WO2009130758A1 - 通信装置および通信方法 - Google Patents
通信装置および通信方法 Download PDFInfo
- Publication number
- WO2009130758A1 WO2009130758A1 PCT/JP2008/057730 JP2008057730W WO2009130758A1 WO 2009130758 A1 WO2009130758 A1 WO 2009130758A1 JP 2008057730 W JP2008057730 W JP 2008057730W WO 2009130758 A1 WO2009130758 A1 WO 2009130758A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- access
- mobile station
- communication network
- communication
- mobile
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/10—Flow control between communication endpoints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/20—Manipulation of established connections
- H04W76/22—Manipulation of transport tunnels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/30—Connection release
- H04W76/34—Selective release of ongoing connections
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/12—Access point controller devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/06—Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
Definitions
- This case relates to a communication device and a communication method, and particularly to a communication device and a communication method for relaying access from a mobile station to a mobile communication network.
- the base station controller distinguishes access to the mobile communication network and access to another communication network and distributes the access.
- the radio base station and the base station control device are also a technology that enables the radio base station and the base station control device to be used in common when using a mobile communication network and when using another communication network, thereby reducing the cost of constructing and operating equipment. (For example, refer to Patent Document 3). JP-A-11-164348 JP 2000-350264 A JP 2003-299157 A
- the mobile station is equipped with both a mobile communication network access function and another communication network access function, and data communication using the mobile communication network is performed.
- a method of reducing this can be considered.
- whether access to the mobile communication network is avoided depends on the function implemented in the mobile station, so there are many existing mobile stations that have only the access function to the mobile communication network. Therefore, the effect of suppressing the inflow of packets cannot be expected so much.
- the present case has been made in view of such points, and an object thereof is to provide a communication apparatus and a communication method that can easily realize a reduction in the amount of packets flowing into a mobile communication network.
- a communication device that can be connected to a mobile communication network that performs circuit switching and packet switching and a data communication network that performs packet switching.
- This communication apparatus has a communication control unit that obtains access from a mobile station to a mobile communication network, terminates access whose call type is a packet-switched call, and replaces it with access to a data communication network.
- access whose call type is a packet-switched call out of access from the mobile station to the mobile communication network is terminated by communication control, and is replaced with access to the data communication network.
- a communication method of a communication device that can be connected to a mobile communication network that performs circuit switching and packet switching and a data communication network that performs packet switching is provided.
- this communication method access from a mobile station to a mobile communication network is acquired, and access whose call type is a packet-switched call is terminated and replaced with access to a data communication network.
- access in which the call type is a packet-switched call out of accesses from the mobile station to the mobile communication network is terminated and replaced with access to the data communication network.
- FIG. 1 is a diagram showing an outline of the present embodiment.
- the communication system shown in FIG. 1 includes a mobile communication network 1, a data communication network 2, a mobile station 3, and a communication device 4.
- the mobile communication network 1 is a communication network capable of communication by circuit switching (CS: Circuit switching) and packet switching (PS: Packet switching).
- the mobile communication network 1 is, for example, a communication network managed by a mobile communication provider.
- the data communication network 2 is a communication network that can communicate by packet switching outside the possible mobile communication network 1.
- the data communication network 2 is, for example, the Internet.
- As a communication service provided by the circuit switching method for example, a voice call service or a videophone service can be considered.
- a communication service provided by the packet switching method for example, a web page browsing service or a video viewing service can be considered.
- the mobile station 3 is a wireless terminal device that can use a communication service based on a contract with a mobile communication carrier.
- the mobile station 3 is, for example, a mobile phone.
- the mobile station 3 accesses the mobile communication network 1 when using a communication service.
- the communication device 4 is a communication device that can be connected to the mobile communication network 1 and the data communication network 2.
- the communication device 4 is, for example, a wireless base station or a relay device other than the wireless base station.
- the communication device 4 is arranged on the access path from the mobile station 3 to the mobile communication network 1.
- the communication device 4 includes a communication control unit 4a.
- the communication control unit 4a determines whether the access is a CS call or a PS call. For example, the case where the mobile station 3 uses a voice call service and the case where a packet communication service is used are distinguished. Then, the communication control unit 4a transfers the CS call access to the mobile communication network 1 as it is. On the other hand, access to the PS call terminates access to the mobile communication network 1 and transfers to access to the data communication network 2 as necessary.
- the call type is determined when the connection request which is the first access from the mobile station 3 to the mobile communication network 1 is acquired, and all PS calls are accessed.
- a method of switching to the data communication network 2 can be considered.
- the contents of access are intercepted, and when it is found that the access type is a predetermined access type, the connection to the mobile communication network 1 is disconnected and the access is made to the data communication network 2 It is also possible to make a transfer to. Further, it may be determined whether or not PS call access is transferred to the data communication network 2 according to the congestion status of the mobile communication network 1.
- the access is relayed by the communication device 4.
- the communication device 4 terminates the access and replaces the access with the data communication network 2 as necessary. Therefore, even when the mobile station 3 does not have a function of directly accessing the data communication network 2 without going through the mobile communication network 1, the access is automatically transferred to the data communication network 2 as necessary. Therefore, the inflow of packets to the mobile communication network 1 can be efficiently suppressed.
- FIG. 2 is a diagram illustrating a system configuration according to the first embodiment.
- the communication system according to the first embodiment includes a core network 10, a public data network (PDN) 20, the Internet 30, an ISP (Internet Services Provider) network 40, a packet switch 100, a circuit switch 100a, and a wireless network.
- Control devices RNC: Radio Network Controller
- 200a radio base stations 300, 300a, 300b, and mobile stations 400, 400a are included.
- the core network 10 is a communication network for call control managed by a mobile communication carrier.
- a PDN 20 and RNCs 200 and 200a are connected to the core network 10.
- CS calls and PS calls from the RNCs 200 and 200a are processed.
- the PDN 20 is a data communication network managed by a mobile communication carrier.
- a core network 10 and the Internet 30 are connected to the PDN 20.
- contents (text, moving images, etc.) for the mobile stations 400 and 400a are provided by packet communication.
- the PDN 20 when there is access from the core network 10 to the contents of the Internet 30, the PDN 20 is transferred to the Internet 30.
- the Internet 30 is a wide area data communication network formed by connecting a plurality of networks.
- a PDN 20 and an ISP network 40 are connected to the Internet 30.
- contents that can be used not only by the mobile stations 400 and 400 a but also by general-purpose devices such as computers are disclosed by packet communication.
- the ISP network 40 is a communication network managed by an internet service provider.
- An RNC 200, a radio base station 300, and the Internet 30 are connected to the ISP network 40.
- the access from the radio base station 300 is transferred to the RNC 200 or the Internet 30 according to the destination.
- the packet switch 100 and the circuit switch 100 a are switches provided in the core network 10.
- the packet switch 100 processes PS calls acquired from the RNCs 200 and 200a. For example, the packet switch 100 relays packet communication from the mobile station 400 to the PDN 20.
- the circuit switch 100a processes CS calls acquired from the RNCs 200 and 200a. For example, the circuit switch 100a relays voice communication from the mobile station 400 to the mobile station 400a.
- the RNCs 200 and 200a are communication devices that control radio base stations under their control.
- the RNC 200 is connected to the core network 10, the ISP network 40, and the radio base station 300b.
- the RNC 200 controls communication to the core network 10 via the radio base stations 300 and 300b.
- the RNC 200a is connected to the core network 10 and the radio base station 300a.
- the RNC 200a controls communication to the core network 10 via the radio base station 300a.
- the wireless base stations 300, 300a, and 300b are wireless communication devices that can wirelessly communicate with mobile stations within their own radio wave reach (cell).
- the radio base station 300 is a radio base station that forms a small cell (for example, a femto cell) that covers a specific indoor area, and the radio base stations 300a and 300b are radio base stations that form a macro cell.
- the radio base station 300 is connected to the ISP network 40.
- the radio base station 300a is connected to the RNC 200a.
- the radio base station 300b is connected to the RNC 200.
- the mobile stations 400 and 400a are wireless terminal devices that can wirelessly communicate with the wireless base stations 300, 300a, and 300b.
- the mobile stations 400 and 400a are, for example, mobile phones.
- it is assumed that the mobile station 400 is located in a cell formed by the radio base station 300, and the mobile station 400a is located in a cell formed by the radio base station 300a.
- FIG. 3 is a diagram illustrating the functions of the packet switch and the RNC according to the first embodiment. 3 shows the module configuration of the RNC 200, the RNC 200a can also be realized by the same module configuration as the RNC 200.
- the packet switch 100 includes a subscriber information management unit 110, an Iu communication unit 120, and a control unit 130.
- the subscriber information management unit 110 manages information (subscriber information) about the mobile stations 400 and 400a that are subscribers of the mobile communication network.
- the subscriber information management unit 110 operates a subscriber information database (not shown) such as a VLR (Visitor Location Register) or an HLR (Home Location Register) provided in the core network 10, Acquire and update subscriber information.
- the subscriber information includes identifiers and current positions of the mobile stations 400 and 400a, contract details, information used for authentication and concealment processing, and the like.
- the Iu communication unit 120 communicates with the RNCs 200 and 200a.
- the control unit 130 controls the overall behavior of the packet switch 100.
- the control unit 130 includes a call control unit 131 and an authentication concealment processing unit 132.
- the call control unit 131 receives a connection request from the RNCs 200 and 200a and controls the PS call.
- the authentication concealment processing unit 132 receives a connection request from the mobile stations 400 and 400a, acquires authentication concealment information from the subscriber information management unit 110, and performs authentication of the mobile stations 400 and 400a. In addition, the authentication concealment processing unit 132 controls to transmit necessary authentication concealment information to the RNCs 200 and 200a.
- the RNC 200 includes an Iu communication unit 210, an Iub communication unit 220, and a control unit 230.
- the Iu communication unit 210 communicates with the packet switch 100 regarding the PS call.
- the Iu communication unit 210 communicates with the circuit switch 100a regarding CS calls.
- the Iub communication unit 220 communicates with the radio base stations 300 and 300b.
- the control unit 230 controls the overall behavior of the RNC 200.
- the control unit 230 includes an authentication concealment processing unit 231.
- the authentication concealment processing unit 231 uses the authentication concealment information acquired from the packet switch 100 for concealment (prevention of interception) and integrity assurance (detection of tampering) with respect to communication contents between the mobile stations 400 and 400a. Apply cryptographic processing. Further, the authentication and concealment processing unit 231 transmits information used for the authentication and concealment processing to the radio base stations 300 and 300b in response to a request from the radio base stations 300 and 300b.
- FIG. 4 is a diagram illustrating functions of the radio base station according to the first embodiment.
- the radio base station 300 includes an Iub communication unit 310, an Internet communication unit 320, a radio communication unit 330, a connection management unit 340, an authentication and concealment processing unit 350, and a control unit 360.
- the connection management unit 340, the authentication and concealment processing unit 350, and the control unit 360 correspond to the communication control unit 4a in FIG.
- the Iub communication unit 310 communicates with the RNC 200.
- the internet communication unit 320 communicates with the internet 30.
- the Internet communication unit 320 appropriately converts the data transmission format on the Internet 30 and the data transmission format on the mobile communication network.
- the wireless communication unit 330 performs wireless communication with the mobile station 400.
- the connection management unit 340 determines, based on an instruction from the control unit 360, whether the access from the mobile station 400 received by the wireless communication unit 330 is transmitted to the core network 10 side or the Internet 30 side.
- the access content is output to the Iub communication unit 310.
- the access content is output to the authentication and concealment processing unit 350.
- the authentication concealment processing unit 350 terminates the access acquired from the connection management unit 340. That is to say, the authentication and concealment processing unit 350 uses the authentication and concealment information acquired from the control unit 360 to cancel the encryption processing applied to the access. Then, the authentication and concealment processing unit 350 outputs the PS call access to the Internet communication unit 320.
- the control unit 360 controls the overall behavior of the radio base station 300.
- the control unit 360 includes a wireless link control unit 361, an authentication confidential information acquisition unit 362, and a connection destination determination unit 363.
- the radio link control unit 361 controls a radio link set between the radio communication unit 330 and the mobile station 400.
- the authentication confidential information acquisition unit 362 requests the RNC 200 to acquire authentication confidential information. Then, the authentication confidential information acquisition unit 362 outputs the acquired authentication confidential information to the authentication confidential processing unit 350.
- the connection destination determination unit 363 determines whether the call type is a CS call or a PS call based on the connection request from the mobile station 400 received by the wireless communication unit 330. Then, the connection destination determination unit 363 instructs the connection management unit 340 about the destination of access to be acquired from the mobile station 400 thereafter, according to the call type.
- FIG. 5 is a diagram illustrating a data structure of a connection request according to the first embodiment.
- the connection request shown in FIG. 5 is first transmitted to the radio base station 300 when the mobile station 400 performs voice communication or packet communication.
- the connection request includes at least Message Type, Initial UE identity, and Establishment cause.
- Message Type is a predetermined bit string indicating that the message type is a connection request.
- Initial UE identity is an identifier for identifying the mobile station 400.
- Establishment cause is a bit string indicating the cause of the connection request. In Establishment cause, at least a different bit string is set for voice communication and packet communication.
- the radio base station 300 can determine whether a call requested by the mobile station 400 thereafter is a CS call or a PS call by referring to Establishment cause included in the connection request.
- FIG. 6 is a diagram illustrating a flow of initial access according to the first embodiment.
- the mobile station 400 accesses the radio base station 300 for the first time after the power is turned on.
- the process illustrated in FIG. 6 will be described in order of step number.
- Step S111 (Common CH Synchronization)
- the mobile station 400 and the radio base station 300 synchronize a common channel between them.
- Step S112 (RRC Connection Request)
- the mobile station 400 requests the RNC 200 to connect the RRC layer.
- Step S113 (Radio Link Setup)
- the RNC 200 requests the radio base station 300 to set up a radio link used for communication with the mobile station 400.
- Step S114 (Radio Link Setup Confirm)
- the radio base station 300 sets a radio link used for communication with the mobile station 400 and notifies the RNC 200 of the completion of the setup.
- Step S115 (RRC Connection Setup)
- the RNC 200 notifies the mobile station 400 of establishment of an RRC connection.
- Step S116 (DCH Layer 1 Synchronization Establishment)
- the mobile station 400 and the radio base station 300 synchronize a dedicated channel (DCH: Dedicated CHannel) of layer 1 (physical layer) between them.
- DCH Dedicated CHannel
- Step S117 (RRC Connection Setup Complete)
- the mobile station 400 notifies the RNC 200 that the establishment of the RRC connection has been confirmed.
- Step S118 (Initial Direct Transfer)
- the mobile station 400 notifies the RNC 200 of the start of transmission of a control signal (Location Updating Request) for registering its own location.
- Step S119 SCCP establishment
- SCCP Signaling Connection Control Part
- Step S120 (Location Updating Request)
- the RNC 200 requests the packet switch 100 for a control signal for registering its own location.
- Step S121 (Authentication Request)
- the packet switch 100 accesses a VLR or HLR (not shown) in the core network 10 and acquires authentication confidential information used for authentication processing and encryption processing. Then, the packet switch 100 transmits a part of the acquired authentication confidential information to the mobile station 400.
- Step S122 (Authentication Response)
- the mobile station 400 verifies the validity of the packet switch 100 using the information received from the packet switch 100. Then, the mobile station 400 generates response information and transmits it to the packet switch 100.
- the packet switch 100 verifies the validity of the mobile station 400 using the response information received from the mobile station 400.
- FIG. 7 is a diagram (continuation) illustrating the flow of initial access according to the first embodiment.
- the process shown in FIG. 7 is executed following the process shown in FIG. In the following, the process illustrated in FIG. 7 will be described in order of step number.
- Step S123 (Security Mode Command)
- the packet switch 100 requests the RNC 200 to perform encryption processing for concealing communication contents and ensuring integrity.
- Step S124 (Security Mode Command)
- the RNC 200 instructs the mobile station 400 to start communication content encryption processing. At this time, the RNC 200 also transmits various parameters used for encryption processing to the mobile station 400.
- Step S125 (Security Mode Complete)
- the mobile station 400 notifies the RNC 200 that the encryption processing of the communication content is started.
- Step S126 (Security Mode Complete)
- the RNC 200 reports to the packet switch 100 that the encryption processing of communication contents has started.
- Step S127 (Location Update Accept)
- the packet switch 100 accesses a VLR (not shown) in the core network 10 and registers the current location of the mobile station 400. Then, the packet switch 100 notifies the mobile station 400 that the current position has been updated.
- Step S128 (TMUI Relocation Complete)
- the mobile station 400 notifies the packet switch 100 that the update of the current location has been confirmed.
- the mobile station 400 accesses a radio base station (radio base station 300) that can communicate at that time.
- mutual validity is verified between the mobile station 400 and the packet switch 100, and encryption of communication contents is started between the mobile station 400 and the RNC 200.
- FIG. 8 is a schematic diagram illustrating a method for generating an authentication vector according to the first embodiment.
- the authentication vector generation process shown in FIG. 8 is executed on the core network 10 side during the first authentication process after the mobile station 400 is activated.
- a parameter AMF Authentication and key agreement Management Field
- a secret key K shared in advance between the mobile station 400 and the core network 10 is prepared.
- the generator automatically generates SQN (Sequence Number) and RAND (RANDom challenge).
- a MAC Message Authentication Code
- AMF Access Management Function
- SQN Session Management Function
- K Session Management Function
- RAND Retrieval
- a message XRES eXpected RESponse
- K Key
- CK Cipher Key
- IK Integrity Key
- authentication vector ⁇ RAND, XRES, CK, IK, AUTH> is generated as authentication confidential information.
- AUTH ⁇ SQN + AK, AMF, MAC> (here, “+” is used in the meaning of exclusive OR).
- RAND and AUTH are transmitted from the core network 10 to the mobile station 400 (step S119).
- FIG. 9 is a schematic diagram illustrating a user authentication method according to the first embodiment.
- the authentication process shown in FIG. 9 is executed by the mobile station 400 during the first authentication process after the mobile station 400 is activated.
- a secret key K shared in advance with the core network 10 is prepared.
- RAND, SQN + AK, AMF, and MAC are received from the core network 10.
- AK is generated from RAND based on the algorithm f5
- SQN is generated by calculating the exclusive OR of SQN + AK and AK.
- XMAC eXpected Message Authentication Code
- a message RES (RESponse) is generated from K and RAND based on the algorithm f2
- a key CK is generated based on the algorithm f3
- a key IK is generated based on the algorithm f4.
- the MAC received from the core network 10 is compared with the generated XMAC, and if both match, the validity of the core network 10 is confirmed. Thereafter, the generated RES is transmitted from the mobile station 400 to the core network 10 (step S120 above).
- the RES received from the mobile station 400 is compared with the generated XRES, and if both match, the legitimacy of the mobile station 400 is confirmed. Thereby, mutual authentication between the mobile station 400 and the core network 10 is completed.
- the key CK used for data concealment (prevention of interception) and the key IK used for data integrity assurance (detection of tampering) are shared between the mobile station 400 and the core network 10. Is done.
- FIG. 10 is a schematic diagram illustrating the data concealment method according to the first embodiment.
- a KEYSTREAM block is generated from COUNT-C, BEARER, DIRECTION, LENGTH, and CK based on algorithm f8. Then, an exclusive OR of the transmission data and the generated KEYSTREAM block is calculated. The bit string thus obtained is transmitted as encrypted data from the transmission side to the reception side.
- COUNT-C is a 32-bit sequence number that is incremented in common on the transmission side and the reception side.
- BEARER is a 5-bit identification number that identifies a radio bearer.
- DIRECTION is a bit indicating the direction of communication.
- LENGTH is a 16-bit numerical value indicating the size of one block.
- CK is a secret key shared between the transmission side and the reception side by the method shown in FIGS.
- a KEYSTREAM block is generated from COUNT-C, BEARER, DIRECTION, LENGTH, and CK based on algorithm f8. Then, an exclusive OR of the received encrypted data and the generated KEYSTREAM block is calculated. The bit string obtained in this way is the original data.
- FIG. 11 is a schematic diagram showing the integrity guarantee method according to the first embodiment.
- MAC-I is generated from MESSAGE, COUNT-I, DIRECTION, FRESH, and IK based on algorithm f9. Then, MESSAGE and MAC-I are transmitted from the transmission side to the reception side.
- MESSAGE is the content of the message whose integrity is to be guaranteed.
- COUNT-I is a 32-bit sequence number that is incremented in common by the transmission side and the reception side.
- DIRECTION is a bit indicating the direction of communication.
- FRESH is a random 32-bit bit string notified from the core network 10 to the mobile station 400 in advance.
- IK is an integrity key shared by the transmitting side and the receiving side by the method shown in FIGS.
- XMAC-I is generated from MESSAGE, COUNT-I, DIRECTION, FRESH, and IK based on algorithm f9. Then, the MAC-I received from the transmission side is compared with the generated XMAC-I, and when both match, the integrity of the message is confirmed.
- FIG. 12 is a flowchart illustrating a connection control procedure according to the first embodiment. This process is executed by the radio base station 300. In the following, the process illustrated in FIG. 12 will be described in order of step number.
- Step S11 When the wireless communication unit 330 receives a connection request from the mobile station 400, the connection destination determination unit 363 suspends the transfer of the connection request to the RNC 200.
- the connection destination determination unit 363 determines whether the call type requested by the mobile station 400 is a CS call or a PS call based on the connection request received in step S11. If it is determined that the call type is a PS call, the process proceeds to step S13. If it is determined that the call type is CS, the process proceeds to step S17.
- connection management unit 340 terminates the connection request received in step S11 without transferring it to the RNC 200.
- the authentication secret information acquisition unit 362 acquires the authentication secret information from the RNC 200 via the Iub communication unit 310.
- the authentication concealment processing unit 350 receives the authentication concealment information acquired in step S14 from the authentication concealment information acquisition unit 362. Then, the authentication and concealment processing unit 350 performs authentication processing of the mobile station 400 using the authentication concealment information and starts encryption processing.
- connection management unit 340 outputs the access (PDN access or Internet access) that the wireless communication unit 330 subsequently receives from the mobile station 400 to the authentication concealment processing unit 350.
- the authentication concealment processing unit 350 cancels the encryption process performed for the access and replaces it with access to the Internet 30.
- connection destination determination unit 363 releases the transfer suspension of the connection request received in Step S11.
- the connection management unit 340 outputs a connection request to the Iub communication unit 310 (core network (CN) side).
- connection management unit 340 outputs the access (voice access) that the wireless communication unit 330 subsequently receives from the mobile station 400 to the Iub communication unit 310 (core network (CN) side).
- the radio base station 300 when it receives a connection request from the mobile station 400, it determines the call type. When the call type is a CS call, the radio base station 300 transfers access received from the mobile station 400 to the core network 10 thereafter. On the other hand, when the call type is a PS call, access received from the mobile station 400 is terminated and replaced with access to the Internet 30.
- FIG. 13 is a diagram illustrating a flow of voice access according to the first embodiment.
- the mobile station 400 performs voice communication with the mobile station 400a.
- the process illustrated in FIG. 13 will be described in order of step number.
- Step S131 (RRC Connection Request)
- the mobile station 400 transmits an RRC layer connection request to the RNC 200.
- radio base station 300 intercepts the content of the connection request, determines that the call type is a CS call, and transfers the connection request to RNC 200.
- Step S132 (Radio Link Setup)
- the RNC 200 requests the radio base station 300 to set up a radio link used for voice communication with the mobile station 400.
- Step S133 (Radio Link Setup Confirm)
- the radio base station 300 sets a radio link used for voice communication with the mobile station 400, and notifies the RNC 200 of the completion of setting.
- Step S134 RRC Connection Setup
- the RNC 200 notifies the mobile station 400 of establishment of an RRC connection.
- Step S135 (DCH layer 1 synchronization established)
- the mobile station 400 and the radio base station 300 synchronize the dedicated channel of layer 1 (physical layer) between them.
- Step S136 (RRC Connection Setup Complete)
- the mobile station 400 notifies the RNC 200 that the establishment of the RRC connection has been confirmed.
- Step S137 (Initial Direct Transfer)
- the mobile station 400 notifies the RNC 200 of the start of transmission of a control signal (CM Service Request) for call connection.
- Step S138 SCCP establishment
- the RNC 200 and the circuit switch 100a establish an SCCP connection for transmitting control information such as authentication confidential information between the RNC 200 and the circuit switch 100a according to the SCCP protocol.
- Step S139 (CM Service Request)
- the RNC 200 requests the circuit switch 100a for a control signal for call connection.
- Step S140 Authentication Concealment
- the mobile station 400 and the circuit switch 100a authenticate each other.
- the mobile station 400 and the RNC 200 start encryption processing for concealing communication contents and ensuring integrity.
- Step S141 (Setup Request)
- the mobile station 400 issues a CS call to the circuit switch 100a using the established RRC connection.
- Step S142 (Call Proceeding)
- the circuit switch 100a notifies the mobile station 400 that the CS call has been accepted.
- Step S143 (Bearer setting) The mobile station 400 and the circuit switch 100a set a bearer (logical signal transmission path) for voice communication between them.
- Step S144 (Alert) The circuit switch 100a notifies the mobile station 400 that it has started calling the mobile station 400a that is the other party.
- Step S145 (Connect) The circuit switch 100a notifies the mobile station 400 that the mobile station 400a that is the other party of the call has accepted the CS call (responded to the call).
- Step S146 (Conn ACK) The mobile station 400 notifies the circuit switch 100a that it has confirmed the establishment of a call connection.
- the radio base station 300 intercepts the connection request from the mobile station 400 and determines the call type. If it is determined that the call type is a CS call, the radio base station 300 relays subsequent voice access from the mobile station 400 to the core network 10. At this time, the radio base station 300 does not need to intercept the access content.
- FIG. 14 is a diagram illustrating a flow of packet access according to the first embodiment.
- the mobile station 400 accesses the content of the PDN 20 or the content of the Internet 30.
- the process illustrated in FIG. 14 will be described in order of step number.
- Step S151 (RRC Connection Request)
- the mobile station 400 transmits an RRC layer connection request to the RNC 200.
- radio base station 300 intercepts the content of the connection request, determines that the call type is a PS call, and terminates the connection request without transferring it to RNC 200.
- Step S152 (Radio Link Setup)
- the radio base station 300 sets a radio link used for packet communication with the mobile station 400.
- Step S153 (RRC Connection Setup)
- the radio base station 300 notifies the mobile station 400 of establishment of an RRC connection.
- Step S154 (DCH layer 1 synchronization established)
- the mobile station 400 and the radio base station 300 synchronize the dedicated channel of layer 1 (physical layer) between them.
- Step S155 (RRC Connection Setup Complete)
- the mobile station 400 notifies the RNC 200 that the establishment of the RRC connection has been confirmed. However, the radio base station 300 terminates this message without transferring it to the RNC 200.
- Step S156 (Initial Direct Transfer)
- the mobile station 400 notifies the RNC 200 of the start of transmission of a control signal (Service Request) for call connection. However, the radio base station 300 terminates this message without transferring it to the RNC 200.
- Step S157 (Request for Authentication Confidential Information)
- the radio base station 300 requests the RNC 200 for authentication confidential information used for authentication processing and encryption processing.
- Step S158 (Authentication Confidential Information Response)
- the RNC 200 transmits the authentication confidential information to the radio base station 300. Note that the RNC 200 acquires the authentication confidential information from the core network 10 when it does not hold valid authentication confidential information about the mobile station 400.
- Step S159 (Authentication Concealment)
- the mobile station 400 and the radio base station 300 authenticate each other using the authentication concealment information acquired in step S158.
- the mobile station 400 and the radio base station 300 start encryption processing for concealing communication contents and ensuring integrity.
- Step S160 (Activate PDP Context Request)
- the mobile station 400 notifies the RNC 200 of an activation request for packet communication. However, the radio base station 300 terminates this message without transferring it to the RNC 200.
- Step S161 (Bearer setting) The mobile station 400 and the radio base station 300 set a bearer (logical signal transmission path) for packet communication between them.
- Step S162 (Activate PDP Context Accept) The radio base station 300 notifies the mobile station 400 of completion of activation of packet communication.
- Step S163 (HTTP Request)
- the mobile station 400 transmits an HTTP (HyperText Transfer Protocol) request using the established call connection.
- the radio base station 300 cancels the encryption process applied to the HTTP request acquired from the mobile station 400 and outputs the HTTP request to the Internet 30.
- the radio base station 300 intercepts the connection request from the mobile station 400 and determines the call type. If it is determined that the call type is a PS call, the radio base station 300 acquires the authentication concealment information from the RNC 200 and performs authentication concealment processing with the mobile station 400 in place of the RNC 200. Then, the radio base station 300 terminates the subsequent HTTP request from the mobile station 400 and replaces it with an HTTP request to the Internet 30.
- FIG. 15 is a diagram showing a flow of incoming voice calls according to the first embodiment.
- the mobile station 400a calls the mobile station 400 in a state where a PS call connection is established between the mobile station 400 and the radio base station 300. That is, the process shown in FIG. 15 is executed after the process shown in FIG. In the following, the process illustrated in FIG. 15 will be described in order of step number.
- Step S171 The circuit switch 100a requests the RNC 200 to call the mobile station 400.
- Step S172 (Paging Type1)
- the RNC 200 requests the radio base station 300 to call the mobile station 400.
- Step S173 (Paging Type 2)
- the radio base station 300 requests the mobile station 400 to add a CS call connection while maintaining an existing PS call connection.
- Step S174 (RRC Connection Request)
- the radio base station 300 transmits a new connection request of the RRC layer to the RNC 200.
- Step S175 (Initial Direct Transfer)
- the mobile station 400 notifies the RNC 200 of a layer 3 (network layer) response message as a response to the call request in step S173.
- the radio base station 300 terminates this message without transferring it to the RNC 200.
- Step S176 (Radio Link Setup)
- the RNC 200 requests the radio base station 300 to set up a radio link used for voice communication with the mobile station 400.
- Step S177 (Radio Link Setup Confirm)
- the radio base station 300 sets a radio link used for voice communication with the mobile station 400 and notifies the RNC 200 of the completion of the setting.
- Step S178 (RRC Connection Setup)
- the RNC 200 notifies the radio base station 300 of establishment of an RRC connection.
- Step S179 (RRC Connection Setup Complete)
- the radio base station 300 notifies the RNC 200 that the establishment of the RRC connection has been confirmed.
- Step S180 (Paging Response)
- the radio base station 300 transmits a layer 3 (network layer) response message to the RNC 200 as a response to the call request in step S172.
- Step S181 (Paging Response)
- the RNC 200 transmits a layer 3 (network layer) response message to the circuit switch 100a as a response to the call request in step S171.
- Step S182 (Authentication Concealment)
- the RNC 200 and the circuit switch 100a authenticate each other.
- Step S183] (Setup)
- the circuit switch 100a notifies the mobile station 400 of an incoming CS call.
- FIG. 16 is a diagram (continued) illustrating the flow of voice incoming calls according to the first embodiment. The process shown in FIG. 16 is executed following the process shown in FIG. In the following, the process illustrated in FIG. 16 will be described in order of step number.
- Step S185 (RAB Assignment Request)
- the circuit switch 100a requests the RNC 200 to set up a bearer (logical signal transmission path) for radio communication of the mobile station 400.
- Step S186 (Radio Link Reconfiguration Prepare)
- the RNC 200 instructs the radio base station 300 to prepare for radio link reconfiguration (change of radio link settings for adding a CS call).
- Step S187 (Radio Link Reconfiguration Ready)
- the radio base station 300 notifies the RNC 200 of the completion of preparation for radio link reconfiguration.
- Step S188 (Radio Link Reconfiguration)
- the RNC 200 instructs the radio base station 300 to perform radio link reconfiguration.
- Step S189 (Radio Bearer Setup)
- the RNC 200 requests the mobile station 400 to set a bearer (logical signal transmission path) in the radio section.
- Step S190 (Radio Bearer Setup Complete)
- the mobile station 400 sets a radio bearer and notifies the RNC 200 of the setting completion.
- Step S191 (RAB Assignment Response)
- the RNC 200 notifies the circuit switch 100a of completion of bearer setting for radio communication of the mobile station 400.
- Step S192 (Alert)
- the mobile station 400 notifies the circuit switch 100a that the mobile station 400 is waiting to receive a CS call (being called).
- Step S193 (Connect) The mobile station 400 notifies the circuit switch 100a that the CS call has been accepted (responded to the call).
- Step S194 (Conn ACK) The circuit switch 100a notifies the mobile station 400 that the establishment of the call connection has been confirmed.
- the radio base station 300 requests the mobile station 400 to add a CS call when there is an incoming voice call to the mobile station 400 while the mobile station 400 is performing PDN access or Internet access. To do. On the other hand, since there is no call connection to the core network 10, a new call connection is requested. Then, the radio base station 300 relays subsequent voice access from the core network 10 to the mobile station 400.
- FIG. 17 is a diagram illustrating an access route according to the first embodiment.
- the radio base station 300 acquires voice access from the mobile station 400
- the radio base station 300 transfers the voice access to the core network 10 managed by the mobile communication carrier.
- PDN access or Internet access is acquired from the mobile station 400
- the access is terminated and output to the Internet 30 side.
- the PDN access is transferred from the Internet 30 to the PDN 20.
- the mobile station 400 may access in accordance with the rules with the mobile communication carrier. That is, it seems to the mobile station 400 that all accesses are made to the core network 10. However, PDN access and Internet access (PS call access) are automatically transferred to the Internet 30 by the radio base station 300. Thereby, the inflow of packets to the core network 10 can be efficiently suppressed without changing the mobile station 400.
- PDN access and Internet access PS call access
- the system configuration of the second embodiment is the same as the system configuration of the first embodiment shown in FIG.
- the radio base station according to the second embodiment can be realized by the same module configuration as that of the radio base station 300 according to the first embodiment shown in FIG.
- the specific connection control method of the connection destination determination unit 363 is different.
- 2nd Embodiment is described using the same code
- FIG. 18 is a diagram illustrating a data structure of a PS activation request according to the second embodiment.
- the PS activation request shown in FIG. 18 is transmitted from the mobile station 400 to the packet switch 100 when performing packet communication after the RRC connection is established between the mobile station 400 and the core network 10.
- the PS activation request includes at least Protocol discriminator, Transaction identifier, and Protocol configuration options.
- Protocol discriminator is an identifier indicating a communication protocol used for packet communication between the mobile station 400 and the core network 10.
- Transaction identifier is an identifier for identifying the current communication transaction.
- Protocol configuration options is a value indicating option information related to a communication protocol used in the external network in the case of packet communication involving access to an external network such as the Internet 30.
- the radio base station 300 can determine whether the access type is PDN access or Internet access by referring to Protocol configuration options included in the PS activation request.
- FIG. 19 is a flowchart illustrating a connection control procedure according to the second embodiment. This process is executed by the radio base station 300. In the following, the process illustrated in FIG. 19 will be described in order of step number.
- Step S21 When the wireless communication unit 330 receives a connection request from the mobile station 400, the connection management unit 340 outputs the connection request to the Iub communication unit 310 (core network (CN) side). Thereafter, the connection management unit 340 relays a control signal between the radio communication unit 330 and the Iub communication unit 310, and establishes an RRC connection between the mobile station 400 and the RNC 200.
- the connection management unit 340 relays a control signal between the radio communication unit 330 and the Iub communication unit 310, and establishes an RRC connection between the mobile station 400 and the RNC 200.
- the authentication confidential information acquisition unit 362 acquires the authentication confidential information from the RNC 200 via the Iub communication unit 310.
- the connection destination determination unit 363 suspends the transfer of the PS activation request received from the mobile station 400 to the RNC 200. Then, the connection destination determination unit 363 intercepts the content of the PS activation request using the authentication concealment information acquired in step S22, and determines whether the access type is PDN access or Internet access. If it is determined that the access type is Internet access, the process proceeds to step S24. If the access type is determined to be PDN access, the process proceeds to step S26.
- connection management unit 340 terminates the received PS activation request without transferring it to the RNC 200. Then, the connection management unit 340 disconnects the RRC connection between the RNC 200 and the radio base station 300.
- connection management unit 340 outputs the access (Internet access) that the wireless communication unit 330 subsequently receives from the mobile station 400 to the authentication concealment processing unit 350.
- the authentication concealment processing unit 350 cancels the encryption process performed for the access and replaces it with access to the Internet 30.
- connection management unit 340 outputs the access (voice access and PDN access) that the wireless communication unit 330 subsequently receives from the mobile station 400 to the Iub communication unit 310 (core network (CN) side).
- the radio base station 300 determines the access type.
- the access type is PDN access
- the radio base station 300 transfers access received from the mobile station 400 to the core network 10 thereafter.
- the access type is Internet access
- subsequent access received from the mobile station 400 is terminated and replaced with access to the Internet 30.
- the message flow during PDN access and Internet access by the mobile station 400 will be described.
- the message flow for voice access is the same as that of the first embodiment shown in FIG.
- FIG. 20 is a diagram illustrating a flow of PDN access according to the second embodiment. Here, it is assumed that the mobile station 400 accesses the content of the PDN 20. In the following, the process illustrated in FIG. 20 will be described in order of step number.
- Step S211 (RRC Connection Request)
- the mobile station 400 transmits an RRC layer connection request to the RNC 200.
- the radio base station 300 transfers the connection request to the RNC 200 without intercepting the content of the connection request.
- Step S212 (Radio Link Setup)
- the RNC 200 requests the radio base station 300 to set up a radio link used for packet communication with the mobile station 400.
- Step S213 (Radio Link Setup Confirm)
- the radio base station 300 sets a radio link used for packet communication with the mobile station 400, and notifies the RNC 200 of the completion of setting.
- Step S214 (RRC Connection Setup)
- the RNC 200 notifies the mobile station 400 of establishment of an RRC connection.
- Step S215 (DCH Layer 1 Synchronization Established)
- the mobile station 400 and the radio base station 300 synchronize layer 1 (physical layer) dedicated channels.
- Step S216 (RRC Connection Setup Complete)
- the mobile station 400 notifies the RNC 200 that the establishment of the RRC connection has been confirmed.
- Step S217 (Initial Direct Transfer)
- the mobile station 400 notifies the RNC 200 of the start of transmission of a logical transmission path setting control signal (Service Request).
- Step S218 The RNC 200 and the packet switch 100 establish an SCCP connection for transmitting control information such as authentication concealment information between the RNC 200 and the packet switch 100 according to a signal connection control unit (SCCP: Signaling Connection Control Part) protocol. Establish.
- SCCP Signaling Connection Control Part
- Step S219 (Service Request)
- the RNC 200 requests the packet switch 100 to set up a logical transmission path.
- Step S220 Authentication Concealment
- the mobile station 400 and the packet switch 100 authenticate each other.
- the mobile station 400 and the RNC 200 start encryption processing for concealing communication contents and ensuring integrity.
- Step S221 (Request for Authentication Confidential Information)
- the radio base station 300 requests the RNC 200 for authentication confidential information used for authentication processing and encryption processing.
- Step S222 (Authentication Confidential Information Response)
- the RNC 200 transmits the authentication confidential information to the radio base station 300.
- FIG. 21 is a diagram (continued) illustrating the flow of PDN access according to the second embodiment.
- the process shown in FIG. 21 is executed following the process shown in FIG. In the following, the process illustrated in FIG. 21 will be described in order of step number.
- Step S223 (Active PDP Context Request)
- the mobile station 400 transmits a packet communication activation request to the packet switch 100.
- the radio base station 300 intercepts the content of the activation request using the authentication confidential information acquired in step S222. Then, it is determined from the content of the activation request that the access type is PDN access, and the activation request is transferred to the RNC 200.
- Step S224 (Bearer setting) The mobile station 400 and the packet switch 100 set up a bearer (logical signal transmission path) for packet communication between them.
- Step S225 (Activate PDP Context Accept) The packet switch 100 notifies the mobile station 400 of completion of activation of packet communication.
- Step S226 (HTTP Request)
- the mobile station 400 transmits an HTTP request to the packet switch 100 using the established call connection.
- the packet switch 100 cancels the encryption processing applied to the HTTP request acquired from the mobile station 400 and outputs the HTTP request to the PDN 20.
- the radio base station 300 acquires authentication confidential information from the RNC 200 and intercepts the access contents. If it is determined that the access is PDN access, the radio base station 300 continues to relay packet communication between the mobile station 400 and the core network 10.
- step S221 the radio base station 300 requests only the minimum information necessary for descrambling to the RNC 200, and in step S222, the RNC 200 transmits only the requested information to the radio base station 300. Also good.
- FIG. 22 is a diagram illustrating the flow of Internet access according to the second embodiment.
- the mobile station 400 accesses content on the Internet 30.
- the first half of the internet access flow is the same as in the case of PDN access.
- the process shown in FIG. 22 is executed after the process shown in FIG. In the following, the process illustrated in FIG. 22 will be described in order of step number.
- Step S231 (Active PDP Context Request)
- the mobile station 400 transmits a packet communication activation request to the packet switch 100.
- the radio base station 300 intercepts the contents of the activation request using the authentication confidential information acquired in step S222. Then, it is determined from the content of the activation request that the access type is Internet access, and the activation request is terminated without being transferred to the RNC 200.
- Step S232 (Deactivate PDP Context Request)
- the radio base station 300 requests the packet switch 100 to deactivate packet communication.
- Step S233 (Deactivate PDP Context Accept)
- the packet switch 100 deactivates packet communication and notifies the radio base station 300 of deactivation.
- Step S234 (RRC Connection Release)
- the RNC 200 requests the radio base station 300 to release the RRC connection.
- [Step S235] (RRC Connection Release Complete)
- the radio base station 300 releases (disconnects) the RRC connection and notifies the RNC 200 of the release completion.
- Step S236 SCCP Disconnect
- the RNC 200 and the packet switch 100 disconnect the SCCP connection between them according to the SCCP protocol.
- Step S237 Radio Bearer Setup
- the radio base station 300 requests the mobile station 400 to set a bearer (logical signal transmission path) in the radio section.
- Step S238 (Radio Bearer Setup Complete)
- the mobile station 400 sets a radio bearer and notifies the radio base station 300 of the completion of the setting.
- Step S239 (Activate PDP Context Accept)
- the radio base station 300 notifies the mobile station 400 of completion of activation of packet communication.
- Step S240 (HTTP Request)
- the mobile station 400 transmits an HTTP request using the established call connection.
- the radio base station 300 cancels the encryption process applied to the HTTP request acquired from the mobile station 400 and outputs the HTTP request to the Internet 30.
- the radio base station 300 acquires authentication confidential information from the RNC 200 and intercepts the access contents. If it is determined that the access is Internet access, the radio base station 300 disconnects the connection on the core network 10 side. Then, subsequent HTTP requests from the mobile station 400 are terminated and replaced with HTTP requests to the Internet 30.
- connection on the core network 10 side is maintained until the Internet access by the mobile station 400 is completed, instead of performing the disconnection processing in the above steps S232 to S236 after it is determined that the access type is Internet access. Also good.
- FIG. 23 is a diagram illustrating an access route according to the second embodiment.
- the radio base station 300 acquires voice access or PDN access from the mobile station 400
- the radio base station 300 transfers the voice access or the PDN access to the core network 10 managed by the mobile communication carrier.
- the access is terminated and output to the Internet 30 side.
- the PDN access is transferred from the core network 10 to the PDN 20.
- the mobile station 400 may access in accordance with the rules with the mobile communication carrier. That is, it seems to the mobile station 400 that all accesses are made to the core network 10. However, Internet access is automatically transferred to the Internet 30 by the radio base station 300. Thereby, the inflow of packets to the core network 10 can be efficiently suppressed without changing the mobile station 400.
- the mobile communication carrier can guarantee a communication quality of a certain level or more for the PDN access.
- an operation of prohibiting packet inflow from the Internet 30 to the PDN 20 is also possible.
- the system configuration of the third embodiment is the same as the system configuration of the first embodiment shown in FIG.
- the radio base station according to the third embodiment can be realized by the same module configuration as that of the radio base station 300 according to the first embodiment shown in FIG.
- the specific connection control method of the connection destination determination unit 363 is different.
- 3rd Embodiment is described using the same code
- FIG. 24 is a flowchart illustrating a connection control procedure according to the third embodiment. This process is executed by the radio base station 300. In the following, the process illustrated in FIG. 24 will be described in order of step number.
- Step S31 When the wireless communication unit 330 receives a connection request from the mobile station 400, the connection management unit 340 outputs the connection request to the Iub communication unit 310 (core network (CN) side). Thereafter, the connection management unit 340 relays a control signal between the radio communication unit 330 and the Iub communication unit 310, and establishes an RRC connection between the mobile station 400 and the RNC 200.
- the connection management unit 340 relays a control signal between the radio communication unit 330 and the Iub communication unit 310, and establishes an RRC connection between the mobile station 400 and the RNC 200.
- connection destination determination unit 363 obtains a connection destination instruction from the RNC 200 via the Iub communication unit 310.
- the authentication secret information acquisition unit 362 acquires the authentication secret information from the RNC 200 via the Iub communication unit 310.
- connection destination determination unit 363 determines whether connection to the Internet 30 is instructed by the connection destination instruction acquired in step S32. If connection to the Internet 30 is instructed, the process proceeds to step S35. If connection to the core network 10 is instructed, the process proceeds to step S37.
- connection management unit 340 disconnects the RRC connection between the RNC 200 and the radio base station 300.
- connection management unit 340 outputs the access that the wireless communication unit 330 subsequently receives from the mobile station 400 to the authentication concealment processing unit 350.
- the authentication concealment processing unit 350 uses the authentication concealment information acquired in step S ⁇ b> 33 to cancel the encryption processing performed for access and replace it with access to the Internet 30.
- the connection management unit 340 outputs the access that the wireless communication unit 330 subsequently receives from the mobile station 400 to the Iub communication unit 310 (core network (CN) side).
- the radio base station 300 acquires the connection destination instruction from the core network 10 after the RNC 200 and the mobile station 400 establish the RRC connection.
- the radio base station 300 acquires an instruction to set the connection destination as the core network 10
- the radio base station 300 transfers access received from the mobile station 400 to the core network 10 thereafter.
- the instruction to set the connection destination to the Internet 30 is acquired, the access received from the mobile station 400 is terminated and replaced with the access to the Internet 30.
- the packet switch 100 can determine the connection destination based on the state of packet inflow into the core network 10 and the subscriber information of the mobile station 400. For example, the packet switch 100 may instruct connection to the core network 10 when there is little packet inflow to the core network 10, and instruct connection to the Internet 30 when there is much packet inflow. In addition, when the mobile station 400 is a terminal that has a special contract for packet communication, it may be possible to instruct connection to the core network 10 even when there is a large amount of packets flowing into the core network 10.
- the message flow during PDN access and Internet access by the mobile station 400 will be described.
- the message flow for voice access is the same as that of the first embodiment shown in FIG.
- FIG. 25 is a diagram illustrating a flow of packet access according to the third embodiment.
- the mobile station 400 accesses the content of the PDN 20 or the content of the Internet 30.
- the process illustrated in FIG. 25 will be described in order of step number.
- Step S311 (RRC Connection Request)
- the mobile station 400 transmits an RRC layer connection request to the RNC 200.
- the radio base station 300 transfers the connection request to the RNC 200 without intercepting the content of the connection request.
- Step S312 (Radio Link Setup)
- the RNC 200 requests the radio base station 300 to set up a radio link used for packet communication with the mobile station 400.
- Step S313 (Radio Link Setup Confirm)
- the radio base station 300 sets a radio link used for packet communication with the mobile station 400, and notifies the RNC 200 of the completion of setting.
- Step S314 (RRC Connection Setup)
- the RNC 200 notifies the mobile station 400 of establishment of an RRC connection.
- Step S315 (DCH layer 1 synchronization established)
- the mobile station 400 and the radio base station 300 synchronize the dedicated channel of the layer 1 (physical layer) between them.
- Step S316 (RRC Connection Setup Complete)
- the mobile station 400 notifies the RNC 200 that the establishment of the RRC connection has been confirmed.
- Step S317 (Initial Direct Transfer)
- the mobile station 400 notifies the RNC 200 of the start of transmission of a logical transmission path setting control signal (Service Request).
- Step S318 SCCP establishment
- the RNC 200 and the packet switch 100 establish an SCCP connection for transmitting control information such as authentication concealment information between them according to the SCCP protocol.
- Step S319 (Service Request)
- the RNC 200 requests the packet switch 100 to set up a logical transmission path.
- Step S320 Authentication Concealment
- the mobile station 400 and the packet switch 100 authenticate each other.
- the mobile station 400 and the RNC 200 start encryption processing for concealing communication contents and ensuring integrity.
- Step S321 (Connection Destination Instruction) The packet switch 100 determines whether the connection destination of the radio base station 300 is the core network 10 or the Internet based on the packet inflow status into the core network 10 and the subscriber information about the mobile station 400. 30 is determined. Then, the packet switch 100 instructs the radio base station 300 as a connection destination.
- Step S322 (Authentication Concealment Information Request)
- the radio base station 300 requests the RNC 200 for authentication concealment information used for authentication processing and encryption processing.
- Step S323 (Authentication Confidential Information Response)
- the RNC 200 transmits the authentication confidential information to the radio base station 300.
- connection destination instructed in step S321 is the core network 10
- the same processing as the PDN access of the second embodiment shown in FIG. 21 is executed.
- the connection destination instructed in step S321 is the Internet 30
- the same processing as the Internet access of the second embodiment shown in FIG. 22 is executed.
- the radio base station 300 does not need to intercept the contents of the activation request from the mobile station 400.
- the radio base station 300 acquires an instruction from the core network 10 as to whether the connection destination is the core network 10 or the Internet 30. To do.
- the radio base station 300 relays the HTTP request from the mobile station 400 to the core network 10 when the core network 10 is a connection destination.
- the HTTP request from the mobile station 400 is terminated and replaced with an HTTP request to the Internet 30.
- FIG. 26 is a diagram illustrating an access route according to the third embodiment.
- the radio base station 300 acquires voice access from the mobile station 400
- the radio base station 300 transfers the voice access to the core network 10 managed by the mobile communication carrier.
- PDN access or Internet access is acquired from the mobile station 400, it is output to either the core network 10 or the Internet 30 in response to an instruction from the core network 10.
- the PDN access output to the core network 10 side is transferred from the core network 10 to the PDN 20.
- the PDN access output to the Internet 30 side is transferred from the Internet 30 to the PDN 20.
- the mobile station 400 may access in accordance with the rules with the mobile communication carrier. That is, it seems to the mobile station 400 that all accesses are made to the core network 10. However, the PDN access and the Internet access are transferred to the Internet 30 by the radio base station 300 in accordance with an instruction from the core network 10. Thereby, the inflow of packets to the core network 10 can be efficiently suppressed without changing the mobile station 400.
- FIG. 27 is a diagram illustrating a system configuration according to the fourth embodiment.
- the communication system according to the fourth embodiment includes a core network 10, a PDN 20, an Internet 30, an ISP network 40, a packet switch 100, a circuit switch 100a, RNCs 200 and 200a, mobile stations 400 and 400a, radio base stations 500 and 500a, 500b and relay device 600.
- the functions of the core network 10, the PDN 20, the Internet 30, the ISP network 40, the packet switch 100, the circuit switch 100a, the RNCs 200 and 200a, and the mobile stations 400 and 400a are as described in the first embodiment.
- the radio base stations 500, 500a, and 500b are obtained by removing the connection control function from the radio base stations 300, 300a, and 300b of the first embodiment.
- the radio base station 500 transfers all accesses from the mobile station 400 to the relay device 600.
- the relay device 600 is obtained by mounting the connection control function of the radio base stations 500, 500a, and 500b described in the first embodiment on an independent communication device.
- the relay device 600 is connected to the Internet 30, the ISP network 40, and the RNC 200.
- the relay apparatus 600 transfers access received from the radio base station 500 via the ISP network 40 to the RNC 200 or terminates and replaces it with access to the Internet 30.
- FIG. 28 is a diagram illustrating functions of the relay device according to the fourth embodiment.
- the relay device 600 includes an RNC side communication unit 610, an Internet communication unit 620, a base station side communication unit 630, a connection management unit 640, an authentication concealment processing unit 650, and a control unit 660.
- the connection management unit 640, the authentication and concealment processing unit 650, and the control unit 660 correspond to the communication control unit 4a in FIG.
- the RNC side communication unit 610 communicates with the RNC 200.
- the internet communication unit 620 communicates with the internet 30. At this time, the Internet communication unit 620 appropriately converts the data transmission format on the Internet 30 and the data transmission format on the mobile communication network.
- the base station side communication unit 630 communicates with the radio base station 500.
- the connection management unit 640 determines whether the access from the mobile station 400 received by the base station side communication unit 630 is sent to the core network 10 side or the Internet 30 side. To do.
- the access content is output to the RNC side communication unit 610.
- the access content is output to the authentication and concealment processing unit 650.
- the authentication concealment processing unit 650 terminates the access acquired from the connection management unit 640. That is, the authentication / secret processing unit 650 uses the authentication / concealment information acquired from the control unit 660 to release the encryption processing performed for the access. Then, the authentication and concealment processing unit 650 outputs the PS call access to the Internet communication unit 620.
- the control unit 660 controls the overall behavior of the relay device 600.
- the control unit 660 includes an authentication confidential information acquisition unit 661 and a connection destination determination unit 662.
- the authentication confidential information acquisition unit 661 requests the RNC 200 to acquire authentication confidential information. Then, the authentication confidential information acquisition unit 661 outputs the acquired authentication confidential information to the authentication confidential processing unit 650.
- the connection destination determination unit 662 determines whether the call type is a CS call or a PS call based on the connection request from the mobile station 400 received by the base station side communication unit 630. Then, the connection destination determination unit 662 instructs the connection management unit 640 of an access destination to be acquired from the mobile station 400 thereafter according to the call type.
- CS call communication voice access
- PS call communication PDN access and Internet access
- FIG. 29 is a diagram illustrating a flow of voice access according to the fourth embodiment.
- the mobile station 400 performs voice communication with the mobile station 400a.
- the process illustrated in FIG. 29 will be described in order of step number.
- Step S411 (RRC Connection Request)
- the mobile station 400 transmits an RRC layer connection request to the RNC 200.
- relay device 600 intercepts the contents of the connection request, determines that the call type is a CS call, and transfers the connection request to RNC 200.
- Step S412 (Radio Link Setup)
- the RNC 200 requests the radio base station 500 to set up a radio link used for voice communication with the mobile station 400.
- Step S413 (Radio Link Setup Confirm)
- the radio base station 500 sets a radio link used for voice communication with the mobile station 400 and notifies the RNC 200 of the completion of the setup.
- Step S414 (RRC Connection Setup)
- the RNC 200 notifies the mobile station 400 of establishment of an RRC connection.
- Step S415 (DCH layer 1 synchronization established)
- the mobile station 400 and the radio base station 500 synchronize the dedicated channel of the layer 1 (physical layer) between them.
- Step S416 (RRC Connection Setup Complete)
- the mobile station 400 notifies the RNC 200 that the establishment of the RRC connection has been confirmed.
- Step S417 (Initial Direct Transfer)
- the mobile station 400 notifies the RNC 200 of the start of transmission of a control signal (CM Service Request) for call connection.
- Step S418 SCCP establishment
- the RNC 200 and the circuit switch 100a establish an SCCP connection for transmitting control information such as authentication secret information between the RNC 200 and the circuit switch 100a.
- Step S419 (CM Service Request)
- the RNC 200 requests the circuit switch 100a for a control signal for call connection.
- Step S420] (Authentication Concealment)
- the mobile station 400 and the circuit switch 100a authenticate each other.
- the mobile station 400 and the RNC 200 start encryption processing for concealing communication contents and ensuring integrity.
- Step S421 (Setup Request)
- the mobile station 400 issues a CS call to the circuit switch 100a using the established RRC connection.
- Step S422 (Call Proceeding)
- the circuit switch 100a notifies the mobile station 400 that the CS call has been accepted.
- Step S423 (Bearer setting) The mobile station 400 and the circuit switch 100a set up a bearer (logical signal transmission path) for voice communication between them.
- Step S424 (Alert) The circuit switch 100a notifies the mobile station 400 that it has started calling the mobile station 400a that is the other party.
- Step S425 (Connect) The circuit switch 100a notifies the mobile station 400 that the mobile station 400a that is the other party of the call has accepted the CS call (responded to the call).
- Step S426 (Conn ACK) The mobile station 400 notifies the circuit switch 100a that it has confirmed the establishment of a call connection.
- the relay apparatus 600 intercepts the connection request from the mobile station 400 and determines the call type. If it is determined that the call type is a CS call, the relay device 600 relays subsequent voice access from the mobile station 400 to the core network 10. At this time, the relay apparatus 600 does not need to intercept the access content.
- FIG. 30 is a diagram illustrating a flow of packet access according to the fourth embodiment.
- the mobile station 400 accesses the content of the PDN 20 or the content of the Internet 30.
- the process illustrated in FIG. 30 will be described in order of step number.
- Step S431 (RRC Connection Request)
- the mobile station 400 transmits an RRC layer connection request to the RNC 200.
- relay device 600 intercepts the content of the connection request, determines that the call type is a PS call, and terminates the connection request without transferring it to RNC 200.
- Step S432 (Radio Link Setup)
- the relay apparatus 600 requests the radio base station 500 to set up a radio link used for packet communication with the mobile station 400.
- Step S433 (Radio Link Setup Confirm)
- the radio base station 500 sets a radio link used for packet communication with the mobile station 400 and notifies the relay apparatus 600 of the completion of the setup.
- Step S434 (RRC Connection Setup)
- the relay device 600 notifies the mobile station 400 of establishment of an RRC connection.
- Step S435 (DCH layer 1 synchronization established)
- the mobile station 400 and the radio base station 300 synchronize the dedicated channel of layer 1 (physical layer) between them.
- Step S436 (RRC Connection Setup Complete)
- the mobile station 400 notifies the RNC 200 that the establishment of the RRC connection has been confirmed. However, the relay device 600 terminates this message without transferring it to the RNC 200.
- Step S437 (Initial Direct Transfer)
- the mobile station 400 notifies the RNC 200 of the start of transmission of a logical transmission path setting control signal (Service Request). However, the relay device 600 terminates this message without transferring it to the RNC 200.
- Step S438 (Authentication Confidential Information Request)
- the relay apparatus 600 requests the RNC 200 for authentication confidential information used for authentication processing and encryption processing.
- Step S439 (Authentication Confidential Information Response)
- the RNC 200 transmits the authentication confidential information to the relay device 600. Note that the RNC 200 acquires the authentication confidential information from the core network 10 when it does not hold valid authentication confidential information about the mobile station 400.
- Step S440 (Authentication Concealment)
- the mobile station 400 and the relay apparatus 600 authenticate each other using the authentication concealment information acquired in step S439.
- the mobile station 400 and the relay apparatus 600 start encryption processing for concealing communication contents and guaranteeing integrity.
- Step S441 (Activate PDP Context Request)
- the mobile station 400 transmits a packet communication activation request to the packet switch 100. However, the relay device 600 terminates without transferring this message.
- Step S442 (Bearer setting) The mobile station 400 and the relay apparatus 600 set up a bearer (logical signal transmission path) for packet communication between them.
- Step S443 (Activate PDP Context Accept) The relay apparatus 600 notifies the mobile station 400 of completion of activation of packet communication.
- Step S444 (HTTP Request)
- the mobile station 400 transmits an HTTP request using the established call connection.
- the relay device 600 cancels the encryption process applied to the HTTP request acquired from the mobile station 400 and outputs the HTTP request to the Internet 30.
- the relay apparatus 600 intercepts the connection request from the mobile station 400 and determines the call type. If it is determined that the call type is a PS call, the relay device 600 acquires authentication confidential information from the RNC 200 and performs authentication confidential processing with the mobile station 400 in place of the RNC 200. Then, the relay device 600 terminates the subsequent HTTP request from the mobile station 400 and replaces it with an HTTP request to the Internet 30.
- FIG. 31 is a diagram illustrating an access route according to the fourth embodiment.
- the relay apparatus 600 acquires voice access from the mobile station 400
- the relay apparatus 600 transfers the voice access to the core network 10 managed by the mobile communication carrier.
- PDN access or Internet access is acquired from the mobile station 400
- the access is terminated and output to the Internet 30 side.
- the PDN access is transferred from the Internet 30 to the PDN 20.
- the mobile station 400 and the radio base station 500 may access according to the rules with the mobile communication carrier. That is, it seems to the mobile station 400 and the radio base station 500 that all accesses are made to the core network 10. However, PDN access and Internet access (PS call access) are automatically transferred to the Internet 30 by the relay device 600. Thereby, the inflow of packets to the core network 10 can be efficiently suppressed without changing the mobile station 400 and the radio base station 500.
- PDN access and Internet access PS call access
- the system configuration of the fifth embodiment is the same as the system configuration of the fourth embodiment shown in FIG. Further, the relay device of the fifth embodiment can be realized by the same module configuration as that of the relay device 600 of the fourth embodiment shown in FIG. However, the specific connection control method of the connection destination determination unit 662 is different.
- the fifth embodiment will be described using the same reference numerals as those in the fourth embodiment.
- the relay device 600 a control process similar to the connection control of the second embodiment shown in FIG. 19 is executed.
- the flow of messages during PDN access and Internet access by the mobile station 400 will be described. Note that the flow of messages during voice access is the same as that of the fourth embodiment shown in FIG.
- FIG. 32 is a diagram illustrating a flow of PDN access according to the fifth embodiment. Here, it is assumed that the mobile station 400 accesses the content of the PDN 20. In the following, the process illustrated in FIG. 32 will be described in order of step number.
- Step S511 (RRC Connection Request)
- the mobile station 400 transmits an RRC layer connection request to the RNC 200.
- the relay device 600 transfers the connection request to the RNC 200 without intercepting the content of the connection request.
- Step S512 (Radio Link Setup)
- the RNC 200 requests the radio base station 500 to set up a radio link used for packet communication with the mobile station 400.
- Step S513 (Radio Link Setup Confirm)
- the radio base station 500 sets a radio link used for packet communication with the mobile station 400, and notifies the RNC 200 of the completion of setting.
- Step S514 (RRC Connection Setup)
- the RNC 200 notifies the mobile station 400 of establishment of an RRC connection.
- Step S515 (DCH Layer 1 Synchronization Established)
- the mobile station 400 and the radio base station 500 synchronize layer 1 (physical layer) dedicated channels.
- Step S516 (RRC Connection Setup Complete)
- the mobile station 400 notifies the RNC 200 that the establishment of the RRC connection has been confirmed.
- Step S517 (Initial Direct Transfer)
- the mobile station 400 notifies the RNC 200 of the start of transmission of a logical transmission path setting control signal (Service Request).
- Step S518 SCCP establishment
- the RNC 200 and the packet switch 100 establish an SCCP connection for transmitting control information such as authentication concealment information between them according to the SCCP protocol.
- Step S519 (Service Request)
- the RNC 200 requests the packet switch 100 to set a logical transmission path.
- Step S520 (Authentication Concealment)
- the mobile station 400 and the packet switch 100 authenticate each other.
- the mobile station 400 and the RNC 200 start encryption processing for concealing communication contents and ensuring integrity.
- Step S521 (Authentication Confidential Information Request)
- Relay device 600 requests RNC 200 for authentication confidential information used for authentication processing and encryption processing.
- Step S522 (Authentication Confidential Information Response)
- the RNC 200 transmits the authentication confidential information to the relay device 600.
- FIG. 33 is a diagram (continued) illustrating the flow of PDN access according to the fifth embodiment.
- the process shown in FIG. 33 is executed following the process shown in FIG. In the following, the process illustrated in FIG. 33 will be described in order of step number.
- Step S523 (Activate PDP Context Request)
- the mobile station 400 transmits a packet communication activation request to the packet switch 100.
- the relay apparatus 600 intercepts the content of the activation request using the authentication confidential information acquired at step S522. Then, it is determined from the content of the activation request that the access type is PDN access, and the activation request is transferred to the RNC 200.
- Step S524 (Bearer setting) The mobile station 400 and the packet switch 100 set a bearer (logical signal transmission path) for packet communication between them.
- Step S525 (Activate PDP Context Accept) The packet switch 100 notifies the mobile station 400 of completion of activation of packet communication.
- Step S526 (HTTP Request)
- the mobile station 400 transmits an HTTP request to the packet switch 100 using the established call connection.
- the packet switch 100 cancels the encryption processing applied to the HTTP request acquired from the mobile station 400 and outputs the HTTP request to the PDN 20.
- the relay device 600 acquires authentication confidential information from the RNC 200 and intercepts the access content. If it is determined that the access is PDN access, the relay device 600 continues to relay packet communication between the mobile station 400 and the core network 10.
- the relay apparatus 600 may request only the minimum information necessary for descrambling to the RNC 200, and in step S522, only the requested information may be transmitted to the relay apparatus 600. .
- FIG. 34 is a diagram illustrating the flow of Internet access according to the fifth embodiment.
- the mobile station 400 accesses content on the Internet 30.
- the first half of the internet access flow is the same as in the case of PDN access.
- the process shown in FIG. 34 is executed after the process shown in FIG. In the following, the process illustrated in FIG. 34 will be described in order of step number.
- Step S531 (Activate PDP Context Request)
- the mobile station 400 transmits a packet communication activation request to the packet switch 100.
- the relay apparatus 600 intercepts the content of the activation request using the authentication confidential information acquired in step S522. Then, it is determined from the content of the activation request that the access type is Internet access, and the activation request is terminated without being transferred to the RNC 200.
- Step S532 (Deactivate PDP Context Request)
- the relay apparatus 600 requests the packet switch 100 to deactivate packet communication.
- Step S533 (Deactivate PDP Context Accept)
- the packet switch 100 deactivates packet communication and notifies the relay apparatus 600 of the completion of deactivation.
- Step S534 (RRC Connection Release)
- the RNC 200 requests the relay device 600 to release the RRC connection.
- [Step S535] (RRC Connection Release Complete) Relay device 600 releases (disconnects) the RRC connection and notifies RNC 200 of the release completion.
- Step S536 SCCP Disconnect
- the RNC 200 and the packet switch 100 disconnect the SCCP connection between them according to the SCCP protocol.
- Step S537 Radio Bearer Setup
- the relay apparatus 600 requests the mobile station 400 to set up a bearer (logical signal transmission path) in the radio section.
- Step S538 (Radio Bearer Setup Complete)
- the mobile station 400 sets a radio bearer and transmits the setting completion to the RNC 200.
- the relay device 600 terminates this message without transferring it to the RNC 200.
- Step S539 (Activate PDP Context Accept)
- the relay apparatus 600 notifies the mobile station 400 of completion of activation of packet communication.
- Step S540 (HTTP Request)
- the mobile station 400 transmits an HTTP request using the established call connection.
- the relay device 600 cancels the encryption process applied to the HTTP request acquired from the mobile station 400 and outputs the HTTP request to the Internet 30.
- the relay device 600 acquires authentication confidential information from the RNC 200 and intercepts the access content. If it is determined that the access is Internet access, the relay device 600 disconnects the connection on the core network 10 side. Then, subsequent HTTP requests from the mobile station 400 are terminated and replaced with HTTP requests to the Internet 30.
- connection processing on the core network 10 side is maintained until the Internet access by the mobile station 400 is completed, instead of performing the disconnection processing in steps S532 to S536 after the access type is found to be Internet access. Also good.
- FIG. 35 is a diagram illustrating an access route according to the fifth embodiment.
- the relay apparatus 600 acquires voice access or PDN access from the mobile station 400
- the relay apparatus 600 transfers the voice access or PDN access to the core network 10 managed by the mobile communication carrier.
- the access is terminated and output to the Internet 30 side.
- the PDN access is transferred from the core network 10 to the PDN 20.
- the mobile station 400 and the radio base station 500 may access according to the rules with the mobile communication carrier. That is, it seems to the mobile station 400 and the radio base station 500 that all accesses are made to the core network 10. However, Internet access is automatically transferred to the Internet 30 by the relay device 600. Thereby, the inflow of packets to the core network 10 can be efficiently suppressed without changing the mobile station 400.
- the mobile communication carrier can guarantee a communication quality of a certain level or more for the PDN access.
- an operation of prohibiting packet inflow from the Internet 30 to the PDN 20 is also possible.
- the system configuration of the sixth embodiment is the same as the system configuration of the fourth embodiment shown in FIG. Further, the relay device of the sixth embodiment can be realized by the same module configuration as that of the relay device 600 of the fourth embodiment shown in FIG. However, the specific connection control method of the connection destination determination unit 662 is different. In the following, the sixth embodiment will be described using the same reference numerals as those in the fourth embodiment.
- the relay device 600 a control process similar to the connection control of the third embodiment shown in FIG. 24 is executed.
- the flow of messages during PDN access and Internet access by the mobile station 400 will be described. Note that the flow of messages during voice access is the same as that of the fourth embodiment shown in FIG.
- FIG. 36 is a diagram illustrating a flow of packet access according to the sixth embodiment.
- the mobile station 400 accesses the content of the PDN 20 or the content of the Internet 30.
- the process illustrated in FIG. 36 will be described in order of step number.
- Step S611 (RRC Connection Request)
- the mobile station 400 transmits an RRC layer connection request to the RNC 200.
- the relay device 600 transfers the connection request to the RNC 200 without intercepting the content of the connection request.
- Step S612 (Radio Link Setup)
- the RNC 200 requests the radio base station 500 to set up a radio link used for packet communication with the mobile station 400.
- Step S613 (Radio Link Setup Confirm)
- the radio base station 500 sets a radio link used for packet communication with the mobile station 400, and notifies the RNC 200 of the completion of setting.
- Step S614 (RRC Connection Setup)
- the RNC 200 notifies the mobile station 400 of establishment of an RRC connection.
- Step S615 (DCH layer 1 synchronization established)
- the mobile station 400 and the radio base station 500 synchronize the dedicated channel of the layer 1 (physical layer) between them.
- Step S616 RRC Connection Setup Complete
- the mobile station 400 notifies the RNC 200 that the establishment of the RRC connection has been confirmed.
- Step S617 Initial Direct Transfer
- the mobile station 400 notifies the RNC 200 of the start of transmission of a logical transmission path setting control signal (Service Request).
- Step S618 SCCP establishment
- the RNC 200 and the packet switch 100 establish an SCCP connection for transmitting control information such as authentication confidential information between the RNC 200 and the packet switch 100 according to the SCCP protocol.
- Step S619 (Service Request)
- the RNC 200 requests the packet switch 100 to set a logical transmission path.
- Step S620 Authentication Concealment
- the mobile station 400 and the packet switch 100 authenticate each other.
- the mobile station 400 and the RNC 200 start encryption processing for concealing communication contents and ensuring integrity.
- Step S621 (Connection Destination Instruction)
- the packet switch 100 sets the connection destination of the relay device 600 as the PDN 20 or the Internet 30 based on the state of packet inflow into the core network 10 and the subscriber information about the mobile station 400. To decide. Then, the packet switch 100 instructs the relay device 600 as a connection destination.
- Step S622 (Authentication Confidential Information Request)
- Relay device 600 requests RNC 200 for authentication confidential information used for authentication processing and encryption processing.
- Step S623 (Authentication Confidential Information Response)
- the RNC 200 transmits the authentication confidential information to the relay device 600.
- connection destination instructed in step S621 is the PDN 20
- the same processing as the PDN access of the fifth embodiment shown in FIG. 33 is executed.
- the connection destination instructed in step S621 is the Internet 30
- the same processing as the Internet access of the fifth embodiment shown in FIG. 34 is executed.
- the relay apparatus 600 does not need to intercept the contents of the activation request from the mobile station 400.
- the relay device 600 acquires an instruction from the core network 10 as to whether the connection destination is the PDN 20 or the Internet 30. Then, when the PDN 20 is the connection destination, the relay device 600 relays the HTTP request from the mobile station 400 to the core network 10. On the other hand, when the Internet 30 is the connection destination, the HTTP request from the mobile station 400 is terminated and replaced with an HTTP request to the Internet 30.
- FIG. 37 is a diagram illustrating an access route according to the sixth embodiment.
- the relay apparatus 600 acquires voice access from the mobile station 400
- the relay apparatus 600 transfers the voice access to the core network 10 managed by the mobile communication carrier.
- PDN access or Internet access is acquired from the mobile station 400
- it is output to either the core network 10 or the Internet 30 in response to an instruction from the core network 10.
- the PDN access output to the core network 10 side is transferred from the core network 10 to the PDN 20.
- the PDN access output to the Internet 30 side is transferred from the Internet 30 to the PDN 20.
- the mobile station 400 and the radio base station 500 may access according to the rules with the mobile communication carrier. That is, it seems to the mobile station 400 and the radio base station 500 that all accesses are made to the core network 10. However, PDN access and Internet access are transferred to the Internet 30 by the relay device 600 in accordance with instructions from the core network 10. Thereby, the inflow of packets to the core network 10 can be efficiently suppressed without changing the mobile station 400 and the radio base station 500.
- connection control is performed by a small radio base station connected to the ISP network.
- connection control is performed by a normal radio base station forming a macro cell.
- the Internet is used as a communication network outside the mobile communication network and capable of packet communication.
- other types such as a private LAN (Local Area Network) are used.
- the communication network may be used.
- voice communication is used as CS call communication and HTTP communication is used as PS call communication.
- PS call communication includes various communication such as FTP (File Transfer Protocol) communication, and establishment of a transmission line connection such as TCP (Transmission Control Protocol) / IP (Internet Protocol) as the previous stage.
- FTP File Transfer Protocol
- TCP Transmission Control Protocol
- IP Internet Protocol
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
本発明の上記および他の目的、特徴および利点は本発明の例として好ましい実施の形態を表す添付の図面と関連した以下の説明により明らかになるであろう。
図1は、本実施の形態の概要を示す図である。図1に示す通信システムは、移動通信網1、データ通信網2、移動局3および通信装置4を有する。
次に、第1の実施の形態を図面を参照して詳細に説明する。
図2は、第1の実施の形態のシステム構成を示す図である。第1の実施の形態に係る通信システムは、コアネットワーク10、公衆データ網(PDN:Public Data Network)20、インターネット30、ISP(Internet Services Provider)網40、パケット交換機100、回線交換機100a、無線ネットワーク制御装置(RNC:Radio Network Controller)200,200a、無線基地局300,300a,300bおよび移動局400,400aを有する。
加入者情報管理部110は、移動通信網の加入者である移動局400,400aについての情報(加入者情報)を管理する。具体的には、加入者情報管理部110は、コアネットワーク10内に設けられたVLR(Visitor Location Register)やHLR(Home Location Register)などの加入者情報データベース(図示せず)を操作して、加入者情報の取得・更新を行う。加入者情報には、移動局400,400aの識別子や現在位置、契約内容、認証秘匿処理に用いる情報などが含まれている。
制御部130は、パケット交換機100の全体的振る舞いを制御する。制御部130は、呼制御部131および認証秘匿処理部132を有する。呼制御部131は、RNC200,200aからの接続要求を受けて、PS呼を制御する。認証秘匿処理部132は、移動局400,400aからの接続要求を受けて、加入者情報管理部110から認証秘匿情報を取得して、移動局400,400aの認証を実行する。また、認証秘匿処理部132は、必要な認証秘匿情報をRNC200,200aに送信するよう制御する。
Iu通信部210は、PS呼に関してパケット交換機100と通信を行う。また、Iu通信部210は、CS呼に関して回線交換機100aと通信を行う。Iub通信部220は、無線基地局300,300bと通信を行う。
[ステップS112](RRC Connection Request)移動局400は、RRC層の接続をRNC200に要求する。
[ステップS114](Radio Link Setup Confirm)無線基地局300は、移動局400との通信に用いる無線リンクを設定し、設定完了をRNC200に通知する。
[ステップS116](DCHレイヤ1同期確立)移動局400と無線基地局300とは、両者の間でレイヤ1(物理層)の個別チャネル(DCH:Dedicated CHannel)の同期をとる。
[ステップS118](Initial Direct Transfer)移動局400は、自局位置の登録のための制御信号(Location Updating Request)の伝送開始をRNC200に通知する。
[ステップS121](Authentication Request)パケット交換機100は、コアネットワーク10内のVLRやHLR(図示せず)にアクセスして、認証処理および暗号処理に用いる認証秘匿情報を取得する。そして、パケット交換機100は、取得した認証秘匿情報の一部を移動局400に送信する。
[ステップS124](Security Mode Command)RNC200は、通信内容の暗号処理の開始を移動局400に指示する。このとき、RNC200は、暗号処理に用いる各種パラメータも移動局400に送信する。
[ステップS126](Security Mode Complete)RNC200は、通信内容の暗号処理を開始したことをパケット交換機100に報告する。
このようにして、移動局400は、電源が投入されて起動すると、そのときに通信可能な無線基地局(無線基地局300)にアクセスする。すると、移動局400とパケット交換機100との間で互いの正当性が検証されると共に、移動局400とRNC200との間で通信内容の暗号化が開始される。その後、移動局400が無線基地局300のセル内にいることがコアネットワーク10に登録される。
[ステップS12]接続先判定部363は、ステップS11で受信された接続要求に基づいて、移動局400が要求する呼の種別がCS呼かPS呼かを判定する。呼種別がPS呼と判定すると、処理をステップS13に進める。呼種別がCSと判定すると、処理をステップS17に進める。
[ステップS14]認証秘匿情報取得部362は、Iub通信部310を介してRNC200から認証秘匿情報を取得する。
図13は、第1の実施の形態の音声アクセスの流れを示す図である。ここでは、移動局400が移動局400aと音声通信を行う場合を想定している。以下、図13に示す処理をステップ番号に沿って説明する。
[ステップS133](Radio Link Setup Confirm)無線基地局300は、移動局400との音声通信に用いる無線リンクを設定し、設定完了をRNC200に通知する。
[ステップS135](DCHレイヤ1同期確立)移動局400と無線基地局300とは、両者の間でレイヤ1(物理層)の個別チャネルの同期をとる。
[ステップS137](Initial Direct Transfer)移動局400は、呼接続のための制御信号(CM Service Request)の伝送開始をRNC200に通知する。
[ステップS140](認証秘匿)移動局400と回線交換機100aとは、互いの認証を行う。また、移動局400とRNC200とは、通信内容の秘匿および完全性保証のための暗号処理を開始する。
[ステップS142](Call Proceeding)回線交換機100aは、CS呼を受け付けたことを移動局400に通知する。
[ステップS144](Alert)回線交換機100aは、通話相手である移動局400aの呼び出しを開始したことを移動局400に通知する。
[ステップS146](Conn ACK)移動局400は、呼接続の確立を確認したことを回線交換機100aに通知する。
[ステップS153](RRC Connection Setup)無線基地局300は、RRC接続の確立を移動局400に通知する。
[ステップS155](RRC Connection Setup Complete)移動局400は、RRC接続の確立を確認したことをRNC200に通知する。ただし、無線基地局300は、このメッセージをRNC200に転送せず終端する。
[ステップS158](認証秘匿情報応答)RNC200は、認証秘匿情報を無線基地局300に送信する。なお、RNC200は、移動局400についての有効な認証秘匿情報を保持していない場合は、コアネットワーク10から認証秘匿情報を取得する。
[ステップS162](Activate PDP Context Accept)無線基地局300は、パケット通信の活性化の完了を移動局400に通知する。
[ステップS172](Paging Type1)RNC200は、移動局400の呼び出しを無線基地局300に対して要求する。
[ステップS174](RRC Connection Request)無線基地局300は、RRC層の新規の接続要求をRNC200に対して送信する。
[ステップS177](Radio Link Setup Confirm)無線基地局300は、移動局400との音声通信に用いる無線リンクを設定し、設定完了をRNC200に通知する。
[ステップS179](RRC Connection Setup Complete)無線基地局300は、RRC接続の確立を確認したことをRNC200に通知する。
[ステップS183](Setup)回線交換機100aは、CS呼の着信を移動局400に通知する。
図16は、第1の実施の形態の音声着信の流れを示す図(続き)である。図16に示す処理は図15に示した処理に続けて実行される。以下、図16に示す処理をステップ番号に沿って説明する。
[ステップS186](Radio Link Reconfiguration Prepare)RNC200は、無線リンクの再構成(CS呼を追加するための無線リンクの設定変更)の準備を無線基地局300に指示する。
[ステップS188](Radio Link Reconfiguration)RNC200は、無線リンクの再構成の実行を無線基地局300に指示する。
[ステップS190](Radio Bearer Setup Complete)移動局400は、無線ベアラの設定を行い、設定完了をRNC200に通知する。
[ステップS192](Alert)移動局400は、CS呼の受け付け待ち(呼び出し中)の状態であることを回線交換機100aに通知する。
[ステップS194](Conn ACK)回線交換機100aは、呼接続の確立を確認したことを移動局400に通知する。
次に、第2の実施の形態を図面を参照して詳細に説明する。前述の第1の実施の形態との相違点を中心に説明し、同様の事項については説明を省略する。第2の実施の形態は、PDNアクセスはコアネットワーク経由でPDNに到達し、インターネットアクセスはコアネットワークを経由せずインターネットに到達するようにしたものである。
[ステップS23]接続先判定部363は、移動局400から受信されたPS活性化要求のRNC200への転送を保留する。そして、接続先判定部363は、ステップS22で取得された認証秘匿情報を用いてPS活性化要求の内容を傍受し、アクセス種別がPDNアクセスかインターネットアクセスか判定する。アクセス種別がインターネットアクセスと判定すると、処理をステップS24に進める。アクセス種別がPDNアクセスと判定すると、処理をステップS26に進める。
[ステップS213](Radio Link Setup Confirm)無線基地局300は、移動局400とのパケット通信に用いる無線リンクを設定し、設定完了をRNC200に通知する。
[ステップS215](DCHレイヤ1同期確立)移動局400と無線基地局300とは、両者の間でレイヤ1(物理層)の個別チャネルの同期をとる。
[ステップS217](Initial Direct Transfer)移動局400は、論理的な伝送路の設定制御信号(Service Request)の伝送開始をRNC200に通知する。
[ステップS220](認証秘匿)移動局400とパケット交換機100とは、互いの認証を行う。また、移動局400とRNC200とは、通信内容の秘匿および完全性保証のための暗号処理を開始する。
[ステップS222](認証秘匿情報応答)RNC200は、認証秘匿情報を無線基地局300に送信する。
[ステップS225](Activate PDP Context Accept)パケット交換機100は、パケット通信の活性化の完了を移動局400に通知する。
[ステップS233](Deactivate PDP Context Accept)パケット交換機100は、パケット通信を非活性化させ、非活性化完了を無線基地局300に通知する。
[ステップS235](RRC Connection Release Complete)無線基地局300は、RRC接続を解放(切断)し、解放完了をRNC200に通知する。
[ステップS237](Radio Bearer Setup)無線基地局300は、無線区間のベアラ(論理的な信号伝送路)の設定を移動局400に要求する。
[ステップS239](Activate PDP Context Accept)無線基地局300は、パケット通信の活性化の完了を移動局400に通知する。
次に、第3の実施の形態を図面を参照して詳細に説明する。前述の第1および第2の実施の形態との相違点を中心に説明し、同様の事項については説明を省略する。第3の実施の形態は、パケット通信をコアネットワーク経由で行うか否かをコアネットワーク側で柔軟に決定できるようにしたものである。
[ステップS33]認証秘匿情報取得部362は、Iub通信部310を介してRNC200から認証秘匿情報を取得する。
[ステップS36]接続管理部340は、無線通信部330が以降に移動局400から受信するアクセスを認証秘匿処理部350に出力する。認証秘匿処理部350は、ステップS33で取得された認証秘匿情報を用いてアクセスに施された暗号処理を解除し、インターネット30へのアクセスに置き換える。
このようにして、無線基地局300は、RNC200と移動局400とがRRC接続を確立させた後に、コアネットワーク10から接続先の指示を取得する。無線基地局300は、接続先をコアネットワーク10とする指示を取得した場合、以降に移動局400から受信するアクセスをコアネットワーク10に転送する。一方、接続先をインターネット30とする指示を取得した場合、以降に移動局400から受信するアクセスを終端して、インターネット30へのアクセスに置き換える。
[ステップS313](Radio Link Setup Confirm)無線基地局300は、移動局400とのパケット通信に用いる無線リンクを設定し、設定完了をRNC200に通知する。
[ステップS315](DCHレイヤ1同期確立)移動局400と無線基地局300とは、両者の間でレイヤ1(物理層)の個別チャネルの同期をとる。
[ステップS317](Initial Direct Transfer)移動局400は、論理的な伝送路の設定制御信号(Service Request)の伝送開始をRNC200に通知する。
[ステップS320](認証秘匿)移動局400とパケット交換機100とは、互いの認証を行う。また、移動局400とRNC200とは、通信内容の秘匿および完全性保証のための暗号処理を開始する。
[ステップS323](認証秘匿情報応答)RNC200は、認証秘匿情報を無線基地局300に送信する。
次に、第4の実施の形態を図面を参照して詳細に説明する。前述の第1の実施の形態との相違点を中心に説明し、同様の事項については説明を省略する。
[ステップS413](Radio Link Setup Confirm)無線基地局500は、移動局400との音声通信に用いる無線リンクを設定し、設定完了をRNC200に通知する。
[ステップS415](DCHレイヤ1同期確立)移動局400と無線基地局500とは、両者の間でレイヤ1(物理層)の個別チャネルの同期をとる。
[ステップS417](Initial Direct Transfer)移動局400は、呼接続のための制御信号(CM Service Request)の伝送開始をRNC200に通知する。
[ステップS420](認証秘匿)移動局400と回線交換機100aとは、互いの認証を行う。また、移動局400とRNC200とは、通信内容の秘匿および完全性保証のための暗号処理を開始する。
[ステップS422](Call Proceeding)回線交換機100aは、CS呼を受け付けたことを移動局400に通知する。
[ステップS424](Alert)回線交換機100aは、通話相手である移動局400aの呼び出しを開始したことを移動局400に通知する。
[ステップS426](Conn ACK)移動局400は、呼接続の確立を確認したことを回線交換機100aに通知する。
[ステップS433](Radio Link Setup Confirm)無線基地局500は、移動局400とのパケット通信に用いる無線リンクを設定し設定完了を中継装置600に通知する。
[ステップS435](DCHレイヤ1同期確立)移動局400と無線基地局300とは、両者の間でレイヤ1(物理層)の個別チャネルの同期をとる。
[ステップS439](認証秘匿情報応答)RNC200は、認証秘匿情報を中継装置600に送信する。なお、RNC200は、移動局400についての有効な認証秘匿情報を保持していない場合は、コアネットワーク10から認証秘匿情報を取得する。
[ステップS443](Activate PDP Context Accept)中継装置600は、パケット通信の活性化の完了を移動局400に通知する。
次に、第5の実施の形態を図面を参照して詳細に説明する。前述の第2および第4の実施の形態との相違点を中心に説明し、同様の事項については説明を省略する。第5の実施の形態は、PDNアクセスはコアネットワーク経由でPDNに到達し、インターネットアクセスはコアネットワークを経由せずインターネットに到達するようにしたものである。
[ステップS513](Radio Link Setup Confirm)無線基地局500は、移動局400とのパケット通信に用いる無線リンクを設定し、設定完了をRNC200に通知する。
[ステップS515](DCHレイヤ1同期確立)移動局400と無線基地局500とは、両者の間でレイヤ1(物理層)の個別チャネルの同期をとる。
[ステップS517](Initial Direct Transfer)移動局400は、論理的な伝送路の設定制御信号(Service Request)の伝送開始をRNC200に通知する。
[ステップS520](認証秘匿)移動局400とパケット交換機100とは、互いの認証を行う。また、移動局400とRNC200とは、通信内容の秘匿および完全性保証のための暗号処理を開始する。
[ステップS522](認証秘匿情報応答)RNC200は、認証秘匿情報を中継装置600に送信する。
[ステップS525](Activate PDP Context Accept)パケット交換機100は、パケット通信の活性化の完了を移動局400に通知する。
[ステップS533](Deactivate PDP Context Accept)パケット交換機100は、パケット通信を非活性化させ、非活性化完了を中継装置600に通知する。
[ステップS535](RRC Connection Release Complete)中継装置600は、RRC接続を解放(切断)し、解放完了をRNC200に通知する。
[ステップS537](Radio Bearer Setup)中継装置600は、無線区間のベアラ(論理的な信号伝送路)の設定を移動局400に要求する。
[ステップS540](HTTP Request)移動局400は、確立された呼接続を用いてHTTPリクエストを送信する。中継装置600は、移動局400から取得したHTTPリクエストに施されている暗号処理を解除し、インターネット30にHTTPリクエストを出力する。
次に、第6の実施の形態を図面を参照して詳細に説明する。前述の第3、第4および第5の実施の形態との相違点を中心に説明し、同様の事項については説明を省略する。第6の実施の形態は、パケット通信をコアネットワーク経由で行うか否かをコアネットワーク側で柔軟に決定できるようにしたものである。
[ステップS613](Radio Link Setup Confirm)無線基地局500は、移動局400とのパケット通信に用いる無線リンクを設定し、設定完了をRNC200に通知する。
[ステップS615](DCHレイヤ1同期確立)移動局400と無線基地局500とは、両者の間でレイヤ1(物理層)の個別チャネルの同期をとる。
[ステップS617](Initial Direct Transfer)移動局400は、論理的な伝送路の設定制御信号(Service Request)の伝送開始をRNC200に通知する。
[ステップS620](認証秘匿)移動局400とパケット交換機100とは、互いの認証を行う。また、移動局400とRNC200とは、通信内容の秘匿および完全性保証のための暗号処理を開始する。
[ステップS623](認証秘匿情報応答)RNC200は、認証秘匿情報を中継装置600に送信する。
2 データ通信網
3 移動局
4 通信装置
4a 通信制御部
Claims (10)
- 回線交換およびパケット交換を行う移動通信網とパケット交換を行うデータ通信網とに接続可能な通信装置であって、
移動局から前記移動通信網へのアクセスを取得し、呼種別がパケット交換呼であるアクセスを終端して前記データ通信網へのアクセスに置き換える通信制御部、
を有することを特徴とする通信装置。 - 前記通信制御部は、前記移動局と前記移動通信網との接続確立後のアクセス内容を監視し、所定のサービスに対するパケット交換呼である場合、前記移動局と前記移動通信網との接続を切断して以降のアクセスを終端することを特徴とする請求の範囲第1項記載の通信装置。
- 前記通信制御部は、前記移動通信網から暗号処理情報を取得し、前記暗号処理情報を用いて前記アクセス内容を解読することを特徴とする請求の範囲第2項記載の通信装置。
- 前記通信制御部は、前記移動局から前記移動通信網への接続要求に基づき呼種別を判定し、呼種別がパケット交換呼である場合、前記接続要求および以降のアクセスを終端することを特徴とする請求の範囲第1項記載の通信装置。
- 前記通信制御部は、前記移動局と前記移動通信網との接続確立後に前記移動通信網からパケット交換呼について前記データ通信網を使用するよう指示を受けると、前記移動局と前記移動通信網との接続を切断して以降のアクセスを終端することを特徴とする請求の範囲第1項記載の通信装置。
- 前記通信制御部は、前記データ通信網へのアクセス中に前記移動通信網から前記移動局への呼び出しがあると、前記移動通信網に対して接続要求を行うと共に前記移動局に対して接続追加要求を行い、前記移動局と前記移動通信網との接続を確立することを特徴とする請求の範囲第1項記載の通信装置。
- 前記通信制御部は、前記移動通信網から暗号処理情報を取得し、前記暗号処理情報を用いてアクセスに施された暗号処理を解除することを特徴とする請求の範囲第1項記載の通信装置。
- 回線交換およびパケット交換を行う移動通信網とパケット交換を行うデータ通信網とに接続された無線基地局であって、
移動局から前記移動通信網へのアクセスを取得し、呼種別がパケット交換呼であるアクセスを終端して前記データ通信網へのアクセスに置き換える通信制御部、
を有することを特徴とする無線基地局。 - 回線交換およびパケット交換を行う移動通信網とパケット交換を行うデータ通信網とに接続可能な、無線基地局から前記移動通信網への通信経路上の中継装置であって、
移動局から前記移動通信網へのアクセスを取得し、呼種別がパケット交換呼であるアクセスを終端して前記データ通信網へのアクセスに置き換える通信制御部、
を有することを特徴とする中継装置。 - 回線交換およびパケット交換を行う移動通信網とパケット交換を行うデータ通信網とに接続可能な通信装置の通信方法であって、
移動局から前記移動通信網へのアクセスを取得し、呼種別がパケット交換呼であるアクセスを終端して前記データ通信網へのアクセスに置き換える、
ことを特徴とする通信方法。
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2008/057730 WO2009130758A1 (ja) | 2008-04-22 | 2008-04-22 | 通信装置および通信方法 |
EP08751915A EP2273846A1 (en) | 2008-04-22 | 2008-04-22 | Communication device and communication method |
CN2008801286189A CN102007811A (zh) | 2008-04-22 | 2008-04-22 | 通信装置以及通信方法 |
JP2010508988A JP5273142B2 (ja) | 2008-04-22 | 2008-04-22 | 通信装置および通信方法 |
KR1020107022995A KR101203807B1 (ko) | 2008-04-22 | 2008-04-22 | 통신 장치 및 통신 방법 |
US12/884,386 US20110002272A1 (en) | 2008-04-22 | 2010-09-17 | Communication apparatus and communication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2008/057730 WO2009130758A1 (ja) | 2008-04-22 | 2008-04-22 | 通信装置および通信方法 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/884,386 Continuation US20110002272A1 (en) | 2008-04-22 | 2010-09-17 | Communication apparatus and communication method |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009130758A1 true WO2009130758A1 (ja) | 2009-10-29 |
Family
ID=41216507
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2008/057730 WO2009130758A1 (ja) | 2008-04-22 | 2008-04-22 | 通信装置および通信方法 |
Country Status (6)
Country | Link |
---|---|
US (1) | US20110002272A1 (ja) |
EP (1) | EP2273846A1 (ja) |
JP (1) | JP5273142B2 (ja) |
KR (1) | KR101203807B1 (ja) |
CN (1) | CN102007811A (ja) |
WO (1) | WO2009130758A1 (ja) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010107118A1 (ja) * | 2009-03-19 | 2010-09-23 | 株式会社エヌ・ティ・ティ・ドコモ | 移動通信方法、無線基地局、無線回線制御局、コアネットワーク装置及びゲートウェイ装置 |
JP2011109417A (ja) * | 2009-11-17 | 2011-06-02 | Kyocera Corp | 無線通信システム、無線端末、無線基地局、及び情報収集方法 |
JP2011109416A (ja) * | 2009-11-17 | 2011-06-02 | Kyocera Corp | 情報収集装置及び情報収集方法 |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012130312A1 (en) * | 2011-03-31 | 2012-10-04 | Telefonaktiebolaget L M Ericsson (Publ) | Low priority indication in extended service request for enhanced overlaod handling |
CN106330747B (zh) * | 2015-06-30 | 2019-09-13 | 富士通株式会社 | 转发目的地选择方法以及通信装置 |
US11470675B2 (en) | 2021-03-03 | 2022-10-11 | Motorola Mobility Llc | Call type selection based on failure probability |
US11540179B2 (en) | 2021-03-03 | 2022-12-27 | Motorola Mobility Llc | Multiple call types for a call event |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH11164348A (ja) | 1997-08-14 | 1999-06-18 | Sk Telecom Co Ltd | マイクロセルラ移動通信システム |
JP2000350264A (ja) | 1999-06-07 | 2000-12-15 | Ntt Docomo Inc | 無線基地局装置及び移動通信システム |
JP2003102059A (ja) * | 2001-09-20 | 2003-04-04 | J-Phone East Co Ltd | 移動通信システムのアクセス制御方法 |
JP2003299157A (ja) | 2001-11-28 | 2003-10-17 | Samsung Electronics Co Ltd | 公衆移動通信網及び私設無線網統合サービスを提供する装置とその装置を含む移動通信網 |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5533019A (en) * | 1994-01-31 | 1996-07-02 | Motorola, Inc. | Packet data in an analog cellular radiotelephone system |
FI102933B (fi) * | 1996-12-16 | 1999-03-15 | Nokia Telecommunications Oy | Paketti- ja piirikytkentäinen tietoliikenne matkapuhelinverkossa |
US6608832B2 (en) * | 1997-09-25 | 2003-08-19 | Telefonaktiebolaget Lm Ericsson | Common access between a mobile communications network and an external network with selectable packet-switched and circuit-switched and circuit-switched services |
US6307845B1 (en) * | 1998-02-23 | 2001-10-23 | Telefonaktiebolaget Lm Ericsson | Processing packet-switched voice calls directed to a mobile unit operating in circuit-switched mode |
JP2002217986A (ja) | 2001-01-19 | 2002-08-02 | Yrp Kokino Idotai Tsushin Kenkyusho:Kk | 回線交換とパケット交換の切替方法 |
KR100625654B1 (ko) * | 2002-08-29 | 2006-09-20 | 에스케이 텔레콤주식회사 | 무선 근거리통신망/이동전화 연동시스템에서 wlan 신호세기에 기반한 접속 시스템 결정 방법 및 이를 위한 이동 단말기 |
US7916715B2 (en) * | 2002-12-18 | 2011-03-29 | Qualcomm Incorporated | Hybrid protocol to support communications with multiple networks |
FI20030967A (fi) * | 2003-06-27 | 2004-12-28 | Nokia Corp | Yhteysasetusten valinta |
US7697480B2 (en) * | 2004-11-22 | 2010-04-13 | Motorola, Inc | Method and apparatus for inter-system active handoff of a hybrid subscriber unit |
US20080039086A1 (en) * | 2006-07-14 | 2008-02-14 | Gallagher Michael D | Generic Access to the Iu Interface |
GB2447442A (en) * | 2007-02-23 | 2008-09-17 | Ubiquisys Ltd | Base station for cellular communication system |
US8019331B2 (en) * | 2007-02-26 | 2011-09-13 | Kineto Wireless, Inc. | Femtocell integration into the macro network |
DE602007013701D1 (de) * | 2007-04-17 | 2011-05-19 | Alcatel Lucent | Verfahren zur Verkoppelung eines Femto-Zellengeräts mit einem mobilen Kernnetzwerk |
EP2204066B1 (en) * | 2007-10-25 | 2017-06-28 | Cisco Technology, Inc. | Interworking gateway for mobile nodes |
JP2009253431A (ja) * | 2008-04-02 | 2009-10-29 | Alcatel-Lucent Usa Inc | Iuインターフェースを有するUMTSフェムトセル解法においてPSトラフィックをオフロードする方法。 |
-
2008
- 2008-04-22 EP EP08751915A patent/EP2273846A1/en not_active Withdrawn
- 2008-04-22 JP JP2010508988A patent/JP5273142B2/ja not_active Expired - Fee Related
- 2008-04-22 CN CN2008801286189A patent/CN102007811A/zh active Pending
- 2008-04-22 WO PCT/JP2008/057730 patent/WO2009130758A1/ja active Application Filing
- 2008-04-22 KR KR1020107022995A patent/KR101203807B1/ko not_active IP Right Cessation
-
2010
- 2010-09-17 US US12/884,386 patent/US20110002272A1/en not_active Abandoned
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH11164348A (ja) | 1997-08-14 | 1999-06-18 | Sk Telecom Co Ltd | マイクロセルラ移動通信システム |
JP2000350264A (ja) | 1999-06-07 | 2000-12-15 | Ntt Docomo Inc | 無線基地局装置及び移動通信システム |
JP2003102059A (ja) * | 2001-09-20 | 2003-04-04 | J-Phone East Co Ltd | 移動通信システムのアクセス制御方法 |
JP2003299157A (ja) | 2001-11-28 | 2003-10-17 | Samsung Electronics Co Ltd | 公衆移動通信網及び私設無線網統合サービスを提供する装置とその装置を含む移動通信網 |
Non-Patent Citations (4)
Title |
---|
"Aruba Networks releases new white paper on integrating cellular and Wi-Fi networks using unlicensed mobile access", ARUBA NETWORKS NEWS & EVENT, 15 January 2008 (2008-01-15), XP008141325, Retrieved from the Internet <URL:http://www.arubanetworks.com/company/news/release.php?id=58> [retrieved on 20080530] * |
ISAO HORIGOSHI: "'Femtocell' ga FMC o Kaeru", NIKKEI COMMUNICATIONS, vol. 482, 15 March 2007 (2007-03-15), pages 68 - 75, XP008144595 * |
KINETO WIRELESS INC ET AL.: "GAN Variant of Iu-based 3G HNB architecture", 3GPP TSG-RAN WG3 MEETING #59, R3-080105, - 15 February 2008 (2008-02-15), XP050163335, Retrieved from the Internet <URL:http://www.3gpp.org/ftp/tsg_ran/WG3Iu/TSGR359/docs/R3-080105.zip> [retrieved on 20080516] * |
P. THORNYCROFT: "Fixed-Mobile Convergence with UMA for Enterprises, ARUBA networks white paper", 15 January 2008 (2008-01-15), pages 8, XP008145668, Retrieved from the Internet <URL:http://www.arubanetworks.com/FMC_UMA> [retrieved on 20080530] * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010107118A1 (ja) * | 2009-03-19 | 2010-09-23 | 株式会社エヌ・ティ・ティ・ドコモ | 移動通信方法、無線基地局、無線回線制御局、コアネットワーク装置及びゲートウェイ装置 |
US9210653B2 (en) | 2009-03-19 | 2015-12-08 | Ntt Docomo, Inc. | Mobile communication method, radio base station, radio network controller, core network device and gateway device |
JP2011109417A (ja) * | 2009-11-17 | 2011-06-02 | Kyocera Corp | 無線通信システム、無線端末、無線基地局、及び情報収集方法 |
JP2011109416A (ja) * | 2009-11-17 | 2011-06-02 | Kyocera Corp | 情報収集装置及び情報収集方法 |
Also Published As
Publication number | Publication date |
---|---|
EP2273846A1 (en) | 2011-01-12 |
JPWO2009130758A1 (ja) | 2011-08-11 |
KR20100127830A (ko) | 2010-12-06 |
CN102007811A (zh) | 2011-04-06 |
US20110002272A1 (en) | 2011-01-06 |
KR101203807B1 (ko) | 2012-11-22 |
JP5273142B2 (ja) | 2013-08-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5273142B2 (ja) | 通信装置および通信方法 | |
US9060270B2 (en) | Method and device for establishing a security mechanism for an air interface link | |
EP2418883B1 (en) | Wireless local area network terminal pre-authentication method and wireless local area network system | |
JP4772776B2 (ja) | 無線携帯インターネットシステムにおけるトラフィック暗号化キー管理方法及びそのプロトコル構成方法、そして、加入者端末でのトラフィック暗号化キー状態マシンの動作方法 | |
JP6727292B2 (ja) | セキュリティ認証方法、構成方法、および関連デバイス | |
KR101078615B1 (ko) | 무선 원격통신에서의 암호화 | |
CN107920350B (zh) | 一种基于sdn的隐私保护切换认证方法、5g异构网络 | |
KR100991522B1 (ko) | 휴대인터넷 시스템의 핸드오버용 보안 콘텍스트 전달 방법 | |
US8724816B2 (en) | Security service control method and wireless local area network terminal | |
EP2506491A1 (en) | Encryption information transmission terminal | |
WO2003056851A1 (fr) | Procede de determination d'un algorithme de cryptage de communication secrete d'apres des codes de pays mobiles | |
CN108781110B (zh) | 用于通过通信网络中继数据的系统和方法 | |
JP2015508623A (ja) | ネットワーク中のサービングノードの動作 | |
US20200162922A1 (en) | Data transmission method, related device, and related system | |
IL271911B2 (en) | A method for transmitting information about end units and related products | |
WO2022083410A1 (zh) | 校时方法、装置、设备及存储介质 | |
JP2004207965A (ja) | 無線lanの高速認証方式及び高速認証方法 | |
EP2506489A1 (en) | Wireless authentication terminal | |
JP5018968B2 (ja) | 通信制御装置、通信制御方法及び通信制御プログラム | |
WO2007075068A1 (en) | Method for authentication between ue and network in wireless communication system | |
JP7160114B2 (ja) | 端末装置、無線通信装置、無線通信システム及び無線通信方法 | |
JP2018133737A (ja) | ネットワーク構築システム、方法及び無線ノード |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200880128618.9 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08751915 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2010508988 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2008751915 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 20107022995 Country of ref document: KR Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |