CN114980264A - Access control method and system, small base station and terminal - Google Patents

Access control method and system, small base station and terminal Download PDF

Info

Publication number
CN114980264A
CN114980264A CN202110211268.XA CN202110211268A CN114980264A CN 114980264 A CN114980264 A CN 114980264A CN 202110211268 A CN202110211268 A CN 202110211268A CN 114980264 A CN114980264 A CN 114980264A
Authority
CN
China
Prior art keywords
base station
small base
terminal
name
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110211268.XA
Other languages
Chinese (zh)
Inventor
孙丽楠
朱红绿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202110211268.XA priority Critical patent/CN114980264A/en
Publication of CN114980264A publication Critical patent/CN114980264A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/10Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The disclosure provides an access control method and system, a small base station and a terminal, and relates to the field of wireless communication. The small base station receives and stores the name and the password of the small base station configured by a user; the small base station broadcasts a system message, wherein the name of the small base station is carried; the small base station receives an access request sent by a terminal, wherein the access request carries the name and the password of the small base station which the terminal requests to access; and the small base station judges whether the name and the password of the small base station in the access request are consistent with the stored name and the password of the small base station, if so, the terminal is allowed to access, and if not, the terminal is forbidden to access. The access control is carried out by utilizing the name and the password of the small base station, and the access control is not carried out by utilizing the IMSI, so that the problems that the IMSI of an individual user is difficult to obtain, the security risk of IMSI leakage, the access control cannot be suitable for 5G and the like in the traditional access control scheme utilizing the IMSI are solved.

Description

Access control method and system, small base station and terminal
Technical Field
The present disclosure relates to the field of wireless communications, and in particular, to an access control method and system, a small cell and a terminal.
Background
At present, a small base station of LTE (Long Term Evolution) makes a UE (User Equipment) report IMSI (International Mobile Subscriber Identity) information through an Identity-Request message of a simulation core network MME (Mobility Management Entity)/AMF (Access and Mobility Management Function), and the small base station of LTE implements analysis of the IMSI of a User through the simulation core network Function. Then, access control is performed by setting a black/white list of the IMSI.
The above scheme has the following problems:
1) for an individual user, the IMSI of the user is not necessarily acquired, and the user needs to be assisted by an operator to inquire and acquire the IMSI, or the terminal supports the display of the IMSI and then is configured to a certain system by the user or the operator;
2) after the small base station has the capability of obtaining the IMSI, the potential safety risk of collecting the IMSI of other surrounding public users exists;
3) the access control method of LTE is not suitable for access control of 5G scenarios because: the 5G terminal encrypts the IMSI (SUPI) to obtain a suci (SUbscription related Identifier), and the small base station cannot acquire the IMSI by the original method, which makes it difficult to perform access control by the black/white list of the IMSI.
Disclosure of Invention
In order to solve the above problem, an embodiment of the present disclosure provides an access control scheme, where access control is performed by using a name and a password of a small base station, and access control is no longer performed by using an IMSI, so as to solve the problems that, in a conventional access control scheme using an IMSI, an IMSI acquisition of an IMSI of an individual user is difficult, a security risk of IMSI leakage is high, and the conventional access control scheme cannot be applied to 5G access control.
Some embodiments of the present disclosure provide an access control method, including:
the small base station receives and stores the name and the password of the small base station configured by a user;
the small base station broadcasts a system message, wherein the name of the small base station is carried;
the small base station receives an access request sent by a terminal, wherein the access request carries the name and the password of the small base station which the terminal requests to access;
and the small base station judges whether the name and the password of the small base station in the access request are consistent with the stored name and the password of the small base station, if so, the access of the terminal is allowed, and if not, the access of the terminal is forbidden.
In some embodiments, the system message includes system information block 1SIB1, SIB1 includes information of the newly added small base station name.
In some embodiments, the access request includes an information element of the newly added small cell name and an information element of the small cell password.
Some embodiments of the present disclosure provide an access control method, including:
a terminal receives a system message broadcasted by a small base station, wherein the system message carries the name of the small base station;
the terminal displays the name of the small base station through a terminal interface and inputs the password of the small base station corresponding to the name of the small base station;
the terminal sends an access request to the small base station, wherein the name and the password of the small base station which the terminal requests to access are carried, so that the small base station allows or forbids the terminal to access according to whether the name and the password of the small base station in the access request are consistent with the stored name and the password of the small base station;
and the terminal accesses the small base station under the condition that the small base station allows access.
In some embodiments, the terminal interface comprises: displaying items of names of the small base stations; and setting items of small base station passwords;
or, the terminal interface includes: displaying items of names of small base stations; setting items of small base station passwords; and, the access control project, is used for disposing and accessing the little base station preferentially;
if the access control item is configured to be preferentially accessed to the small base station, the terminal is preferentially accessed to the small base station, and the small base station is switched out when the signal receiving quality of the small base station is lower than a preset threshold;
and if the access control item is not configured with the priority access to the small base station, the terminal selects the accessed base station by comparing the strength of the signal receiving quality of each base station, wherein each base station comprises a macro base station and a small base station.
In some embodiments, further comprising:
configuring the name and the password of the small base station to the small base station through a web configuration page;
or, the name of the small base station and the password of the small base station are configured to the small base station through a small base station gateway or a small base station network manager.
In some embodiments, the system message includes system information block 1SIB1, SIB1 includes information of the newly added small base station name.
In some embodiments, the access request includes an information element of the newly added small cell name and an information element of the small cell password.
In some embodiments, the access Request includes a radio resource control Setup Request RRC Setup Request, which carries a name and a password of a small base station to which the terminal requests access.
Some embodiments of the present disclosure provide a small cell, including:
a memory; and
a processor coupled to the memory, the processor configured to perform an access control method based on instructions stored in the memory.
Some embodiments of the present disclosure provide a small cell, including:
the message processing module is configured to receive and store the name and the password of the small base station configured by the user; broadcasting system information, wherein the name of the small base station is carried; receiving an access request sent by a terminal, wherein the access request carries a name and a password of a small base station which the terminal requests to access;
and the access control module is configured to judge whether the name and the password of the small base station in the access request are consistent with the stored name and the password of the small base station, if so, the terminal is allowed to access, and if not, the terminal is forbidden to access.
Some embodiments of the present disclosure provide a terminal, including:
a memory; and
a processor coupled to the memory, the processor configured to perform an access control method based on instructions stored in the memory.
Some embodiments of the present disclosure provide a terminal, including:
the password setting module is configured to display the name of the small base station through a terminal interface and input a password of the small base station corresponding to the name of the small base station;
the message processing module is configured to receive a system message broadcasted by the small base station, wherein the system message carries the name of the small base station; sending an access request to a small base station, wherein the access request carries the name and the password of the small base station which is requested to be accessed by a terminal, so that the small base station allows or forbids the access of the terminal according to the consistency between the name and the password of the small base station in the access request and the stored name and the password of the small base station; and accessing the small base station under the condition that the small base station allows access.
In some embodiments, the terminal further comprises: the access control module is configured to provide an access control item through a terminal interface, and is used for configuring whether to access the small base station preferentially; if the access control item is configured to be preferentially accessed to the small base station, the control terminal is preferentially accessed to the small base station, and the small base station is switched out when the signal receiving quality of the small base station is lower than a preset threshold; and if the access control item is not configured with the priority access to the small base station, the control terminal selects the accessed base station by comparing the strength of the signal receiving quality of each base station, wherein each base station comprises a macro base station and a small base station.
Some embodiments of the present disclosure provide an access control system, including: a small base station; and a terminal.
Some embodiments of the present disclosure propose a non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of an access control method.
Drawings
The drawings that will be used in the description of the embodiments or the related art will be briefly described below. The present disclosure can be understood more clearly from the following detailed description, which proceeds with reference to the accompanying drawings.
It is to be understood that the drawings in the following description are merely exemplary of the disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without undue inventive faculty.
Fig. 1 shows a flow diagram of an access control method according to some embodiments of the present disclosure.
Fig. 2 illustrates a schematic diagram of a terminal interface of some embodiments of the present disclosure.
Fig. 3 illustrates a schematic diagram of an access control application of some embodiments of the present disclosure.
Fig. 4 illustrates a schematic diagram of an access control system of some embodiments of the present disclosure.
Fig. 5a shows a schematic diagram of a small cell site of some embodiments of the present disclosure.
Fig. 5b shows a schematic diagram of a small cell of further embodiments of the disclosure.
Fig. 6a shows a schematic diagram of a terminal of some embodiments of the present disclosure.
Fig. 6b shows a schematic view of a terminal of further embodiments of the present disclosure.
Detailed Description
The technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in the embodiments of the present disclosure.
Unless specifically stated otherwise, the descriptions of "first", "second", etc. in this disclosure are used to distinguish different objects, and are not used to indicate the meaning of size or timing, etc.
Fig. 1 shows a flow diagram of an access control method according to some embodiments of the present disclosure.
As shown in fig. 1, the access control method of this embodiment includes: step 110-.
In step 110, the user configures the name and password of the small base station to the small base station; and the small base station receives and stores the name and the password of the small base station configured by the user.
A user configures the name and the password of a small base station to the small base station, and one configuration mode comprises the following steps: an ordinary user can configure the small base station name and the small base station password to the small base station (110a) through a web configuration page, and the configuration mode is simple and easy to implement; the other configuration mode comprises the following steps: and the management user configures the name and the password of the small base station to the small base station through the gateway of the small base station or the network management of the small base station (110 b). For example, when the ordinary user forgets the configured name/password of the small base station, the latter configuration mode may be adopted for the configuration of the name/password of the small base station.
In step 120, the small cell broadcasts a system message, which carries the name of the small cell; and the terminal receives the system message broadcasted by the small base station, wherein the system message carries the name of the small base station.
The System message includes a System Information Block 1(SIB1, System Information Block 1), and SIB1 includes Information elements of the newly added small base station name.
In step 130, the terminal displays the name of the small base station through the terminal interface, inputs the password of the small base station corresponding to the name of the small base station, and can also configure whether to access the small base station preferentially.
The terminal interface includes: displaying items of names of small base stations; and, setting items of small base station passwords; optionally, an access control item may be further included, configured to determine whether to access the small base station preferentially. If the access control item is configured to be preferentially accessed to the small base station, the terminal is preferentially accessed to the small base station (the default access small base station), and the small base station is switched out when the signal receiving quality of the small base station is lower than a preset threshold; if the access control item is not configured with the priority access small base station, the terminal selects the base station with the access (stronger signal) by comparing the strength of the signal receiving quality of each base station, and each base station comprises various base stations such as a macro base station, a small base station and the like. The Signal reception quality includes, for example, RSRP (Reference Signal Receiving Power).
Fig. 2 illustrates a schematic diagram of a terminal interface of some embodiments of the present disclosure.
As shown in fig. 2, enter a network connection display interface (terminal interface 1) on the terminal, display various network connections of the terminal, wherein the rightmost side is a small base station network connection icon, click the icon, enter a small base station network connection interface (terminal interface 2), display various small base stations detected by the terminal, such as the small base station 1, the small base station 2, and the small base station 3, click one of the small base stations, and then enter a setting interface (terminal interface 3) of a password setting item and an access control item of the small base station. The password of the small base station can be input in the password setting item of the small base station, if the password setting item is selected, the password setting item indicates that the small base station is configured to be accessed preferentially, and if the password setting item is not selected, the password setting item indicates that the password setting item is not configured to be accessed preferentially.
In step 140, the terminal sends an access request to the small base station, where the name and password of the small base station requested to be accessed by the terminal are carried, so that the small base station allows or prohibits the terminal access according to whether the name and password of the small base station in the access request are consistent with the stored name and password of the small base station. And the terminal accesses the small base station under the condition that the small base station allows the access.
The access request comprises a newly added cell of the name of the small base station and a cell of the password of the small base station.
The access Request includes a radio resource control Setup Request (RRC Setup Request), which carries a name and a password of the small base station to which the terminal requests access. RRC denotes Radio Resource Control (Radio Resource Control).
TABLE 1 messages and newly added cells
Figure BDA0002952414130000061
Figure BDA0002952414130000071
In step 150, the small cell determines whether the name and password of the small cell in the access request are consistent with the stored name and password of the small cell, and if so, allows the terminal to access, for example, may send an RRC Setup message to the terminal, and if not, prohibits the terminal from accessing, for example, may send an RRC Reject message to the terminal.
The access control scheme of the embodiment utilizes the name and the password of the small base station to perform access control, and does not utilize IMSI to perform access control, thereby solving the problems that the IMSI of an individual user is difficult to obtain, the IMSI is leaked, the access control scheme cannot be suitable for 5G access control and the like in the traditional access control scheme utilizing the IMSI, and being suitable for 5G access control of IMSI encryption and 3G, 4G, LET and the like of IMSI non-encryption.
Fig. 3 illustrates a schematic diagram of an access control application of some embodiments of the present disclosure.
As shown in fig. 3, the terminal 1 is located in the cross coverage area of the macro station and the small base station, and if the camping is selected according to the signal strength, it is impossible to control the terminal to prefer the small base station to camp on, which is difficult to meet the requirement of the home-only bandwidth or the factory-specific requirement. The terminal 2 belongs to a user outside a home or a factory, and if no effective access control strategy exists, the terminal 2 can access the small base station after receiving the small base station signal, so that the legality problem and the safety risk exist.
For example, after the method is applied to a home/factory small base station device, a user wants to configure that a terminal member can access a network through the small base station at any time and any place, strange numbers such as other neighbor/non-factory terminals and the like are forbidden to access the network through the small base station, the user inputs a password through a terminal interface, the password is incorrect, the access to the base station is forbidden, and the resource exclusivity of the home/factory small base station is realized.
For another example, a home/factory user may select to preferentially reside in a small base station by means of switch control, rather than switch to a nearby macro station or other indoor coverage signal source according to signal strength, thereby ensuring data sharing in home bandwidth or Ultra Reliable Low Latency Communication (urrllc) experience in a factory, and ensuring stability of service quality.
It can be seen that the access control method of the present disclosure provides a bidirectional selection mechanism for the terminal and the base station, and meets the specific requirements of the family exclusive bandwidth or the factory, for example, the terminal 1 may select whether to preferentially reside in the small base station, and the terminal 2 cannot access the small base station without knowing the password. In addition, a user can configure an access terminal independently without the participation of a small base station gateway/network management, so that the implementation is easier for the user, the user experience is good, and the commercial application of the small base station is facilitated.
Fig. 4 illustrates a schematic diagram of an access control system of some embodiments of the present disclosure.
As shown in fig. 4, the access control system includes: small base station 400 and terminal 500.
Fig. 5a shows a schematic diagram of a small cell site of some embodiments of the present disclosure.
As shown in fig. 5a, the small cell 400 includes: a memory 410; and a processor 420 coupled to the memory, the processor configured to perform an access control method based on instructions stored in the memory.
For example, the small base station receives and stores the name and password of the small base station configured by the user; the small base station broadcasts a system message, wherein the name of the small base station is carried; the small base station receives an access request sent by a terminal, wherein the access request carries the name and the password of the small base station which the terminal requests to access; and the small base station judges whether the name and the password of the small base station in the access request are consistent with the stored name and the password of the small base station, if so, the terminal is allowed to access, and if not, the terminal is forbidden to access.
The memory may include, for example, system memory, fixed non-volatile storage media, and the like. The system memory stores, for example, an operating system, an application program, a Boot Loader (Boot Loader), and other programs.
Fig. 5b shows a schematic diagram of a small cell of further embodiments of the disclosure.
As shown in fig. 5b, the small cell 400 includes:
a message processing module 430 configured to receive and store a name and a password of a small base station configured by a user; broadcasting system information, wherein the name of the small base station is carried; receiving an access request sent by a terminal, wherein the access request carries a name and a password of a small base station which the terminal requests to access;
and an access control module 440 configured to determine whether the name and the password of the small base station in the access request are consistent with the stored name and the password of the small base station, if so, allow the terminal to access, and if not, prohibit the terminal from accessing.
Fig. 6a shows a schematic diagram of a terminal of some embodiments of the present disclosure.
As shown in fig. 6a, the terminal 500 includes: a memory 510; and a processor 520 coupled to the memory, the processor configured to perform an access control method based on instructions stored in the memory.
For example, a terminal receives a system message broadcasted by a small base station, wherein the system message carries the name of the small base station; the terminal displays the name of the small base station through a terminal interface and inputs the password of the small base station corresponding to the name of the small base station; the terminal sends an access request to the small base station, wherein the name and the password of the small base station which the terminal requests to access are carried, so that the small base station allows or forbids the terminal to access according to whether the name and the password of the small base station in the access request are consistent with the stored name and the password of the small base station; and the terminal accesses the small base station under the condition that the small base station allows the access.
Wherein, terminal interface includes: displaying items of names of small base stations; and setting items of small base station passwords; or, the terminal interface includes: displaying items of names of small base stations; setting items of small base station passwords; and, the access control project, is used for disposing and accessing the little base station preferentially; if the access control item is configured to be preferentially accessed to the small base station, the terminal is preferentially accessed to the small base station, and the small base station is switched out when the signal receiving quality of the small base station is lower than a preset threshold; and if the access control item is not configured with the priority access to the small base station, the terminal selects the accessed base station by comparing the strength of the signal receiving quality of each base station, wherein each base station comprises a macro base station and a small base station.
The memory may include, for example, system memory, fixed non-volatile storage media, and the like. The system memory stores, for example, an operating system, an application program, a Boot Loader (Boot Loader), and other programs.
Fig. 6b shows a schematic view of a terminal of further embodiments of the present disclosure.
As shown in fig. 6b, the terminal 500 includes:
and a password setting module 530 configured to display the name of the small base station through the terminal interface and input a password of the small base station corresponding to the name of the small base station.
A message processing module 540 configured to receive a system message broadcasted by the small cell, where the system message carries a name of the small cell; sending an access request to a small base station, wherein the name and the password of the small base station which is requested to be accessed by a terminal are carried, so that the small base station allows or forbids the terminal to be accessed according to whether the name and the password of the small base station in the access request are consistent with the stored name and the password of the small base station; and accessing the small base station under the condition that the small base station allows access.
An access control module 550 configured to provide an access control item through a terminal interface for configuring whether to access the small cell preferentially; if the access control item is configured to be preferentially accessed to the small base station, the control terminal is preferentially accessed to the small base station, and the small base station is switched out when the signal receiving quality of the small base station is lower than a preset threshold; and if the access control item is not configured with the priority access to the small base station, the control terminal selects the accessed base station by comparing the strength of the signal receiving quality of each base station, wherein each base station comprises a macro base station and a small base station.
The present disclosure proposes a non-transitory computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the access control method.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more non-transitory computer-readable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer program code embodied therein.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only exemplary of the present disclosure and is not intended to limit the present disclosure, so that any modification, equivalent replacement, or improvement made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.

Claims (15)

1. An access control method, comprising:
the small base station receives and stores the name and the password of the small base station configured by a user;
the small base station broadcasts a system message, wherein the name of the small base station is carried;
the small base station receives an access request sent by a terminal, wherein the access request carries the name and the password of the small base station which the terminal requests to access;
and the small base station judges whether the name and the password of the small base station in the access request are consistent with the stored name and the password of the small base station, if so, the terminal is allowed to access, and if not, the terminal is forbidden to access.
2. The method of claim 1,
the system message includes system information block 1SIB1, SIB1 includes information of the newly added small base station name.
3. The method of claim 1,
the access request comprises newly added cells of the name of the small base station and cells of the password of the small base station.
4. An access control method, comprising:
a terminal receives a system message broadcasted by a small base station, wherein the system message carries the name of the small base station;
the terminal displays the name of the small base station through a terminal interface and inputs the password of the small base station corresponding to the name of the small base station;
the terminal sends an access request to the small base station, wherein the name and the password of the small base station which the terminal requests to access are carried, so that the small base station allows or forbids the terminal to access according to whether the name and the password of the small base station in the access request are consistent with the stored name and the password of the small base station;
and the terminal accesses the small base station under the condition that the small base station allows access.
5. The method of claim 4,
the terminal interface comprises: displaying items of names of the small base stations; and setting items of small base station passwords;
or, the terminal interface includes: displaying items of names of small base stations; setting items of small base station passwords; and, the access control project, is used for disposing and accessing the small base station preferentially;
if the access control item is configured to be preferentially accessed to the small base station, the terminal is preferentially accessed to the small base station, and the small base station is switched out when the signal receiving quality of the small base station is lower than a preset threshold;
and if the access control item is not configured with the priority access to the small base station, the terminal selects the accessed base station by comparing the strength of the signal receiving quality of each base station, wherein each base station comprises a macro base station and a small base station.
6. The method of claim 4, further comprising:
configuring the name and the password of the small base station to the small base station through a web configuration page;
or, the name of the small base station and the password of the small base station are configured to the small base station through a small base station gateway or a small base station network manager.
7. The method of claim 4,
the system message comprises a system information block 1SIB1, wherein the SIB1 comprises an information element of a newly added small base station name;
the access request comprises newly added cells of the name of the small base station and cells of the password of the small base station.
8. The method of claim 4,
the access Request comprises a radio resource control establishment Request RRC Setup Request, wherein the name and the password of the small base station which the terminal requests to access are carried.
9. A small cell base station, comprising:
a memory; and
a processor coupled to the memory, the processor configured to perform the access control method of any of claims 1-3 based on instructions stored in the memory.
10. A small cell base station, comprising:
the message processing module is configured to receive and store the name and the password of the small base station configured by the user; broadcasting system information, wherein the name of the small base station is carried; receiving an access request sent by a terminal, wherein the access request carries a name and a password of a small base station which the terminal requests to access;
and the access control module is configured to judge whether the name and the password of the small base station in the access request are consistent with the stored name and the password of the small base station, if so, the terminal is allowed to access, and if not, the terminal is forbidden to access.
11. A terminal, comprising:
a memory; and
a processor coupled to the memory, the processor configured to perform the access control method of any of claims 4-8 based on instructions stored in the memory.
12. A terminal, comprising:
the password setting module is configured to display the name of the small base station through a terminal interface and input a password of the small base station corresponding to the name of the small base station;
the message processing module is configured to receive a system message broadcasted by the small base station, wherein the system message carries the name of the small base station; sending an access request to a small base station, wherein the name and the password of the small base station which is requested to be accessed by a terminal are carried, so that the small base station allows or forbids the terminal to be accessed according to whether the name and the password of the small base station in the access request are consistent with the stored name and the password of the small base station; and accessing the small base station under the condition that the small base station allows access.
13. The terminal of claim 12, further comprising:
the access control module is configured to provide an access control item through a terminal interface, and is used for configuring whether to access the small base station preferentially; if the access control item is configured to be preferentially accessed to the small base station, the control terminal is preferentially accessed to the small base station, and the small base station is switched out when the signal receiving quality of the small base station is lower than a preset threshold; and if the access control item is not configured with the priority access to the small base station, the control terminal selects the accessed base station by comparing the strength of the signal receiving quality of each base station, wherein each base station comprises a macro base station and a small base station.
14. An access control system comprising:
the small cell base station of claim 9 or 10; and
the terminal of any one of claims 11-13.
15. A non-transitory computer readable storage medium, having stored thereon a computer program which, when executed by a processor, implements the steps of the access control method of any one of claims 1-8.
CN202110211268.XA 2021-02-25 2021-02-25 Access control method and system, small base station and terminal Pending CN114980264A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110211268.XA CN114980264A (en) 2021-02-25 2021-02-25 Access control method and system, small base station and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110211268.XA CN114980264A (en) 2021-02-25 2021-02-25 Access control method and system, small base station and terminal

Publications (1)

Publication Number Publication Date
CN114980264A true CN114980264A (en) 2022-08-30

Family

ID=82973965

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110211268.XA Pending CN114980264A (en) 2021-02-25 2021-02-25 Access control method and system, small base station and terminal

Country Status (1)

Country Link
CN (1) CN114980264A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101801063A (en) * 2009-02-10 2010-08-11 华为技术有限公司 Method and system for accessing home base station, user terminal and home base station
US20110274051A1 (en) * 2009-01-14 2011-11-10 Vikberg Jari Distribution of access control information in a network
CN107454593A (en) * 2017-08-01 2017-12-08 中国联合网络通信集团有限公司 Family's monitoring method, household monitoring system and network communicating system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110274051A1 (en) * 2009-01-14 2011-11-10 Vikberg Jari Distribution of access control information in a network
CN101801063A (en) * 2009-02-10 2010-08-11 华为技术有限公司 Method and system for accessing home base station, user terminal and home base station
CN107454593A (en) * 2017-08-01 2017-12-08 中国联合网络通信集团有限公司 Family's monitoring method, household monitoring system and network communicating system

Similar Documents

Publication Publication Date Title
CN111263334B (en) Configuring an electronic subscriber identity module for a mobile wireless device
EP3627863B1 (en) Cell reselection method and related device
US10798647B2 (en) Network slice selection
CN105580399B (en) Transmitting an indicator extending an area range of system information
WO2019122494A1 (en) Method and apparatus for disaster resilience in mobile networks
WO2022028345A1 (en) Non-public network measurement method and apparatus, device, and storage medium
EP2922343B1 (en) Access control method, base station and system
US20210297844A1 (en) Selection of Slice-Supporting PLMNs While Roaming Away from Home Network
CN113286332B (en) Information transmission method and equipment
CN108471631B (en) Switching preparation method, related base station and UE
US20220086636A1 (en) Access point authentication based on a digital certificate
CN105407519A (en) Device of handling selection of public land mobile network for device-to-device communication
EP3668177B1 (en) Cell reselection methods, device and storage media
EP3522668B1 (en) Method and device for trust relationship establishment
CN114007192B (en) Terminal access processing method, device and storage medium
CN113965334A (en) Online signing method, device and system
JP2023554088A (en) Network selection method, device, equipment and storage medium
KR101680107B1 (en) Method and apparatus for acquisition of target cell configuration information by a source cell in a wireless communication system and sytem thereof
CN105848251B (en) Hotspot access method, device and terminal
US10057871B2 (en) Data transmission method and base station
CN114980264A (en) Access control method and system, small base station and terminal
US20230136928A1 (en) Communications device, infrastructure equipment, core network equipment and methods
CN114827979A (en) Method and equipment for processing different network roaming
CN113825209B (en) Access method, device and equipment of shared network
CN113573370B (en) Information processing method, network equipment, terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination