WO2008148348A1 - Procédé de communication, système et station de base domestique - Google Patents

Procédé de communication, système et station de base domestique Download PDF

Info

Publication number
WO2008148348A1
WO2008148348A1 PCT/CN2008/071179 CN2008071179W WO2008148348A1 WO 2008148348 A1 WO2008148348 A1 WO 2008148348A1 CN 2008071179 W CN2008071179 W CN 2008071179W WO 2008148348 A1 WO2008148348 A1 WO 2008148348A1
Authority
WO
WIPO (PCT)
Prior art keywords
base station
home base
authentication
home
identification code
Prior art date
Application number
PCT/CN2008/071179
Other languages
English (en)
Chinese (zh)
Inventor
Yong Qiu
Original Assignee
Huawei Technologies Co, .Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co, .Ltd. filed Critical Huawei Technologies Co, .Ltd.
Publication of WO2008148348A1 publication Critical patent/WO2008148348A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/105PBS [Private Base Station] network

Definitions

  • the present invention relates to a communication technology, and more particularly to a communication method and system, and a home base station. Background technique
  • a home base station usually refers to a small, small base station for home or office use. It may be completely private. It can also be opened to the public for use with different priorities and permissions. Its ownership is private, not government.
  • the operator Or the operator; its use of the object may be a small range of users, but also a wide range of users. ⁇ Using home base stations to achieve wireless access, can better utilize existing network resources, save more network equipment operators' costs, and combine the advantages of mobile access networks and fixed access networks.
  • the device identity of the home base station is used to identify the user group that uses the home base station, and only after the user group using the home base station is registered, the member of the user group can use the home base station.
  • the home base station is a base station purchased by the user and placed at the user, that is, the home base station is under the control of the operator, so that when the home base station accesses the mobile network, it needs to be connected with the mobile network.
  • Mutual authentication is performed to identify the legitimacy of the home base station, and a symmetric key is used in the authentication process.
  • the user identifier of the home base station Since the user identifier of the home base station is used to identify the user group using the home base station, the following problems occur: (1) Since the identifier is the identifier of the home base station, it is provided by the manufacturer, and if the identifier is to be modified, It becomes very difficult; (2) When the identifier is used to find the relevant node of the network, because the device identifier is provided by the device provider and cannot contain routing information, the device identifier of the home base station is used in the mobile network to find the corresponding node. HSS (Home Subscriber Server) can be cumbersome.
  • HSS Home Subscriber Server
  • the embodiments of the present invention provide a communication method and system, and a home base station, which enhance the mobility of the home base station and facilitate the user.
  • An embodiment of the present invention provides a communication method, including:
  • the home base station user identification code is stored in the base station identity identification card by the home base station user identification code, and the base station identity identification card is detachably mounted on the base station body.
  • Embodiments of the present invention also provide a communication system including a home base station and a network side entity.
  • the home base station is configured to communicate with a network side entity by using a home base station user identification code, where the home base station includes a base station body and a base station identity identification card, where the user identification code is stored in a base station identity identification card, and the base station identity is The identification card is detachably mounted on the base station body.
  • An embodiment of the present invention further provides a home base station, including a base station body and a base station identity card.
  • the base station body includes: a first sending unit, configured to send a read home base station user identification code request to the base station identity identification card, where the first receiving unit is configured to receive the home base station user identification code sent by the base station identity identification card a confirmation message, configured to communicate with the network side by using the home base station user identification code;
  • the base station identity card is detachably mounted on the base station body, and includes a first storage unit, configured to store a home base station user identification code, and a first receiving unit, configured to receive a read home base station user identifier sent by the base station body And a first sending unit, configured to send, to the base station body, an acknowledgement message including a home base station user identification code.
  • the embodiment of the present invention enhances the mobility of the home base station by separating the home base station into a base station body and a BSIM (Base Station Identifier Module) card, so that the user can use any other home base station through the BSIM card.
  • BSIM Base Station Identifier Module
  • the BSIM card is easy to carry, when the user goes to the outside, the BSIM card only needs to be carried, and the BSIM card is installed on the base station body, and the network side can communicate with the network side, thereby greatly facilitating the user.
  • FIG. 1 shows the structure of a BSIM ID (Home Base Station User Identification Code) according to an embodiment of the present invention
  • FIG. 2 is a flowchart showing an authentication process of a home base station in a PLMN (Public Land Mobile Network) according to Embodiment 1 of the present invention
  • FIG. 3 is a diagram showing a scenario in which a home base station is managed by an MME (Mobile Management Entity) in a SAE (System Architecture Evolution)/LTE (Long Term Evolution) network according to Embodiment 2 of the present invention. Authentication process;
  • FIG. 4 is a flowchart showing an authentication process of a home base station in a UMTS (Universal Mobile Telecommunication System) network according to Embodiment 3 of the present invention
  • FIG. 5 is a diagram showing another authentication process of a home base station in a UMTS network according to Embodiment 4 of the present invention.
  • FIG. 6 is a flowchart showing an authentication process when a home base station is managed by an intermediate gateway GW in a SAE/LTE network or a UMTS network according to Embodiment 5 of the present invention
  • Fig. 7 shows a communication system of an embodiment of the present invention. detailed description
  • the entire home base station is composed of two parts: that is, the base station body and BSIM card.
  • the base station body stores the BS Number (home base station body number) of the home base station
  • the BSIM card stores the subscriber identity BSIM ID (home base station user identification code) of the home base station, and can also store related security parameters, and the related security.
  • the parameter may be a related parameter based on a symmetric key system, such as a basic key, and some authentication algorithms and a derivative key generation algorithm (hereinafter referred to as a key generation algorithm), or may be related parameters based on an asymmetric key system.
  • a key generation algorithm such as digital certificates.
  • the BSIM ID can be used to uniquely identify a group of users using a certain base station.
  • Other communication-related information may also be stored in the B SIM card, such as user data (such as a telephone number, etc.) and network data of each user using the home base station (for example, a list of users who are allowed to use the home base station, and a home base station when the last registration is used)
  • the location identification number, the derived key life cycle, etc.; the other communication-related information can be dynamically changed during the communication process.
  • the BSIM card can be detachably installed in any base station body.
  • the BSIM ID of the BSIM card can be used to register and authenticate to the mobile network.
  • the home base station can communicate with the network in various ways.
  • the BSIM ID and related service information are stored in the BSIM card, so the BSIM ID and related service information can be flexibly modified through the detachable installation of the BSIM card.
  • the BSIM ID can be composed of the following three parts:
  • MCC mobile country code
  • MNC mobile network code
  • a mobile home base station identification code identifies a home base station within a home network and may identify a home subscriber server HSS to which the home base station belongs. So you can find the corresponding HSS based on the MBIN of the BSIM ID.
  • NMBI National Mobile Home Base Station Identity
  • the allocation of the MCC can be managed by the ITU.
  • NMBI can be accounted for by each operator or national policy department.
  • the BSIM ID can also be composed in other ways as long as it can satisfy the user group that uniquely identifies the use of a certain base station.
  • the embodiment of the invention discloses a communication method, which comprises:
  • the home base station user identification code communicates with the network side, and the home base station user identification code is stored in the base station identity identification card, and the base station identity identification card is detachably installed on the base station body.
  • the base station body Before communicating with the network side, the base station body sends the home base station user identification code request information to the base station identity identification card, and receives the home base station user identification code returned by the base station identity identification card.
  • the base station identity card also stores related security parameters for the home base station to authenticate with the network side.
  • the authentication of the home base station and the network side includes: the home base station sends the home base station user identification code to the network side, so that the network side performs an authentication algorithm according to the received home base station user identification code, obtains the first authentication result, and returns the reference. Receiving a second authentication result according to the authentication request message and the security parameter; sending an authentication response message to the network side, the authentication response message includes a second authentication result; and causing the network side to perform the first authentication result according to the The second authentication result in the authentication response message is authenticated.
  • the communication method further includes: the home base station transmitting the home base station user identification code to the network side by using a registration request message; the home base station receiving the registration response message, and the registration response message is determined by the network side according to the first authentication result and the second authentication The result of the right is sent after authentication. Since the home base station is divided into the base station body and the BSIM card, the communication process change is mainly reflected in the authentication process of the home base station and the network side, and the registration authentication in various networks is respectively described by the first embodiment to the fifth embodiment. process.
  • This embodiment describes a registration authentication method of a home base station in a PLMN operator network.
  • the home base station includes the base station body and the BSIM card.
  • the registration authentication process of the home base station is as follows:
  • Step 201 The home base station is powered on, and sends a registration request message including a BSIM ID to the network side.
  • Step 202 After receiving the registration request message, the network side finds a corresponding basic key according to the BSIM ID in the registration request message, and then executes an authentication algorithm according to the BSIM ID and the basic key, and sends an authentication request message to the home base station.
  • Step 203 After receiving the authentication request message, the home base station performs an authentication algorithm by using the basic key in the BSIM card, and sends an authentication response message to the network.
  • a derived key may be generated by using a basic key, the derivative
  • the birth key can be used as a pre-shared key for IKE (Internet Key Exchange) in IPSec (Network Layer Security Protocol) to establish a security association (SA) in IPSEC. It can be used as a key to protect data transmitted between the home base station and the network.
  • IKE Internet Key Exchange
  • IPSec Network Layer Security Protocol
  • SA security association
  • Step 204 The network side authenticates the home base station. If the authentication succeeds, the user using the home base station is a legitimate user, and the network can provide a subscription service for the user through the home base station, and the network sends a registration response message to the home base station.
  • step 201 to step 204 an authentication method is simply exemplified, and those skilled in the art can know that other authentication methods can also be used for authentication.
  • the user After receiving the subscription service provided by the network through the home base station, the user can perform other corresponding processes by using the BSIM ID in the BSIM card according to the requirements of the network side, for example, adding or deleting users in the user list that can use the home base station.
  • the home base station according to the embodiment of the present invention is also suitable for other networks, such as UMTS network, SAE/LTE, etc., and the following describes the home base station in the UMTS network, SAE/LTE by using Embodiment 2 to Embodiment 5 with reference to FIG. 3 to FIG.
  • the authentication process in the case of power-on registration in the network is similar to the authentication process in other cases, and will not be described here.
  • BSIM denotes a BSIM card
  • MME denotes a mobility management entity, when the network is an SAE/LTE network, an MME node is used
  • SGSN is a serving GPRS support node, when the network is UMTS , using the SGSN node.
  • the HSS is a home subscriber server, which is used to store the BSIM ID of the home base station, and the corresponding basic key.
  • the intermediate gateway (GW) may be a security gateway or a sink node, and may share part of the network side and part. The function of the wireless control node.
  • this embodiment describes an authentication process when the home base station is managed by the MME in the SAE/LTE network.
  • Step 301 After the base station body is powered on, send the home base station user identification code request information to the BSIM card, for example, send a request message for reading the B SIM ID.
  • Step 302 The BSIM card returns BSIM ID information to the base station body, for example, sending an acknowledgement message, where the message includes the BSIM ID of the BSIM card.
  • a registration request message (Register)
  • Step 304 The MME sends an authentication information request message (AuthlnfoReq) to the HSS to request authentication information from the HSS, where the authentication information request message includes a BSIM ID.
  • AuthlnfoReq authentication information request message
  • Step 305 After receiving the authentication information request message, the HSS finds a corresponding basic key according to the BSIM ID in the authentication information request message, and generates a random number (Rand) according to the basic key, where the basic key and the random number are The parameter, the authentication algorithm is executed, and the authentication result Resultl is generated; at the same time, the HSS can also generate the derived key according to the basic key, the random number and the specific key generation algorithm, and then the HSS sends an authentication information response message (AuthlnfoResp) to the MME, Sending the authentication result Resultl, the random number, and the derived key to step 306, the MME sends an authentication request message (AuthChallenge) to the BSIM card, and sends the random number to the BSIM card;
  • AuthChallenge authentication request message
  • Step 307 The BSIM card generates an authentication result Result2 according to the received random number and the basic key stored in the BSIM card using the same authentication algorithm as that in step 305, or may be used according to the basic key and the random number in step 305.
  • the same key generation algorithm generates a derivative key.
  • the BSIM card sends an authentication response message to the MME, and sends the authentication result Result2 to the MME.
  • the derived key generated in step 305 and step 307 can be used as the IPSec.
  • the pre-shared key of IKE in the network layer security protocol is used to establish a security association (SA) in IPSEC, and can also be used as a key for protecting data transmitted between the home base station and the network.
  • SA security association
  • Step 308 The MME compares the authentication result Result2 with the authentication result Resultl transmitted by the HSS. If the authentication fails, the authentication fails. Otherwise, the authentication succeeds, and the MME sends a registration confirmation message RegisterAck to the base station entity.
  • step 301 to step 308 only one authentication method is simply mentioned, and those skilled in the art can know that other authentication methods can also be used for authentication.
  • this embodiment describes an authentication process at the time of power-on registration of a home base station in a UMTS network.
  • Step 401 After the base station body is powered on, send the home base station user identification code request information to the BSIM card, for example, a request message for reading the BSIM ID.
  • Step 402 The BSIM card returns BSIM ID information to the base station body, for example, sending an acknowledgement message, where the message includes the BSIM ID of the BSIM card.
  • Step 403 The base station body sends a registration request message (Register) to the RNC, where the registration request message includes a BSIM ID.
  • the registration request message includes a BSIM ID.
  • Step 404 The RNC sends an authentication information request message (AuthlnfoReq) to the HSS to request authentication information from the HSS, where the authentication information request message includes a BSIM ID.
  • AuthlnfoReq authentication information request message
  • Step 405 After receiving the authentication information request message, the HSS finds the corresponding basic key according to the BSIM ID in the authentication information request message, and generates a random number according to the basic key, and performs the authentication by using the basic key and Rand as parameters.
  • the weight algorithm generates the authentication result Resultl; at the same time, the HSS can also generate the derived key according to the basic key, the random number and the specific key generation algorithm, and then the HSS sends an authentication information response message (AuthlnfoResp) to the RNC, and the authentication result is obtained.
  • the Resultl, the random number, and the derived key are sent to the RNC, and the authentication information response message includes an authentication result Resultl, a random number, and a derived key.
  • Step 406 The RNC sends an authentication request message (AuthChallenge) to the BSIM card, and sends the random number to the BSIM card.
  • AuthChallenge an authentication request message
  • Step 407 The BSIM card generates the authentication result Result2 according to the random number and the basic key stored in the BSIM card using the same authentication algorithm as that in step 405, and may also use the same secret as in step 405 according to the basic key and the random number.
  • the key generation algorithm generates a derivative key, and then the BSIM card sends an authentication response message to the RNC, and sends the authentication result Result2 to the RNC; the derived key generated in step 405 and step 407 can be used as the pre-shared secret of IKE in IPSec.
  • the key, used to establish a security association (SA) in IPSEC can also be used as a key to protect data transmitted between the home base station and the network.
  • SA security association
  • Step 408 The RNC compares the authentication result Result2 with the authentication result Resultl transmitted by the HSS. If the authentication fails, the authentication fails. Otherwise, the authentication succeeds, and the RNC sends a registration confirmation message Register Ack to the base station entity.
  • step 401 to step 408 only one authentication method is simply mentioned, and those skilled in the art can know that other authentication methods can also be used for authentication.
  • Embodiment 4 is simply mentioned, and those skilled in the art can know that other authentication methods can also be used for authentication.
  • this embodiment describes an authentication process at the time of another boot registration of a home base station in a UMTS network.
  • Step 501 After the base station body is powered on, send the home base station user identification code request information to the BSIM card, for example, a request message for reading the BSIM ID.
  • Step 502 The BSIM card returns BSIM ID information to the base station body, for example, sending an acknowledgement message, where the message includes a BSIM ID of the BSIM card.
  • Step 503 The base station body sends a registration request message (Register) to the RNC, where the registration request message includes a BSIM ID.
  • the registration request message includes a BSIM ID.
  • Step 504 The RNC sends an authentication information request message (AuthlnfoReq) to the SGSN to request authentication information, where the authentication information request message includes a BSIM ID.
  • AuthlnfoReq authentication information request message
  • Step 505 The SGSN sends an authentication information request message (AuthlnfoReq) to the HSS to request authentication information from the HSS, where the authentication information request message includes a BSIM ID.
  • AuthlnfoReq authentication information request message
  • Step 506 After receiving the authentication information request message, the HSS finds the corresponding basic key according to the BSIM ID in the authentication information request message, and generates a random number, and performs an authentication algorithm by using the basic key and the Rand as parameters. The authentication result Resultl; at the same time, the HSS can also generate the derived key according to the basic key, the random number and the specific key generation algorithm, and then the HSS sends an authentication information response message (AuthlnfoResp) to the RNC, and the authentication result Resultl, the random number And the derived key is sent to the SGSN.
  • AuthlnfoResp authentication information response message
  • Step 507 The SGSN sends an authentication information response message (AuthlnfoResp) to the RNC, and sends the random number to the RNC.
  • AuthlnfoResp authentication information response message
  • Step 508 The RNC sends an authentication request message (AuthChallenge) to the BSIM card, and sends the random number to the BSIM card, where the authentication request message includes a random number.
  • AuthChallenge an authentication request message
  • Step 509 After receiving the authentication request message, the BSIM card generates the authentication result Result2 according to the random number in the authentication request message and the basic key stored in the BSIM card using the same authentication algorithm as that in step 505.
  • the basic key and the random number use the same key generation algorithm as in step 505 to generate the derived key, and the BSIM card sends an authentication response message to the RNC, and sends the authentication result Result2 to the RNC; the derivative generated in step 506 and step 509
  • the key can be used as a pre-shared key for IKE in IPSec, used to establish The Security Association (SA) in IPSEC can also be used as a key to protect data transmitted between the home base station and the network.
  • SA Security Association
  • Step 510 The RNC sends an authentication result comparison request (CompResultReq) to the SGSN, and sends the authentication result Result2 to the SGSN.
  • CompResultReq an authentication result comparison request
  • Step 511 The SGSN compares the authentication result Result2 with the authentication result Resultl transmitted by the HSS. If different, the authentication fails, otherwise the authentication succeeds, and the SGSN sends an authentication result comparison response (CompResultReq) to the RNC.
  • CompResultReq an authentication result comparison response
  • step 512 the RNC will send a registration confirmation message (RegisterAck) to the base station body.
  • Registration confirmation message (RegisterAck)
  • step 501 to step 512 only one authentication method is simply mentioned, and those skilled in the art can know that other authentication methods can also be used for authentication.
  • this embodiment describes an authentication process when the home base station is managed by the intermediate gateway GW in the SAE/LTE network or the UMTS network.
  • Step 601 After the base station body is powered on, send the home base station user identification code request information to the BSIM card, for example, send a request message for reading the B SIM ID.
  • Step 602 The BSIM card returns BSIM ID information to the base station body, for example, sending an acknowledgement message, where the message includes a BSIM ID of the BSIM card.
  • Step 603 The base station body sends a registration request message (Register) to the intermediate gateway, where the registration request message includes a BSIM ID.
  • the registration request message includes a BSIM ID.
  • Step 604 The intermediate gateway sends an authentication information request message (AuthlnfoReq) to the HSS to request authentication information from the HSS, where the authentication information request message includes a BSIM ID.
  • AuthlnfoReq authentication information request message
  • Step 605 After receiving the authentication information request message, the HSS finds the corresponding basic key according to the BSIM ID in the authentication information request message, and generates a random number according to the basic key, and performs the authentication by using the basic key and Rand as parameters.
  • the weight algorithm generates the authentication result Resultl; at the same time, the HSS can also generate the derived key according to the basic key, the random number and the specific key generation algorithm, and then the HSS sends an authentication information response message (AuthlnfoResp) to the intermediate gateway, and the authentication is performed.
  • the Resultl, the random number and the derived key are sent to the intermediate gateway, and the authentication information response message includes the authentication result Resultl, the random number and the derivative.
  • Raw key After receiving the authentication information request message, the HSS finds the corresponding basic key according to the BSIM ID in the authentication information request message, and generates a random number according to the basic key, and performs the authentication by using the basic key and Rand as parameters.
  • the weight algorithm generates the
  • Step 606 The intermediate gateway sends an authentication request message to the BSIM card.
  • Step 607 The BSIM card generates the authentication result Result2 by using the same authentication algorithm as that in step 605 according to the random number and the basic key stored in the BSIM card, and may also use the same secret as in step 605 according to the basic key and the random number.
  • the key generation algorithm generates a derivative key.
  • the BSIM card sends an authentication response message to the intermediate gateway, and sends the authentication result Result2 to the intermediate gateway.
  • the derived key generated in step 605 and step 607 can be used as the IKE pre-preparation in IPSec. Shared key, used to establish security associations in IPSEC
  • SA can also be used as a key to protect data transmitted between the home base station and the network.
  • Step 608 The intermediate gateway compares the authentication result Result2 with the authentication result Resultl transmitted by the HSS. If the authentication fails, the authentication fails. Otherwise, the authentication succeeds, and the intermediate gateway sends a registration confirmation message RegisterAck to the base station entity.
  • step 601 to step 608 only one authentication method is simply mentioned, and those skilled in the art can know that other authentication methods can also be used for authentication.
  • this embodiment discloses a communication system including a home base station 100 and a network side entity 200.
  • the home base station 100 is configured to communicate with the network side entity 200 by using a home base station user identification code.
  • the home base station 100 includes a base station body 110 and a base station identity card 120.
  • the user identification code is stored in the base station identity card 120, and the base station identity card 120 is stored. It is detachably mounted on the base station main body 110.
  • the network side entity 200 is configured to communicate with the home base station 100.
  • the home base station 100 includes a base station body 110 and a base station identity card 120, which may be a home base station or an AP (Access Point) in the UMTS network, or may be a home base station or a Home eNB in the SAE/LTE network.
  • the network side entity 200 may be an RNC in a UMTS network, or may be an MME or a GW in an SAE/LTE network.
  • the base station main body 110 includes a first transmitting unit 111, a first receiving unit 113, and a communication unit 112.
  • the first sending unit 111 is configured to send the home base station user identification code request information to the base station identity card 120, for example, send a home base station user identification code request;
  • the first receiving unit 113 is configured to receive the home base station user identification code, for example, receive The confirmation message sent by the base station identity card with the home base station user identification code;
  • the communication unit 112 is configured to communicate with the network side entity 200 by using the home base station user identification code. For example, in the authentication process, the communication unit 112 transmits a registration request message to the network side entity 200, and receives a registration confirmation message from the network side entity 200.
  • a base station identity card 120 detachably mounted on the base station body 110, includes a first storage unit 123, a second receiving unit 121, a second transmitting unit 124, and a second storage unit 122.
  • the first storage unit 123 is configured to store related security parameters; the second storage unit 122 is configured to store the home base station user identification code; and the second receiving unit 121 is configured to receive the home base station user identification code request information sent by the base station body 110.
  • the receiving home base station subscriber identity code request message is received; the second sending unit 124 is configured to send the home base station subscriber identity code to the base station body 110, for example, send an acknowledgement message including the home base station subscriber identity code.
  • the user does not have to re-replace the home base station.
  • the key is burned to the equipment operator, and the home base station user is also provided with more choices of the base station main body, which greatly facilitates the user and saves the user's investment in the base station main body.
  • the BSIM card can be carried, and the base station body does not need to be carried, which improves the mobility of the user and brings convenience to the user.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé, un système et une station de base (BS) domestique pour une communication. Le procédé de communication comprend un utilisateur communique avec un réseau à travers le code d'identifiant d'utilisateur de la station de base domestique, le code d'identifiant d'utilisateur de la station de base domestique est stocké dans une carte d'identifiant de station de base, la carte d'identifiant de station de base est installée de manière détachable dans le corps principal de station de base.
PCT/CN2008/071179 2007-06-04 2008-06-04 Procédé de communication, système et station de base domestique WO2008148348A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200710107384.7 2007-06-04
CN2007101073847A CN101321100B (zh) 2007-06-04 2007-06-04 一种通信方法和系统、及家用基站

Publications (1)

Publication Number Publication Date
WO2008148348A1 true WO2008148348A1 (fr) 2008-12-11

Family

ID=40093193

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2008/071179 WO2008148348A1 (fr) 2007-06-04 2008-06-04 Procédé de communication, système et station de base domestique

Country Status (2)

Country Link
CN (1) CN101321100B (fr)
WO (1) WO2008148348A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010078920A1 (fr) * 2009-01-08 2010-07-15 Deutsche Telekom Ag Procédé de mise à jour d'informations supplémentaires stockées dans un terminal pour reconnaissance fondée sur le terminal de stations de base domestiques dans un système mobile terrestre cellulaire
CN102056164A (zh) * 2009-11-10 2011-05-11 中兴通讯股份有限公司 一种家庭基站接入网络的方法、家庭基站管理服务器

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104349315B (zh) * 2013-07-31 2018-01-05 普天信息技术有限公司 一种保障基站与用户设备信息安全的方法和系统
CN110245943B (zh) * 2019-05-20 2021-04-23 创新先进技术有限公司 基于判断条件的收据存储方法和节点

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1558697A (zh) * 2004-02-10 2004-12-29 Ut˹�￵ͨѶ���޹�˾ Phs系统鉴权方法
CN1561136A (zh) * 2004-02-18 2005-01-05 Ut˹�￵ͨѶ���޹�˾ Phs手机网络鉴权方法

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2349049T3 (es) * 2005-11-15 2010-12-22 Alcatel Lucent Acceso a red, pasarela y servidor de gestión para un sistema celular de comunicación inalambrica.

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1558697A (zh) * 2004-02-10 2004-12-29 Ut˹�￵ͨѶ���޹�˾ Phs系统鉴权方法
CN1561136A (zh) * 2004-02-18 2005-01-05 Ut˹�￵ͨѶ���޹�˾ Phs手机网络鉴权方法

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010078920A1 (fr) * 2009-01-08 2010-07-15 Deutsche Telekom Ag Procédé de mise à jour d'informations supplémentaires stockées dans un terminal pour reconnaissance fondée sur le terminal de stations de base domestiques dans un système mobile terrestre cellulaire
US8977286B2 (en) 2009-01-08 2015-03-10 Deutsche Telekom Ag Process for updating additional information stored in a terminal for a terminal-based recognition of home base stations in a cellular land mobile system
CN102056164A (zh) * 2009-11-10 2011-05-11 中兴通讯股份有限公司 一种家庭基站接入网络的方法、家庭基站管理服务器

Also Published As

Publication number Publication date
CN101321100A (zh) 2008-12-10
CN101321100B (zh) 2012-11-07

Similar Documents

Publication Publication Date Title
US10425808B2 (en) Managing user access in a communications network
JP3869392B2 (ja) 公衆無線lanサービスシステムにおけるユーザ認証方法および該方法をコンピュータで実行させるためのプログラムを記録した記録媒体
US7831835B2 (en) Authentication and authorization in heterogeneous networks
KR100813295B1 (ko) 무선 휴대 인터넷 시스템에서 eap를 이용한 보안 관계협상 방법
US7450554B2 (en) Method for establishment of a service tunnel in a WLAN
CN101616410B (zh) 一种蜂窝移动通信网络的接入方法和系统
TWI356614B (en) Improved subscriber authentication for unlicensed
CA2490131C (fr) Generation de cles dans un systeme de communication
JP5597676B2 (ja) 鍵マテリアルの交換
CN102111766B (zh) 网络接入方法、装置及系统
JP4687788B2 (ja) 無線アクセスシステムおよび無線アクセス方法
WO2019017837A1 (fr) Procédé de gestion de sécurité de réseau et appareil
WO2018176441A1 (fr) Procédé et dispositif d'authentification d'utilisateur
WO2008125062A1 (fr) Procédé de détermination d'admission et de radiomessagerie d'utilisateur dans un système de communication mobile, système et dispositif apparentés
WO2013174267A1 (fr) Procédé, système et dispositif pour l'établissement d'une connexion sécurisée à un réseau local sans fil
JP2012134703A (ja) 無線lan接続方法、無線lanクライアント、および無線lanアクセスポイント
WO2008148348A1 (fr) Procédé de communication, système et station de base domestique
US9473934B2 (en) Wireless telecommunications network, and a method of authenticating a message
CN101990207A (zh) 接入控制方法、家用基站及家用基站授权服务器
CN114946153A (zh) 与服务应用进行加密通信的通信网络中的应用密钥生成与管理的方法、设备及系统
KR100668660B1 (ko) 휴대 인터넷 망과 3g 망간의 로밍을 위한 사용자 인증처리 방법 및 이를 수행하는 라우터
KR101434750B1 (ko) 이동통신망에서 지리 정보를 이용한 무선랜 선인증 방법 및 장치

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08757590

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08757590

Country of ref document: EP

Kind code of ref document: A1