CN113395392A - Call access control method, system, simulcast system and terminal - Google Patents

Call access control method, system, simulcast system and terminal Download PDF

Info

Publication number
CN113395392A
CN113395392A CN202110657019.3A CN202110657019A CN113395392A CN 113395392 A CN113395392 A CN 113395392A CN 202110657019 A CN202110657019 A CN 202110657019A CN 113395392 A CN113395392 A CN 113395392A
Authority
CN
China
Prior art keywords
terminal
access code
identification information
voice
sending
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110657019.3A
Other languages
Chinese (zh)
Other versions
CN113395392B (en
Inventor
陈家鑫
边境
李海华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Hytera Technology Corp ltd
Original Assignee
Harbin Hytera Technology Corp ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Hytera Technology Corp ltd filed Critical Harbin Hytera Technology Corp ltd
Priority to CN202110657019.3A priority Critical patent/CN113395392B/en
Publication of CN113395392A publication Critical patent/CN113395392A/en
Application granted granted Critical
Publication of CN113395392B publication Critical patent/CN113395392B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls

Abstract

In the application, the simulcasting system receives a check signaling sent by a terminal, then receives a voice header and a voice frame sent by the terminal after the check signaling is sent, and forwards the voice header and the voice frame sent by the terminal under the condition that an access code is checked to be legal, so that the voice header and the voice frame are prevented from being forwarded before the access code is checked to be legal, and the reliability of call access control is improved. And the call access control is realized by consuming the time length of one check signaling, so that the occupied time of a channel can be shortened, the efficiency of the call access control is improved, and the air interface resources are saved.

Description

Call access control method, system, simulcast system and terminal
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method, a system, a simulcast system, and a terminal for call access control.
Background
The simulcast system is fast in access and simple in use, and is widely applied to special task guarantee in large-area mobile scenes such as public security fire fighting. However, the simulcast system has no call access control, so that no matter a legal or illegal terminal, the simulcast system can be accessed as long as the frequency point meets the requirements of the simulcast system, and the security of the simulcast system is threatened.
Therefore, a method for call access control is needed in the simulcast system.
Disclosure of Invention
In order to solve the above technical problems, embodiments of the present application provide a method, a system, a simulcast system, and a terminal for call access control, so as to achieve the purpose of improving reliability and efficiency of call access control, and the technical solution is as follows:
a method for controlling call access is applied to a simulcast system, and comprises the following steps:
receiving a check signaling sent by a terminal, wherein the check signaling comprises identification information of the terminal and an access code generated according to the identification information of the terminal;
receiving a voice header and a voice frame sent by the terminal according to a predetermined mode, wherein the predetermined mode at least comprises the following steps: after the check signaling is sent, sending the check signaling;
and forwarding the voice header and the voice frame sent by the terminal under the condition that the access code is verified to be legal according to the identification information of the terminal in the verification signaling.
Optionally, under the condition that the access code is verified to be illegal according to the identification information of the terminal in the verification signaling, the forwarding of the voice header and the voice frame sent by the terminal is refused.
Optionally, the method further includes:
and issuing an interruption instruction to the terminal so that the terminal stops sending the voice header or the voice frame.
Optionally, after receiving the check signaling sent by the terminal, the method further includes:
sending an instruction to the terminal, wherein the instruction is used for instructing the terminal to start sending the voice header and the voice frame;
the predetermined manner further includes: and sending the instruction after receiving the instruction.
Optionally, the verifying that the access code is legal according to the identification information of the terminal in the verification signaling includes:
analyzing the identification information of the terminal and an access code generated according to the identification information of the terminal from the checking signaling;
generating a target access code according to the identification information of the terminal;
comparing whether the access code and the target access code are consistent;
and if the access codes are consistent, determining that the access codes are legal.
A method for controlling call access is applied to a terminal, and comprises the following steps:
generating an access code according to setting information, wherein the setting information at least comprises identification information of the terminal;
sending a verification signaling containing the identification information of the terminal and the access code to a simulcasting system so that the simulcasting system carries out validity verification on the access code to obtain a validity verification result;
and sending a voice header and a voice frame to the simulcasting system according to a preset mode so as to enable the simulcasting system to forward the voice header and the voice frame under the condition that the validity check result is that the access code is legal, wherein the preset mode at least comprises sending after the check signaling is sent.
Optionally, the predetermined manner further includes:
and after receiving an instruction sent by the simulcast system and used for indicating the terminal to start sending the voice header and the voice frame, sending the instruction.
Optionally, the identification information of the terminal includes: the ID of the terminal and the electronic serial number ESN of the terminal, the setting information further includes: random numbers issued by the simulcast system;
the generating the access code according to the setting information includes:
carrying out bitwise AND operation on the terminal ID and first information extracted from an ESN of the terminal to obtain first operation information;
performing and operation on second information extracted from the ESN of the terminal and the random number to obtain second operation information;
and carrying out XOR operation on the first operation information and the second operation information to obtain an XOR operation result, and taking the XOR operation result as an access code.
Optionally, the taking the result of the xor operation as an access code includes:
and encrypting the result of the XOR operation, and taking the encrypted result of the XOR operation as an access code.
A simulcast system, comprising: a first memory and a first processor;
the first memory for storing at least one set of instructions;
the first processor is configured to call and execute the instruction set in the memory, and execute the instruction set to perform the steps of the call access control method according to any one of the above items.
A terminal, comprising: a second memory and a second processor;
the second memory for storing at least one set of instructions;
the second processor is configured to call and execute the instruction set in the memory, and execute the steps of the call access control method according to any one of the above items by executing the instruction set.
A system for call access control, comprising:
a terminal for:
generating an access code according to setting information, wherein the setting information at least comprises identification information of the terminal;
sending a verification signaling containing the identification information of the terminal and the access code to a simulcasting system;
sending a voice header and a voice frame to the simulcasting system according to a predetermined mode, wherein the predetermined mode at least comprises sending after sending the check signaling;
the simulcast system is configured to:
receiving a check signaling sent by a terminal, wherein the check signaling comprises identification information of the terminal and an access code generated according to the identification information of the terminal;
and forwarding the voice header and the voice frame sent by the terminal under the condition that the access code is verified to be legal according to the identification information of the terminal in the verification signaling.
Compared with the prior art, the beneficial effect of this application is:
in the application, the simulcast system firstly receives the check signaling sent by the terminal, then receives the voice header and the voice frame sent by the terminal after sending the check signaling, and forwards the voice header and the voice frame sent by the terminal under the condition of checking the validity of the access code, so that the voice header and the voice frame are prevented from being forwarded before the access code is checked to be valid, and the reliability of call access control is improved. And the call access control is realized by consuming the time length of one check signaling, so that the occupied time of a channel can be shortened, the efficiency of the call access control is improved, and the air interface resources are saved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive labor.
Fig. 1 is a flowchart of an embodiment 1 of a method for call access control provided in the present application;
fig. 2 is a flowchart of embodiment 2 of a method for call access control provided in the present application;
fig. 3 is a flowchart of embodiment 3 of a method for call access control provided in the present application;
fig. 4 is a flowchart of embodiment 4 of a method for call access control provided in the present application;
fig. 5 is a flowchart of embodiment 5 of a method for call access control provided in the present application;
fig. 6 is a schematic diagram of a logical structure of a call access control system provided in the present application.
Detailed Description
In the background that the simulcast system has no call access control, the person skilled in the art proposes a method for performing the authentication of the simulcast system by using an ESN check. The specific implementation process is as follows: the terminal carries its own ESN (Electronic Serial Number) in the first voice superframe of the uplink. And after receiving the first language of the terminal and heading towards the town, the base station compares the analyzed ESN information with the ESN stored in the system background. If the two are matched, the verification is passed, and the voice is continuously forwarded normally.
However, the inventor finds that the above-mentioned method has a problem that the simulcast base station forwards the first voice superframe no matter whether the check is passed or not, reliability of call access control cannot be ensured, and more air interface resources are wasted by forwarding the first voice superframe. In order to improve the above problem, the present application provides a method for call access control, and the following detailed description is provided for the method for call access control provided by the present application.
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, the present application is described in further detail with reference to the accompanying drawings and the detailed description.
As shown in fig. 1, a flowchart of embodiment 1 of a method for call access control provided in the present application is applied to a simulcast system, and the method may include the following steps:
step S11, receiving a check signaling sent by the terminal, where the check signaling includes the identification information of the terminal and an access code generated according to the identification information of the terminal.
In this embodiment, before the terminal sends the voice header and the voice frame, the terminal may generate the access code according to the setting information, and the setting information may at least include the identification information of the terminal.
The identification information of the terminal may include: the ID of the terminal and the electronic serial number ESN of the terminal, and the setting information may further include: and the random number is issued by the simulcast system. The random number issued by the simulcast system may be, but is not limited to: the simulcast system utilizes the random number delivered by the ShortLC period. The ShortLC period can be understood as: the short link in CACH controls the signaling period.
It will be appreciated that the simulcast system will not deliver the random numbers at different ShortLC periods.
The generating the access code according to the setting information may include, but is not limited to:
s1101, performing bitwise AND operation on the terminal ID and first information extracted from the ESN of the terminal to obtain first operation information;
s1102, performing AND operation on second information extracted from the ESN of the terminal and the random number to obtain second operation information;
s1103, performing XOR operation on the first operation information and the second operation information to obtain an XOR operation result, and taking the XOR operation result as an access code.
In this embodiment, taking the result of the exclusive or operation as an access code may include:
and encrypting the result of the XOR operation, and taking the encrypted result of the XOR operation as an access code.
In this embodiment, the setting information includes, in addition to the terminal ID and the ESN of the terminal, the random number issued by the simulcast system using the ShortLC, so as to ensure that the access code is different along with the difference in the random number issued by the simulcast system, increase the difficulty of falsification of the access code, and further improve the reliability of call access control.
The check signaling sent by the terminal may be, but is not limited to: csbk (air interface control signaling block) type of check signaling.
Step S12, receiving a speech header and a speech frame sent by the terminal according to a predetermined manner, where the predetermined manner at least includes: and sending the check signaling after sending the check signaling.
The speech header can be understood as: a control frame transmitted by the terminal before the voice frame is transmitted. The control frame may include information such as a call type, a call destination address, and a call source address.
Step S13, checking whether the access code is legal or not according to the identification information of the terminal in the check signaling.
If yes, go to step S14. And after receiving the check signaling, the broadcasting system checks whether the access code is legal or not according to the identification information of the terminal in the check signaling. The process of verifying whether the access code is legal according to the identification information of the terminal in the verification signaling may include:
s131, analyzing the identification information of the terminal and an access code generated according to the identification information of the terminal from the check signaling;
s132, generating a target access code according to the identification information of the terminal.
The process of generating the target access code according to the identification information of the terminal may include, but is not limited to:
comparing the identification information of the terminal with the identification information of the terminal stored in advance by the simulcast system;
and if the comparison is consistent, generating a target access code according to the identification information of the terminal.
S133, comparing whether the access code is consistent with the target access code.
And if the access codes are consistent, determining that the access codes are legal.
And step S14, forwarding the voice header and the voice frame sent by the terminal.
In the application, the simulcast system firstly receives the check signaling sent by the terminal, then receives the voice header and the voice frame sent by the terminal after sending the check signaling, and forwards the voice header and the voice frame sent by the terminal under the condition of checking the validity of the access code, so that the voice header and the voice frame are prevented from being forwarded before the access code is checked to be valid, and the reliability of call access control is improved. And the call access control is realized by consuming the time length of one check signaling, so that the occupied time of a channel can be shortened, the efficiency of the call access control is improved, and the air interface resources are saved.
As another alternative embodiment of the present application, referring to fig. 2, a flowchart of embodiment 2 of a method for call access control provided by the present application is provided, where this embodiment is mainly an extension of the method for call access control described in embodiment 1 above, and as shown in fig. 2, the method may include, but is not limited to, the following steps:
step S21, receiving a check signaling sent by a terminal, wherein the check signaling comprises identification information of the terminal and an access code generated according to the identification information of the terminal;
step S22, receiving the speech header and the speech frame sent by the terminal according to a predetermined manner, where the predetermined manner at least includes: after the check signaling is sent, sending the check signaling;
step S23, checking whether the access code is legal or not according to the identification information of the terminal in the check signaling.
If yes, go to step S24; if not, step S25 is executed.
And step S24, forwarding the voice header and the voice frame sent by the terminal.
The detailed procedures of steps S21-S24 can be found in the related descriptions of steps S11-S14 in embodiment 1, and are not repeated herein.
And step S25, refusing to forward the voice header and the voice frame sent by the terminal.
And refusing to forward the voice header and the voice frame sent by the terminal under the condition that the access code is verified to be illegal according to the identification information of the terminal in the verification signaling, so that illegal terminal access is avoided, and the reliability of call access control is further improved.
As another alternative embodiment of the present application, referring to fig. 3, a flowchart of embodiment 3 of a method for call access control provided by the present application is provided, where this embodiment is mainly an extension of the method for call access control described in embodiment 2 above, and as shown in fig. 3, the method may include, but is not limited to, the following steps:
step S31, receiving a check signaling sent by a terminal, wherein the check signaling comprises identification information of the terminal and an access code generated according to the identification information of the terminal;
step S32, receiving the speech header and the speech frame sent by the terminal according to a predetermined manner, where the predetermined manner at least includes: after the check signaling is sent, sending the check signaling;
step S33, checking whether the access code is legal or not according to the identification information of the terminal in the check signaling.
If yes, go to step S34; if not, step S35 is executed.
And step S34, forwarding the voice header and the voice frame sent by the terminal.
The detailed procedures of steps S31-S34 can be referred to the related descriptions of steps S21-S24 in embodiment 2, and are not described herein again.
Step S35, issuing an interrupt instruction to the terminal so that the terminal stops sending voice headers or voice frames.
In this embodiment, the simulcast system may issue an interrupt instruction to the terminal in an adjacent time slot, so that the terminal stops sending the speech header or the speech frame.
And step S36, refusing to forward the voice header and the voice frame sent by the terminal.
In this embodiment, when the access code is verified to be illegal according to the identification information of the terminal in the verification signaling, an interrupt instruction is issued to the terminal so that the terminal stops sending the voice header or the voice frame, which can reduce the data volume received by the simulcast system and save air interface resources.
As another alternative embodiment of the present application, referring to fig. 4, a flowchart of embodiment 4 of a method for call access control provided by the present application is provided, where this embodiment is mainly an extension of the method for call access control described in embodiment 1 above, and as shown in fig. 4, the method may include, but is not limited to, the following steps:
step S41, receiving a check signaling sent by the terminal, where the check signaling includes the identification information of the terminal and an access code generated according to the identification information of the terminal.
The detailed process of step S41 can be referred to the related description of step S11 in embodiment 1, and is not repeated here.
Step S42, sending an instruction to the terminal, wherein the instruction is used for instructing the terminal to start sending the voice header and the voice frame.
Step S43, receiving the speech header and the speech frame sent by the terminal according to a predetermined manner, where the predetermined manner at least includes: after the check signaling is sent, and after the indication instruction is received, sending the check signaling.
It can be understood that, in this embodiment, the terminal starts to send the voice header and the voice frame after receiving the indication instruction and sending the verification signaling, and the terminal itself does not actively start to send the voice header and the voice frame after sending the verification signaling.
Step S44, checking whether the access code is legal or not according to the identification information of the terminal in the check signaling.
If yes, go to step S45.
And step S45, forwarding the voice header and the voice frame sent by the terminal.
The detailed procedures of steps S44-S45 can be found in the related descriptions of steps S13-S14 in embodiment 1, and are not repeated herein.
In this embodiment, the simulcast system sends an instruction to the terminal to instruct the terminal to start sending the voice header and the voice frame, and the terminal starts sending the voice header and the voice frame when receiving the instruction, so as to prevent the simulcast system from receiving invalid information and save air interface resources of the simulcast system.
As another alternative embodiment of the present application, referring to fig. 5, there is provided a flowchart of embodiment 5 of a method for call access control, which is applied to a terminal, as shown in fig. 5, and the method may include, but is not limited to, the following steps:
step S51, generating an access code according to setting information, where the setting information at least includes identification information of the terminal.
The identification information of the terminal may include: the ID of the terminal and the electronic serial number ESN of the terminal, and the setting information may further include: and the random number is issued by the simulcast system. The random number issued by the simulcast system may be, but is not limited to: the simulcast system utilizes the random number delivered by the ShortLC period. The ShortLC period can be understood as: the short link in CACH controls the signaling period.
It will be appreciated that the simulcast system will not deliver the random numbers at different ShortLC periods.
The generating the access code according to the setting information may include, but is not limited to:
s5101, bitwise AND operation is carried out on the terminal ID and first information extracted from the ESN of the terminal to obtain first operation information;
s5102, performing an and operation on the random number and second information extracted from the ESN of the terminal to obtain second operation information;
s5103, carrying out XOR operation on the first operation information and the second operation information to obtain an XOR operation result, and taking the XOR operation result as an access code.
In this embodiment, taking the result of the exclusive or operation as an access code may include:
and encrypting the result of the XOR operation, and taking the encrypted result of the XOR operation as an access code.
In this embodiment, the setting information includes, in addition to the terminal ID and the ESN of the terminal, the random number issued by the simulcast system using the ShortLC, so as to ensure that the access code is different along with the difference in the random number issued by the simulcast system, increase the difficulty of falsification of the access code, and further improve the reliability of call access control.
The check signaling sent by the terminal may be, but is not limited to: csbk (air interface control signaling block) type of check signaling.
Step S52, sending a verification signaling containing the identification information of the terminal and the access code to the simulcasting system, so that the simulcasting system performs validity verification on the access code to obtain a validity verification result.
The detailed process of the simulcast system performing validity check on the access code to obtain the validity check result may refer to the related introduction of the simulcast system described in the foregoing embodiments, which checks whether the access code is valid according to the identification information of the terminal in the check signaling, and is not described herein again.
Step S53, sending a voice header and a voice frame to the simulcasting system according to a predetermined manner, so that the simulcasting system forwards the voice header and the voice frame when the validity check result indicates that the access code is valid, where the predetermined manner at least includes sending after sending the check signaling.
In this embodiment, after sending the check signaling, the terminal may automatically send the voice header and the voice frame without being controlled by the simulcast system.
After the terminal sends the check signaling, the terminal automatically sends the voice header and the voice frame, so that the efficiency of sending the voice header and the voice frame by the terminal can be ensured.
Of course, the predetermined manner may further include:
and after receiving an instruction sent by the simulcast system and used for indicating the terminal to start sending the voice header and the voice frame, sending the instruction.
When the terminal receives the instruction, the terminal starts to send the voice header and the voice frame, so that the simulcast system can be prevented from receiving invalid information, and the air interface resource of the simulcast system is saved.
In this embodiment, the terminal sends the check signaling first, and sends the voice header and the voice frame after sending the check signaling, so that the simulcast system receives the check signaling sent by the terminal first, then receives the voice header and the voice frame sent by the terminal after sending the check signaling, and forwards the voice header and the voice frame sent by the terminal under the condition that the check access code is legal, thereby avoiding forwarding the voice header and the voice frame before checking the access code as legal, and improving the reliability of call access control. And the call access control is realized by consuming the time length of one check signaling, so that the occupied time of a channel can be shortened, the efficiency of the call access control is improved, and the air interface resources are saved.
Furthermore, before sending the voice header, the terminal sends a check signaling containing the terminal ID and the preset access code to the simulcast system, and the traditional flow of sending the voice header and the voice frame by the terminal is not changed, so that the realization of call access control is simpler.
A simulcast system provided by the present application is described next, and the simulcast system described below and the method for call access control described above are referred to correspondingly.
In this embodiment, the simulcast system includes: a first memory and a first processor;
the first memory for storing at least one set of instructions;
the first processor is configured to call and execute the instruction set in the memory, and execute the instruction set to perform the steps of the call access control method as described in any one of embodiments 1 to 4.
A terminal provided by the present application is described below, and the terminal described below and the method for controlling call access described above may be referred to correspondingly.
In this embodiment, the terminal includes: a second memory and a second processor;
the second memory for storing at least one set of instructions;
the second processor is configured to call and execute the instruction set in the memory, and execute the steps of the call access control method as described in embodiment 5 by executing the instruction set.
Next, a system for call access control provided by the present application will be described, and the system for call access control described below and the method for call access control described above may be referred to correspondingly.
Referring to fig. 5, the system for call access control includes: a terminal 11 and a simulcast system 12.
A terminal 11 for:
generating an access code according to setting information, wherein the setting information at least comprises identification information of the terminal;
sending a verification signaling containing the identification information of the terminal and the access code to a simulcasting system;
sending a voice header and a voice frame to the simulcasting system according to a predetermined mode, wherein the predetermined mode at least comprises sending after sending the check signaling;
the simulcast system 12 is configured to:
receiving a check signaling sent by a terminal, wherein the check signaling comprises identification information of the terminal and an access code generated according to the identification information of the terminal;
and forwarding the voice header and the voice frame sent by the terminal under the condition that the access code is verified to be legal according to the identification information of the terminal in the verification signaling.
It should be noted that each embodiment is mainly described as a difference from the other embodiments, and the same and similar parts between the embodiments may be referred to each other. For the device-like embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
From the above description of the embodiments, it is clear to those skilled in the art that the present application can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the present application may be essentially or partially implemented in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments of the present application.
The method and system for call access control provided by the present application are introduced in detail above, and a specific example is applied in the present application to illustrate the principle and implementation manner of the present application, and the description of the above embodiment is only used to help understand the method and core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (12)

1. A method for call access control, applied to a simulcast system, the method comprising:
receiving a check signaling sent by a terminal, wherein the check signaling comprises identification information of the terminal and an access code generated according to the identification information of the terminal;
receiving a voice header and a voice frame sent by the terminal according to a predetermined mode, wherein the predetermined mode at least comprises the following steps: after the check signaling is sent, sending the check signaling;
and forwarding the voice header and the voice frame sent by the terminal under the condition that the access code is verified to be legal according to the identification information of the terminal in the verification signaling.
2. The method of claim 1, wherein in case that the access code is verified to be illegal according to the identification information of the terminal in the verification signaling, forwarding of the voice header and the voice frame sent by the terminal is denied.
3. The method of claim 2, further comprising:
and issuing an interruption instruction to the terminal so that the terminal stops sending the voice header or the voice frame.
4. The method of claim 1, wherein after receiving the check signaling sent by the terminal, the method further comprises:
sending an instruction to the terminal, wherein the instruction is used for instructing the terminal to start sending the voice header and the voice frame;
the predetermined manner further includes: and sending the instruction after receiving the instruction.
5. The method of claim 1, wherein the verifying that the access code is valid according to the identification information of the terminal in the verification signaling comprises:
analyzing the identification information of the terminal and an access code generated according to the identification information of the terminal from the checking signaling;
generating a target access code according to the identification information of the terminal;
comparing whether the access code and the target access code are consistent;
and if the access codes are consistent, determining that the access codes are legal.
6. A method for call access control, applied to a terminal, includes:
generating an access code according to setting information, wherein the setting information at least comprises identification information of the terminal;
sending a verification signaling containing the identification information of the terminal and the access code to a simulcasting system so that the simulcasting system carries out validity verification on the access code to obtain a validity verification result;
and sending a voice header and a voice frame to the simulcasting system according to a preset mode so as to enable the simulcasting system to forward the voice header and the voice frame under the condition that the validity check result is that the access code is legal, wherein the preset mode at least comprises sending after the check signaling is sent.
7. The method of claim 6, wherein the predetermined manner further comprises:
and after receiving an instruction sent by the simulcast system and used for indicating the terminal to start sending the voice header and the voice frame, sending the instruction.
8. The method of claim 6, wherein the identification information of the terminal comprises: the ID of the terminal and the electronic serial number ESN of the terminal, the setting information further includes: random numbers issued by the simulcast system;
the generating the access code according to the setting information includes:
carrying out bitwise AND operation on the terminal ID and first information extracted from an ESN of the terminal to obtain first operation information;
performing and operation on second information extracted from the ESN of the terminal and the random number to obtain second operation information;
and carrying out XOR operation on the first operation information and the second operation information to obtain an XOR operation result, and taking the XOR operation result as an access code.
9. The method of claim 8, wherein the using the XOR operation result as an access code comprises:
and encrypting the result of the XOR operation, and taking the encrypted result of the XOR operation as an access code.
10. A simulcast system, comprising: a first memory and a first processor;
the first memory for storing at least one set of instructions;
the first processor, configured to invoke and execute the set of instructions in the memory, and to execute the set of instructions to perform the steps of the call access control method according to any one of claims 1 to 5.
11. A terminal, comprising: a second memory and a second processor;
the second memory for storing at least one set of instructions;
the second processor, configured to invoke and execute the set of instructions in the memory, and execute the set of instructions to perform the steps of the call access control method according to any one of claims 6 to 9.
12. A system for call access control, comprising:
a terminal for:
generating an access code according to setting information, wherein the setting information at least comprises identification information of the terminal;
sending a verification signaling containing the identification information of the terminal and the access code to a simulcasting system;
sending a voice header and a voice frame to the simulcasting system according to a predetermined mode, wherein the predetermined mode at least comprises sending after sending the check signaling;
the simulcast system is configured to:
receiving a check signaling sent by a terminal, wherein the check signaling comprises identification information of the terminal and an access code generated according to the identification information of the terminal;
and forwarding the voice header and the voice frame sent by the terminal under the condition that the access code is verified to be legal according to the identification information of the terminal in the verification signaling.
CN202110657019.3A 2021-06-11 2021-06-11 Call access control method, system, simulcast system and terminal Active CN113395392B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110657019.3A CN113395392B (en) 2021-06-11 2021-06-11 Call access control method, system, simulcast system and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110657019.3A CN113395392B (en) 2021-06-11 2021-06-11 Call access control method, system, simulcast system and terminal

Publications (2)

Publication Number Publication Date
CN113395392A true CN113395392A (en) 2021-09-14
CN113395392B CN113395392B (en) 2022-08-05

Family

ID=77620929

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110657019.3A Active CN113395392B (en) 2021-06-11 2021-06-11 Call access control method, system, simulcast system and terminal

Country Status (1)

Country Link
CN (1) CN113395392B (en)

Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998009227A1 (en) * 1996-08-29 1998-03-05 Smarttouch Tokenless biometric transaction authorization method and system
US5729549A (en) * 1995-03-16 1998-03-17 Bell Atlantic Network Services, Inc. Simulcasting digital video programs for broadcast and interactive services
US5822324A (en) * 1995-03-16 1998-10-13 Bell Atlantic Network Services, Inc. Simulcasting digital video programs for broadcast and interactive services
WO2001084768A1 (en) * 2000-05-01 2001-11-08 Authenex, Inc. Method of authenticating user
US20050238016A1 (en) * 2004-04-23 2005-10-27 Yasuyuki Nishibayashi Communication apparatus, communication system, and communication control program
US20060129458A1 (en) * 2000-10-12 2006-06-15 Maggio Frank S Method and system for interacting with on-demand video content
WO2008042990A1 (en) * 2006-10-03 2008-04-10 Yardarm Technologies, Llc Methods and systems for providing advanced call services
CN102170614A (en) * 2011-04-29 2011-08-31 杭州东信北邮信息技术有限公司 Interactive voice data response system and realizing method thereof
CN103237191A (en) * 2013-04-16 2013-08-07 成都飞视美视频技术有限公司 Method for synchronously pushing audios and videos in video conference
US8964739B1 (en) * 2013-09-13 2015-02-24 SMG Holdings—Anova Technologies, LLC Self-healing data transmission system and method to achieve deterministic and lower latency
CN104539436A (en) * 2014-12-22 2015-04-22 杭州施强网络科技有限公司 Lesson content real-time live broadcasting method and system
CN105519028A (en) * 2015-07-01 2016-04-20 海能达通信股份有限公司 Wireless system access control method and apparatus
WO2016095473A1 (en) * 2014-12-17 2016-06-23 中兴通讯股份有限公司 Security call method, terminal and system, and computer storage medium
US20160234307A1 (en) * 2013-09-29 2016-08-11 Beijing Qihoo Technology Company Limited Data transmission method, device, and system
US20170366388A1 (en) * 2014-12-19 2017-12-21 Ivent Mobile B.V. Voice and text data service for mobile subscribers
WO2018164707A1 (en) * 2017-03-07 2018-09-13 Intel IP Corporation Internet-of-things (iot) station (sta), access point (ap) and methods for unassociated communication
CN108847248A (en) * 2018-06-15 2018-11-20 珠海市杰理科技股份有限公司 Bluetooth equipment audio-frequency processing method, system, readable storage medium storing program for executing and bluetooth equipment
US20190110091A1 (en) * 2016-09-14 2019-04-11 Boe Technology Group Co., Ltd. Method and device for synchronously performing an operation on contents
CN110290592A (en) * 2018-03-19 2019-09-27 北京三星通信技术研究有限公司 The method and user equipment of relay transmission
CN111585697A (en) * 2020-04-03 2020-08-25 河南翔宇医疗设备股份有限公司 Communication method, device and multi-module communication system

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5729549A (en) * 1995-03-16 1998-03-17 Bell Atlantic Network Services, Inc. Simulcasting digital video programs for broadcast and interactive services
US5822324A (en) * 1995-03-16 1998-10-13 Bell Atlantic Network Services, Inc. Simulcasting digital video programs for broadcast and interactive services
WO1998009227A1 (en) * 1996-08-29 1998-03-05 Smarttouch Tokenless biometric transaction authorization method and system
WO2001084768A1 (en) * 2000-05-01 2001-11-08 Authenex, Inc. Method of authenticating user
US20060129458A1 (en) * 2000-10-12 2006-06-15 Maggio Frank S Method and system for interacting with on-demand video content
US20050238016A1 (en) * 2004-04-23 2005-10-27 Yasuyuki Nishibayashi Communication apparatus, communication system, and communication control program
WO2008042990A1 (en) * 2006-10-03 2008-04-10 Yardarm Technologies, Llc Methods and systems for providing advanced call services
CN102170614A (en) * 2011-04-29 2011-08-31 杭州东信北邮信息技术有限公司 Interactive voice data response system and realizing method thereof
CN103237191A (en) * 2013-04-16 2013-08-07 成都飞视美视频技术有限公司 Method for synchronously pushing audios and videos in video conference
US8964739B1 (en) * 2013-09-13 2015-02-24 SMG Holdings—Anova Technologies, LLC Self-healing data transmission system and method to achieve deterministic and lower latency
US20160234307A1 (en) * 2013-09-29 2016-08-11 Beijing Qihoo Technology Company Limited Data transmission method, device, and system
WO2016095473A1 (en) * 2014-12-17 2016-06-23 中兴通讯股份有限公司 Security call method, terminal and system, and computer storage medium
US20170366388A1 (en) * 2014-12-19 2017-12-21 Ivent Mobile B.V. Voice and text data service for mobile subscribers
CN104539436A (en) * 2014-12-22 2015-04-22 杭州施强网络科技有限公司 Lesson content real-time live broadcasting method and system
CN105519028A (en) * 2015-07-01 2016-04-20 海能达通信股份有限公司 Wireless system access control method and apparatus
US20190110091A1 (en) * 2016-09-14 2019-04-11 Boe Technology Group Co., Ltd. Method and device for synchronously performing an operation on contents
WO2018164707A1 (en) * 2017-03-07 2018-09-13 Intel IP Corporation Internet-of-things (iot) station (sta), access point (ap) and methods for unassociated communication
CN110290592A (en) * 2018-03-19 2019-09-27 北京三星通信技术研究有限公司 The method and user equipment of relay transmission
CN108847248A (en) * 2018-06-15 2018-11-20 珠海市杰理科技股份有限公司 Bluetooth equipment audio-frequency processing method, system, readable storage medium storing program for executing and bluetooth equipment
CN111585697A (en) * 2020-04-03 2020-08-25 河南翔宇医疗设备股份有限公司 Communication method, device and multi-module communication system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
ERICSSON /J?RGEN: "C1-185540 "Signing and verification at diversion"", 《3GPP TSG_CT\WG1_MM-CC-SM_EX-CN1》 *
倪惠莲: ""网络安全与防火墙技术"", 《中国优秀硕士学位论文全文数据库》 *
王占龙: ""基于软交换的3G与无线局域网的互通"", 《中国优秀硕士学位论文全文数据库》 *

Also Published As

Publication number Publication date
CN113395392B (en) 2022-08-05

Similar Documents

Publication Publication Date Title
JP5231433B2 (en) System and method for authenticating remote server access
WO2015169158A1 (en) Information protection method and system
CN109345245B (en) Short message verification method, device, network and storage medium based on block chain
US20130160097A1 (en) Methods, apparatus, and computer program products for subscriber authentication and temporary code generation
US20100325708A1 (en) System and method for providing a multi-credential authentication protocol
CN110995689A (en) Method and device for user identity authentication
CN101449566A (en) Method and apparatus for preventing denial of service attacks on cellular infrastructure access channels
EP3319267A1 (en) Wireless system access control method and device
US9270666B2 (en) Verification of user communication addresses
CN110958119A (en) Identity verification method and device
CN111885043B (en) Internet account login method, system, equipment and storage medium
US9680814B2 (en) Method, device, and system for registering terminal application
EP3079329B1 (en) Terminal application registration method, device and system
CN113395392B (en) Call access control method, system, simulcast system and terminal
CN117220904A (en) Service protection method, device, electronic equipment and storage medium
CN109348472B (en) OTA (over the air) upgrading method and system based on single-point pushing
KR102300021B1 (en) Authentication method and telecommunication server using IP address and SMS
CN110650014B (en) Signature authentication method, system, equipment and storage medium based on hessian protocol
CN111193706B (en) Identity verification method and device
CN107995587B (en) Authentication method, authentication platform, authentication system and service provider platform
KR102208332B1 (en) Authentication method and telecommunication server using location information and SMS
KR101746471B1 (en) User authentication method of ssl-vpn and sso based on yaws
CN115250186B (en) Network connection authentication method, device, computer equipment and storage medium
WO2017148337A1 (en) Methods of providing and acquiring terminal service, device, and terminal
CN113079505B (en) User authentication method, core network side device and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant