WO2010012168A1 - 一种固定或游牧用户终端接入网络的方法及装置 - Google Patents

一种固定或游牧用户终端接入网络的方法及装置 Download PDF

Info

Publication number
WO2010012168A1
WO2010012168A1 PCT/CN2009/071644 CN2009071644W WO2010012168A1 WO 2010012168 A1 WO2010012168 A1 WO 2010012168A1 CN 2009071644 W CN2009071644 W CN 2009071644W WO 2010012168 A1 WO2010012168 A1 WO 2010012168A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
terminal
base station
message
aaa
Prior art date
Application number
PCT/CN2009/071644
Other languages
English (en)
French (fr)
Inventor
卢磊
梁文亮
李波杰
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2010012168A1 publication Critical patent/WO2010012168A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a method and apparatus for a fixed or nomadic user terminal to access a network. Background technique
  • WiMAX Worldwide Interoperability for Microwave Access
  • the wireless side of the WiMAX network is a wireless metropolitan area network access technology based on the IEEE802.16d/e standard, which adopts OFDM (Orthrogonal Frequency Division Multiplexing) and OFDM A (OFDM Access).
  • OFDM Orthogonal Frequency Division Multiplexing
  • OFDM A OFDM Access
  • the physical layer technology can effectively resist multipath fading. In the case of optimal channel fading, the transmission rate can approach 75 Mbps.
  • the logical architecture of the WiMAX network is shown in Figure 1.
  • the WiMAX network consists of the following three parts:
  • Terminal Includes SS (Subscriber Station) or MS (Mobile Station), which is used by the terminal to access the WiMAX network.
  • Access service network ASN (Access Service Network) A set of network functions defined to provide wireless access services for WiMAX terminals.
  • the ASN includes BS (Base Static n) and ASN-GW (ASN Gateway) network elements.
  • the main functions of the BS network element are: providing L2 connection between the BS and the MS, radio resource management, and the like; the main functions of the ASN-GW network element are: providing client functions for the MS authentication, authorization, and accounting functions, and providing the MS with Rel ay function of L3 information (such as IP address allocation), intra-ASN switching, etc.
  • Connection service network CSN (Connectivity Service Network) is defined to provide IP connection services for WiMAX terminals.
  • the CSN mainly includes a prepaid server and logical entities such as an authentication, authorization, and accounting server.
  • the main functions provided are: MS IP address allocation, Internet access, AAA proxy or server, and terminal-based authorization control.
  • the mobility classification attribute is added to the user's subscription relationship, including: fixed, nomadic and mobile.
  • the mobile service refers to that the terminal can continuously use the data service of the network when the terminal moves at a certain speed within the coverage of the network side, and the network side supports the handover of the terminal, and ensures the continuity of the session during the handover process;
  • the terminal can access the network in different geographical locations.
  • the terminal is generally fixedly attached to an access network.
  • the nomadic service user terminal can initiate the re-attachment of the device, but does not necessarily need to ensure the continuity of the session;
  • the fixed service refers to the terminal can only access the network in a fixed area, perform data services, when leaving the When the area is fixed, you cannot access the network.
  • the embodiments of the present invention provide a method and a device for accessing a network by a fixed or nomadic user terminal, so as to implement access to the network in the area where the user terminal is allowed to access.
  • a method for a fixed or nomadic user terminal to access a network comprising:
  • a method for a fixed or nomadic user terminal to access a network comprising:
  • the AAA server Sending an access request message to the AAA server, where the access request message carries location information of the terminal accessing the base station, so that the AAA server verifies whether the location of the terminal accessing the base station is based on the area information that the terminal is allowed to access. Within the geographical area where the terminal is allowed to access;
  • the terminal receives the access permission message from the AAA, and sends an authentication success message to the terminal, so that the terminal performs the subsequent network access process.
  • a device comprising:
  • the first sending module is configured to: send an access request message to the charging authentication authentication server AAA; the receiving module is configured to receive an access permission message from the AAA, and convert the regional information in the access permission message of the AAA into The terminal allows access to the base station to identify the BS ID list of the base station;
  • a saving module configured to save a list of BS IDs that the terminal allows to access the base station;
  • a judging module determining whether a BS ID of a base station currently accessed by the terminal is within the BS ID list, and if yes, notifying the second sending module;
  • the second sending module is configured to send an authentication success message to the terminal.
  • An AAA server including:
  • Receiving module configured to receive an access request message
  • the sending module is configured to send an access permission message, where the access permission message carries the area information that the terminal allows access.
  • a device comprising:
  • a mapping module configured to map a BS ID that the terminal currently accesses to the base station to location information of the current accessing base station of the terminal;
  • the first sending module is configured to send an access request message to the AAA, where the access request message carries location information of the current accessing base station of the terminal;
  • the receiving module is configured to receive an access permission message or an access reject message from the AAA.
  • the second sending module is configured to send an authentication success message or an authentication failure message to the terminal.
  • An AAA server including:
  • a receiving module configured to receive an access request message, where the access request message carries location information of a current access terminal of the terminal;
  • the saving module is used to save the geographical information allowed by the terminal;
  • a judging module configured to determine whether a location of the terminal accessing the currently accessed base station is within a geographical range allowed to be accessed by the terminal; if yes, notifying the first sending module;
  • the first sending module is configured to send an access permission message.
  • the method and apparatus for accessing a network by a fixed or nomadic user terminal enables a fixed or nomadic user terminal to correctly access the network in an area permitted to access, thereby limiting the geographical extent of the fixed or nomadic user terminal accessing the network.
  • FIG. 1 is a schematic structural diagram of a WIMAX network in the prior art
  • FIG. 2 is a flowchart of a method for a fixed or nomadic user terminal to access a network according to an embodiment of the present invention
  • FIG. 3 is a flowchart of a method for a fixed or nomadic user terminal to access a network according to another embodiment of the present invention
  • FIG. 5 is a schematic diagram of a device for accessing a network by a fixed or nomadic user terminal according to an embodiment of the present invention
  • FIG. 6 is a schematic diagram of a fixed or nomadic user terminal accessing a network according to another embodiment of the present invention
  • FIG. 7 is a schematic diagram of an apparatus for accessing a network by a fixed or nomadic user terminal according to another embodiment of the present invention
  • FIG. 8 is a schematic diagram of an apparatus for accessing a network by a fixed or nomadic user terminal according to another embodiment of the present invention.
  • Embodiments of the present invention provide a method and apparatus for a fixed or nomadic terminal to access a network to enable a fixed or nomadic user terminal to correctly access a network in an area permitted to access, and to limit the range in which the user terminal accesses the network.
  • a method for a fixed or nomadic user terminal to access a network includes:
  • the terminal MS initiates an initial network access and authentication process.
  • the terminal interacts with the base station and the authenticator Authenticator, and the Authent icator obtains the BS ID of the terminal currently accessing the base station and the identification information of the terminal, which is a prior art and is not described in detail;
  • the authenticator Authenticator sends an access request Access-Request message to the AAA server.
  • the request message carries the identifier information of the terminal, and the step belongs to the prior art, and is not described again.
  • the AAA server verifies the identity of the MS, and if the verification succeeds, sending an access permission Access-Accept message to the Authenticator;
  • the subscription information profi le of the MS stored in the AAA server identifies that the mobility of the MS needs to be restricted, that is, the activity type of the MS is bixed (fixed) or nomad ic (nomadic), then in Access- The Accept message carries the Area Information (MS).
  • MS Area Information
  • the Authent icator After receiving the Access-Accept, the Authent icator obtains the MS to allow access to the area information, and maps the area information to a BS ID list of the base station that the MS is allowed to access, and according to the current terminal.
  • the BS ID of the access base station determines whether the BS ID of the BS currently accessed by the MS is in the BS ID list, and if so, the base station currently accessed by the MS is within the range of the entry permit zone. Step 205; Otherwise, the base station currently accessed by the MS is not within the range of the allowed access area, and step 206 is performed;
  • the authentication success message such as EAP-Success to the MS, is sent to the MS, indicating that the MS access authentication succeeds, so that the MS performs the subsequent network access process;
  • the Authenticator rejects the access, and sends an authentication failure message, such as EAP-Fai lure to the MS;
  • the authentication failure message may carry the access failure reason and the identification information of the BS that the MS is recommended to access; for example, the TLV field of the extended EAP-Fai lure message may indicate that the access failure is caused by the location of the access geographical location. And adding a related TLV field, indicating a BS ID of the BS that is recommended to access the MS according to the BS ID list of the base station that the MS is allowed to access;
  • the BS ID of the BS accessed by the MS can be implemented according to a local policy, such as: coverage of the BS, signal strength, configuration information inside the ASN, and the like.
  • the Authenticator sends an Accounting Request message to the AAA server, and the message carries a release indication Release Indication, indicating that the MS cannot access the network due to mobility restrictions, and needs to release corresponding resources.
  • the AAA server After receiving the Accounting Request message, the AAA server releases the corresponding resource, and returns an Accounting Response message to the Authenticator.
  • the area information that the MS allows to access may be implemented in the following manners:
  • Lat/Long/Radius longitude/latitude/radius
  • the area information in the MS subscription information profi le Area informat ion is Lat/Long/Radi us (longitude/latitude/radius)
  • the Authenticator receives the Lat/Long/Radius, it takes the Lat/Long intersection as the center and Radius as the radius to determine a circle whose range is MS.
  • the geographical extent of the BS allowed to access.
  • Each BS sets a latitude and longitude coordinate according to its geographical location, and sets a database for storing the BS area information in the ASN, and stores the correspondence relationship between the Lat/Long (longitude/latitude) of each BS and the BS ID.
  • the Authenticator receives the Lat/Long/Radius in the subscription information of the MS, the Lat/Long is used as the center, the Radius is the radius, a circle is determined, and then the BS regional information database is queried, and the latitude and longitude range determined according to the circle is determined.
  • the BS within the latitude and longitude range adds the BS ID of the BS in the range to the BS ID list accessible by the MS.
  • the BS within the geographical area may include the coverage of the BS or BS whose location is within the geographical area within the geographical range.
  • the BS ID of all BSs in the geographical area as a list of specific B S IDs that the MS allows to access the geographical area.
  • the area information Lat/Long list in MS prof ile when Authenticat or receives the Lat/Long list, maps each Lat/Long coordinate to the BS ID at the location, thereby forming an MS to allow access to the geographical area.
  • Each BS sets a latitude and longitude coordinate according to its geographical location, and sets a database for storing the BS area information in the ASN, and stores the correspondence relationship between the Lat/Long (longitude/latitude) of each BS and the BS ID.
  • the NAS After receiving the Lat/Long List in the subscription information of the MS, the NAS queries the BS area information database, and queries the BS ID of each BS according to the corresponding latitude and longitude value, and adds the BS ID of the BS to the MS to access.
  • BS ID in the list After receiving the Lat/Long List in the subscription information of the MS, the NAS queries the BS area information database, and queries the BS ID of each BS according to the corresponding latitude and longitude value, and adds the BS ID of the BS to the MS to access.
  • BS ID in the list After receiving the Lat/Long List in the subscription information of the MS, the NAS queries the BS area information database, and queries the BS ID
  • the Area information in the MS profile is the Lat/Long/Radius (latitude/longitude/radius) that the MS can access.
  • the Authenticator receives the Lat/Long/Radius, the Lat/Long is the center and the Radius is the radius. Circle, the range of the circle is the area where the MS can access.
  • the BS ID of the BS that can serve the MS in the geographical area is determined, thereby forming a specific BS ID list that the MS allows to access the geographical scope.
  • the local policy here can be the coverage of the BS, the signal strength, and the configuration information inside the ASN.
  • the area informat ion in the MS profi le is a list of Lat/Long (longitude/latitude) that the MS can access.
  • the Authenticator receives the Lat/Long list, it can determine the actual location where the MS is located, thereby determining according to the local policy.
  • the local policy here can be the coverage of the BS, the signal strength, and the configuration information inside the ASN.
  • the Authenticator when the Authenticator receives the entry permit zone ID, it maps to the specific BS ID list of the MS allowed access zone according to the preset configuration information, for example, the correspondence between the entry permit zone and the BS ID.
  • the second embodiment of the present invention is different from the first embodiment in that the timer is used to release the resources of the AAA.
  • the method for accessing the network by the fixed or nomadic user terminal according to the second embodiment of the present invention includes:
  • step 301 the MS initiates an initial network access and authentication process
  • the authenticator Authent icator sends an access request Access-Re quest message to the AAA server.
  • the AAA server verifies the identity of the MS. If the identity is legal, the access permission is allowed to be sent to the Authenticator.
  • the subscription information profi le of the MS stored in the AAA identifies that the mobility of the MS needs to be restricted, that is, the activity type of the MS is fixed (fixed) or nomadic (nomadic), then in the Access-Accept message. Carrying the MS to allow access to the area information; the timer can be turned on at the same time as or after the Acecess-Accept is sent;
  • step 304 Similar to step 204, after the Authenticator receives the Access-Accept, it acquires the MS. Allowing access to the area information, mapping the area information to the BS ID list of the base station to which the MS is allowed to access, and determining whether the BS currently accessed by the MS is within the range of the allowed access area; if yes, executing step 305, Otherwise, proceed to step 307;
  • the Authenticator sends an Accounting request message to the AAA server, and after receiving the message, the AAA server terminates the timer.
  • the Authenticator rejects the access, and sends an authentication failure message, such as EAP-Failure to the MS; in the authentication failure message.
  • an authentication failure message such as EAP-Failure to the MS
  • the Authenticator does not send the Accounting request message to the AAA server. After the timer expires, the AAA server considers that the Authenticator rejects the MS access and releases the related resources.
  • step 303 the manner in which the area information that the MS is allowed to access is similar to that in the first embodiment, and is not described here.
  • the third embodiment of the present invention is different from the first embodiment in that the AAA server determines whether the terminal is allowed to access.
  • the method for accessing the network by the fixed or nomadic user terminal according to the third embodiment of the present invention includes:
  • the MS initiates an initial network access and authentication process, which is similar to step 201;
  • the location information of the BS such as the Lat/Long information of the BS
  • some existing messages may be passed.
  • Sending the location information of the BS to the Authenticator for example, the BS may send the location information of the BS to the Authenticator through the terminal attach request message MS_attach_Req or the terminal pre-attach request message MS_preatta ch_Req, in order to determine the location information of the BS when the MS initially accesses the BS.
  • the location information of the foregoing BS may be pre-stored in the BS or the ASN-GW;
  • the Authenticator sends an Access-Request message to the AAA server, and the Access-Request message carries the location information of the BS currently accessed by the MS, and the location information may be initially accessed in the MS as described in step S401. If the location information is not obtained in the initial network access process, the BS ID of the BS currently accessed by the MS is mapped to the corresponding location information;
  • the AAA server verifies the identity of the MS, and determines the type of the MS. If the profi le of the MS identifies that the MS needs to restrict its mobility, that is, the mobiity class of the MS is fixed or nomad ic, according to the received Access-Request.
  • the message carries the location information of the BS currently accessed by the MS, and the area information that the MS is allowed to access in the AAA server, and determines whether the BS currently accessed by the MS is within the area permitted by the MS. If yes, an Access-Accep t message is sent, where the Access-Accept message may carry the area information that the MS is allowed to access; otherwise, step 405 is performed;
  • the Authenticator after receiving the Access-Accept, the Authenticator sends an authentication success message, such as EA P-Success to the MS, indicating that the MS access authentication succeeds, so that the MS performs a subsequent network access process, and ends the process;
  • an authentication success message such as EA P-Success
  • the area information of the Access-Accept message that is allowed to be accessed by the MS is obtained, and the area information that the MS is allowed to access is mapped to the area information that the MS is allowed to access.
  • the BS ID list is stored and then sent an authentication success message, such as EA P-Success to the MS, indicating that the MS access authentication succeeds, so that the MS performs a subsequent network access process, and the process ends.
  • the AAA server sends an Access-Reject message to the Authent icator
  • the access-reject message may carry the area information that the MS is allowed to access
  • the Authenticator After receiving the Access-Reject message, the Authenticator obtains the area information that the MS allows to access, and stores the area information, and optionally maps the area information that the MS allows to access to the BS ID list that the MS allows to access the BS. ; and send EAP-Fai lure to the MS, rejecting the access;
  • the EAP-Fai lure message may carry the reason for the failure of the access and the standard of the BS that recommends the MS access
  • the information may be indicated by the TLV indication field of the extended EAP-Failure, and the access failure due to the geographical location mismatch may be added, and the relevant TLV field is added according to the BS ID of the MS allowed to access the BS, indicating the BS ID of the BS that is recommended to access the MS.
  • step 403 the manner in which the MS allows access to the area information is similar to that in the first embodiment, and is not described here.
  • the method for accessing the network by the fixed or nomadic user terminal enables the fixed or nomadic user terminal to correctly access the network in the area allowed to access, and limits the geographical scope of the fixed or nomadic user terminal to access the network.
  • Embodiments of the present invention also open a device for a fixed or nomadic user terminal to access a network.
  • the embodiment of the present invention further discloses a device, which may be an authenticator.
  • the method includes:
  • the first sending module is configured to: send an access request message to the charging authentication authentication server AAA; the receiving module is configured to receive an access permission message from the AAA, and convert the regional information in the access permission message of the AAA into The terminal allows access to the base station to identify the BS ID list of the base station;
  • a saving module configured to save a list of BS IDs that the terminal allows to access the base station;
  • a judging module determining whether a BS ID of a base station currently accessed by the terminal is within the BS ID list, and if yes, notifying the second sending module;
  • the second sending module is configured to send an authentication success message to the terminal.
  • the above device may further include a third sending module,
  • the determining module is further configured to: when the BS ID of the base station currently accessed by the terminal is not in the range of the BS ID list, notify the third sending module;
  • the third sending module is configured to send an authentication failure message to the terminal.
  • the above device may further comprise:
  • the fourth sending module is configured to send an accounting request message to the AAA, where the charging request message carries release indication information.
  • An embodiment of the present invention further discloses an AAA server.
  • the method includes: Receiving module: configured to receive an access request message;
  • the sending module is configured to send an access permission message, where the access permission message carries the area information that the terminal allows access.
  • the AAA server may further include:
  • the release module is configured to release the corresponding resource according to the release indication information in the received charging request message.
  • the embodiment of the present invention further discloses a device, which may be an authenticator.
  • the method includes:
  • the first sending module is configured to send an access request message to the AAA, where the access request message carries location information of the current accessing base station of the terminal, where the location information may be pre-stored in the base station or the access service network gateway.
  • the base station may send the base station by using a terminal attach request message or a terminal pre-attach request message.
  • the location information is sent to the device; the receiving module is configured to: receive an access permission message or an access rejection message from the AAA; and the second sending module is configured to send an authentication success message or an authentication failure message to the terminal.
  • the apparatus may further include: a mapping module, configured to: when the location information of the current access base is not obtained during initial access to the base station, map the BS ID of the current access base station of the terminal to the location of the current access base station of the terminal. information.
  • the embodiment of the present invention further discloses an AAA server.
  • the method includes: a receiving module: configured to receive an access request message, where the access request message carries a location where the terminal currently accesses the base station.
  • the saving module is used to save the geographical information allowed by the terminal;
  • a judging module configured to determine whether a location of the terminal accessing the currently accessed base station is within a geographical range allowed to be accessed by the terminal; if yes, notifying the first sending module;
  • the first sending module is configured to send an access permission message.
  • the AAA server may further include: a second sending module, The determining module is further configured to notify the second sending module when the location of the terminal accessing the current accessing base station is within a geographical range that the terminal is not allowed to access;
  • the second sending module is configured to send an access reject message.
  • the present invention is also applicable to other network systems, wherein the Authenticator can be replaced by other network elements, such as BSC, RNC, and the like.
  • the method and device for accessing a network by a fixed or nomadic user terminal enable a fixed or nomadic user terminal to correctly access the network in an area allowed to access, and limit the range in which the user terminal accesses the network;
  • the AAA server notifies the Authenticator of the access area, so if the ASN adds a base station or a base station, there is no impact on the user's access area and subscription information, and the complicated interaction mode is avoided. , flexible for operators to use.
  • the present invention can be implemented by means of software plus a necessary general hardware platform, and of course, can also be through hardware, but in many cases, the former is a better implementation. the way.
  • the technical solution of the present invention which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a readable storage medium, such as a floppy disk of a computer.
  • a hard disk or optical disk or the like includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform the methods described in various embodiments of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

一种固定或游牧用户终端接入网络的方法及装置 本申请要求 2008年 7月 29日递交的申请号为 200810142560. 5、 发明名 称为 "一种固定或游牧用户终端接入网络的方法及装置" 的中国专利申请的 优先权, 其全部内容通过引用结合在本申请中。
技术领域 本发明属于通信技术领域, 尤其涉及一种固定或游牧用户终端接入网络 的方法及装置。 背景技术
WiMAX (Worldwide Interoperability for Microwave Access, 全球接 入微波互操作性) 是一种基于 IEEE802. 16标准的无线城域网技术。 WiMAX网 络无线侧是基于 IEEE802. 16d/e标准的无线城域网接入技术, 采用 OFDM (Or thogonal Frequency Division Multiplexing, 正交步I分复用技术) 禾口 OFDM A (OFDM Access, OFDM接入) 的物理层技术, 能有效的抗多径衰落。 最佳信 道衰落情况下, 传输速率可以逼近 75Mbps。
WiMAX网络逻辑架构如图 1所示, WiMAX整个网络主要由以下三部分组成:
( 1 ) 终端: 包括 SS (Subscriber Station, 用户台) 或 MS (Mobile Sta tion, 移动台) , 终端使用该设备接入 WiMAX网络。
(2) 接入业务网: ASN (Access Service Network, 接入业务网) 定义为 WiMAX终端提供无线接入服务的网络功能集合。 ASN包含了 BS (Base Static n, 基站) 和 ASN-GW (ASN Gateway, ASN网关) 网元。 其中 BS网元的主要功 能为: 提供 BS和 MS的 L2连接、 无线资源管理等等; ASN-GW网元的主要功能 为: 为 MS认证、 授权和计费功能提供客户端功能, 为 MS提供 L3信息的 Rel ay功能 (如 IP地址分配) 、 ASN内切换等。 (3) 连接业务网: CSN (Connectivity Service Network, 连接业务网) 定义为 WiMAX终端提供 IP连接服务。 CSN主要包括预付费服务器以及认证、 授权和计费服务器等逻辑实体, 所提供的主要功能为: MS的 IP地址分配、 I nternet接入、 AAA proxy或者 server、 基于终端的授权控制等。
为了实现终端的移动性限制, 在用户的签约关系中增加移动性分类属性, 包括: 固定, 游牧以及移动。 其中, 移动业务指的是终端在网络侧覆盖范围 内以一定速度移动时, 能够连续使用网络的数据业务, 网络侧支持终端的切 换, 并且在切换过程中, 保证会话的连续性; 游牧业务指的是终端可以在不 同的地理位置接入网络, 在数据业务的会话过程中, 终端一般固定地附着在 某个接入网, 当终端移动到新的位置时, 需要重新接入网络, 进行新的数据 业务会话, 因此, 游牧业务用户终端可以发起设备的重附着, 但不一定需要 保证会话的连续性; 固定业务指的是终端只能在固定区域接入网络, 进行数 据业务, 当离开该固定区域时, 则不能接入网络。
对于一些国家的某些运营商, 由于牌照的限制, 只能运营固定或游牧网 络业务, 因此, 对于固定和游牧的用户, 要求限制其终端的移动性。
发明人发现, 现有技术中, 终端接入过程中没有相关参数来限制终端的 移动性, 因此无法实现固定或游牧用户的终端在允许接入的区域接入网络, 并且终端接入网络后, 无法限制终端的移动范围。 发明内容
本发明实施例提供了一种固定或游牧用户终端接入网络的方法及装置 , 以实现该类用户终端在允许接入的区域接入网络。
本发明实施例采取技术方案为:
一种固定或游牧用户终端接入网络的方法, 包括:
向认证授权计费服务器 AAA发送接入请求消息;
接收来自 AAA 的接入允许消息, 所述接入允许消息中携带有终端允许接 入的地域信息;
将所述地域信息转换为允许接入基站的基站标识 BS ID列表;
如果所述终端当前接入的基站的 BS ID在所述 BS ID列表范围内, 则向 所述终端发送鉴权成功消息, 以使得终端进行后续入网过程。
一种固定或游牧用户终端接入网络的方法, 包括:
向 AAA服务器发送接入请求消息, 所述接入请求消息中携带有终端接入 基站的位置信息, 以使得所述 AAA服务器根据终端允许接入的地域信息验证 所述终端接入基站的位置是否在终端允许接入的地域范围内;
如果所述终端接入基站的位置在终端允许接入的地域范围内, 接收来自 AAA的接入允许消息, 并向所述终端发送鉴权成功消息, 以使得所述终端进行 后续入网过程。
一种装置, 包括:
第一发送模块: 用于向计费认证鉴权服务器 AAA发送接入请求消息; 接收模块: 用于接收来自 AAA的接入允许消息, 并将该 AAA的接入允许 消息中的地域信息转换为终端允许接入基站的基站标识 BS ID列表;
保存模块: 用于保存终端允许接入基站的 BS ID列表;
判断模块: 判断终端当前接入的基站的 BS ID是否在所述 BS ID列表范 围内, 如果是, 则通知第二发送模块;
第二发送模块: 用于向所述终端发送鉴权成功消息。
一种 AAA服务器, 包括:
接收模块: 用于接收接入请求消息;
发送模块: 用于发送接入允许消息, 所述接入允许消息中携带有终端允 许接入的地域信息。
一种装置, 包括:
映射模块: 用于将终端当前接入基站的 BS ID 映射为终端当前接入基站 的位置信息; 第一发送模块: 用于向 AAA发送接入请求消息, 所述接入请求消息中携 带有终端当前接入基站的位置信息;
接收模块: 用于接收来自 AAA的接入允许消息或接入拒绝消息; 第二发送模块: 用于向所述终端发送鉴权成功消息或鉴权失败消息。 一种 AAA服务器, 包括:
接收模块: 用于接收接入请求消息, 所述接入请求消息中携带有终端当 前接入基站的位置信息;
保存模块: 用于保存终端允许接入的地域信息;
判断模块: 用于判断述终端接入当前接入基站的位置是否在终端允许接 入的地域范围内; 如果是, 通知第一发送模块;
第一发送模块: 用于发送接入允许消息。
本发明实施例所述固定或游牧用户终端接入网络的方法及装置, 使得固 定或游牧用户终端在允许接入的区域正确接入网络, 限制了固定或游牧用户 终端接入网络的地域范围。 附图说明
此处所说明的附图用来提供对本发明的进一歩理解, 构成本申请的一部 分, 并不构成对本发明的限定。 在附图中:
图 1为现有技术中 WIMAX网络结构示意图;
图 2 为本发明实施例固定或游牧用户终端接入网络的方法流程图; 图 3 为本发明另一实施例固定或游牧用户终端接入网络的方法流程图; 图 4 为本发明另一实施例固定或游牧用户终端接入网络的方法流程图; 图 5 为本发明实施例固定或游牧用户终端接入网络的装置示意图; 图 6 为本发明另一实施例固定或游牧用户终端接入网络的装置示意图; 图 7 为本发明另一实施例固定或游牧用户终端接入网络的装置示意图; 图 8 为本发明另一实施例固定或游牧用户终端接入网络的装置示意图。 具体实施方式
为使本发明的目的、 技术方案和优点更加清楚明白, 下面结合实施方式 和附图, 对本发明做进一歩详细说明。 在此, 本发明的示意性实施方式及其 说明用于解释本发明, 但并不作为对本发明的限定。
本发明实施例提供了一种固定或游牧户终端接入网络的方法及装置以实 现固定或游牧用户终端在允许接入的区域正确接入网络, 限制该类用户终端 接入网络的范围。
下面结合附图对本发明实施例做进一歩说明, 以下实施例以 Wimax 网络 为例进行说明, 参考图 2, 本发明实施例一固定或游牧用户终端接入网络的方 法包括:
201、 终端 MS发起初始入网和鉴权过程;
在此过程中, 终端与基站禾口鉴权器 Authenticator交互, Authent icator 可获得终端当前接入基站的 BS ID及终端的标识信息, 该歩骤属现有技术, 不在赘述;
202、 鉴权器 Authenticator发送接入请求 Access-Request消息到 AAA 服务器;
该歩骤中, 所述请求消息中携带终端的标识信息, 该歩骤属于现有技术, 不再赘述;
203、 AAA服务器验证 MS身份, 如验证通过, 则发送接入允许 Access-Ac cept消息给 Authenticator;
如果 AAA服务器中保存的该 MS的签约信息 profi le中标识了需要限制 M S的移动性, 即 MS的活动类型 mobi l ity class为 f ixed (固定) 或是 nomad ic (游牧) , 那么在 Access-Accept消息中携带 MS允许接入地域信息 (Area Informat ion) ;
204、 Authent icator收到 Access-Accept后,获取 MS允许接入地域信息, 将所述地域信息映射成为 MS允许接入的基站的 BS ID 列表,并根据终端当前 接入基站的 BS ID确定 MS当前接入的 BS的 BS ID是否在上述 BS ID列表内, 如果是, 则 MS 当前接入的基站在允许接入地域 (entry permit zone ) 的范 围内, 执行歩骤 205 ; 否则, 则 MS当前接入的基站不在允许接入地域的范围 内, 执行歩骤 206;
205、 如果 MS当前接入的 BS在允许接入地域范围内, 那么发送鉴权成功 消息, 如 EAP-Success到 MS , 指示 MS接入认证成功, 使得 MS执行后续的入 网过程; 结束本流程。
206、 如果 MS接入的 BS不在允许接入地域范围内, 那么 Authenticator 拒绝该次接入, 发送鉴权失败消息, 如 EAP-Fai lure到 MS;
所述鉴权失败消息中可携带接入失败原因及推荐 MS接入的 BS的标识信 息; 例如: 可以通过扩展 EAP-Fai lure消息的 TLV字段指示由于接入地域位 置不符造成的接入失败, 并增加相关 TLV字段, 根据 MS允许接入的基站的 B S ID 列表, 指示推荐 MS接入的 BS的 BS ID;
推荐 MS接入的 BS的 BS ID可以根据本地策略来实现, 例如: BS的覆盖 范围, 信号强度, ASN内部的配置信息等。
207、 Authenticator发送 Accounting Request消息到 AAA月艮务器, 在该 消息中携带释放指示 Release Indication,指示 MS由于移动性限制不能接入 网络, 需要释放相应的资源;
208、 AAA服务器收到 Accounting Request消息后, 释放相应的资源, 返 回 Accounting Response消息到 Authenticator。
上述实施例的歩骤 203中, MS允许接入的地域信息, 可以采用以下几种 方式来实现:
( 1 ) 使用 Lat/Long/Radius (经度 /纬度 /半径) 标识 BS的地域范围; MS签约信息 profi le中的地域信息 Area informat ion为 Lat/Long/Radi us (经度 /纬度 /半径) , 当 Authenticator接收到该 Lat/Long/Radius时, 以 Lat/Long交叉点为圆心, Radius为半径, 确定一个圆, 该圆的范围为 MS 允许接入的 BS地域范围。
每个 BS根据其地理位置, 设置一个经纬度坐标, 在 ASN内设置一个保存 BS地域信息数据库, 存储了各个 BS的 Lat/Long (经度 /纬度) 和 BS ID的对 应关系。 当 Authenticator收到 MS的签约信息中的 Lat /Long/Radius后, 以 Lat/Long为圆心, Radius为半径, 确定一个圆, 随后查询 BS地域信息数据 库, 根据这个圆确定的经纬度范围, 确定在该经纬度范围内的 BS, 将该范围 内 BS的 BS ID加入到 MS可接入的 BS ID 列表中。
在该地域范围内的 BS, 可以包括位置在该地域范围内的 BS或者 BS的覆 盖范围在该地域范围内。
在该地域范围内的所有 BS的 BS ID, 作为 MS允许接入地域范围的具体 B S ID列表。
(2) 使用 Lat/Long List标识 BS的位置;
MS prof ile中的 Area information Lat/Long 列表, 当 Authenticat or接收到该 Lat/Long列表时, 将各个 Lat/Long坐标映射为在该位置上的 BS ID, 从而形成 MS允许接入地域范围内的具体 BS ID列表。
每个 BS根据其地理位置, 设置一个经纬度坐标, 在 ASN内设置一个保存 BS地域信息数据库, 存储了各个 BS的 Lat/Long (经度 /纬度) 和 BS ID的对 应关系。 当 NAS收到 MS的签约信息中的 Lat/Long List后, 查询 BS地域信 息数据库, 根据相应的经纬度值, 查询对应的各个 BS的 BS ID, 将查询到 BS 的 BS ID加入到 MS可接入的 BS ID List中。
(3) 使用 Lat/Long/Radius (经度 /纬度 /半径) 标识 MS的位置
MS profile中的 Area information为 MS可接入的 Lat/Long/Radius (经 度 /纬度 /半径) , 当 Authenticator接收到该 Lat/Long/Radius时, 以 Lat/ Long为圆心, Radius为半径, 确定一个圆, 该圆的范围为 MS可接入的地域。 然后根据本地策略, 确定该地域范围内可为该 MS提供服务的 BS的 BS ID, 从 而形成 MS允许接入地域范围的具体 BS ID列表。 这里的本地策略可以是 BS的覆盖范围, 信号强度, ASN内部的配置信息
( 4) 使用 Lat/Long l ist标识 MS的位置;
MS profi le中的 Area informat ion为 MS可接入的 Lat/Long (经度 /纬 度) 列表, 当 Authenticator接收到该 Lat/Long列表时, 可以确定 MS所在 的各个实际位置, 从而根据本地策略, 确定可为该 MS提供服务的各个 BS的 B S ID, 从而形成 MS允许接入地域范围的具体 BS ID 列表。
这里的本地策略可以是 BS的覆盖范围, 信号强度, ASN内部的配置信息
( 5 ) 使用允许接入地域标识 (entry permit zone ID) 标识 BS的位置; MS prof i le中的 Area information为 MS可接入的 Entry permit zone
ID, 当 Authenticator接收到该 Entry permit zone ID时, 根据预先设置的 配置信息, 例如: Entry permit zone和 BS ID 的对应关系, 将其映射为 MS 允许接入地域的具体 BS ID 列表。
本发明实施例二与实施例一不同之处在于, 采用定时器来释放 AAA 的资 源, 参考图 3, 本发明实施例二固定或游牧用户终端接入网络的方法包括:
301、 同歩骤 201类似, MS发起初始入网和鉴权过程;
302、 同歩骤 202类似, 鉴权器 Authent icator发送接入请求 Access-Re quest消息到 AAA服务器;
303、 AAA服务器验证 MS身份, 如果身份合法, 则发送接入允许 Access- Accept消息给 Authenticator ;
如果 AAA中保存的该 MS的签约信息 profi le中标识了需要限制 MS的移 动性, 即 MS的活动类型 mobi l ity class为 fixed (固定) 或是 nomadic (游 牧) , 那么在 Access-Accept消息中携带 MS允许接入地域信息; 可在发送 A ccess-Accept的同时或之后, 开启定时器;
304、 同歩骤 204类似, Authenticator收到 Access-Accept后, 获取 MS 允许接入地域信息, 将所述地域信息映射成为 MS 允许接入的基站的 BS ID 列表, 并判断 MS当前接入的 BS是否在允许接入地域的范围内; 如果是, 执 行歩骤 305, 否则, 进入歩骤 307;
305、 如果 MS当前接入的 BS在允许接入地域范围内, 那么发送鉴权成功 消息, 如 EAP-Success到 MS, 指示 MS接入认证成功, 使得 MS执行后续的入 网过程;
306、 Authenticator发送 Accounting request消息到 AAA月艮务器, AAA 服务器收到该消息后, 终止定时器;
307、 同歩骤 206类似, 如果 MS接入的 BS不在允许接入地域范围内, 那 么 Authenticator拒绝该次接入, 发送鉴权失败消息, 如 EAP-Failure到 MS; 所述鉴权失败消息中写携带接入失败原因及推荐 MS接入的 BS的标识信息;
Authenticator不发送 Accounting request消息到 AAA月艮务器, AAA月艮 务器在定时器超时后认为 Authenticator拒绝 MS接入, 释放相关的资源。
歩骤 303中, MS允许接入的地域信息的表示方式同实施例一类似, 在此 不在赘述。
本发明实施例三与实施例一不同之处在于, 由 AAA服务器判断是否允许 终端接入, 参考图 4, 本发明实施例三固定或游牧用户终端接入网络的方法包 括:
401、 MS发起初始入网和鉴权过程, 同歩骤 201类似;
在这里, 需要指出的是, MS在初始接入 BS时, 可以确定该 BS的位置信 息, 比如该 BS的 Lat/Long信息, 而当 MS与 Authenticator交互的过程中, 便可通过一些现有消息将该 BS的位置信息发送给 Authenticator,例如 BS可 以通过终端附着请求消息 MS_attach_Req或终端预附着请求消息 MS_preatta ch_Req将 BS的位置信息发送给 Authenticator, 为了在 MS初始接入 BS时, 确定 BS的位置信息, 上述 BS的位置信息可以预先存储在 BS或者 ASN-GW之 内; 402、 Authenticator发送 Access-Request消息到 AAA月艮务器, 并且所述 Access-Request消息中携带所述 MS当前接入的 BS的位置信息, 该位置信息 如歩骤 S401所述可以在 MS初始入网的过程中获得; 但是, 如果在初始入网 过程中并未获得该位置信息, 则将所述 MS当前接入的 BS的 BS ID映射为相 应的位置信息;
403、 AAA服务器验证 MS身份, 确定该 MS的类型, 如果该 MS的 profi le 标识了 MS需要限制其移动性, 即 MS的 mobi l ity class为 fixed或是 nomad ic, 根据接收到的 Access-Request消息中携带所述 MS当前接入的 BS的位置 信息, 以及 AAA服务器中保存的该 MS允许接入的地域信息, 判断该 MS当前 接入的 BS是否在该 MS允许接入的地域范围内, 如果是则发送 Access-Accep t消息, 所述 Access-Accept消息中可以携带 MS允许接入的地域信息; 否则 执行歩骤 405 ;
404, Authenticator收到 Access-Accept后, 发送鉴权成功消息, 如 EA P-Success到 MS , 指示 MS接入认证成功, 使得 MS执行后续的入网过程, 结 束本流程;
如所述 Access-Accept消息中有携带 MS允许接入的地域信息, 获取 Acc ess-Accept中携带的 MS允许接入的地域信息, 将该 MS允许接入的地域信息 映射为 MS允许接入 BS的 BS ID列表并存储, 随后发送鉴权成功消息, 如 EA P-Success到 MS , 指示 MS接入认证成功, 使得 MS执行后续的入网过程, 结 束本流程。
405 , AAA月艮务器发送 Access-Reject消息给 Authent icator ;
所述 Access-Reject消息中可以携带 MS允许接入的地域信息;
406、 Authenticator收到 Access-Reject消息后, 获取 MS允许接入的地 域信息, 存贮该地域信息, 可选地将该取 MS 允许接入的地域信息映射为 MS 允许接入 BS的 BS ID列表; 并发送 EAP-Fai lure到 MS , 拒绝该次接入;
所述 EAP-Fai lure消息中可携带接入失败原因及推荐 MS接入的 BS的标 识信息; 可以通过扩展 EAP-Failure的 TLV指示字段指示由于地域位置不符 造成的接入失败, 并根据 MS的允许接入 BS的 BS ID增加相关 TLV字段, 指 示推荐 MS接入的 BS的 BS IDo
歩骤 403中, MS允许接入的地域信息的表示方式同实施例一类似, 在此 不在赘述。
本发明实施例所述固定或游牧用户终端接入网络的方法, 使得固定或游 牧用户终端在允许接入的区域正确接入网络, 限制了固定或游牧用户终端接 入网络的地域范围。
本发明实施例还共开了固定或游牧用户终端接入网络的装置。
针对实施例一, 本发明实施例还公开一种装置, 该装置可以为鉴权器, 参考图 5, 包括:
第一发送模块: 用于向计费认证鉴权服务器 AAA发送接入请求消息; 接收模块: 用于接收来自 AAA的接入允许消息, 并将该 AAA的接入允许 消息中的地域信息转换为终端允许接入基站的基站标识 BS ID列表;
保存模块: 用于保存终端允许接入基站的 BS ID列表;
判断模块: 判断终端当前接入的基站的 BS ID是否在所述 BS ID列表范 围内, 如果是, 则通知第二发送模块;
第二发送模块: 用于向所述终端发送鉴权成功消息。
上述装置还可包括第三发送模块,
所述判断模块: 还用于当终端当前接入的基站的 BS ID不在所述 BS ID 列表范围内, 通知第三发送模块;
所述第三发送模块: 用于向所述终端发送鉴权失败消息。
上述装置还可包括:
第四发送模块: 用于向 AAA发送计费请求消息, 所述计费请求消息中携 带有释放指示信息。
本发明实施例还公开了一种 AAA服务器, 参考图 6, 包括: 接收模块: 用于接收接入请求消息;
发送模块: 用于发送接入允许消息, 所述接入允许消息中携带有终端允 许接入的地域信息。
所述 AAA服务器还可包括:
释放模块: 用于根据接收到计费请求消息中的释放指示信息释放相应的 资源。
针对实施例三, 本发明实施例还公开了一种装置, 该装置可以为鉴权器, 参考图 7, 包括:
第一发送模块: 用于向 AAA发送接入请求消息, 所述接入请求消息中携 带有终端当前接入基站的位置信息, 该位置信息可以预先存储在基站或者接 入业务网网关之内, 当终端初始接入该基站时, 确定该基站的位置信息, 并 通过基站和本装置的交互信息发送该位置信息给本装置, 例如基站可以通过 终端附着请求消息或终端预附着请求消息将基站的位置信息发送给本装置; 接收模块: 用于接收来自 AAA的接入允许消息或接入拒绝消息; 第二发送模块: 用于向所述终端发送鉴权成功消息或鉴权失败消息。 所述装置还可以包括映射模块: 其用于在初始接入该基站过程中并未获 得当前接入基的位置信息时, 将终端当前接入基站的 BS ID映射为终端当前 接入基站的位置信息。
针对实施例三,本发明实施例还公开了一种 AAA服务器,参考图 8,包括: 接收模块: 用于接收接入请求消息, 所述接入请求消息中携带有终端当 前接入基站的位置信息;
保存模块: 用于保存终端允许接入的地域信息;
判断模块: 用于判断述终端接入当前接入基站的位置是否在终端允许接 入的地域范围内; 如果是, 通知第一发送模块;
第一发送模块: 用于发送接入允许消息。
所述 AAA服务器还可包括, 第二发送模块, 所述判断模块: 还用于当所述终端接入当前接入基站的位置是否在终端 不允许接入的地域范围内, 则通知第二发送模块;
所述第二发送模块: 用于发送接入拒绝消息。
本发明还可应用于其他的网络系统, 其中 Authenticator可以用其他的 网元替代, 如 BSC, RNC等。
本发明实施例所述固定或游牧用户终端接入网络的方法及装置, 实现了 固定或游牧用户终端在允许接入的区域正确接入网络, 限制该类用户终端接 入网络的范围; 进一歩的, 由于 AAA服务器将允许接入的地域标识通知到鉴 权器 Authenticator, 因此, 如果 ASN新增基站或基站发生改变, 对用户的接 入地域及签约信息均无影响, 避免的复杂的交互方式, 方便运营商的灵活应 用。
通过以上的实施方式的描述, 所属领域的技术人员可以清楚地了解到本 发明可借助软件加必需的通用硬件平台的方式来实现, 当然也可以通过硬件, 但很多情况下前者是更佳的实施方式。 基于这样的理解, 本发明的技术方案 本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来, 该计算机软件产品存储在可读取的存储介质中, 如计算机的软盘, 硬盘或光 盘等, 包括若干指令用以使得一台计算机设备 (可以是个人计算机, 服务器, 或者网络设备等) 执行本发明各个实施例所述的方法。
上所述仅为本发明的较佳实施例而已, 并不用以限制本发明, 凡在本发 明的精神和原则之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本 发明的保护范围之内。

Claims

权 利 要 求 书
1、 一种固定或游牧用户终端接入网络的方法, 其特征在于, 包括: 向认证授权计费服务器 AAA发送接入请求消息;
接收来自 AAA 的接入允许消息, 所述接入允许消息中携带有终端允许接 入的地域信息;
将所述地域信息转换为允许接入基站的基站标识 BS ID列表;
如果所述终端当前接入的基站的 BS ID在所述 BS ID列表范围内, 则向 所述终端发送鉴权成功消息, 以使得终端进行后续入网过程。
2、 如权利要求 1所述的方法, 其特征在于, 进一歩包括:
AAA接收所述接入请求消息后, 确定终端的类型, 如果终端的类型为固定 或游牧, 则回复所述接入允许消息。
3、 如权利要求 1所述的方法, 其特征在于, 进一歩包括:
如果所述终端当前接入的基站的 BS ID不在所述 BS ID列表范围内, 则 向终端发送鉴权失败消息, 所述鉴权失败消息中携带有失败原因和 /或推荐所 述终端接入基站的 BS ID。
4、 如权利要求 3所述的方法, 其特征在于, 进一歩包括:
向 AAA发送计费请求消息, 所述计费请求消息中携带有释放指示信息; 接收来自 AAA的计费响应消息。
5、 如权利要求 2所述的方法, 其特征在于, AAA回复接入允许消息的同 时或之后, 启动定时器; 该方法进一歩包括:
如果所述终端当前接入的基站的 BS ID在所述 BS ID列表范围内, 向 AA A发送计费请求消息, 以使得 AAA服务器终止定时器;
如果所述终端当前接入的基站的 BS ID不在所述 BS ID列表范围内, 定 时器超时后, AAA服务器释放相关资源。
6、 如权利要求 1-5任意一项所述的方法, 其特征在于: 终端允许接入的 地域信息为: 基站或终端的经度 /纬度 /半径、 基站或终端的经度 /纬度列表或 允许接入地域标识。
7、 一种固定或游牧用户终端接入网络的方法, 其特征在于, 包括: 向 AAA服务器发送接入请求消息, 所述接入请求消息中携带有终端接入 基站的位置信息, 以使得所述 AAA服务器根据终端允许接入的地域信息验证 所述终端接入基站的位置是否在终端允许接入的地域范围内;
如果所述终端接入基站的位置在终端允许接入的地域范围内,接收来自 A AA的接入允许消息, 并向所述终端发送鉴权成功消息, 以使得所述终端进行 后续入网过程。
8、 如权利要求 7所述的方法, 其特征在于, 所述接入请求消息中的位置 信息是根据所述终端当前接入基站的 BS ID映射得到的。
9、 如权利要求 7所述的方法, 其特征在于, 所述方法之前进一歩包括: 在所述终端的初始入网过程中,接收基站发送的消息, 所述消息中包括所述基 站的位置信息。
10、 如权利要求 9所述的方法, 其特征在于, 所述位置信息预先存储在 所述基站或者接入业务网网关之中。
11、 如权利要求 7所述的方法, 其特征在于, 所述接入允许消息中包含 终端允许接入的地域信息。
12、 如权利要求 7所述的方法, 其特征在于, 进一歩包括:
如果所述终端接入的地域信息不在终端允许接入的地域范围内, 接收来 自 AAA的接入拒绝消息, 并向所述终端发送鉴权失败消息。
13、 如权利要求 12所述的方法, 其特征在于, 所述接入拒绝消息中携带 有终端允许接入的地域信息, 进一歩包括:
将所述终端允许接入的地域信息映射为终端允许接入基站的 BS ID列表; 根据所述 BS ID列表确定推荐终端接入的基站的 BS ID;
所述鉴权失败消息中携带有失败原因和 /或所述推荐终端接入基站的 BS ID。
14、 一种装置, 其特征在于, 包括:
第一发送模块: 用于向计费认证鉴权服务器 AAA发送接入请求消息; 接收模块: 用于接收来自 AAA的接入允许消息, 并将该 AAA的接入允许 消息中的地域信息转换为终端允许接入基站的基站标识 BS ID列表;
保存模块: 用于保存终端允许接入基站的 BS ID列表;
判断模块: 判断终端当前接入的基站的 BS ID是否在所述 BS ID列表范 围内, 如果是, 则通知第二发送模块;
第二发送模块: 用于向所述终端发送鉴权成功消息。
15、 如权利要求 14所述的装置, 其特征在于, 还包括第三发送模块, 所述判断模块: 还用于当终端当前接入的基站的 BS ID不在所述 BS ID 列表范围内, 通知第三发送模块;
所述第三发送模块: 用于向所述终端发送鉴权失败消息。
16、 如权利要求 15所述的装置, 其特征在于, 还包括:
第四发送模块: 用于向 AAA发送计费请求消息, 所述计费请求消息中携 带有释放指示信息。
17、 一种 AAA服务器, 其特征在于, 包括:
接收模块: 用于接收接入请求消息;
发送模块: 用于发送接入允许消息, 所述接入允许消息中携带有终端允 许接入的地域信息。
18、 如权利要求 17所述的 AAA服务器, 其特征在于, 还包括:
释放模块: 用于根据接收到计费请求消息中的释放指示信息释放相应的 资源。
19、 一种装置, 其特征在于, 包括:
第一发送模块: 用于向 AAA发送接入请求消息, 所述接入请求消息中携 带有终端当前接入基站的位置信息; 接收模块: 用于接收来自 AAA的接入允许消息或接入拒绝消息; 第二发送模块: 用于向所述终端发送鉴权成功消息或鉴权失败消息。
20、 如权利要求 19所述的装置, 其特征在于, 还包括:
映射模块: 用于将终端当前接入基站的 BS ID 映射为终端当前接入基站 的位置信息。
21、 一种 AAA服务器, 其特征在于, 包括:
接收模块: 用于接收接入请求消息, 所述接入请求消息中携带有终端当 前接入基站的位置信息;
保存模块: 用于保存终端允许接入的地域信息;
判断模块: 用于判断述终端接入当前接入基站的位置是否在终端允许接 入的地域范围内; 如果是, 通知第一发送模块;
第一发送模块: 用于发送接入允许消息。
22、 如权利要求 21所述的 AAA服务器, 其特征在于, 还包括, 第二发送 模块,
所述判断模块: 还用于当所述终端接入当前接入基站的位置是否在终端 不允许接入的地域范围内, 则通知第二发送模块;
所述第二发送模块: 用于发送接入拒绝消息。
PCT/CN2009/071644 2008-07-29 2009-05-05 一种固定或游牧用户终端接入网络的方法及装置 WO2010012168A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200810142560.5 2008-07-29
CN200810142560.5A CN101640889B (zh) 2008-07-29 2008-07-29 一种固定或游牧用户终端接入网络的方法及装置

Publications (1)

Publication Number Publication Date
WO2010012168A1 true WO2010012168A1 (zh) 2010-02-04

Family

ID=41609934

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/071644 WO2010012168A1 (zh) 2008-07-29 2009-05-05 一种固定或游牧用户终端接入网络的方法及装置

Country Status (2)

Country Link
CN (1) CN101640889B (zh)
WO (1) WO2010012168A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116074924A (zh) * 2023-03-07 2023-05-05 北京首信科技股份有限公司 一种移动终端上网区域管控的方法和设备

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102428729A (zh) * 2010-10-11 2012-04-25 华为技术有限公司 接入处理的方法、网络设备和网络系统
CN102547892B (zh) * 2010-12-20 2014-12-10 大唐移动通信设备有限公司 一种游牧数据接入系统、装置及数据传输方法
CN102271383A (zh) * 2011-07-19 2011-12-07 中兴通讯股份有限公司 WiMAX系统移动性限制接入方法及基站
CN103701764B (zh) * 2012-09-27 2016-09-07 中国移动通信集团公司 一种游牧限制方法、系统及设备
US9246894B2 (en) * 2012-10-30 2016-01-26 Microsoft Technology Licensing, Llc. Communicating state information to legacy clients using legacy protocols
CN103532715B (zh) * 2013-10-09 2016-11-23 北京奇虎科技有限公司 基于无密码或任意密码的网络授权的方法、系统和装置
CN108449705B (zh) * 2017-02-16 2020-05-29 中国移动通信集团吉林有限公司 一种控制无线宽带用户上网位置的方法及装置
CN112449361B (zh) * 2019-09-02 2022-10-18 华为技术有限公司 检测方法、装置及系统
CN112020065B (zh) * 2020-08-04 2023-05-19 深圳传音控股股份有限公司 一种信息处理方法、终端设备、服务器及存储介质

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1852588A (zh) * 2005-11-02 2006-10-25 上海华为技术有限公司 连接模式下实现网络共享的方法

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19730363B4 (de) * 1997-07-15 2011-08-11 Telefonaktiebolaget Lm Ericsson (Publ) Ortsspezifische World Wide Web Dienste in digitalen zellularen Kommunikationsnetzwerken
CN1214577C (zh) * 2002-05-16 2005-08-10 华为技术有限公司 网际协议网络上aaa服务器控制接入设备的方法
CN100479386C (zh) * 2006-07-12 2009-04-15 华为技术有限公司 域管理系统、建立本地域的方法和获取本地域许可的方法

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1852588A (zh) * 2005-11-02 2006-10-25 上海华为技术有限公司 连接模式下实现网络共享的方法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116074924A (zh) * 2023-03-07 2023-05-05 北京首信科技股份有限公司 一种移动终端上网区域管控的方法和设备
CN116074924B (zh) * 2023-03-07 2023-06-06 北京首信科技股份有限公司 一种移动终端上网区域管控的方法和设备

Also Published As

Publication number Publication date
CN101640889A (zh) 2010-02-03
CN101640889B (zh) 2013-04-24

Similar Documents

Publication Publication Date Title
WO2010012168A1 (zh) 一种固定或游牧用户终端接入网络的方法及装置
US9532220B2 (en) Apparatus and method for authentication in wireless communication system
US8224325B2 (en) Resource control method, relevant device, and system
WO2020224622A1 (zh) 一种信息配置方法及装置
US10772033B2 (en) Avoiding reselection of a fake cell in a wireless communication network
US20120203905A1 (en) M2m servce providing system, m2m terminal, and operation methods thereof
CN101296509A (zh) 紧急通信业务实现方法、系统及其相关设备
US10278073B2 (en) Processing method for terminal access to 3GPP network and apparatus
CN109964453A (zh) 统一安全性架构
CN101785343B (zh) 用于快速转换资源协商的方法、系统和装置
CN102006646A (zh) 一种切换方法和切换设备
US20160094976A1 (en) Ue (user equipment), base station apparatus and server apparatus
US9161217B2 (en) Method and system for authenticating in a communication system
JP2014535207A (ja) ホーム基地局のセキュアアクセス方法、システム及びコアネットワークエレメント
WO2018058365A1 (zh) 一种网络接入授权方法、相关设备及系统
CN102752725A (zh) 事件通知方法、终端设备和认证服务器
WO2013185709A1 (zh) 一种呼叫认证方法、设备和系统
US20150026787A1 (en) Authentication method, device and system for user equipment
WO2005069648A1 (fr) Procede de gestion d'une demande d'informations de position lancee par un equipement d'utilisateur (ue)
US8443431B2 (en) Authenticator relocation method for WiMAX system
WO2010012177A1 (zh) 一种确定漫游用户终端移动性的方法及装置
WO2015089969A1 (zh) 一种m2m终端/终端外设的可及性管理方法及设备
US10959097B1 (en) Method and system for accessing private network services
CN113055342B (zh) 一种信息处理方法及通信装置
WO2023066210A1 (zh) 鉴权方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09802361

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09802361

Country of ref document: EP

Kind code of ref document: A1