configured to establish a new link connection for the original communication in a new wired access location or a new wireless mobile coverage area and release the original link connection and wired or wireless access resources when the ue switches between the wireless mobile communication and wired discontinuous mobile communication access modes.
6. The wireless mobile and wired discontinuous mobile based communication system according to claim 1, wherein the mobile core network further comprises a service management module, the ue implements information communication transmission by providing radio access resources, wired access resources and radio access bearers and respective radio and wired access services of the network access unit, the network access unit is connected to the mobile core network, and the service management module performs access port and location registration, handover, roaming management for legitimate ues, and communication management for voice, data, multimedia communication services in packet domain.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110582021.9A CN113347169B (en) | 2021-05-25 | 2021-05-25 | Communication system based on wireless mobile and wired discontinuous mobile |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110582021.9A CN113347169B (en) | 2021-05-25 | 2021-05-25 | Communication system based on wireless mobile and wired discontinuous mobile |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113347169A CN113347169A (en) | 2021-09-03 |
CN113347169B true CN113347169B (en) | 2022-09-06 |
Family
ID=77471748
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110582021.9A Active CN113347169B (en) | 2021-05-25 | 2021-05-25 | Communication system based on wireless mobile and wired discontinuous mobile |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113347169B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1787434A (en) * | 2004-12-08 | 2006-06-14 | 杭州华为三康技术有限公司 | System and method for safety identification to network customer terminal |
CN1859614A (en) * | 2005-12-28 | 2006-11-08 | 华为技术有限公司 | Method, device and system for radio transmission |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1728579A (en) * | 2004-07-30 | 2006-02-01 | 俞隽 | Communication network system and method syncretic configured from wireless mobile comunication and wired discontinuous mobile communication |
CN100407622C (en) * | 2004-07-30 | 2008-07-30 | 俞隽 | Wired core network system and method possessing non-continuous mobile characteristics |
CN101800753B (en) * | 2010-03-16 | 2012-07-18 | 中国电子科技集团公司第三十研究所 | Comprehensive safety protecting method based on integral network safety service framework |
EP2403186B1 (en) * | 2010-07-02 | 2017-12-27 | Vodafone IP Licensing limited | Telecommunication networks |
CN102594814B (en) * | 2012-02-10 | 2014-11-12 | 福建升腾资讯有限公司 | Terminal-based network access control system |
KR20230035427A (en) * | 2016-05-12 | 2023-03-13 | 인터디지탈 패튼 홀딩스, 인크 | Connecting to virtualized mobile core networks |
-
2021
- 2021-05-25 CN CN202110582021.9A patent/CN113347169B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1787434A (en) * | 2004-12-08 | 2006-06-14 | 杭州华为三康技术有限公司 | System and method for safety identification to network customer terminal |
CN1859614A (en) * | 2005-12-28 | 2006-11-08 | 华为技术有限公司 | Method, device and system for radio transmission |
Also Published As
Publication number | Publication date |
---|---|
CN113347169A (en) | 2021-09-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10097517B2 (en) | Secure tunnels for the internet of things | |
CA2600760C (en) | Security for mobile devices in a wireless network | |
JP4754964B2 (en) | Radio network control apparatus and radio network control system | |
US7574202B1 (en) | System and methods for a secure and segregated computer network | |
JP4369513B2 (en) | Improved subscriber authentication for unlicensed mobile connection signaling | |
KR100704202B1 (en) | Radio lan access authentication system | |
KR101518362B1 (en) | Method and apparatus for providing network communication association information to applications and services | |
US8838752B2 (en) | Enterprise wireless local area network switching system | |
US7797530B2 (en) | Authentication and encryption method and apparatus for a wireless local access network | |
WO2008019615A1 (en) | The method, device and system for access authenticating | |
CN108234677B (en) | Block chain network node service device facing multi-block chain platform | |
US8498223B2 (en) | Systems and methods for providing emergency service trust in packet data networks | |
KR20140123883A (en) | Security and information supporting method and apparatus for using policy control in change of subscription to mobile network operator in mobile telecommunication system environment | |
WO2006002601A1 (en) | A method for wireless lan users set-up session connection | |
US8069473B2 (en) | Method to grant access to a data communication network and related devices | |
WO2014102525A1 (en) | Method and device for secure network access | |
WO2012122217A2 (en) | Method and apparatus for network access control | |
US20020056001A1 (en) | Communication security system | |
CN113347169B (en) | Communication system based on wireless mobile and wired discontinuous mobile | |
Chamas et al. | Securing open access networks using intelligent policy management system | |
Cartmell | Meeting lawful interception requirements for selected ip traffic offload and local IP access traffic |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |