WO2010139147A1 - 用户接入方法及系统、闭合用户组用户管理方法及系统 - Google Patents

用户接入方法及系统、闭合用户组用户管理方法及系统 Download PDF

Info

Publication number
WO2010139147A1
WO2010139147A1 PCT/CN2009/073973 CN2009073973W WO2010139147A1 WO 2010139147 A1 WO2010139147 A1 WO 2010139147A1 CN 2009073973 W CN2009073973 W CN 2009073973W WO 2010139147 A1 WO2010139147 A1 WO 2010139147A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
base station
home base
identifier
terminal
Prior art date
Application number
PCT/CN2009/073973
Other languages
English (en)
French (fr)
Inventor
骆文
周娜
霍玉臻
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2010139147A1 publication Critical patent/WO2010139147A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/042Public Land Mobile systems, e.g. cellular systems
    • H04W84/045Public Land Mobile systems, e.g. cellular systems using private Base Stations, e.g. femto Base Stations, home Node B

Definitions

  • the present invention relates to the field of communications, and in particular, to a user access method and system, and a closed user group user management method and system.
  • home base stations are usually installed in homes, office areas and the like.
  • the home base station is a small, low-power base station with advantages such as affordability, convenience, and low power output.
  • FIGS. 1 and 2 are schematic diagrams of a communication network including a home base station. As shown in Figure 1 and Figure 2, the home base station can access the core network through the access network gateway.
  • the security gateway may be set up with the access gateway or with the access gateway.
  • the main function of the security gateway is to secure the link between the home base station and the access gateway and the user data server.
  • the main functions of the access gateway include: verifying the security of the home base station, handling the registration of the home base station, performing operation and maintenance management on the home base station, configuring and controlling the home base station according to the operator's requirements, and between the core network and the home base station. Data exchange.
  • the server is an important facility in the communication network. It is used to implement network operator control and management of data and users. It provides authentication and authorization and account services, usually with the network. Interoperability with access control, gateway servers, databases, and user information directories.
  • CSG Closed Subscriber Group
  • base stations base stations
  • the working mode of the home base station can be divided into a closed mode, a mixed mode, and an open mode.
  • the working mode of the home base station When the working mode of the home base station is in the closed mode, only the user of the CSG to which the home base station belongs can access the home base station and enjoy the service provided by the home base station; when the working mode of the home base station When in the open mode, any user can access the home base station, and the home base station is equivalent to the macro base station; when the working mode of the home base station is in the hybrid mode, the CSG user is allowed to access, and other users are allowed to access. Incoming, but depending on whether the user belongs to the CSG list to distinguish different user types and achieve differentiated quality of service processing, that is to say, CSG users have higher service priority when using mixed mode home base stations, and have better Quality of service and business category.
  • the user data server is used to store subscription information of the home base station, such as a user allowed to access the home base station, that is, CSG related information (including CSG member information).
  • the CSG member information of the home base station is generally stored in the home data base of the home base station and the user data server on the network side, and the data stored in the two base stations are synchronized, that is, the home base station is modified locally on the home base station or on the user data server.
  • the CSG member information needs to perform synchronization between the two.
  • modifying the CSG member information of the home base station requires the consent of both the home base station owner and the operator (i.e., the user data server).
  • the home base station in the closed mode uses the CSG member information to perform access control on the terminal user. If the terminal user is not a CSG member user, the closed mode home base station will refuse the terminal user to access the network;
  • the home base station in the hybrid mode distinguishes user categories (eg, CSG users, non-CSG users) according to the CSG member information, and facilitates operations such as differentiated charging and quality of service authorization. If the terminal user is not a CSG member user, the home base station It will only be offered low priority services.
  • access control the operation of the home base station to determine whether the user belongs to the CSG list (i.e., whether the user is the CSG user of the home base station) is hereinafter referred to as access control.
  • FIG. 3 is a flowchart of a method for a terminal user to access a home base station by using the system reference model shown in FIG. 1 in the prior art; in the process, the home base station checks whether the terminal user belongs to the CSG list according to the user identifier sent by the terminal user. (that is, whether it is a CSG user of the home base station), specifically including the following steps:
  • Step 301 The terminal requests the negotiation of the authentication capability (for example, the user's authentication policy, and the like), and completes the negotiation of the authentication capability with the base station and the access gateway.
  • the authentication capability for example, the user's authentication policy, and the like
  • Step 302 The access gateway sends a user identity request to the home base station, and the home base station forwards the request to the terminal.
  • NAI Network Access Identifier
  • IMSI International Mobile Subscriber Identification Number
  • an international mobile client Identifier an international mobile client Identifier
  • Step 304 The home base station performs access control on the terminal user according to the foregoing user identification information.
  • the home base station in the closed mode checks whether the terminal user exists in the CSG list, and if so, allows the terminal user to access, and performs step 305; otherwise, the terminal user access is denied, and the user release process can be initiated.
  • the home base station in the hybrid mode checks whether the terminal user exists in the CSG list. If yes, the neighboring user is notified to the access gateway as the CSG user in the subsequent process. If not, the access gateway is notified to the user in the subsequent process. For non-CSG users.
  • Step 305 The home base station sends a user identity response to the access gateway, where the user identity information is carried.
  • step and step 304 can be performed in parallel with step 304, regardless of the order.
  • Step 306 The AAA server interacts with the terminal, performs a user authentication process, completes the audit of the user's legality through the user authentication process, and authorizes the user to perform the service.
  • Step 307 continue to perform other processes related to user access.
  • step 304 the home base station needs to perform access control according to the user identification information carried in the user identification response sent by the terminal, and check whether the terminal user is a CSG member of the home base station. Therefore, in step 303, the terminal needs to be forced to transmit the real user identity of the terminal user, and the message is transmitted in a clear text manner, and security and privacy cannot be guaranteed. This poses a security risk. For example, after the real user identity of the terminal user is exposed, the malicious attacker can track the communication and service opportunities of the terminal user, which is disadvantageous for protecting the privacy and security of the terminal user.
  • the AAA server needs to know the real user identifier of the terminal user.
  • the authentication method for supporting the real user identifier of the hidden terminal user is used between the terminal and the AAA server.
  • EAP Extensible Authentication Protocol
  • the method can hide the real user identifier of the terminal user, so that the real user identifier of the terminal user is only visible to the terminal and the AAA server, and the home base station cannot obtain the real user identifier hidden by the method in step 306.
  • the user identifier that is transmitted in the clear text in the EAP message is a pseudo identifier of the terminal user (the role is mainly used for routing).
  • the home base station can resolve the identifier, the identifier cannot be used because it is not the real user identifier.
  • the above access control is performed on the home base station. That is to say, even if the access control operation is performed after step 306, the home base station cannot obtain the real user identity for access control, and can only use the real identity transmitted by the terminal in plain text in step 303.
  • User identification information is used for access control, which poses a security risk.
  • the method shown in FIG. 3 also needs to transmit the real user identity to the access gateway in clear text in step 305. Since the access gateway and the AAA server may belong to different operators, transmitting the real user identifier to the access gateway in clear text may expose the user's privacy.
  • the technical problem to be solved by the present invention is to overcome the deficiencies of the prior art, to provide a user access method and system capable of enhancing security, and a closed user group user management method and system related thereto.
  • the present invention provides a user access method, the method includes: after receiving a user identity request sent by an access gateway, the terminal sends a user identity response message to the access gateway by using the home base station, where the message carries the terminal The pseudo-identity of the user; the access gateway sends the pseudo-identity to the authentication and authorization charging AAA server;
  • the AAA server initiates an authentication process for the terminal user by using the pseudo identifier, and obtains a real user identifier of the terminal user in the authentication process;
  • the AAA server sends an access success message to the home base station
  • the home base station controls the terminal user to access the wireless communication network by using a real user identifier or a user identifier corresponding to the real user identifier, where the user identifier code is used by the user.
  • the base station or user data server or AAA server is assigned to the end user during the process of managing the closed subscriber group CSG members of the home base station.
  • the method further includes: before the step of sending, by the home base station, the user identity response message to the access gateway:
  • the terminal sends the user identifier code corresponding to the real user identifier to the home base station through the wireless air interface, and the home base station uses the user identifier code, or the user identifier code is corresponding to the real user identifier, and then performs access control on the terminal user. .
  • the step of performing access control includes:
  • the home base station uses the real user identifier or the user identification code to determine whether the terminal user is a CSG member of the home base station. If yes, the terminal user is allowed to access or be assigned a high access priority, and the subsequent steps are continued; otherwise, the terminal user is not allowed to access or assign a low access priority to the terminal, if it is determined not to If the terminal user is allowed to access, the process ends; if it is determined that the terminal user is assigned a low access priority, the subsequent steps are continued.
  • the home base station determines whether the terminal user is a CSG member of the home base station by using the real user identifier or the user identifier code, and determines, according to the attribute parameter of the terminal, whether the terminal user uses a pre-designated terminal to access . If the end user is a CSG member and accesses using a pre-designated terminal, allowing the terminal user to access or assign a high access priority to it, and continuing to perform subsequent steps; otherwise, the terminal user is not allowed Accessing or assigning a low access priority to the terminal, if it is determined that the terminal user is not allowed to access, the process ends; if it is determined that the terminal user is assigned a low access priority, the subsequent steps are continued.
  • step that the AAA server sends the access success message to the home base station through the access gateway includes:
  • the AAA server sends an access success message to the access gateway, where the access success message carries the user identification code corresponding to the real user identifier obtained by the AAA server in the authentication process;
  • the access gateway After receiving the access success message, the access gateway sends the real user identifier or the user identification code to the home base station by using an extensible authentication protocol EAP forwarding message or a key change indication message.
  • the foregoing method further includes: obtaining, by the AAA server, the user identifier of the real user identifier by using one of the following manners:
  • the AAA server obtains the user identification code locally by using the real user identifier or using the real user identifier in combination with the identifier of the home base station; or
  • the AAA server obtains the user identification code from the user data server using the real user identifier or using the real user identifier in conjunction with the identity of the home base station.
  • the method further includes: after the home base station uses the real user identifier or the user identifier, or the user identifier is corresponding to the real user identifier, performing access control on the terminal user.
  • the user identification code has the following characteristics:
  • a user identification code or a user identification code combined with a network identifier corresponds to a real user identifier of an end user
  • the real user identifier of an end user or the real user identifier of an end user is combined with a user identifier of a terminal user corresponding to a home base station identifier;
  • the real user identifier of an end user or the real user identifier of an end user, combined with a home base station identifier, or a real user identifier of an end user, combined with a home base station identifier and a network identifier corresponding to an end user User ID code.
  • the home base station performs access control on the terminal user in one of the following ways:
  • the home base station determines whether the terminal user is a CSG member of the home base station by using the real user identifier or the user identifier code; if the terminal user is a CSG member of the home base station, allowing the terminal user to access or allocate the same High access priority, otherwise it is not allowed to access or assign a low access priority to it; or
  • the home base station determines whether the terminal user is a CSG member of the home base station by using the real user identifier or the user identifier code, and determines, according to an attribute parameter of the terminal, whether the terminal user uses a terminal that is pre-designated for the terminal user. If the end user is a CSG member and uses the pre-designated terminal access, then allow it to access or assign a high access priority to it, otherwise It is not allowed to access or assign a low access priority to it.
  • the invention also provides a closed user group user management method, the method comprising:
  • the home base station After receiving the CSG member management request for adding the terminal user to its closed subscriber group CSG member, the home base station requests the user data server, or requests the user data server and the AAA server to authorize the terminal user to be the CSG member of the home base station;
  • the user data server or the user data server and the AAA server authenticate and authorize the CSG member management request, save the updated CSG member information after the authentication authorization is passed, and authorize the terminal user to be added as the CSG member of the home base station;
  • the home base station After the user data server, or the user data server and the AAA server are authorized, the home base station adds the terminal user as a CSG member, and saves the updated CSG member information;
  • the CSG member information includes: a real user identifier of the terminal user, or the home base station identifier, or a real user identifier of the terminal user, and the home base station identifier.
  • the home base station after receiving the CSG member management request, the home base station further allocates a user identification code to the terminal user, and together with the real user identifier of the terminal user or the real user identifier of the terminal user. And sent to the user data server together with the home base station identifier, or sent to the user data server and the AAA server; or
  • the terminal user After the user data server authentication authorization is passed, the terminal user is also assigned a user identification code and sent to the home base station, or sent to the home base station and associated with the end user's real user identity or And sending to the AAA server together with the real user identifier of the end user and the home base station identifier; or
  • the terminal user After the AAA server authentication and authorization is passed, the terminal user is also assigned a user identification code and sent to the home base station and the user data server;
  • the CSG member information further includes: the user identifier code.
  • the CSG information update message is sent to the AAA server, where the message carries the real user identifier of the terminal user, or the real user identifier of the terminal user and the identifier of the home base station. ;
  • the AAA server After receiving the CSG information update message, the AAA server allocates a user identification code to the terminal user, and sends the user identification code to the user data server and the home base station;
  • the CSG member information further includes: the user identifier code.
  • the user identification code has the following characteristics:
  • a user identification code or a user identification code combined with a network identifier corresponds to a real user identifier of an end user
  • the real user identifier of an end user or the real user identifier of an end user is combined with a user identifier of a terminal user corresponding to a home base station identifier;
  • the real user identifier of an end user or the real user identifier of an end user, combined with a home base station identifier, or a real user identifier of an end user, combined with a home base station identifier and a network identifier corresponding to an end user User ID code.
  • the invention also provides a closed user group user management method, the method comprising:
  • the user data server After receiving the CSG member management request of the CSG member of the home base station, the user data server, or the user data server and the AAA server authenticate and authorize the CSG member management request; and save the update after the authentication and authorization is passed.
  • CSG member information, and the updated data of the CSG member is sent by the user data server to the home base station;
  • the home base station saves the updated CSG member information
  • the CSG member information includes: a real user identifier of the terminal user, or the home base station identifier, or a real user identifier of the terminal user, and the home base station identifier.
  • the terminal user is also assigned a user identification code and sent to the home base station, or sent to the home base station and associated with the end user's real user identity or Sending it to the AAA server along with the real user identity of the end user and the home base station identity; or
  • the terminal user After the AAA server authentication and authorization is passed, the terminal user is also assigned a user identification code and sent to the home base station and the user data server;
  • the CSG member information further includes: the user identifier code.
  • the CSG letter is also sent to the AAA server.
  • An information update message where the message carries the real user identifier of the terminal user, or the real user identifier of the terminal user and the identifier of the home base station;
  • the AAA server After receiving the CSG information update message, the AAA server allocates a user identification code to the terminal user, and sends the user identification code to the user data server and the home base station;
  • the CSG member information further includes: the user identifier code.
  • the user identification code has the following characteristics:
  • a user identification code or a user identification code combined with a network identifier corresponds to a real user identifier of an end user
  • the real user identifier of an end user or the real user identifier of an end user is combined with a user identifier of a terminal user corresponding to a home base station identifier;
  • the real user identifier of an end user or the real user identifier of an end user, combined with a home base station identifier, or a real user identifier of an end user, combined with a home base station identifier and a network identifier corresponding to an end user User ID code.
  • the user data server sends the updated CSG member information to the home base station in one of the following ways:
  • the user data server After the authentication and authorization is passed, the user data server includes the CSG member information in the CSG member information update message and sends the information to the home base station; or
  • the user data server After the authentication and authorization is passed, in the process of performing the access authentication and authorization of the home base station, the user data server includes the CSG member information in the authentication success response message and sends the information to the home base station.
  • the present invention also provides a user access system, the system comprising: a home base station, an access gateway, and an AAA server; wherein:
  • the access gateway is configured to send a user identity request to the terminal, and receive a user identity response message sent by the terminal by using the home base station, and send the pseudo identity of the terminal user carried in the user identity response message to the AAA server;
  • the AAA server is configured to initiate an authentication process for the terminal user by using the pseudo identifier, where Obtaining a real user identifier of the terminal user in the authentication process;
  • the AAA server is further configured to send the real user identifier or the user identifier code corresponding to the real user identifier to the home base station by using the access gateway;
  • the home base station is configured to perform access control on the terminal user by using the real user identifier or the user identification code.
  • the AAA server is further configured to obtain the user identification code locally by using the real user identifier or using the real user identifier and the identifier of the home base station; or
  • the system further includes a user data server; the AAA server is further configured to obtain the user identification code from the user data server by using the real user identifier, or using the real user identifier and the identifier of the home base station .
  • the invention also provides a closed user group user management system, the system comprising: a home base station, a user data server; wherein:
  • the home base station is configured to request the user data server to authorize the terminal user to be a CSG member of the home base station after receiving the CSG member management request to add the terminal user to its closed subscriber group CSG member;
  • the user data server is configured to perform authentication and authorization on the CSG member management request, save the updated CSG member information after the authorization is passed, and authorize the terminal user to be added as a CSG member of the home base station;
  • the home base station is further configured to: after obtaining the authorization of the user data server, add the terminal user as a CSG member, and save the updated CSG member information;
  • the CSG member information includes: a real user identifier of the terminal user, or a real user identifier of the terminal user and the home base station identifier.
  • system further includes an AAA server, where the AAA server is configured to perform authentication and authorization on the CSG member management request, and save the updated CSG member information;
  • the home base station is further configured to add the end user to its CSG member after both the user data server and the AAA server authenticate the authorization.
  • the home base station is further configured to allocate the user identification code to the terminal user, and together with the real user identifier of the terminal user, or to associate it with the real user of the terminal user.
  • the identifier is sent to the user data server together with the home base station identifier, or sent to the user data server and the AAA server; or
  • the user data server is further configured to assign the user identification code to the end user and send it to the home base station, or send it to the home base station and together with the real user identifier of the terminal user or Transmitting it to the AAA server along with the real user identity of the end user and the home base station identity; or
  • the AAA server is further configured to allocate the user identification code to the terminal user, and send the same to the home base station and the user data server;
  • the CSG member information further includes: the user identifier code.
  • the invention also provides a closed user group user management system, the system comprising: a home base station, a user data server; wherein:
  • the user data server is configured to perform authentication and authorization on the CSG member management request after receiving the CSG member management request of the CSG member of the home base station, and save the updated CSG member information after the authentication and authorization is passed, and Sending updated CSG member information to the home base station;
  • the home base station is configured to save updated CSG member information
  • the CSG member information includes: a real user identifier of the terminal user, or a real user identifier of the terminal user and the home base station identifier.
  • system further includes an AAA server, where the AAA server is configured to perform authentication and authorization on the CSG member management request, save the updated CSG member information after the authentication authorization is passed, and authorize the terminal user to be added to the CSG member of the home base station;
  • the user data server is further configured to save the updated CSG member information after obtaining the authorization of the AAA server, and send the updated CSG member information to the home base station.
  • the user data server is further configured to allocate the user identification code to the terminal user, and send it to the home base station, or send it to the home base station and identify it with the real user of the terminal user. Sending to the AAA server together or together with the real user identity of the end user and the home base station identity; or The AAA server is further configured to allocate the user identification code to the terminal user, and send the same to the home base station and the user data server;
  • the CSG member information further includes: the user identifier code.
  • the terminal user assigns a user identification code, and synchronizes the parameter between the home base station, the user data server, and the AAA server; the parameter itself or the parameter combined with other parameters may uniquely refer to the real user identifier of an end user; at the home base station, the user Passing and using this parameter between the data server and the AAA server can hide the real user identity of the end user.
  • the home base station can learn according to the parameter provided by the terminal or the parameter user identifier (SIS) returned by the AAA server, such as the MAC address of the terminal used by the terminal user.
  • the home base station performs the real user identifier of the user who accesses the authentication. According to the identifier, the home base station can perform access control on the user in combination with the CSG information saved on the home base station.
  • SIS parameter user identifier
  • the invention not only fills in the blank of the current CSG user management method and system, but also avoids frequently transmitting the user's real identity in the air interface during the user access control, provides the privacy protection of the user identity, and reduces the security risk of the home base station system.
  • FIG. 1 is a schematic diagram of a communication network including a home base station in the prior art
  • FIG. 2 is a schematic diagram of another communication network including a home base station in the prior art
  • FIG. 3 is a flow chart of a method for a terminal user to access a home base station by using the system reference model shown in FIG. 1 in the prior art;
  • FIG. 4 is a schematic diagram showing the relationship between a parameter SIS defined by the present invention and a real user identifier of an end user;
  • FIG. 5 is a flow chart of a first embodiment of a CSG member management method of the present invention.
  • FIG. 6 is a flow chart of a second embodiment of a CSG member management method of the present invention.
  • FIG. 7 is a flow chart of a third embodiment of a CSG member management method of the present invention.
  • 8 is a flowchart of a fourth embodiment of a CSG member management method of the present invention.
  • FIG. 9 is a flowchart of a fifth embodiment of a CSG member management method of the present invention.
  • FIG. 10 is a flowchart of a sixth embodiment of a CSG member management method of the present invention.
  • FIG. 11 is a flowchart of a seventh embodiment of a CSG member management method of the present invention.
  • FIG. 12 is a flowchart of an eighth embodiment of a CSG member management method of the present invention.
  • FIG. 13 is a flowchart of a method for a terminal user to access a mobile communication network through the home base station system shown in FIG. 1 according to a tenth embodiment of the present invention
  • FIG. 14 is a flowchart of a method for an end user to access a mobile communication network through the home base station system shown in FIG. 1 according to the eleventh embodiment of the present invention
  • FIG. 15 is a flowchart of a method for a terminal user to access a mobile communication network through the home base station system shown in FIG. 1 according to a twelfth embodiment of the present invention
  • 16 is a schematic diagram showing the structure of a user access system and a closed user group user management system according to an embodiment of the present invention. Preferred embodiment of the invention
  • the core idea of the present invention is that the AAA server can obtain the real user identifier of the terminal user in a secure manner in the authentication process. Therefore, the AAA server can identify the real user of the terminal user in the process of the terminal user accessing the network.
  • the access gateway sends the home base station to the home base station, so that the home base station uses the real user identity to perform access control on the terminal user.
  • the present invention also defines parameters for representing the identity of the user: User identification code
  • SIS Subscriber Identity Symbol
  • SIS is the code of the real user ID of the end user; in the process of the terminal user accessing the network, the AAA server can also send the parameter SIS of the end user to the home base station through the access gateway, so that The home base station uses the end user's parameter SIS for access control.
  • . 4 is a schematic diagram of the relationship between the parameter SIS defined by the present invention and the real user identifier of the terminal user; as shown in FIG. 4, using the parameter SIS, or combining the parameter SIS with the home base station identifier, or the parameter SIS, the home base station
  • the combination of the identity and the network identity can uniquely determine the real user identity (Real-NAI) of an end user.
  • the User Identification Number (SIS) has the following characteristics:
  • the user identifier may be used, or the user identifier (SIS) may be used to uniquely determine (ie, correspond to) the real user identifier of an end user in combination with the network identifier;
  • the real user identity of the terminal user is used in combination with the home base station identity, or the real user identity of the terminal user is used to uniquely determine (ie, correspond to) the home base station identity and the network identity.
  • group user identification code (SIS) of the end user;
  • the user identification code (SIS) of a (group) end user can be uniquely determined (i.e., corresponding) by using the real user identity of the end user or using the real user identity of the end user in conjunction with the home base station identity.
  • the network identifier may be an identifier of the home operator of the terminal user, such as an NSP ID (Network Service Provider ID).
  • NSP ID Network Service Provider ID
  • the home base station identifier may be a BSID (Base Station ID) of the home base station or a NAI (Network Access Identifier) of the home base station.
  • BSID Base Station ID
  • NAI Network Access Identifier
  • the user identification code may be an identifier of a mobile terminal (referred to as a terminal) used by the terminal user, for example, an MSID (Mobile Station ID) of the terminal, or a MAC address of the terminal; or Related parameters generated by the associated network element in the wireless mobile network (eg, by the home base station, or by the user data server, or by the AAA server), such as user aliases, serial numbers, security parameter indexes (SPI), etc. Regardless of the parameters, whether it is used off-the-shelf or otherwise generated, it is considered to be the user identification code assigned by the network to the end user.
  • the present invention proposes a method for managing the CSG members of the home base station.
  • the embodiment and the method for managing a CSG member of a home base station proposed by the present invention are described in detail.
  • the operation of managing the CSG members of the home base station includes: adding a subscriber as a CSG member of the home base station, or modifying the attributes of a CSG member, or deleting a CSG member of the home base station, and the like.
  • FIG. 5 to FIG. 12 are the flowcharts of the method for managing a home base station CSG member using the system reference model shown in FIG. 1 as an example of the present invention.
  • FIG. 5 is a flowchart of a first embodiment of a CSG member management method of the present invention; in this embodiment, a user (owner of a home base station) manages a CSG member of the home base station by operating a home base station, and is allocated by the user data server.
  • SIS SIS
  • Step 501 The home base station accesses the mobile communication network, and generally includes the following sub-steps: First, the home base station discovers the security gateway that it needs to connect and establishes a secure channel with the security gateway;
  • the home base station interacts with the network to obtain a series of parameters required for the home base station to initialize and complete the access of the mobile communication network.
  • Step 502 The home base station receives a request to add an end user to its CSG member.
  • the owner of the home base station can add the end user to the CSG member of the home base station through the management interface on the home base station.
  • the above-described request must contain at least the end-user real user identity, e.g., Real-NAI (real user identity, Real Network Access Identity), IMSI ( international mobile subscriber identity code further 1 J, International Mobile Subscriber Identity) , USI ID (Universal Service Interface Identity, etc.).
  • the parameters carried in the foregoing request may further include: attribute parameters of the terminal used by the terminal user, such as a MAC address of the terminal, an MSID of the terminal, and the like.
  • the owner of the home base station can pass the relevant parameters to the household by manual input.
  • Base station The owner of the home base station.
  • Step 503 The home base station initiates an authentication authorization request to the user data server to request the user data server to authorize the terminal user to be a CSG member of the home base station.
  • the authentication authorization request message carries: a real user identifier of the terminal user, the home base station identifier (for example, a global unique identifier of the home base station, a BSID of the home base station, and the like).
  • the home base station identifier for example, a global unique identifier of the home base station, a BSID of the home base station, and the like.
  • the foregoing authentication authorization request message may further include attribute parameters of the terminal used by the terminal user, such as a MAC address of the terminal, an MSID of the terminal, and the like.
  • the home base station may use the shared key with the user data server to encrypt and protect the above-mentioned terminal user's real user identity, the home base station identity, and the attributes of the terminal used by the terminal user, so that only the home base station and the user data are used.
  • the server can read these parameters encrypted.
  • Step 504 The user data server performs authentication and authorization on the request of adding the terminal user to the CSG member of the home base station, where the authentication authorization may be regarded as a preliminary authentication authorization; if the preliminary authentication authorization is passed, the user data server is the The end user assigns the parameter SIS.
  • the authentication and authorization performed by the user data server may include the following operations:
  • End-user to be joined Whether there is a contract relationship between the home operator and the operator to which the home base station belongs. If not, the home base station is not allowed to add the target user as its CSG member.
  • the operator to which the terminal user belongs is the same carrier as the operator to which the home base station belongs, it can be understood that there is a contract relationship between the operator to which the terminal user belongs and the operator to which the home base station belongs.
  • the user data server may generate the parameter SIS according to the identity of the home base station transmitting the authentication authorization request in combination with the real user identity of the terminal user. For example, the user data server checks the profile of the home base station and finds all SIS values associated with the home base station, and then generates a new SIS that is different from these SIS values as the SIS for the end user.
  • the user data server may also directly use the attribute parameters of the terminal used by the terminal user (for example, the MAC address of the terminal and the MSID of the terminal) as the SIS of the terminal user.
  • the user data server may directly generate the parameter SIS by using the real user identifier of the terminal user, for example, hashing the real user identifier of the terminal user, and using the hash value obtained by the hash operation as the parameter SIS.
  • the parameter SIS can correspond to the user's real user identity.
  • the user data server assigns a user identification code to the terminal user.
  • Step 505 The user data server initiates an authentication authorization request to the end user's AAA server to request authorization to add the terminal user as a CSG member of the home base station.
  • the foregoing authentication authorization request message includes: the parameter SIS allocated by the user data server, the real user identifier of the terminal user, and the home base station identifier.
  • the user data server can determine the end user's AAA server by parsing the real user identity of the terminal user (the format is usually user@domain).
  • Step 506 The AAA server authenticates and authorizes the request, where the authentication authorization can be regarded as the final authentication authorization. After the authentication and authorization succeeds, the AAA server saves the SIS carried in the authentication authorization request message, the real user identifier of the terminal user, and the home. Base station identification.
  • the foregoing final authentication and authorization operation may include: the AAA server checks the file of the terminal user to determine whether the terminal user has the right to access through the home base station.
  • Step 507 The AAA server returns an authentication authorization response message to the user data server.
  • the authentication authorization response message needs to include the above parameters.
  • Step 508 The user data server saves the SIS, the real user identifier of the terminal user, and the home base station identifier.
  • the user data server may save the real SIS of the SIS and the end user in the file of the home base station. For example, in the CSG member list of the home base station, the real user identifier of the terminal user is inserted as a new CSG member; and the above parameter SIS is taken as one of the attributes of the member.
  • Step 509 The user data server returns an authentication authorization response to the home base station, and the authorized home base station increases the terminal user as a CSG member of the home base station.
  • the above-mentioned parameter SIS generated by the user data server needs to be carried in at least the authentication authorization response message.
  • the interaction between the user data server and the home base station can be performed through the security gateway so that the parameters and information of the interaction between the two parties are not known by the third party.
  • Step 510 The home base station saves the foregoing parameter SIS, updates its CSG member information, and completes the process of adding the terminal user to its CSG member.
  • the home base station may insert the real user identity of the terminal user as a new CSG member in its locally stored CSG member list; and the above parameter SIS is one of the members' attributes. At this time, given a parameter SIS, the home base station can uniquely determine the real user identity of an end user.
  • the CSG member list stored locally by the home base station may be in the same format as the CSG member list stored in the file of the home base station in the user data server.
  • the solution described in the above embodiment implements the function of adding an end user to a CSG member of a home base station.
  • the CSG information between the home base station and the user data server can be synchronized; at the same time, the home base station, the user data server, and the AAA server of the terminal user can share the parameter SIS allocated by the user data server, that is, The synchronization of the parameter SIS on the home base station, the user data server, and the AAA server.
  • the real user identity of the end user can be uniquely identified on the home base station, on the user data server, and on the AAA server.
  • FIG. 6 is a flowchart of a second embodiment of a CSG member management method of the present invention.
  • a user owner of a home base station
  • the method includes the following steps:
  • Step 601 The same as step 501.
  • Step 602 As described in step 502, the home base station receives a request to add the terminal user to its CSG member. For example, the owner of the home base station increases the terminal user as a CSG member of the home base station through a management interface on the home base station. .
  • the home base station after receiving the above request, the home base station also needs to allocate the parameter SIS to the terminal user.
  • the home base station can check the values of all SIS recorded locally and then generate one with these SIS Different SISs are used as the parameter SIS.
  • the home base station can also directly use the attribute parameters of the terminal used by the terminal user.
  • the parameter SIS (for example, the MAC address of the terminal, the MSID of the terminal) as the parameter SIS.
  • the home base station assigns a user identification code to the terminal user.
  • Step 603 The home base station initiates an authentication authorization request to the user data server to request the user data server to authorize the terminal user to be a CSG member of the home base station.
  • the foregoing authentication and authorization request carries: a real user identifier of the terminal user, the home base station identifier, and the parameter SIS allocated by the home base station.
  • Step 604 The user data server authenticates the request to add the terminal user to the CSG member of the home base station, where the authentication can be regarded as a preliminary authentication authorization.
  • Step 605 The user data server initiates an authentication authorization request to the end user's AAA server to request authorization to add the terminal user as a CSG member of the home base station.
  • the foregoing authentication authorization request message includes: the parameter SIS allocated by the home base station, the real user identifier of the terminal user, and the home base station identifier.
  • the user data server can determine the AAA server of the terminal user by parsing the real user identity of the terminal user.
  • Steps 606 ⁇ 608 Same as steps 506 ⁇ 508.
  • Step 609 The user data server returns an authentication authorization response to the home base station, and the authorized home base station increases the terminal user as a CSG member of the home base station.
  • the parameter SIS is carried in the above-mentioned authentication and authorization response message.
  • Step 610 Same as step 510.
  • FIG. 7 is a flowchart of a third embodiment of a CSG member management method of the present invention.
  • a user owner of a home base station
  • a user data server for example, a home base station owner
  • Step 701 The same as step 501.
  • Step 702 The user data server receives a request to add the terminal user to the CSG member of the home base station.
  • the foregoing request includes at least a home base station identifier and a real user identifier of the terminal user.
  • the foregoing request may further include attribute parameters of the terminal used by the terminal user, such as the MAC address of the terminal, the MSID of the terminal, and the like.
  • Steps 703 ⁇ 707 Same as steps 504 ⁇ 508.
  • Step 708 The user data server sends a message for updating the home base station CSG member information (which may be referred to as a CSG member information update message) to the home base station, by which the user data server may synchronize the CSG member information of the latest home base station to the home. In the base station. All CSG member information related to the home base station.
  • CSG member information which may be referred to as a CSG member information update message
  • the above CSG member information includes at least the real user identifier of the CSG member and the parameter SIS assigned by the user data server.
  • the CSG member information includes at least the real user identifier of the terminal user and the parameter SIS assigned by the user data server.
  • Step 709 As described in step 510, the home base station updates the CSG member information locally saved by the home base station by using the parameters in the CSG member information update message.
  • Step 710 The home base station returns a CSG member information update response to the user data server.
  • FIG. 8 is a flowchart of a fourth embodiment of a CSG member management method according to the present invention.
  • a user owner of a home base station
  • SIS user data server
  • the user data server synchronizes the changed CSG member information to the home base station.
  • the method includes the following steps:
  • Steps 801 - 806 Same as steps 702 ⁇ 707.
  • the user data server may set a flag for the home base station. It is used to indicate whether the CSG member information of the home base station has changed. Alternatively, the user data server may set a flag for each CSG member of the home base station to indicate whether the information of the CSG member has changed.
  • Step 807 The home base station accesses the mobile communication network, and performs an access authentication authorization process of the home base station.
  • Step 808 After the access authentication of the home base station is successful, the user data server returns an authentication success response to the home base station; the response may include CSG member information of the home base station, or may not include the CSG member information of the home base station. .
  • the response may include CSG member information of the home base station, or may not include the CSG member information of the home base station. .
  • the user data server uses the response message to synchronize CSG information with the home base station.
  • the user data server may first send the CSG information of the home base station to the security gateway, and then the security gateway sends the CSG information to the home base station.
  • the access authentication process can be performed simultaneously with the establishment of the security tunnel.
  • the process of sending the authentication success response message to the home base station may be understood as follows:
  • the user data server first sends a message carrying the CSG information of the home base station to the security gateway.
  • the message at this time may be RADIUS (Remote Authentication Dial-In User Service) / Diameter message;
  • the security gateway then forwards the CSG information to the home base station through another message (eg, IKE-AUTH message).
  • step 808 After step 808 is executed, step 811 is directly performed, and steps 809, 810 and 812 are not required to be executed.
  • the authentication success response message may carry an identifier indicating that the CSG member information has changed in the home base station.
  • Step 809 the home base station sends a message to the user data server requesting to update the CSG member of the home base station.
  • the home base station parses the identifier of the CSG member information of the home base station in the authentication success response message, and the household The base station sends a message (which may be referred to as a CSG member information update request message) requesting to update the home base station CSG member to the user data server according to the identifier.
  • Step 810 As described in step 708, the user data server finds that the CSG information of the home base station has changed, and sends a message (which may be referred to as a CSG member information update message) for updating the home base station CSG member information to the home base station.
  • a message which may be referred to as a CSG member information update message
  • Steps 811 ⁇ 812 Same as steps 709 ⁇ 710.
  • FIG. 9 is a flowchart of a fifth embodiment of a CSG member management method according to the present invention.
  • the difference between this embodiment and the fourth embodiment shown in FIG. 8 is: after the home base station accesses the mobile communication network, the user data server is the same. The home base station allocates the parameter SIS. As shown in FIG.
  • Steps 901-906 Basically the same as steps 801-806, except that in the embodiment, steps 901-906 do not process the parameter SIS, ie: In 902, the user data server does not generate the parameter SIS; in step 903, the user data server does not send the parameter SIS to the AAA server; in step 904, the AAA server does not save the parameter SIS; in step 906, the user data server does not save the parameter SIS.
  • Step 907 As in step 807, the home base station accesses the mobile communication network, and performs an access authentication authorization process of the home base station.
  • Step 908 As described in step 802 (step 504), the user data server assigns a parameter SIS to the end user newly joining the CSG.
  • Steps 909 ⁇ 911 The user data server synchronizes the above-mentioned parameter SIS assigned to the AAA server, and the AAA server saves the parameter SIS.
  • the user data server needs to allocate one SIS for each terminal user, and simultaneously synchronize the allocated SIS to the respective users.
  • the AAA server is saved.
  • Step 912 Same as step 808. If the authentication success response message carries the home base station
  • the CSG member information then jumps to step 915, and steps 913, 914 and 916 do not need to be executed; otherwise, execution proceeds from step 913.
  • Steps 913 ⁇ 916 Same as steps 809 ⁇ 812. It should be noted that, as a variant of this embodiment, steps 908-911 may occur before the home base station accesses the mobile communication network, performs access authentication authorization of the home base station, or may perform access authentication authorization at the home base station. after that. For example, steps 908-911 may occur at any time after step 912, prior to step 914. However, if the authentication success message in step 912 needs to carry the CSG information of the home base station, steps 909-911 must be performed at the location shown in FIG.
  • the CSG member managing the home base station requires the owner of the home base station, the user data server, and the AAA server to authenticate and authorize.
  • the operation of managing the CSG members of the home base station may not require the authentication and authorization of the AAA server, and the modifications and modifications of the first embodiment to the fifth embodiment can meet the requirements of the scenario. There is no essential difference.
  • the deformation will be described in detail below by taking the first embodiment as an example.
  • FIG. 10 is a flowchart of a sixth embodiment of the CSG member management method of the present invention.
  • the difference between this embodiment and the first embodiment shown in FIG. 5 is that the AAA server does not perform authentication and authorization for the CSG member management operation; the specific steps are as follows:
  • Steps 1001 ⁇ 1003 Same as steps 501 ⁇ 503.
  • Step 1004 It is basically the same as step 504. The difference is that, in this step, the user data server performs a final authentication and authorization on the request for adding the CSG member.
  • the specific authentication and authorization method refer to step 504. After the authentication and authorization is passed, follow step 504. The method described assigns a parameter SIS.
  • Step 1005 The user data server sends a CSG information update message to the AAA server.
  • the message carries: the home base station identifier, the real user identifier of the terminal user, and the parameter SIS assigned by the user data server.
  • Step 1006 After receiving the CSG information update message, the AAA server saves the information such as the parameter SIS, the real user identifier of the terminal user, and the home base station identifier carried in the message locally.
  • Step 1007 The AAA server returns a CSG information update response message to the user data server.
  • the user data server does not save or cache the SIS, the real user identifier of the terminal user, and the home base station identifier in step 1004, the CSG information update response message needs to carry the above parameters.
  • Step 1008 The user data server receives the CSG information update response from the AAA server. After the message, if the user data server does not save the SIS, the real user identifier of the terminal user, and the home base station identifier in step 1004, the method described in step 508 needs to be performed to save the parameters locally in the user data server.
  • Steps 1009 ⁇ 1010 Same as steps 509 ⁇ 510.
  • the sixth embodiment of the CSG member management method is a modification of the first embodiment.
  • the main difference between the two is that the steps 504 to 508 of the first embodiment are transformed into steps 1004 to 1008.
  • steps 604 to 608 of the second embodiment are modified to steps 1004 to 1008; steps 703-707 of the third embodiment are converted to steps 1004 to 1008; steps 802 to 806 of the fourth embodiment are converted to steps 1004 to 1008; Steps 902 ⁇ 906 are transformed into steps 1004 ⁇ 1008.
  • the CSG information after the change does not necessarily need to be notified to the AAA server of the terminal user.
  • Appropriate modifications and modifications to the first embodiment to the fifth embodiment of the present invention can satisfy the requirements of the scenario. The above description will be described in detail below by taking the first embodiment as an example.
  • FIG. 11 is a flowchart of a seventh embodiment of the CSG member management method of the present invention.
  • the difference between the embodiment and the embodiment 1 shown in FIG. 5 is that the entire process does not require the participation of the AAA server; as shown in FIG.
  • the method includes the following steps:
  • Steps 1101 ⁇ 1103 Same as steps 501 ⁇ 503.
  • Step 1104 The user data server performs final authentication and authorization on the request to add the terminal user to the CSG member of the home base station, and allocates the parameter SIS according to the method described in step 504.
  • Step 1105 The user data server saves the parameter SIS, the real user identity of the terminal user, and the home base station identity according to the method described in step 508.
  • Steps 1106 ⁇ 1107 Same as steps 509 ⁇ 510.
  • the seventh embodiment of the CSG member management method is a simplified modification of the first embodiment. Specifically, the seventh embodiment deletes the steps 505-507 of the first embodiment, and the steps 504 and 508 are appropriately modified. (Change to the method described in steps 1104 and 1105).
  • steps 605-607 of the second embodiment may be deleted, and steps 604 and 608 are modified by the same method; steps 704-706 of the third embodiment may be deleted, and steps 703 and 707 are modified by the same method; Steps 803 ⁇ 805 of the fourth can be deleted, and steps 802 and 806 are modified in the same manner; steps 903 ⁇ 905, 909 ⁇ 911 of the fifth embodiment can be deleted.
  • Figure 12 is a flow chart showing an eighth embodiment of the CSG member management method of the present invention.
  • the parameter SIS is allocated by the home base station or the user data server and synchronized to the AAA server.
  • the allocation parameter SIS can be implemented, and the AAA server of the end user can also implement the allocation parameter SIS.
  • the principle is the same as the above embodiments, the only difference is that the execution point of the allocation parameter SIS is put into the AAA. There is no essential difference on the server. The difference will be described in detail below by taking the first embodiment as an example. Specific steps are as follows:
  • Steps 1201 ⁇ 1203 Same as steps 501 ⁇ 503.
  • Step 1204 The method as described in step 504, the user data server performs preliminary authentication and authorization on the request of adding the terminal user to the CSG member of the home base station; different from step 504, in this step, the user data server does not Assign the parameter SIS to the end user.
  • Step 1205 The user data server initiates an authentication authorization request to the AAA server to request to add the terminal user to the CSG member of the home base station.
  • the authentication authorization request message carries at least the real user identifier of the terminal user and the home base station identifier.
  • the user data server can determine the AAA server of the terminal user by parsing the real user identity of the terminal user.
  • Step 1206 In the method described in step 506, the AAA server authenticates and authorizes the request for adding the CSG member, and the authentication authorization in this step can be regarded as the final authentication authorization. After the authentication and authorization succeeds, the AAA server allocates parameters to the terminal user. SIS.
  • the AAA server may generate a unique parameter SIS according to the identity of the home base station transmitting the authentication authorization request and the home operator identity (e.g., NSP-ID) of the terminal user.
  • the home operator identity e.g., NSP-ID
  • the AAA server can directly use the attribute parameters of the terminal used by the terminal user (for example, the MAC address of the terminal and the MSID of the terminal) as the SIS of the terminal user.
  • the attribute of the terminal The number can be obtained from the above request to increase the CSG member; or the AAA server obtains it locally.
  • the attribute parameters (MAC address, MSID, etc.) in the user profile are saved in the user profile.
  • the AAA server can use the upper limit. In this case, the AAA server is used. Assign the user ID to the end user.
  • Step 1207 The AAA server returns an authentication and authorization response message to the user data server.
  • the message carries at least the parameter SIS allocated by the AAA server.
  • the authentication authorization response message also needs to carry parameters such as the terminal user identifier and the home base station identifier.
  • Steps 1208 ⁇ 1210 Same as steps 508 ⁇ 510.
  • the eighth embodiment of the CSG member management method is a modification of the first embodiment.
  • the main difference between the two is that the steps 504 to 508 of the first embodiment are transformed into steps 1204 to 1208.
  • steps 703 to 707 of the third embodiment are converted to steps 1204 to 1208; and steps 802 to 806 of the fourth embodiment are converted to steps 1204 to 1208.
  • steps 908 to 911 need to be modified to steps 908' to 911', which are described as follows:
  • Step 908' not executed
  • Step 909 the user data server sends a message to the AAA server to request the AAA server to obtain the parameter SIS of the terminal user.
  • the request includes at least the real user identifier of the terminal user and the home base station identifier.
  • the request may further include the terminal.
  • the attribute parameters of the terminal used by the user such as the MAC address of the terminal, MSID, and so on.
  • Step 910' As described in step 1106, the AAA server allocates and saves the parameter SIS of the end user.
  • Step 91 The AAA server returns a response message to the user data server; the response message carries at least the parameter SIS assigned by the AAA server to the terminal user; after receiving the response message, the user data server performs the method described in step 510.
  • the parameter SIS generated by the AAA server is saved, and its CSG member information is updated.
  • the operation of managing the CSG members of the home base station may not require the AAA server for authentication authorization.
  • This scenario can be achieved by appropriately modifying the eighth embodiment.
  • the above-described modification on the basis of the eighth embodiment is consistent with the principle of the modification of the first embodiment and the first embodiment, and there is no essential difference; specifically, only the authentication authorization request of step 1205 is changed to the CSG information update message. The authentication 4 authorized response of step 1207 is changed to the CSG information update response message; and the authentication and authorization operation in step 1206 is cancelled.
  • the user data server may be an authentication and authorization accounting server (AAA server) of the home base station, or may be a server dedicated to CSG member management, for example, a management system. System ), Network Management System, etc.
  • AAA server authentication and authorization accounting server
  • the home base station may be an authentication and authorization accounting server (AAA server) of the home base station, or may be a server dedicated to CSG member management, for example, a management system. System ), Network Management System, etc.
  • the home base station identifier needs to be used when allocating and synchronizing the parameter SIS of the terminal user; if the above factors are not considered, the terminal user is allocated and synchronized.
  • the parameter SIS may not use the home base station identity.
  • the AAA servers of different operators may be respectively Different users are assigned the same parameter SIS, that is, a parameter SIS on the home base station and the user data server corresponds to the real user identity of different end users; in this case, the parameter SIS needs to be associated with the home base station identity and the network identity.
  • the combination can be used to uniquely identify the real user identifier of an end user. Therefore, when the parameter SIS and the real user identifier of the terminal user are stored on the home base station and the user data server, the corresponding network identifier needs to be stored at the same time.
  • Example ten 13 is a flowchart of a method for a terminal user to access a mobile communication network through the home base station system shown in FIG. 1 according to the tenth embodiment of the present invention; in this embodiment, the AAA server searches for the parameter SIS of the terminal user, and transmits it to The home base station, the home base station maps the parameter SIS to the real user identifier of the terminal user, and then uses the real user identifier of the terminal user and the corresponding CSG information to perform access control on the terminal user.
  • the specific steps include the following steps:
  • Step 1301 Perform air interface parameter synchronization and ranging between the terminal and the home base station.
  • Step 1302 The terminal requests to negotiate the authentication capability (such as the user's authentication policy, etc.), and completes the capability negotiation work with the home base station and the access gateway.
  • the authentication capability such as the user's authentication policy, etc.
  • Step 1303 The access gateway starts an EAP authentication process, and sends a user identity request to the home base station, and the home base station forwards the request to the terminal.
  • Step 1304 After receiving the user identity request, the terminal replies with the user identity response to the home base station, where the terminal user carries the pseudo identity, and the home base station transparently transmits the response to the access gateway.
  • the terminal may also transmit terminal attribute parameters such as a terminal identifier (e.g., MSID) and a MAC address of the terminal to the home base station, and the home base station may save the information in the context.
  • terminal attribute parameters such as a terminal identifier (e.g., MSID) and a MAC address of the terminal to the home base station, and the home base station may save the information in the context.
  • the pseudo-identity of the above-mentioned terminal users mainly serves as a route, and the terminal user may change every time accessing the network.
  • Step 1305 After receiving the user identity response, the access gateway sends an access request message to the AAA server, and carries the pseudo identity of the terminal user, the working mode of the home base station, and the identification of the home base station.
  • the access gateway can distinguish whether the terminal accesses the home base station or the ordinary macro base station. For example, the access gateway may judge according to the information that it owns, or may judge according to the information reported by the home base station (for example, when the home base station can send the user identity response, the home base station transmits the indication that it is the home base station to the access gateway) .
  • the home base station working mode information is used to identify that the home base station operates in a closed mode, or an open mode, or a mixed mode.
  • the access gateway may judge according to the information that it owns, or may judge according to the information reported by the home base station (for example, when the home base station can send the user identity response, it simultaneously transmits its working mode to the access gateway).
  • Step 1306 The AAA server uses the AAA server and the terminal based on the pseudo identity of the terminal user.
  • the authentication method is negotiated, and the authentication process of the terminal is initiated.
  • the AAA server can obtain the real user identifier of the terminal user in a secure manner.
  • An authentication method for supporting the real user identity of the hidden terminal user may be used between the terminal and the AAA server, such as the EAP-AKA method, or the EAP-TTLS (Extensible Authentication Protocol-Tunneled Transport Layer Security). Security) and other methods for access authentication. These authentication methods enable the AAA server to secure the security and privacy of the real user identity of the end user while obtaining the real user identity of the end user.
  • Step 1307 After the AAA server passes the authentication of the terminal user, the AAA server searches for the CSG information related to the terminal user by using the real user identifier of the terminal user acquired in the authentication process, where the parameter SIS of the terminal user is included. .
  • the AAA server can use the real user identity of the end user and look up the SIS of the end user in conjunction with the home base station identity (eg, BSID). For example, the AAA server can look up the end user's SIS in the end user's user profile.
  • the home base station identity eg, BSID
  • the end user's SIS can be requested from the user data server.
  • the AAA server performs this step only when the terminal performs access authentication through the home base station.
  • the AAA server can determine whether the terminal is accessed by the home base station (for example, by using the base station identifier), or can be determined according to the prompt from the access gateway (for example, by using the home base station working mode information brought by the access gateway). Or, the AAA server performs this step only when the terminal performs access authentication through the home base station, and the home base station works in the closed mode or the mixed mode. In this case, the AAA server may prompt according to the access gateway. To judge (for example, by using the home base station operating mode information brought by the access gateway).
  • Step 1308 The AAA server sends an access success message to the access gateway, indicating that the user access is accepted (including the authentication success message, indicating that the authentication succeeds), and the message needs to carry the CSG information related to the terminal user, where at least End user's SIS.
  • the AAA server may not carry the SIS value in the access success message or carry a meaningless SIS value (for example, null value (NONE)).
  • Step 1309 The access gateway successfully forwards the authentication in the access success message by using the EAP forwarding message.
  • the information is forwarded to the home base station, and carries the CSG information related to the terminal user, where at least the SIS of the terminal user is included.
  • Step 1310 After receiving the EAP forwarding message, the home base station uses the parameter SIS of the terminal user carried in the message to search for the corresponding real user identifier, and uses the real user identifier used by the terminal and the corresponding CSG information to perform access control on the terminal user. .
  • the access control operation may further include: The base station assigns different access priorities and the like to end users belonging to CSG members and end users not belonging to CSG members.
  • the home base station can perform the access control operation by combining the real user identity of the terminal user with the attribute parameters of the terminal (such as the MSID, the MAC address of the terminal) and the CSG information. For example, the home base station determines whether the terminal is a CSG member by using the real user identifier of the terminal user, and determines, according to the attribute parameter of the terminal, whether the terminal user uses the specific terminal that is pre-designated for the terminal; if the terminal user is a CSG member, and uses The above specific terminal access allows it to access (or assign a high access priority), otherwise it is not allowed to access (or assign a low access priority).
  • the attribute parameters of the terminal such as the MSID, the MAC address of the terminal
  • the home base station can simply assume that the user is not a CSG member.
  • the home base station when the home base station is in the closed mode and the end user is not a CSG member, the home base station should mark that the home base station access failed (i.e., does not allow access).
  • Step 1311 The home base station forwards the authentication success message to the terminal by using the EAP forwarding message.
  • step 1312 the other processes related to user access are continued.
  • the CSG-related user access procedure controlled by the home base station can be implemented. If the home base station determines that the access fails (for example, in step 1310, the home base station is in the closed mode and the terminal user is not a CSG member of the home base station), the home base station may force the terminal to perform the retreat after the access authentication is completed. Network process. Embodiment 11
  • the AAA server may not have the parameter SIS of the terminal user. In this scenario, the AAA server needs to obtain the terminal from the user data server. User's parameter SIS.
  • FIG. 14 is a flowchart of a method for a terminal user to access a mobile communication network through the home base station system shown in FIG. 1 according to the eleventh embodiment of the present invention; in this embodiment, the AAA server obtains the parameter SIS of the terminal user from the user data server, And the home base station is configured to map the parameter SIS to the real user identifier of the terminal user, and then use the real user identifier of the terminal user and the corresponding CSG information to perform access control on the terminal user. :
  • Steps 1401 ⁇ 1406 Same as steps 1301 ⁇ 1306.
  • Step 1407 The AAA server initiates a CSG information acquisition request to the user data server by using the real user identifier of the terminal user acquired in the access authentication process, to request to obtain CSG information related to the user.
  • the request message carries the terminal user.
  • the real user identity and the identity of the home base station eg, BSID, etc.
  • the AAA server can find a corresponding user data server according to the home base station identifier.
  • the AAA server only needs to perform this step if the home base station is in the closed mode or the mixed mode.
  • the AAA server can determine the working mode of the home base station according to the prompt of the access gateway (for example, determining the working mode of the home base station by using the home base station working mode information brought by the access gateway).
  • Step 1408 After receiving the CSG information obtaining request, the user data server searches for CSG information related to the terminal user, where the parameter SIS of the terminal user is included.
  • the user data server can use the real user identifier of the end user in combination with the identity of the home base station (such as BSID) to uniquely find the parameter SIS of the end user.
  • the identity of the home base station such as BSID
  • Step 1409 The user data server returns the CSG information related to the terminal user to the AAA server, where the CSG information includes at least the parameter SIS of the terminal user. If the user data server cannot find the parameter SIS of the terminal user, the parameter SIS may not be returned to the AAA. , or return a meaningless SIS value (for example, null (NONE)). Steps 1410 to 1414: Same as steps 1308 to 1312.
  • Figure 15 is a flow chart showing a method for a terminal user to access a mobile communication network through the home base station system shown in Figure 1 in a twelfth embodiment of the present invention.
  • the access gateway transmits the parameter SIS sent by the AAA server to the home base station by using the EAP forwarding message, and the access gateway may also transmit the parameter SIS to the home base station by using a key change indication message;
  • the specific steps after the above deformation is carried out in the tenth embodiment are as follows:
  • Steps 1501 ⁇ 1508 Same as steps 1301 ⁇ 1308.
  • Step 1509 The access gateway forwards the authentication success message to the home base station through the EAP forwarding message.
  • Step 1510 The access gateway sends a key change indication message to the home base station, where the message carries the CSG information related to the terminal user, where at least the parameter SIS of the terminal user is included.
  • Step 1511 Same as step 1310.
  • Step 1512 Same as step 1312.
  • the embodiment shown in Figures 13 ⁇ 15 can also have various transformation modes, for example:
  • the home base station uses the parameter SIS to search for the corresponding real user identifier, and uses the real user identifier to perform access control on the terminal user.
  • the parameter SIS may also be established.
  • the home base station directly uses the terminal user's parameter SIS for access control in step 1310.
  • the AAA server sends the parameter SIS of the terminal user to the home base station through the access gateway, and the home base station uses the parameter SIS to search for the corresponding real user identifier, and uses the real user identifier to access the terminal user.
  • the AAA server may directly send the real user identifier of the terminal user to the home base station through the access gateway, and the home base station directly uses the real user identifier of the terminal user for access control.
  • the access gateway cannot be prevented from acquiring the real user identifier of the terminal user, and therefore usually does not Applicable when the access gateway and the AAA server do not belong to the same carrier. Even if the access gateway and the AAA server belong to the same carrier, the security of the connection between the access gateway and the AAA server is not guaranteed. Be applicable.
  • the AAA server needs to combine the home base station identity when searching for the parameter SIS of the terminal user by using the real user identity of the terminal user. If the value of the SIS is globally unique, the AAA server can find only one parameter SIS locally or from the user data server using the real user identity of the end user, and the home base station identity may not be used.
  • the home base station acquires the parameter SIS of the terminal user from the AAA server.
  • the home base station may also directly acquire the terminal user from the terminal.
  • the parameter SIS for example, when the attributes of the terminal (such as MAC address, MSID, etc.) are directly used as the parameter SIS (see the related description of step 504). In this case, the home base station does not have to wait for the AAA server to return the parameters of the end user to it.
  • the terminal may use any message that interacts with the home base station to send the attribute of the terminal to the home base station, for example, the air interface parameter synchronization and ranging message of step 1301, and the measurement of step 1302.
  • the capability negotiation message, the user identification response of step 1304, and the like can immediately perform access control to the end user after obtaining the parameter SIS.
  • the home base station may also perform the following operations using the real user identity or the corresponding SIS: the mobile terminal switches from the macro base station to the home base station; The location update is performed under the home base station; the mobile terminal performs idle mode exit under the home base station, and re-enters the network and the like.
  • the embodiment shown in Figs. 5 to 15 is based on the model shown in Fig. 1 in accordance with the basic principle of the present invention.
  • the model shown in Fig. 2 can be applied as well.
  • the security gateway in FIG. 1 (FIG. 2) can be set separately from the access gateway, or can be set up with the access gateway, and does not even need the full gateway.
  • the method provided by the present invention does not conflict, and the same applies. I will not repeat them here.
  • the user data server may also be referred to as an AAA server of a home base station, or is referred to as As a CSG server for a home base station.
  • the user data server may not need to carry the request in the request sent to the AAA server (for example, the authentication authorization request message in step 505) The home base station identifier.
  • the present invention also provides a user access system and a closed subscriber group subscriber management system implementing the above method.
  • the user access system includes: a home base station, a security gateway, an access gateway, an AAA server, and a user data server; wherein, the user data server
  • the user data server can be connected to the home base station through a security gateway or directly connected to the home base station, or through the access gateway to the home base station, or through the access gateway and the security gateway; the user data server is connected to the AAA server.
  • the functions of the network elements in the system and the connection relationship (message interaction relationship) between the network elements are described in detail in the description of the method embodiments shown in FIGS. 13-15.
  • the structure diagram of the closed user group user management system in the embodiment of the present invention is the same as the structure of the user access system; as shown in FIG. 16, the closed user group user management system includes: a home base station, a security gateway, an access gateway, an AAA server, and a user data server; wherein the user data server can be connected to the home base station through a security gateway or directly connected to the home base station through the access gateway, or connected to the home base station through the access gateway and the security gateway; the user data server is connected to the AAA server .
  • the function of each network element in the system and the connection relationship (message interaction relationship) between the network elements are described in detail in the description of the method embodiments shown in FIGS. 5-12.
  • the present invention not only fills in the blanks of the current CSG user management method and system, but also avoids frequently transmitting the user's real identity in the air interface during the user access control, and provides the user identity privacy protection, which reduces the The security risks of the home base station system.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

用户接入方法及系统、 闭合用户组用户管理方法及系统 技术领域
本发明涉及通信领域, 尤其涉及一种用户接入方法及系统、 闭合用户组 用户管理方法及系统。
背景技术
为了给用户提供更高的业务速率并降低使用高速率服务所需要的费用, 同时, 为了弥补已有分布式蜂窝无线通信系统覆盖的不足, 通常会在家庭、 办公区域等场所设置家用基站。 家用基站是一种小型、 低功率的基站, 具有 实惠、 便捷、 低功率输出等优点。
图 1和图 2是包含家用基站的通信网络示意图。 如图 1和图 2所示, 家 用基站可以通过接入网关这个逻辑网元接入到核心网。
家用基站和接入网关之间可以存在一个安全网关。 安全网关可以与接入 网关合设也可以与接入网关分设。 安全网关的主要作用是保障家用基站和接 入网关、 用户数据服务器之间的链路安全。
接入网关的主要功能包括: 验证家用基站的安全性、 处理家用基站的注 册、 对家用基站进行运行维护管理、 根据运营商的要求对家用基站进行配置 和控制、 在核心网和家用基站之间进行数据交换。
鉴权授权计费 ( Authentication\Authorization\Accounting, 简称为 AAA ) 服务器是通信网络中的重要设施, 用于实现网络运营商对数据、 用户的控制 和管理, 提供认证授权及账户服务, 通常与网络访问控制、 网关服务器、 数 据库以及用户信息目录等协同工作。
在家用基站系统中存在闭合用户组(Closed Subscriber Group, 简称为 CSG ) 的概念, 允许用户接入一个或多个访问受限的 CSG Cell (基站) 。 家 用基站的工作模式可分为闭合模式、 混合模式和开放模式。
当家用基站的工作模式是闭合模式时,只有该家用基站所属 CSG的用户 可以接入该家用基站并享受该家用基站提供的业务; 当家用基站的工作模式 是开放模式时, 任何用户都可以接入该家用基站, 此时的家用基站等同于宏 基站使用; 当家用基站的工作模式是混合模式时, 既允许 CSG用户接入, 同 时也允许其他用户接入使用,不过会根据用户是否属于 CSG列表来区分不同 的用户类型、 实现差异化的服务质量处理, 也就是说 CSG用户在使用混合模 式家用基站的时候具有更高的业务优先级,拥有更好的服务质量和业务类别。
用户数据服务器用于存储家用基站的签约信息, 如家用基站允许接入的 用户, 即 CSG相关信息 (其中包含 CSG成员信息)等。
家用基站的 CSG成员信息一般存放在家用基站本地以及网络侧的用户 数据服务器中, 且这两处保存的数据是同步的, 即无论是在家用基站本地, 还是在用户数据服务器上修改了家用基站的 CSG成员信息,都需要在两者之 间执行同步操作。 而且, 一般来说, 修改家用基站的 CSG成员信息需要征得 家用基站拥有者和运营商 (即用户数据服务器)双方的同意。
当终端用户进行网络接入时,处于闭合模式的家用基站会利用 CSG成员 信息对终端用户进行接入控制, 若终端用户不是其 CSG成员用户, 闭合模式 家用基站将拒绝该终端用户接入网络; 处于混合模式的家用基站根据 CSG成 员信息进行用户类别(如, CSG用户、 非 CSG用户)的区分, 便于实施差异 化计费、 服务质量授权等操作, 若终端用户不是其 CSG成员用户, 家用基站 将只会对其提供低优先级服务。 为了简化描述, 以下将家用基站判断用户是 否属于 CSG列表(即判断用户是否为该家用基站的 CSG用户) 的操作称为 接入控制。
图 3为现有技术中终端用户以图 1所示的系统参考模型接入家用基站的 方法流程图; 在该流程中, 家用基站根据终端用户发送的用户标识来检查该 终端用户是否属于 CSG列表(即是否为该家用基站的 CSG用户) , 具体包 括如下步骤:
步骤 301 , 终端请求进行鉴权认证能力 (例如, 用户的认证策略等) 的 协商, 并与基站、 接入网关完成鉴权认证能力的协商工作。
步骤 302 , 接入网关向家用基站发送用户标识请求, 家用基站将该请求 转发给终端。 步骤 303 , 收到用户标识请求消息后, 终端向家用基站回复用户标识响 应, 其中携带用户标识信息, 如 NAI ( Network Access Identifier , 网络接入标 识 ) 、 IMSI ( International Mobile Subscriber Identification Number, 国际移动 客户识别码) 。
步骤 304, 家用基站根据上述用户标识信息对终端用户进行接入控制。 闭合模式的家用基站检查该终端用户是否存在于 CSG列表中, 如果存 在, 则允许终端用户接入, 执行步骤 305; 否则拒绝终端用户接入, 并且可 以发起用户释放流程。
混合模式的家用基站检查该终端用户是否存在于 CSG列表中, 如果存 在, 则在后续流程中告知接入网关该终端用户为 CSG用户, 如果不存在, 则 在后续流程中告知接入网关该用户为非 CSG用户。
步骤 305 , 家用基站向接入网关发送用户标识响应, 其中携带上述用户 标识信息。
本步骤与步骤 304不分先后顺序, 可以与步骤 304并行执行。
步骤 306, AAA服务器与终端交互, 执行用户鉴权流程, 通过用户鉴权 流程 AAA服务器完成对用户合法性的审核, 并授权用户执行业务。
步骤 307 , 继续执行与用户接入相关的其他流程。
由以上描述可知, 在步骤 304中, 家用基站需要根据终端发送的用户标 识响应中携带的用户标识信息进行接入控制, 检查该终端用户是否为该家用 基站的 CSG成员。 因此, 在步骤 303中, 需要强制终端传递终端用户的真实 用户标识, 且此消息是以明文方式来传递的, 无法保证安全性和私密性。 这 就带来了安全隐患, 例如该终端用户的真实用户标识暴露以后, 会给恶意攻 击者以跟踪该终端用户的通信以及业务的机会, 对于保护终端用户的隐私和 安全不利。
需要注意的是, 在步骤 306中, AAA服务器需要知道终端用户的真实用 户标识, 但是, 出于安全的考虑, 终端与 AAA服务器之间会釆用支持隐藏终 端用户的真实用户标识的鉴权方法,来到达使 AAA服务器得到终端用户的真 实用户标识的目的, 例如使用 EAP ( Extensible Authentication Protocol, 可扩 Key Agreement, 可扩展认证协议 -认证和密钥协商)方法。 该方法能够隐藏终 端用户的真实用户标识,使得终端用户的真实用户标识只对终端和 AAA服务 器可见, 而家用基站无法在步骤 306中获取被该方法隐藏的真实用户标识。 而在 EAP消息中以明文方式传递的用户标识是一个终端用户的伪标识(其作 用是主要用于路由) , 虽然家用基站可以解析该标识, 但是由于其不是真实 用户标识, 所以无法使用该标识在家用基站上进行上述接入控制。 也就是说, 即使将接入控制操作放在步骤 306之后进行, 家用基站也无法获得真实的用 户标识, 用以进行接入控制, 而只能使用终端在步骤 303中以明文的方式传 递的真实的用户标识信息进行接入控制, 造成了安全隐患。 安全隐患外, 釆用图 3所示的方法在步骤 305中也需要以明文方式向接入网 关传递真实的用户标识。 由于接入网关与 AAA服务器可能属于不同的运营 商, 以明文方式向接入网关传递真实的用户标识会暴露用户的隐私。
发明内容
本发明所要解决的技术问题是, 克服现有技术的不足, 提供一种可增强 安全性的用户接入方法及系统, 以及与之相关的闭合用户组用户管理方法及 系统。
为了解决上述问题, 本发明提供一种用户接入方法, 该方法包括: 终端接收到接入网关发送的用户标识请求后, 通过家用基站向接入网关 发送用户标识响应消息, 该消息中携带终端用户的伪标识; 接入网关将所述 伪标识发送给鉴权授权计费 AAA服务器;
AAA服务器使用所述伪标识发起对终端用户的鉴权流程,在所述鉴权流 程中获取终端用户的真实用户标识;
AAA服务器将接入成功消息发送给所述家用基站;
从而实现使家用基站通过真实用户标识、 或真实用户标识对应的用户标 识代号对终端用户接入无线通信网进行控制, 其中所述用户标识代号由家用 基站或用户数据服务器或 AAA服务器在管理家用基站的闭合用户组 CSG成 员的过程中为该终端用户分配。
此外, 所述方法在通过家用基站向接入网关发送用户标识响应消息的所 述步骤之前还包括:
终端将真实用户标识对应的用户标识代号通过无线空口发送给家用基 站, 家用基站使用所述用户标识代号, 或者将所述用户标识代号对应成所述 真实用户标识后, 对终端用户进行接入控制。
此外, 上述方法中, 进行接入控制的所述步骤包括:
家用基站使用所述真实用户标识或所述用户标识代号判断所述终端用户 是否为所述家用基站的 CSG成员。 如果是, 则允许所述终端用户接入或为其 分配高接入优先级, 并继续执行后续的步骤; 否则不允许所述终端用户接入 或为其分配低接入优先级, 如果判定不允许所述终端用户接入, 则结束流程; 如果判定为所述终端用户分配低接入优先级, 则继续执行后续的步骤。
或者,
家用基站使用所述真实用户标识或所述用户标识代号判断所述终端用户 是否为所述家用基站的 CSG成员,并根据所述终端的属性参数判断所述终端 用户是否使用预先指定的终端接入。 如果所述终端用户是 CSG成员, 且使用 预先指定的终端接入, 则允许所述终端用户接入或为其分配高接入优先级, 并继续执行后续的步骤; 否则不允许所述终端用户接入或为其分配低接入优 先级, 如果判定不允许所述终端用户接入, 则结束流程; 如果判定为所述终 端用户分配低接入优先级, 则继续执行后续的步骤。
此外, AAA服务器将接入成功消息通过接入网关发送给所述家用基站的 所述步骤包括:
AAA服务器向接入网关发送接入成功消息, 所述接入成功消息中携带 AAA服务器在鉴权流程中所获取的真实用户标识对应的用户标识代号;
接收到所述接入成功消息后,接入网关通过可扩展认证协议 EAP转发消 息或密钥改变指示消息将所述真实用户标识或所述用户标识代号发送给家用 基站。 此外, 上述方法还包括: AAA服务器通过如下方式之一获取所述真实用 户标识的用户标识代号:
AAA服务器使用所述真实用户标识、或使用所述真实用户标识结合所述 家用基站的标识在本地获取所述用户标识代号; 或
AAA服务器使用所述真实用户标识、或使用所述真实用户标识结合所述 家用基站的标识从用户数据服务器获取所述用户标识代号。
此外, 所述方法还包括: 家用基站使用所述真实用户标识或所述用户标 识代号, 或者将所述用户标识代号对应成所述真实用户标识后, 对终端用户 进行接入控制。
此外, 所述用户标识代号具有如下特征:
在家用基站上, 一个用户标识代号、 或一个用户标识代号结合一个网络 标识对应一个终端用户的真实用户标识;
和 /或,
在 AAA服务器上,一个终端用户的真实用户标识、或一个终端用户的真 实用户标识结合一个家用基站标识对应一个终端用户的用户标识代号;
和 /或,
在用户数据服务器上, 一个终端用户的真实用户标识、 或一个终端用户 的真实用户标识结合一个家用基站标识、 或一个终端用户的真实用户标识结 合一个家用基站标识和一个网络标识对应一个终端用户的用户标识代号。
此外, 家用基站釆用如下方式之一对终端用户进行接入控制:
家用基站使用所述真实用户标识或所述用户标识代号判断所述终端用户 是否为该家用基站的 CSG成员; 如果所述终端用户是该家用基站的 CSG成 员, 则允许其接入或为其分配高接入优先级, 否则不允许其接入或为其分配 低接入优先级; 或
家用基站使用所述真实用户标识或所述用户标识代号判断所述终端用户 是否为该家用基站的 CSG成员,并根据所述终端的属性参数判断所述终端用 户是否使用为其预先指定的终端接入; 如果所述终端用户是 CSG成员, 且使 用为其预先指定的终端接入, 则允许其接入或为其分配高接入优先级, 否则 不允许其接入或为其分配低接入优先级。
本发明还提供一种闭合用户组用户管理方法, 该方法包括:
家用基站接收到将终端用户增加为其闭合用户组 CSG成员的 CSG成员 管理请求后,请求用户数据服务器、或请求用户数据服务器和 AAA服务器授 权将所述终端用户增加为该家用基站的 CSG成员;
用户数据服务器、 或用户数据服务器和 AAA服务器对所述 CSG成员管 理请求进行认证授权, 认证授权通过后保存更新的 CSG成员信息, 并授权将 所述终端用户增加为所述家用基站的 CSG成员;
用户数据服务器、或用户数据服务器和 AAA服务器授权后, 家用基站将 所述终端用户增加为 CSG成员, 并保存更新的 CSG成员信息;
所述 CSG成员信息中包含: 所述终端用户的真实用户标识、 或所述家用 基站标识、 或所述终端用户的真实用户标识和所述家用基站标识。
此外, 家用基站接收到所述 CSG成员管理请求后, 还为所述终端用户分 配用户标识代号, 并将其与所述终端用户的真实用户标识一起或将其与所述 终端用户的真实用户标识和所述家用基站标识一起发送给用户数据服务器、 或发送给用户数据服务器和 AAA服务器; 或
用户数据服务器认证授权通过后 ,还为所述终端用户分配用户标识代号 , 并将其发送给家用基站、 或将其发送给家用基站并将其与所述终端用户的真 实用户标识一起或将其与所述终端用户的真实用户标识和所述家用基站标识 一起发送给 AAA服务器; 或
AAA服务器认证授权通过后, 还为所述终端用户分配用户标识代号, 并 将其发送给家用基站和用户数据服务器;
所述 CSG成员信息中还包含: 所述用户标识代号。
此外, 用户数据服务器认证授权通过后, 还向 AAA服务器发送 CSG信 息更新消息, 该消息中携带所述终端用户的真实用户标识、 或携带所述终端 用户的真实用户标识和所述家用基站的标识;
接收到所述 CSG信息更新消息后, AAA服务器为所述终端用户分配用 户标识代号, 并将所述用户标识代号发送给用户数据服务器和家用基站; 所述 CSG成员信息中还包含: 所述用户标识代号。
此外, 所述用户标识代号具有如下特征:
在家用基站上, 一个用户标识代号、 或一个用户标识代号结合一个网络 标识对应一个终端用户的真实用户标识;
和 /或,
在 AAA服务器上,一个终端用户的真实用户标识、或一个终端用户的真 实用户标识结合一个家用基站标识对应一个终端用户的用户标识代号;
和 /或,
在用户数据服务器上, 一个终端用户的真实用户标识、 或一个终端用户 的真实用户标识结合一个家用基站标识、 或一个终端用户的真实用户标识结 合一个家用基站标识和一个网络标识对应一个终端用户的用户标识代号。
本发明还提供一种闭合用户组用户管理方法, 该方法包括:
用户数据服务器接收到将终端用户增加为家用基站的 CSG成员的 CSG 成员管理请求后,用户数据服务器、或用户数据服务器和 AAA服务器对所述 CSG成员管理请求进行认证授权; 认证授权通过后保存更新的 CSG成员信 息, 并由用户数据服务器将更新的 CSG成员信息发送给家用基站;
家用基站保存更新的 CSG成员信息;
所述 CSG成员信息中包含: 所述终端用户的真实用户标识、 或所述家用 基站标识、 或所述终端用户的真实用户标识和所述家用基站标识。
此外, 用户数据服务器认证授权通过后, 还为所述终端用户分配用户标 识代号, 并将其发送给家用基站、 或将其发送给家用基站并将其与所述终端 用户的真实用户标识一起或将其与所述终端用户的真实用户标识和所述家用 基站标识一起发送给 AAA服务器; 或
AAA服务器认证授权通过后, 还为所述终端用户分配用户标识代号, 并 将其发送给家用基站和用户数据服务器;
所述 CSG成员信息中还包含: 所述用户标识代号。
此外, 用户数据服务器认证授权通过后, 还向 AAA服务器发送 CSG信 息更新消息, 该消息中携带所述终端用户的真实用户标识、 或携带所述终端 用户的真实用户标识和所述家用基站的标识;
接收到所述 CSG信息更新消息后, AAA服务器为所述终端用户分配用 户标识代号, 并将其发送给用户数据服务器和家用基站;
所述 CSG成员信息中还包含: 所述用户标识代号。
此外, 所述用户标识代号具有如下特征:
在家用基站上, 一个用户标识代号、 或一个用户标识代号结合一个网络 标识对应一个终端用户的真实用户标识;
和 /或,
在 AAA月良务器上,一个终端用户的真实用户标识、或一个终端用户的真 实用户标识结合一个家用基站标识对应一个终端用户的用户标识代号;
和 /或,
在用户数据服务器上, 一个终端用户的真实用户标识、 或一个终端用户 的真实用户标识结合一个家用基站标识、 或一个终端用户的真实用户标识结 合一个家用基站标识和一个网络标识对应一个终端用户的用户标识代号。
此外,用户数据服务器釆用如下方式之一将更新的 CSG成员信息发送给 家用基站:
认证授权通过后, 用户数据服务器将所述 CSG成员信息包含在 CSG成 员信息更新消息中发送给家用基站; 或
认证授权通过后, 在执行家用基站的接入鉴权授权的过程中, 用户数据 服务器将所述 CSG成员信息包含在鉴权成功响应消息中发送给家用基站。
本发明还提供一种用户接入系统, 该系统包含: 家用基站、 接入网关、 AAA服务器; 其中:
所述接入网关设置成向终端发送用户标识请求, 接收所述终端通过所述 家用基站发送的用户标识响应消息; 并将所述用户标识响应消息中携带的终 端用户的伪标识发送给所述 AAA服务器;
所述 AAA服务器设置成使用所述伪标识发起对终端用户的鉴权流程,在 所述鉴权流程中获取终端用户的真实用户标识;
所述 AAA服务器还设置成将所述真实用户标识、或所述真实用户标识对 应的用户标识代号通过所述接入网关发送给所述家用基站;
所述家用基站设置成使用所述真实用户标识或所述用户标识代号对终端 用户进行接入控制。
此外,所述 AAA服务器还设置成使用所述真实用户标识、或使用所述真 实用户标识和所述家用基站的标识在本地获取所述用户标识代号; 或
所述系统中还包含用户数据服务器;所述 AAA服务器还设置成使用所述 真实用户标识、 或使用所述真实用户标识和所述家用基站的标识从所述用户 数据服务器获取所述用户标识代号。
本发明还提供一种闭合用户组用户管理系统, 该系统包含: 家用基站、 用户数据服务器; 其中:
所述家用基站设置成在接收到将终端用户增加为其闭合用户组 CSG成 员的 CSG成员管理请求后,请求用户数据服务器授权将所述终端用户增加为 该家用基站的 CSG成员;
所述用户数据服务器设置成对所述 CSG成员管理请求进行认证授权,认 证授权通过后保存更新的 CSG成员信息,并授权将所述终端用户增加为所述 家用基站的 CSG成员;
所述家用基站还设置成在获得所述用户数据服务器的授权后, 将所述终 端用户增加为 CSG成员, 并保存更新的 CSG成员信息;
所述 CSG成员信息中包含: 所述终端用户的真实用户标识、 或所述终端 用户的真实用户标识和所述家用基站标识。
此外, 所述系统中还包含 AAA服务器, 所述 AAA服务器设置成对所述 CSG成员管理请求进行认证授权, 并保存更新的 CSG成员信息;
所述家用基站还设置成在所述用户数据服务器和所述 AAA服务器都认 证授权通过后, 将所述终端用户增加为其 CSG成员。
此外, 所述家用基站还设置成为所述终端用户分配用户标识代号, 并将 其与所述终端用户的真实用户标识一起、 或将其与所述终端用户的真实用户 标识和所述家用基站标识一起发送给所述用户数据服务器、 或发送给所述用 户数据服务器和所述 AAA服务器; 或
所述用户数据服务器还设置成为所述终端用户分配用户标识代号, 并将 其发送给所述家用基站、 或将其发送给所述家用基站并将其与所述终端用户 的真实用户标识一起或将其与所述终端用户的真实用户标识和所述家用基站 标识一起发送给所述 AAA服务器; 或
所述 AAA服务器还设置成为所述终端用户分配用户标识代号,并将其发 送给所述家用基站和所述用户数据服务器;
所述 CSG成员信息中还包含: 所述用户标识代号。
本发明还提供一种闭合用户组用户管理系统, 该系统包含: 家用基站、 用户数据服务器; 其中:
所述用户数据服务器设置成在接收到将终端用户增加为家用基站的 CSG 成员的 CSG成员管理请求后, 对所述 CSG成员管理请求进行认证授权; 认 证授权通过后保存更新的 CSG成员信息, 并将更新的 CSG成员信息发送给 所述家用基站;
所述家用基站设置成保存更新的 CSG成员信息;
所述 CSG成员信息中包含: 所述终端用户的真实用户标识、 或所述终端 用户的真实用户标识和所述家用基站标识。
此外, 所述系统中还包含 AAA服务器, 所述 AAA服务器设置成对所述 CSG成员管理请求进行认证授权, 认证授权通过后保存更新的 CSG成员信 息, 并授权将所述终端用户增加为所述家用基站的 CSG成员;
所述用户数据服务器还设置成在获得所述 AAA服务器的授权后,才保存 所述更新的 CSG成员信息, 并将所述更新的 CSG成员信息发送给所述家用 基站。
此外,所述用户数据服务器还设置成为所述终端用户分配用户标识代号, 并将其发送给所述家用基站、 或将其发送给所述家用基站并将其与所述终端 用户的真实用户标识一起或将其与所述终端用户的真实用户标识和所述家用 基站标识一起发送给所述 AAA服务器; 或 所述 AAA服务器还设置成为所述终端用户分配用户标识代号,并将其发 送给所述家用基站和所述用户数据服务器;
所述 CSG成员信息中还包含: 所述用户标识代号。 终端用户分配用户标识代号, 并将该参数在家用基站、 用户数据服务器和 AAA服务器进行同步; 该参数本身或该参数结合其它参数可以唯一指代一个 终端用户的真实用户标识; 在家用基站、用户数据服务器和 AAA服务器之间 传递和使用该参数可以隐藏终端用户的真实用户标识。
此外, 釆用本发明提供的用户接入方法及系统, 家用基站可以根据终端 提供的, 或者 AAA服务器返回的参数用户标识代号 ( SIS ) , 如终端用户使 用的终端的 MAC地址, 获知当前通过该家用基站执行接入鉴权的用户的真 实用户标识, 依据此标识, 家用基站可以结合家用基站上保存的 CSG信息对 该用户进行接入控制。
本发明不仅填补了当前 CSG用户管理的方法及系统的空白,还能避免在 用户接入控制时在空口频繁传递用户真实标识,提供了用户标识私密性保护, 降低了家用基站系统的安全隐患。 附图概述
图 1是现有技术中的一种包含家用基站的通信网络示意图;
图 2是现有技术中的另一种包含家用基站的通信网络示意图;
图 3为现有技术中终端用户以图 1所示的系统参考模型接入家用基站的 方法流程图;
图 4为本发明定义的参数 SIS与终端用户的真实用户标识之间的关系示 意图;
图 5是本发明的 CSG成员管理方法的第一实施例流程图;
图 6是本发明的 CSG成员管理方法的第二实施例流程图;
图 7是本发明的 CSG成员管理方法的第三实施例流程图; 图 8是本发明的 CSG成员管理方法的第四实施例流程图; 图 9是本发明的 CSG成员管理方法的第五实施例流程图;
图 10是本发明的 CSG成员管理方法的第六实施例流程图;
图 11是本发明的 CSG成员管理方法的第七实施例流程图;
图 12是本发明的 CSG成员管理方法的第八实施例流程图;
图 13是本发明第十实施例终端用户通过图 1所示的家用基站系统接入移 动通信网的方法流程图;
图 14是本发明第十一实施例终端用户通过图 1所示的家用基站系统接入 移动通信网的方法流程图;
图 15是本发明第十二实施例终端用户通过图 1所示的家用基站系统接入 移动通信网的方法流程图;
图 16 是本发明实施例的用户接入系统和闭合用户组用户管理系统的结 构示意图。 本发明的较佳实施方式
本发明的核心思想是,由于 AAA服务器可以在鉴权流程中以安全的方式 获取终端用户的真实用户标识, 因此可以在终端用户接入网络的过程中由 AAA服务器将该终端用户的真实用户标识通过接入网关发送给家用基站, 以 便家用基站使用该真实用户标识对终端用户进行接入控制。
此外, 本发明还定义了用于表示用户身份的参数: 用户标识代号
( Subscriber Identity Symbol, 简称为 SIS ) , SIS是终端用户真实用户标识的 代号; 在终端用户接入网络的过程中, AAA服务器也可以将终端用户的参数 SIS通过接入网关发送给家用基站, 以便家用基站使用该终端用户的参数 SIS 进行接入控制。
此外, 当终端可以直接向家用基站提供网络为终端用户分配的用户标识 代号时, 也可以在终端用户接入网络的过程中, 由家用基站使用终端提供的 用户标识代号对终端用户进行接入控制。 图 4为本发明定义的参数 SIS与终端用户的真实用户标识之间的关系示 意图; 如图 4所示, 使用参数 SIS, 或者将参数 SIS与家用基站标识相结合、 或将参数 SIS,家用基站标识和网络标识三者相结合可以唯一确定一个终端用 户的真实用户标识(Real-NAI ) 。
用户标识代号 ( SIS )具有如下特征:
在家用基站上,可以使用用户标识代号( SIS )、或使用用户标识代号( SIS ) 结合网络标识唯一确定(即对应)一个终端用户的真实用户标识;
和 /或,
在用户数据服务器上, 可以使用终端用户的真实用户标识、 或使用终端 用户的真实用户标识结合家用基站标识、 或使用终端用户的真实用户标识结 合家用基站标识和网络标识唯一确定(即对应)一个(组)终端用户的用户 标识代号 ( SIS ) ;
和 /或,
在 AAA服务器上,可以使用终端用户的真实用户标识、或使用终端用户 的真实用户标识结合家用基站标识唯一确定(即对应)一个(组)终端用户 的用户标识代号 (SIS ) 。
上述网络标识可以是终端用户的归属运营商的标识,如 NSP ID ( Network Service Provider ID, 网络服务提供商标识符) 。
上述家用基站标识可以是家用基站的 BSID ( Base Station ID, 基站标识 符), 或者是家用基站的 NAI ( Network Access Identifier, 网络接入标识符 )。
用户标识代号( SIS )可以是终端用户所使用的移动终端(简称终端)的 标识, 例如, 该终端的 MSID ( Mobile Station ID, 移动台标识符) , 或者是 该终端的 MAC地址; 或者是由无线移动网络中的相关的网元(例如, 由家 用基站、 或由用户数据服务器、 或由 AAA服务器生成)为终端用户生成的其 他参数, 例如用户别名, 序列号, 安全参数索引 (SPI )等, 无论是什么参数, 使用现成的还是另外生成的,都认为是网络为终端用户分配的用户标识代号。
为了在终端用户接入网络的过程中使用本发明定义的用户标识代号 ( SIS ) , 本发明提出了管理家用基站的 CSG成员的方法, 下面先结合附图 和实施例对本发明提出的管理家用基站的 CSG成员的方法进行详细描述。 管理家用基站的 CSG成员的操作包括: 增加一个终端用户 (subscriber ) 作为家用基站的 CSG成员, 或者修改一个 CSG成员的属性, 或者删除家用 基站的一个 CSG成员等。以下各实施例以增加一个终端用户作为家庭基站的 图 5至图 12是本发明提供的以图 1所示系统参考模型为例的家用基站 CSG成员管理方法的流程图。
实施例一
图 5是本发明的 CSG成员管理方法的第一实施例流程图; 本实施例中, 用户(家用基站的拥有者)通过操作家用基站来管理该家用基站的 CSG成员, 并且由用户数据服务器分配 SIS; 如图 5所示, 该方法包括如下步骤:
步骤 501 : 家用基站接入移动通信网络, 一般包括如下子步骤: 首先, 家用基站发现其所需要连接的安全网关并与该安全网关建立安全 通道;
其次,在家用基站的 AAA服务器的参与下, 家庭基站和与其连接的移动 通信网之间进行相互认证;
最后, 家用基站通过与网络进行交互, 以获取家用基站初始化时所需要 的一系列参数, 并完成移动通信网的接入。
步骤 502: 家用基站收到增加终端用户为其 CSG成员的请求。
家用基站的拥有者可以通过家用基站上的管理接口将终端用户增加为家 用基站的 CSG成员。
值得注意的是, 上述请求中至少需要包含终端用户的真实用户标识, 例 如, Real-NAI (真实用户标识, Real Network Access Identity ) 、 IMSI (国际移 动用户识另1 J码, International Mobile Subscriber Identity), USI ID (通用业务接口 标识, Universal Services Interface Identity)等。 上述请求中携带的参数还可以 包含:终端用户使用的终端的属性参数,例如终端的 MAC地址、终端的 MSID 等。
家用基站的拥有者可以通过手工输入的方式, 将相关的参数传递给家用 基站。
步骤 503: 家用基站向用户数据服务器发起认证授权请求, 以请求用户 数据服务器授权将所述终端用户增加为该家用基站的 CSG成员。
上述认证授权请求消息中携带: 终端用户的真实用户标识、 该家用基站 标识(例如, 家用基站的全球唯一标识、 家用基站的 BSID等) 。
此外, 上述认证授权请求消息中还可以包含终端用户使用的终端的属性 参数, 例如终端的 MAC地址、 终端的 MSID等。
这里, 家用基站可以使用与用户数据服务器之间的共享密钥给上述的终 端用户的真实用户标识、 家用基站标识、 以及终端用户使用的终端的属性等 参数加密保护;使得只有家用基站和用户数据服务器可以加密读取这些参数。
步骤 504: 用户数据服务器对将终端用户增加为该家用基站的 CSG成员 的请求进行认证授权, 此处的认证授权可被看作初步认证授权; 如果通过了 初步认证授权, 则用户数据服务器为该终端用户分配参数 SIS。
用户数据服务器进行的认证授权可以包含如下操作:
检查家用基站所拥有的 CSG成员是否达到上限, 若已经达到上限, 则不 允许该家用基站增加新的 CSG成员; 以及
待加入的终端用户 (目标用户) 归属的运营商与家用基站归属的运营商 之间是否有签约关系, 如果没有, 则不允许该家用基站将该目标用户增加为 其 CSG成员。
如果终端用户归属的运营商与家用基站归属的运营商是同一个运营商, 则可理解为终端用户归属的运营商与家用基站归属的运营商之间有签约关 系。
用户数据服务器可以根据发送所述认证授权请求的家用基站的标识结合 所述终端用户的真实用户标识来生成参数 SIS。例如,用户数据服务器检查该 家用基站的档案, 并找出与该家用基站有关联的所有 SIS值, 然后生成一个 与这些 SIS值都不相同的新的 SIS, 作为该终端用户的 SIS。
用户数据服务器也可以直接将终端用户使用的终端的属性参数 (例如, 终端的 MAC地址、 终端的 MSID )作为该终端用户的 SIS。 此外, 用户数据服务器还可以直接使用所述终端用户的真实用户标识来 生成参数 SIS, 例如, 对终端用户的真实用户标识进行哈希运算, 将哈希运算 得到的哈希值作为参数 SIS, 使参数 SIS能与用户的真实用户标识——对应。
总之, 此时, 用户数据服务器为该终端用户分配用户标识代号。
步骤 505:用户数据服务器向终端用户的 AAA服务器发起认证授权请求, 以请求授权将终端用户增加为该家用基站的 CSG成员。
上述认证授权请求消息中包含:用户数据服务器分配的所述参数 SIS、终 端用户的真实用户标识以及家用基站标识。
本步骤中, 用户数据服务器可通过解析终端用户的真实用户标识(格式 通常为 user@domain )来确定终端用户的 AAA月良务器。
步骤 506: AAA服务器对上述请求进行认证及授权, 这里的认证授权可 以看作为最终认证授权; 认证授权成功后, AAA服务器保存上述认证授权请 求消息中携带的 SIS、 终端用户的真实用户标识以及家用基站标识。
上述最终认证授权操作可以包含: AAA服务器检查该终端用户的档案, 以判断该终端用户是否有权限通过该家用基站接入。
步骤 507: AAA服务器向用户数据服务器返回认证授权响应消息。
若用户数据服务器在向 AAA服务器发送认证授权请求之前没有緩存上 述 SIS、终端用户的真实用户标识以及家用基站标识,则认证授权响应消息中 需要包含上述参数。
步骤 508: 用户数据服务器保存 SIS、 终端用户的真实用户标识以及家用 基站标识。
用户数据服务器可将上述 SIS、终端用户的真实用户标识保存在上述家用 基站的档案中。 例如, 在该家用基站的 CSG成员列表中, 插入终端用户的真 实用户标识, 作为一个新的 CSG成员; 同时将上述参数 SIS作为所述成员的 属性之一。
步骤 509: 用户数据服务器向家用基站返回认证授权响应, 授权家用基 站将所述终端用户增加为该家用基站的 CSG成员。
认证授权响应消息中至少需要携带用户数据服务器生成的上述参数 SIS。 用户数据服务器与家用基站之间的交互可以通过安全网关进行, 以便双 方之间交互的参数以及信息不会被第三方获知。
步骤 510: 家用基站保存上述参数 SIS, 更新其 CSG成员信息, 完成增 加终端用户为其 CSG成员的过程。
该家用基站可以在其本地存储的 CSG成员列表中插入所述终端用户的 真实用户标识作为一个新的 CSG成员; 同时将上述参数 SIS作为所述成员的 属性之一。 此时, 给定一个参数 SIS, 该家用基站可以唯一确定一个终端用户 的真实用户标识。 此外, 家用基站本地存储的 CSG成员列表与用户数据服务器中家用基站 的档案中存储的 CSG成员列表的格式可以相同。
上述实施例描述的方案实现了将终端用户增加为家用基站的 CSG成员 的功能。 通过使用该方案, 能实现家用基站与用户数据服务器之间 CSG信息 的同步; 同时能使家用基站、用户数据服务器以及终端用户的 AAA服务器三 者共享用户数据服务器分配的所述参数 SIS, 即实现了参数 SIS在家用基站、 用户数据服务器、 AAA服务器上的同步。
将参数 SIS与家用基站的标识相结合, 能在该家用基站上、 用户数据服 务器上、 以及 AAA服务器上唯一地标识所述终端用户的真实用户标识。
实施例二
图 6是本发明的 CSG成员管理方法的第二实施例流程图; 本实施例中, 用户(家用基站的拥有者)通过操作家用基站来管理该家用基站的 CSG成员, 并且由家用基站分配 SIS; 如图 6所示, 该方法包括如下步骤:
步骤 601 : 与步骤 501相同。
步骤 602: 如步骤 502所述, 家用基站收到将终端用户增加为其 CSG成 员的请求, 例如, 家用基站的拥有者通过家用基站上的管理接口将所述终端 用户增加为家用基站的 CSG成员。
在本步骤中, 家用基站收到上述请求后, 还需要为所述终端用户分配参 数 SIS。
家用基站可以检查本地记录的所有 SIS 的值, 然后生成一个与这些 SIS 都不相同的新的 SIS作为所述参数 SIS。
此外, 家用基站也可以直接使用所述终端用户所使用的终端的属性参数
(例如, 终端的 MAC地址、 终端的 MSID )作为所述参数 SIS。
总之, 此时, 家用基站为该终端用户分配用户标识代号。
步骤 603: 家用基站向用户数据服务器发起认证授权请求, 以请求用户 数据服务器授权将所述终端用户增加为该家用基站的 CSG成员。
上述认证授权请求中携带: 终端用户的真实用户标识、 该家用基站标识 以及家用基站分配的所述参数 SIS。
步骤 604: 用户数据服务器对将终端用户增加为该家用基站的 CSG成员 的请求进行认证, 此处的认证可被看作初步认证授权。
步骤 605:用户数据服务器向终端用户的 AAA服务器发起认证授权请求, 以请求授权将终端用户增加为该家用基站的 CSG成员。
上述认证授权请求消息中包含: 家用基站分配的所述参数 SIS、所述终端 用户的真实用户标识以及所述家用基站标识。
本步骤中, 用户数据服务器可通过解析终端用户的真实用户标识来确定 终端用户的 AAA服务器。
步骤 606 ~ 608: 与步骤 506 ~ 508相同。
步骤 609: 用户数据服务器向家用基站返回认证授权响应, 授权家用基 站将所述终端用户增加为该家用基站的 CSG成员。
如果在步骤 602中家用基站没有暂存其分配的参数 SIS,则上述认证授权 响应消息中要携带参数 SIS。
步骤 610: 与步骤 510相同。
实施例三
图 7是本发明的 CSG成员管理方法的第三实施例流程图; 本实施例中, 用户 (家用基站的拥有者)通过用户数据服务器来管理该家用基站的 CSG成 员 (例如, 家用基站的拥有者通过给运营商打电话来请求将终端用户添加为 其拥有的家用基站的 CSG成员) , 并且由用户数据服务器分配 SIS; 如图 7 所示, 该方法包括如下步骤:
步骤 701 : 与步骤 501相同。
步骤 702: 用户数据服务器收到将终端用户增加为家用基站的 CSG成员 的请求。
上述请求中至少包含家用基站标识、 所述终端用户的真实用户标识。 此外, 上述请求中还可以包含终端用户使用的终端的属性参数, 例如终 端的 MAC地址、 终端的 MSID等。
步骤 703 ~ 707: 与步骤 504 ~ 508相同。
步骤 708: 用户数据服务器向家用基站发送更新家用基站 CSG成员信息 的消息(可以称为 CSG成员信息更新消息), 通过此消息, 用户数据服务器 可将最新的家用基站的 CSG成员信息同步到所家用基站中。 与家用基站相关的所有 CSG成员信息。
上述 CSG成员信息中至少包含 CSG成员的真实用户标识, 以及用户数 据服务器分配的参数 SIS。 本实施例中, CSG成员信息至少包含终端用户的 真实用户标识, 用户数据服务器分配的参数 SIS。
步骤 709: 如步骤 510所述, 家用基站使用上述 CSG成员信息更新消息 中的参数更新该家用基站本地保存的 CSG成员信息。
步骤 710: 家用基站向用户数据服务器返回 CSG成员信息更新响应。 实施例四
图 8是本发明的 CSG成员管理方法的第四实施例流程图; 本实施例中, 用户 (家用基站的拥有者)通过用户数据服务器来管理该家用基站的 CSG成 员, 并且由用户数据服务器分配 SIS; 在家用基站上线以后, 用户数据服务器 将变更后的 CSG成员信息同步到该家用基站。 如图 8所示, 该方法包括如下 步骤:
步骤 801 - 806: 与步骤 702 ~ 707相同。
其中, 在步骤 806中, 用户数据服务器可以为家用基站设置一个标志, 用来表示该家用基站的 CSG成员信息是否发生了变化; 或者, 用户数据服务 器可以为家用基站的每一个 CSG成员都设置一个标志, 用来表示该 CSG成 员的信息是否发生了变化。
步骤 807: 家用基站接入移动通信网络, 并执行家用基站的接入鉴权授 权流程。
步骤 808: 对家用基站的接入鉴权成功以后, 用户数据服务器向该家用 基站返回鉴权成功响应; 该响应中可以包含家用基站的 CSG成员信息, 也可 以不包含该家用基站的 CSG成员信息。 下面分这两种情况分别叙述:
a、 若上述响应中包含 CSG成员信息, 则用户数据服务器使用该响应消 息实现其与家用基站之间的 CSG信息同步。
用户数据服务器可以先将家用基站的 CSG信息发送到安全网关,进而由 安全网关将该 CSG信息发送到家用基站。
此外,如果家用基站与安全网关之间使用 IPSec( Internet Protocol Security, 互联网协议安全) 隧道来保障家用基站与安全网关之间的安全性, 则上述接 入鉴权过程可以与安全隧道的建立同时执行。 在这种情况下, 上述向家用基 站发送鉴权成功响应消息的过程可以理解为: 用户数据服务器首先将携带该 家用基站的 CSG信息的消息发到安全网关上, 例如, 此时的消息可以是 RADIUS ( Remote Authentication Dial-In User Service,远程用户拨入认证系统) /Diameter消息; 然后安全网关再通过另一消息(例如, IKE— AUTH消息)把 上述 CSG信息转发至家用基站。
执行完步骤 808后, 直接跳转执行步骤 811 , 此时步骤 809, 810和步骤 812都不需要执行。
b、 如果上述响应不包含 CSG成员信息, 则从步骤 809开始执行。
值得注意的是,鉴权成功响应消息中可携带一个提示家用基站其 CSG成 员信息已发生变更的标识。
步骤 809: 可选地, 收到鉴权成功响应消息后, 家用基站向用户数据服 务器发送请求更新该家用基站 CSG成员的消息。 例如, 家用基站在上述鉴权 成功响应消息中解析出该家用基站的 CSG成员信息发生了变更的标识, 家用 基站根据该标识向用户数据服务器发送请求更新该家用基站 CSG成员的消息 (可以称为 CSG成员信息更新请求消息) 。
步骤 810: 如步骤 708所述, 用户数据服务器发现家用基站的 CSG信息 发生了变更, 向该家用基站发送更新家用基站 CSG成员信息的消息(可以称 为 CSG成员信息更新消息) 。
步骤 811 ~ 812: 与步骤 709 ~ 710相同。
实施例五
图 9是本发明的 CSG成员管理方法的第五实施例流程图; 本实施例与图 8 所示的实施例四的不同之处在于: 家用基站接入移动通信网络以后, 用户 数据服务器为该家用基站分配参数 SIS。 如图 9所示, 该方法包括如下步骤: 步骤 901 - 906: 与步骤 801 ~ 806基本相同, 所不同的是, 在本实施例 中, 步骤 901 - 906不处理所述参数 SIS, 即: 步骤 902中, 用户数据服务器 不生成参数 SIS; 步骤 903中用户数据服务器不将参数 SIS发送给 AAA服务 器; 步骤 904中, AAA服务器不保存参数 SIS; 步骤 906中, 用户数据服务 器不保存参数 SIS。
步骤 907: 与步骤 807相同, 家用基站接入移动通信网络, 并执行家用 基站的接入鉴权授权过程。
步骤 908: 如步骤 802 (步骤 504 )所述, 用户数据服务器为新加入 CSG 的终端用户分配参数 SIS。
步骤 909 ~ 911 : 用户数据服务器将分配的上述参数 SIS同步到 AAA服 务器, AAA服务器保存参数 SIS。
此外, 如果在家用基站入网之前, 有多个终端用户被增加为该家用基站 的 CSG成员, 则用户数据服务器需要为每个终端用户分别分配一个 SIS, 同 时将分配的 SIS同步到这些用户各自的 AAA服务器保存。
步骤 912: 与步骤 808相同。 如果鉴权成功响应消息中携带家用基站的
CSG成员信息,则跳转至步骤 915,步骤 913 , 914和步骤 916都不需要执行; 否则, 从步骤 913开始执行。
步骤 913 ~ 916: 与步骤 809 ~ 812相同。 需要注意的是, 作为本实施例的变形, 步骤 908 ~ 911可以发生在家用基 站接入移动通信网络、 执行家用基站的接入鉴权授权之前, 也可以发生在家 用基站的接入鉴权授权之后。例如,步骤 908 ~ 911可以发生在步骤 912之后、 步骤 914之前的任意时刻。 但是, 若步骤 912中的鉴权成功消息中需要携带 家用基站的 CSG信息, 则步骤 909 ~ 911必须在如图 9所示的位置执行。
实施例六
在上述实施例中, 管理家用基站的 CSG成员需要家用基站的拥有者、 用 户数据服务器以及 AAA服务器三方都认证授权。 实际上,基于运营商的实际 管理配置, 管理家用基站的 CSG成员的操作可以不需要经过 AAA服务器的 认证授权, 实施例一至实施例五经过适当的变形和修改, 就可以满足该场景 的需求, 没有本质上的差别。 以下以第一实施例为例, 详细描述所述的变形。
图 10是本发明的 CSG成员管理方法的第六实施例流程图; 本实施例与 图 5所示的第一实施例的区别在于 AAA服务器不对 CSG成员管理操作进行 认证授权; 具体步骤如下:
步骤 1001 ~ 1003: 与步骤 501 ~ 503相同。
步骤 1004: 与步骤 504基本相同; 所不同的是, 在本步骤中用户数据服 务器对增加 CSG成员的请求进行最终认证授权(具体的认证授权方法可参考 步骤 504 ) , 认证授权通过后依照步骤 504所述的方法, 分配参数 SIS。
步骤 1005: 用户数据服务器向 AAA服务器发送 CSG信息更新消息; 该 消息中携带: 家用基站标识, 终端用户的真实用户标识以及该用户数据服务 器分配的参数 SIS。
步骤 1006: 接收到 CSG信息更新消息后, AAA服务器将该消息中携带 的参数 SIS, 终端用户的真实用户标识以及家用基站标识等信息保存在本地。
步骤 1007: AAA服务器向用户数据服务器返回 CSG信息更新响应消息。 参照步骤 507, 若在步骤 1004中用户数据服务器没有保存或者緩存 SIS、 终 端用户的真实用户标识以及家用基站标识等参数,则 CSG信息更新响应消息 中需要携带上述参数。
步骤 1008: 用户数据服务器收到来自 AAA服务器的 CSG信息更新响应 消息后, 若在步骤 1004中用户数据服务器没有保存 SIS、 终端用户的真实用 户标识以及家用基站标识等参数, 则需要参照步骤 508所述的方法, 将这些 参数保存在用户数据服务器本地。
步骤 1009 ~ 1010: 与步骤 509 ~ 510相同。
可见, CSG成员管理方法的实施例六是对实施例一的变形, 两者之间的 主要差别是将实施例一的步骤 504 ~ 508变形为步骤 1004 ~ 1008。
同样, 可以将 CSG成员管理方法的实施例二至实施例五做类似的变形。 例如, 实施例二的步骤 604 ~ 608变形为步骤 1004 ~ 1008; 实施例三的步骤 703 - 707 变换为步骤 1004 ~ 1008; 实施例四的步骤 802 ~ 806 变换为步骤 1004 ~ 1008; 实施例五的步骤 902 ~ 906变形为步骤 1004 ~ 1008。
实施例七
在实施例六的基础上,用户数据服务器在对将终端用户增加为 CSG成员 的请求进行认证授权后,不一定需要将变更以后的 CSG信息通知到终端用户 的 AAA服务器上。 对本发明中的实施例一至实施例五做适当的变形和修改, 可以满足该场景的需求。 以下以第一实施例为例, 详细描述所述变形。
图 11是本发明的 CSG成员管理方法的第七实施例流程图; 本实施例中 与图 5所示的实施例一的不同之处在于整个过程无需 AAA服务器参与;如图 11所示, 该方法包括如下步骤:
步骤 1101 ~ 1103: 与步骤 501 ~ 503相同。
步骤 1104:用户数据服务器对将终端用户增加为家用基站的 CSG成员的 请求进行最终认证授权, 并按照步骤 504中所述的方法分配参数 SIS。
步骤 1105: 用户数据服务器依照步骤 508中所述的方法, 保存参数 SIS, 终端用户的真实用户标识以及家用基站标识。
步骤 1106 ~ 1107: 与步骤 509 ~ 510相同。
可见, CSG成员管理方法的实施例七是对实施例一的一种简化变形, 具 体地说, 实施例七删除了实施例一的步骤 505 ~ 507 , 并对步骤 504和 508做 了适当的修改(变更为步骤 1104和 1105所述的方法) 。
同样,可以将 CSG成员管理方法的实施例二至实施例五做类似的简化和 变形。 具体地说, 实施例二的步骤 605 ~ 607可删除, 并使用同样的方法修改 步骤 604和 608; 实施例三的步骤 704 ~ 706可删除, 并使用同样的方法修改 步骤 703和 707; 实施例四的步骤 803 ~ 805可删除, 并使用同样的方法修改 步骤 802和 806; 实施例五的步骤 903 ~ 905, 909 ~ 911可删除。
实施例八
图 12是本发明的 CSG成员管理方法的第八实施例流程图。
在 CSG成员管理方法的实施例一至实施例六中, 参数 SIS由家用基站或 者用户数据服务器分配并同步到 AAA服务器中。除了家用基站和用户数据服 务器可实现分配参数 SIS以夕卜,终端用户的 AAA服务器也可以实现分配参数 SIS, 其原理与上述各实施例相同, 差别仅在于将分配参数 SIS的执行点放到 了 AAA服务器上, 没有本质的区别。 以下以第一实施例为例, 详细描述所述 差别。 具体步骤如下:
步骤 1201 ~ 1203: 与步骤 501 ~ 503相同。
步骤 1204: 如步骤 504所述的方法, 用户数据服务器对将终端用户增加 为该家用基站的 CSG成员的请求进行初步认证授权;与步骤 504所不同的是, 在本步骤中, 用户数据服务器不为终端用户分配参数 SIS。
步骤 1205: 用户数据服务器向 AAA服务器发起认证授权请求, 以请求 将终端用户增加为家用基站的 CSG成员; 上述认证授权请求消息中至少携带 终端用户的真实用户标识以及家用基站标识。
本步骤中, 用户数据服务器可通过解析终端用户的真实用户标识来确定 终端用户的 AAA服务器。
步骤 1206: 如步骤 506所述的方法, AAA服务器对上述增加 CSG成员 的请求进行认证以及授权, 本步骤中的认证授权可以看作为最终认证授权; 认证授权成功后, AAA服务器为终端用户分配参数 SIS。
AAA服务器可以根据发送所述认证授权请求的家用基站的标识, 结合终 端用户的归属运营商标识(如 NSP-ID )来生成唯一的参数 SIS。
此外, AAA服务器还可以直接将终端用户使用的终端的属性参数(例如, 终端的 MAC地址、 终端的 MSID )作为该终端用户的 SIS。 该终端的属性参 数可以是从上述的增加 CSG成员的请求中获取的; 或者是 AAA服务器在本 地取得的。 例如, 基于运营商的策略, 在用户档案中保存了与该用户绑定的 中的属性参数(MAC地址, MSID等), 则, 此时, AAA服务器可以使用上 总之, 此时, 由 AAA服务器为该终端用户分配用户标识代号。
步骤 1207: AAA服务器向用户数据服务器返回认证授权响应消息; 该消 息中至少携带 AAA服务器分配的所述参数 SIS; 此外, 认证授权响应消息中 还需要携带终端用户标识、 家用基站标识等参数。
步骤 1208 ~ 1210: 与步骤 508 ~ 510相同。
可见, CSG成员管理方法的实施例八是对实施例一的变形, 两者之间的 主要差别是将实施例一的步骤 504 ~ 508变形为步骤 1204 ~ 1208。 通过上述 变形处理, 可以实现由 AAA服务器负责分配所述参数 SIS。
同样, 可以将 CSG成员管理方法的实施例三和实施例四做类似的变形。 例如, 实施例三的步骤 703 ~ 707变换为步骤 1204 ~ 1208; 实施例四的步骤 802 ~ 806变换为步骤 1204 ~ 1208。
为了在实施例五中实现类似的变形, 需要将步骤 908 ~ 911 修改为步骤 908' ~ 911' , 具体描述如下:
步骤 908' : 不执行;
步骤 909,: 用户数据服务器向 AAA服务器发送消息, 以向 AAA服务器 请求获取终端用户的参数 SIS; 上述请求中至少包含终端用户的真实用户标 识、 家用基站标识; 此外, 上述请求中还可以包含终端用户使用的终端的属 性参数, 如终端的 MAC地址, MSID等。
步骤 910': 如步骤 1106所述的方法, AAA服务器分配并保存终端用户 的参数 SIS。
步骤 91 Γ: AAA服务器向用户数据服务器返回响应消息; 该响应消息 中至少携带 AAA服务器为所述终端用户分配的参数 SIS; 用户数据服务器收 到该响应消息以后, 按步骤 510所述的方法, 保存 AAA服务器生成的参数 SIS, 更新其 CSG成员信息。 实施例九
基于运营商的实际管理配置, 即使由 AAA服务器负责分配参数 SIS, 对 家用基站的 CSG成员进行管理的操作也可以不需要 AAA服务器进行认证授 权。 通过对实施例八做适当的变形, 可以实现这种场景。 在实施例八的基础 上进行上述变形与实施例六对实施例一所作的变形的原理一致, 没有本质的 区别; 具体地说, 只需将步骤 1205的认证授权请求改为 CSG信息更新消息, 将步骤 1207的认证 4受权响应改为 CSG信息更新响应消息; 并取消步骤 1206 中的认证授权操作即可。
需要注意的是, 在上述九个实施例中, 用户数据服务器可以是家用基站 的鉴权授权计费服务器(AAA服务器) , 也可以是专门用于 CSG成员管理 的服务器, 例如, 管理系统 (Management System ) 、 网管系统 (Network Management System )等。
根据本发明的基本原理,图 5 ~ 12所示的实施例还可以有多种变换方式, 例如:
1 )在上述实施例中, 考虑到一个终端用户可以是多个家用基站的 CSG 成员, 因此分配和同步终端用户的参数 SIS时需要使用家用基站标识; 如果 不考虑以上因素, 分配和同步终端用户的参数 SIS时可以不使用家用基站标 识。
2 )考虑到以下场景: 多个属于不同运营商(对应不同的网络标识)的用 户使用各自的或者相同的终端、 并通过相同的家用基站接入网络, 不同运营 商的 AAA服务器可能会分别为不同用户分配相同的参数 SIS, 即在家用基站 和用户数据服务器上一个参数 SIS会对应不同终端用户的真实用户标识; 在 这种情况下, 需要将参数 SIS与家用基站标识和网络标识三者相结合才能唯 一确定一个终端用户的真实用户标识, 因此在家用基站和用户数据服务器上 存储参数 SIS和终端用户的真实用户标识时还需要同时存储对应的网络标识。
以下将结合附图和实施例对终端用户通过家用基站接入移动通信网, 家 用基站在终端用户接入的过程中进行接入控制的方法进行描述。
实施例十 图 13是本发明第十实施例终端用户通过图 1所示的家用基站系统接入移 动通信网的方法流程图; 在本实施例中, AAA服务器查找终端用户的参数 SIS, 并将其传递给家用基站, 家用基站将参数 SIS映射为该终端用户的真实 用户标识, 然后使用终端用户的真实用户标识, 以及对应的 CSG信息对该终 端用户进行接入控制; 具体包括如下步骤:
步骤 1301 : 终端与家用基站之间完成空口参数同步及测距。
步骤 1302: 终端请求协商认证能力 (如用户的认证策略等) , 并与家用 基站、 接入网关完成能力协商工作。
步骤 1303:接入网关启动 EAP鉴权流程,向家用基站发送用户标识请求, 家用基站将该请求转发给终端。
步骤 1304: 收到用户标识请求后, 终端向家用基站回复用户标识响应, 其中携带终端用户的伪标识, 家用基站将该响应透传给接入网关。
此外, 终端还可以将终端标识(例如 MSID ) , 终端的 MAC地址等终端 属性参数传递给家用基站, 家用基站可以将这些信息保存在上下文中。
需要注意的是, 上述终端用户的伪标识主要起到路由作用, 且终端用户 每次接入网络时都可能改变。
步骤 1305: 收到用户标识响应后, 接入网关向 AAA服务器发送接入请 求消息, 并在该消息中携带终端用户的伪标识、 家用基站工作模式信息和家 用基站标识。
需要注意的是, 接入网关能够区分终端接入的是家用基站或者是普通宏 基站。 例如, 接入网关可以根据自己拥有的信息来判断, 也可以根据家用基 站上报的信息来判断 (如, 家用基站可以发送用户标识响应时, 同时将自己 是家用基站的指示传递到接入网关) 。
家用基站工作模式信息用于标识家用基站工作在闭合模式、或开放模式、 或混合模式。 例如, 接入网关可以根据自己拥有的信息来判断, 也可以根据 家用基站上报的信息来判断(如, 家用基站可以发送用户标识响应时, 同时 将自己的工作模式传递到接入网关 ) 。
步骤 1306: AAA服务器基于终端用户的伪标识, 使用 AAA服务器与终 端协商好的鉴权方法, 发起对终端的鉴权流程; 在鉴权流程中, AAA服务器 可以以安全的方式获得终端用户的真实用户标识。
终端与 AAA服务器之间可以釆用支持隐藏终端用户的真实用户标识的 鉴权方法, 例如 EAP-AKA方法、 或 EAP-TTLS ( Extensible Authentication Protocol-Tunneled Transport Layer Security,可扩展认证协议-隧道传输层安全 ) 等方法进行接入鉴权。这些鉴权方法能够使 AAA服务器在获得终端用户的真 实用户标识的同时, 保障终端用户的真实用户标识的安全性和私密性。
步骤 1307: 在 AAA服务器通过了对终端用户的鉴权认证后, AAA服务 器使用在鉴权过程中获取的终端用户的真实用户标识查找该终端用户相关的 CSG信息, 其中包含该终端用户的参数 SIS。
AAA服务器可以使用终端用户的真实用户标识, 并结合家用基站标识 (如 BSID )查找终端用户的 SIS。 例如, AAA服务器可以在终端用户的用户 档案中查找终端用户的 SIS。
如果 AAA服务器找不到终端用户的 SIS, 可以向用户数据服务器请求该 终端用户的 SIS。
需要注意的是,只有当终端通过家用基站实施接入鉴权时 AAA服务器才 执行本步骤。 AAA服务器可以自行判断终端是否通过家用基站接入(例如, 通过基站标识来判断) , 也可以根据来自接入网关的提示来判断(例如通过 接入网关带来的家用基站工作模式信息来判断) ; 或者, 只有在终端通过家 用基站实施接入鉴权, 且该家用基站工作于闭合模式或者混合模式时, AAA 服务器才执行本步骤, 在这种情况下, AAA服务器可以根据接入网关的提示 来判断(例如通过接入网关带来的家用基站工作模式信息来判断) 。
步骤 1308: AAA服务器向接入网关发送接入成功消息,表示接受用户接 入(其中包含鉴权成功消息, 表示鉴权成功) , 该消息中需要携带该终端用 户相关的 CSG信息, 其中至少包含终端用户的 SIS。
如果 AAA服务器没有找到终端用户的 SIS,则可以不在接入成功消息中 携带 SIS值, 或携带一个无意义的 SIS值(例如, 空值(NONE ) ) 。
步骤 1309:接入网关通过 EAP转发消息将接入成功消息中的鉴权成功消 息转发给家用基站, 同时携带与终端用户相关的 CSG信息, 其中至少包含终 端用户的 SIS。
步骤 1310: 家用基站收到 EAP转发消息后,使用该消息中携带的终端用 户的参数 SIS查找对应的真实用户标识, 并使用终端用的真实用户标识以及 对应的 CSG信息对终端用户进行接入控制。
如果家用基站处于开放模式, 则可以不执行上述接入控制操作; 如果家 用基站处于闭合模式或者混合模式,则上述 CSG信息可以是家用基站的 CSG 成员列表, 接入控制操作就是查看终端用户的真实用户标识是否在该家用基 站的 CSG成员列表中; 若家用基站处于混合模式, 除了查看终端用户的真实 用户标识是否在该家用基站的 CSG成员列表中夕卜,接入控制操作还可以包括: 家用基站给属于 CSG成员的终端用户和不属于 CSG成员的终端用户分配不 同的接入优先级等。
此外,家用基站可以结合终端用户的真实用户标识和终端的属性参数(如 MSID, 终端的 MAC地址)等信息、 以及 CSG信息来进行接入控制操作。 例 如, 家用基站使用终端用户的真实用户标识判断该终端是否为 CSG成员, 并 根据终端的属性参数判断该终端用户是否使用为其预先指定的特定终端接 入;如果终端用户是 CSG成员,且使用上述特定终端接入,则允许其接入(或 为其分配高接入优先级), 否则不允许其接入(或为其分配低接入优先级)。
如果家用基站无法将参数 SIS映射成为一个有效的真实用户标识, 则家 用基站可以简单的认为用户不是其 CSG成员。
此外, 当家用基站处于闭合模式, 且终端用户不是其 CSG成员, 则家用 基站应当标记该家用基站接入失败(即不允许其接入) 。
步骤 1311 : 家用基站通过 EAP转发消息将鉴权成功消息转发给终端。 步骤 1312 , 继续执行用户接入相关的其他流程。
通过上述流程, 可以实现由家用基站控制的与 CSG相关的用户接入过 程。 其中, 如果家用基站判断接入失败(例如, 在步骤 1310中, 家用基站处 于闭合模式并且终端用户不是该家用基站的 CSG成员), 家用基站可在接入 鉴权完毕以后强制所述终端执行退网流程。 实施例十一
由于存在不需要 AAA服务器参与的 CSG成员管理场景(如图 11所示的 实施例) , 因此 AAA服务器可能没有存储终端用户的参数 SIS, 在这种场景 下, AAA服务器需要从用户数据服务器获取终端用户的参数 SIS。
图 14是本发明第十一实施例终端用户通过图 1所示的家用基站系统接入 移动通信网的方法流程图; 在本实施例中, AAA服务器从用户数据服务器获 取终端用户的参数 SIS, 并将其传递给家用基站, 家用基站将参数 SIS映射为 该终端用户的真实用户标识, 然后使用终端用户的真实用户标识, 以及对应 的 CSG信息对该终端用户进行接入控制; 具体包括如下步骤:
步骤 1401 ~ 1406: 与步骤 1301 ~ 1306相同。
步骤 1407: AAA服务器使用在接入鉴权过程中获取的终端用户的真实用 户标识向用户数据服务器发起 CSG信息获取请求, 以请求获取与该用户相关 的 CSG信息; 该请求消息中携带终端用户的真实用户标识以及所述家用基站 的标识(例如, BSID等) 。
本步骤中, AAA服务器可以根据家用基站标识找到对应的用户数据服务 器。
需要注意的是, 只有在所述家用基站处于闭合模式或者混合模式的情况 下, AAA服务器才需要执行此步骤。 AAA服务器可以根据接入网关的提示 来判断所述家用基站所处的工作模式(例如通过接入网关带来的家用基站工 作模式信息来判断家用基站所处的工作模式) 。
步骤 1408:接收到 CSG信息获取请求后,用户数据服务器查找与终端用 户相关的 CSG信息, 其中包含终端用户的参数 SIS。
本步骤中, 用户数据服务器可以使用终端用户的真实用户标识结合家用 基站的标识(如 BSID )唯一的找到终端用户的参数 SIS。
步骤 1409: 用户数据服务器将与终端用户相关的 CSG信息返回给 AAA 服务器, CSG信息中至少包含终端用户的参数 SIS; 如果用户数据服务器找 不到终端用户的参数 SIS, 可以不向 AAA返回参数 SIS、 或返回一个无意义 的 SIS值(例如, 空值(NONE ) ) 。 步骤 1410至 ~ 1414: 与步骤 1308 ~ 1312相同。
实施例十二
图 15是本发明第十二实施例终端用户通过图 1所示的家用基站系统接入 移动通信网的方法流程图。 在实施例十和实施例十一中, 接入网关使用 EAP 转发消息将 AAA服务器发送的参数 SIS传递给家用基站,接入网关也可以通 过密钥改变指示消息将参数 SIS传递给家用基站; 对实施例十进行上述变形 后的具体步骤如下:
步骤 1501 ~ 1508: 与步骤 1301 ~ 1308相同。
步骤 1509: 接入网关通过 EAP转发消息将鉴权成功消息转发给家用基 站。
步骤 1510: 接入网关向家用基站发送密钥改变指示消息, 该消息中携带 终端用户相关的 CSG信息, 其中至少包含终端用户的参数 SIS。
步骤 1511 : 与步骤 1310相同。
步骤 1512: 与步骤 1312相同。
对实施例十一也可以做类似的修改, 原理相同, 不再赘述。
根据本发明的基本原理, 图 13 ~ 15 所示的实施例还可以有多种变换方 式, 例如:
( 1 )在上述实施例中,家用基站使用参数 SIS查找对应的真实用户标识, 并使用该真实用户标识对终端用户进行接入控制;在本发明的其它实施例中, 也可以建立以参数 SIS为索引的 CSG信息, 家用基站在步骤 1310中直接使 用终端用户的参数 SIS进行接入控制。
( 2 )在上述实施例中, AAA服务器将终端用户的参数 SIS通过接入网 关发送给家用基站, 家用基站使用参数 SIS查找对应的真实用户标识, 并使 用该真实用户标识对终端用户进行接入控制;在本发明的其它实施例中, AAA 服务器可以直接将终端用户的真实用户标识通过接入网关发送给家用基站, 家用基站直接使用终端用户的真实用户标识进行接入控制。
当然,如果 AAA服务器将终端用户的真实用户标识通过接入网关发送给 家用基站, 则无法防止接入网关获取终端用户的真实用户标识, 因此通常不 适用于接入网关与 AAA服务器不属于同一运营商的情况; 即使接入网关与 AAA服务器同属于一个运营商, 但是接入网关与 AAA服务器之间的连接的 安全得不到保障时, 也不适用。
( 3 )在上述实施例中,考虑到一个终端用户可以是多个家用基站的 CSG 成员,因此 AAA服务器在使用终端用户的真实用户标识查找终端用户的参数 SIS时需要结合家用基站标识。 如果所述 SIS的取值是全局唯一的, 则 AAA 服务器使用终端用户的真实用户标识在本地或从用户数据服务器中仅能查找 到一个参数 SIS, 则可以不使用家用基站标识。
( 4 )在上述实施例中 (图 13至图 15 ) , 家用基站是从 AAA服务器获 取终端用户的参数 SIS的, 在本发明的其它实施例中, 家用基站也可以直接 从终端获取终端用户的参数 SIS, 例如, 当直接使用终端的属性(如 MAC地 址, MSID等 )作为参数 SIS时(参见步骤 504的相关描述 )。在这种情况下, 家用基站就无需等待 AAA服务器向其返回终端用户的参数了。
以第九实施例 (图 13 )为例, 终端可以使用任意一条其与家用基站交互 的消息, 将终端的属性发送到家用基站, 例如步骤 1301的空口参数同步及测 距消息、 步骤 1302的鉴权能力协商消息、 步骤 1304的用户标识响应等等。 在这种情况下, 家用基站在获得了参数 SIS之后, 可以立刻执行对终端用户 的接入控制。
( 5 ) 除了使用 AAA服务器发送的真实用户标识或对应的 SIS进行接入 控制外, 家用基站还可以使用真实用户标识或对应的 SIS进行如下操作: 移动终端从宏基站切换到家用基站; 移动终端在家用基站下执行位置更 新; 移动终端在家用基站下执行空闲模式退出, 以及重入网等等。
为了简化描述, 根据本发明的基本原理, 图 5 ~ 15所示的实施例是基于 图 1所示的模型进行的。 对于其他可能的模型, 如图 2所示的模型, 本发明 一样能够适用。 此外, 图 1 (图 2 ) 中的安全网关可以与接入网关单独设置, 也可以与接入网关合设, 甚至不需要该完全网关, 对本发明提供的方法没有 冲突, 同样适用, 原理相同, 在此不再赘述。
所述的用户数据服务器也可以被称作家用基站的 AAA服务器,或者被称 作家用基站的 CSG服务器。
此外, 如果分配所述 SIS、 才艮据所述终端用户的真实标识查找对应的 SIS 不需要结合所述的家用基站标识时(例如, SIS的取值是全局唯一的, 或者不 仅 SIS的取值全局唯一而且与所述终端用户的真实标识是——对应的) , 那 么所述用户数据服务器在发给所述 AAA服务器的请求中 (例如, 步骤 505 中的认证授权请求消息 )可以不用携带所述的家用基站标识。
除了上述方法实施例外, 本发明还提供实施上述方法的用户接入系统和 闭合用户组用户管理系统。
图 16是本发明实施例的用户接入系统结构示意图; 如图 16所示, 用户 接入系统中包含: 家用基站、 安全网关、 接入网关、 AAA服务器和用户数据 服务器; 其中, 用户数据服务器可以通过安全网关或直接与家用基站相连、 或通过接入网关与家用基站相连、 或通过接入网关和安全网关与家用基站相 连; 用户数据服务器与 AAA服务器相连。该系统中各网元的功能和网元之间 的连接关系(消息交互关系)详见对图 13 ~ 15所示的方法实施例的描述部分。
本发明实施例的闭合用户组用户管理系统结构示意图与用户接入系统结 构示意图相同; 如图 16所示, 闭合用户组用户管理系统中包含: 家用基站、 安全网关、 接入网关、 AAA服务器和用户数据服务器; 其中, 用户数据服务 器可以通过安全网关或直接与家用基站相连、 或通过接入网关与家用基站相 连、或通过接入网关和安全网关与家用基站相连; 用户数据服务器与 AAA服 务器相连。 该系统中各网元的功能和网元之间的连接关系 (消息交互关系) 详见对图 5 ~ 12所示的方法实施例的描述部分。
工业实用性
与现有技术相比,本发明不仅填补了当前 CSG用户管理的方法及系统的 空白, 还能避免在用户接入控制时在空口频繁传递用户真实标识, 提供了用 户标识私密性保护, 降低了家用基站系统的安全隐患。

Claims

权 利 要 求 书
1、一种终端用户通过家用基站接入无线通信网络的接入方法, 该方法包 括:
终端接收到接入网关发送的用户标识请求后, 通过家用基站向接入网关 发送用户标识响应消息, 所述响应消息中携带所述终端用户的伪标识; 接入 网关将所述伪标识发送给鉴权授权计费 AAA服务器;
AAA服务器使用所述伪标识发起对终端用户的鉴权流程,在所述鉴权流 程中获取终端用户的真实用户标识; 以及
AAA服务器将接入成功消息通过接入网关发送给所述家用基站; 从而实现使家用基站通过真实用户标识、 或真实用户标识对应的用户标 识代号对终端用户接入无线通信网进行控制, 其中, 所述用户标识代号由家 用基站或用户数据服务器或 AAA服务器在管理家用基站的闭合用户组 CSG 成员的过程中分配。
2、如权利要求 1所述的方法, 所述方法在通过家用基站向接入网关发送 用户标识响应消息的所述步骤之前还包括:
终端将真实用户标识对应的用户标识代号通过无线空口发送给家用基 站, 家用基站使用所述用户标识代号, 或者将所述用户标识代号对应成所述 真实用户标识后, 对终端用户进行接入控制。
3、 如权利要求 2所述的方法, 进行接入控制的所述步骤包括: 家用基站使用所述真实用户标识或所述用户标识代号判断所述终端用户 是否为所述家用基站的 CSG成员,
如果是, 则允许所述终端用户接入或为其分配高接入优先级, 并继续执 行后续的步骤;
否则不允许所述终端用户接入或为其分配低接入优先级, 如果判定不允 许所述终端用户接入, 则结束流程; 如果判定为所述终端用户分配低接入优 先级, 则继续执行后续的步骤。
或者, 家用基站使用所述真实用户标识或所述用户标识代号判断所述终端用户 是否为所述家用基站的 CSG成员,并根据所述终端的属性参数判断所述终端 用户是否使用预先指定的终端接入,
如果所述终端用户是 CSG成员, 且使用预先指定的终端接入, 则允许所 述终端用户接入或为其分配高接入优先级, 并继续执行后续的步骤;
否则不允许所述终端用户接入或为其分配低接入优先级, 如果判定不允 许所述终端用户接入, 则结束流程; 如果判定为所述终端用户分配低接入优 先级, 则继续执行后续的步骤。
4、 如权利要求 1所述的方法, 其中,
AAA服务器将接入成功消息通过接入网关发送给所述家用基站的所述 步骤包括:
AAA服务器向接入网关发送接入成功消息, 所述接入成功消息中携带 AAA服务器在鉴权流程中所获取的真实用户标识对应的用户标识代号; 接收到所述接入成功消息后,接入网关通过可扩展认证协议 EAP转发消 息或密钥改变指示消息将所述真实用户标识或所述用户标识代号发送给家用 基站。
5、 如权利要求 4所述的方法, 其还包括, AAA服务器通过如下方式之 一获取所述真实用户标识对应的用户标识代号:
AAA服务器使用所述真实用户标识、或使用所述真实用户标识结合所述 家用基站的标识在本地获取所述用户标识代号; 或者
AAA服务器使用所述真实用户标识、或使用所述真实用户标识结合所述 家用基站的标识从用户数据服务器获取所述用户标识代号。
6、 如权利要求 5所述的方法, 其还包括:
家用基站使用所述真实用户标识或所述用户标识代号, 或者将所述用户 标识代号对应成所述真实用户标识后, 对终端用户进行接入控制。
7、 如权利要求 1至 6中任一权利要求所述的方法, 其中, 所述用户标识 代号具有如下特征: 在家用基站上, 一个用户标识代号、 或一个用户标识代号结合一个网络 标识对应一个终端用户的真实用户标识;
和 /或,
在 AAA服务器上,一个终端用户的真实用户标识、或一个终端用户的真 实用户标识结合一个家用基站的标识对应一个(组)终端用户的用户标识代 号;
和 /或,
在用户数据服务器上, 一个终端用户的真实用户标识、 或一个终端用户 的真实用户标识结合一个家用基站的标识、 或一个终端用户的真实用户标识 结合一个家用基站的标识和一个网络标识对应一个(组)终端用户的用户标 识代号。
8、 如权利要求 4所述的方法, 其中, 对终端用户进行接入控制的所述步 骤包括:
家用基站使用所述真实用户标识或所述用户标识代号判断所述终端用户 是否为所述家用基站的 CSG成员; 如果是, 则允许所述终端用户接入或为其 分配高接入优先级,否则不允许所述终端用户接入或为其分配低接入优先级; 或者,
家用基站使用所述真实用户标识或所述用户标识代号判断所述终端用户 是否为所述家用基站的 CSG成员,并根据所述终端的属性参数判断所述终端 用户是否使用预先指定的终端接入; 如果所述终端用户是 CSG成员, 且使用 预先指定的终端接入, 则允许所述终端用户接入或为其分配高接入优先级, 否则不允许所述终端用户接入或为其分配低接入优先级。
9、 一种闭合用户组用户管理方法, 其包括:
家用基站接收到将终端用户增加为闭合用户组 CSG成员的 CSG成员管 理请求后, 请求用户数据服务器、 或请求用户数据服务器和鉴权授权计费 AAA服务器授权将所述终端用户增加为所述家用基站的 CSG成员;
所述用户数据服务器、或用户数据服务器和 AAA服务器对所述家用基站 的请求进行认证授权, 认证授权通过后, 保存更新的 CSG成员信息, 并授权 将所述终端用户增加为所述家用基站的 CSG成员; 以及
所述家用基站将所述终端用户增加为 CSG成员, 并保存更新的 CSG成 员信息;
其中,
所述 CSG成员信息包括: 所述终端用户的真实用户标识、 或所述家用基 站标识、 或所述终端用户的真实用户标识和所述家用基站的标识。
10、 如权利要求 9所述的方法, 其中,
所述方法在家用基站接收到将终端用户增加为闭合用户组 CSG成员的 CSG成员管理请求的所述步骤之后还包括:
家用基站为所述终端用户分配用户标识代号, 并将所分配的用户标识代 号与所述终端用户的真实用户标识一起、 或与所述终端用户的真实用户标识 和所述家用基站的标识一起发送给用户数据服务器、 或发送给用户数据服务 器和 AAA服务器; 或者
所述方法在用户数据服务器对所述家用基站的请求进行认证授权且认证 授权通过的步骤之后还包括:
用户数据服务器为所述终端用户分配用户标识代号, 并将所分配的用户 标识代号发送给家用基站、 或将所分配的用户标识代号发送给家用基站并将 该用户标识代号与所述终端用户的真实用户标识或与所述终端用户的真实用 户标识和所述家用基站的标识一起发送给所述 AAA服务器; 或者
所述方法在用户数据服务器和 AAA服务器对所述家用基站的请求进行 认证授权且认证授权通过的步骤之后还包括:
AAA服务器为所述终端用户分配用户标识代号, 并将所分配的用户标识 代号发送给所述家用基站和用户数据服务器;
所述 CSG成员信息还包括: 所述用户标识代号。
11、 如权利要求 9所述的方法, 所述方法在用户数据服务器对所述家用 基站的请求进行认证授权且认证授权通过的步骤之后还包括: 所述用户数据服务器向 AAA服务器发送 CSG信息更新消息, 该消息中 携带所述终端用户的真实用户标识、 或携带所述终端用户的真实用户标识和 所述家用基站的标识;
接收到所述 CSG信息更新消息后, 所述 AAA服务器为所述终端用户分 配用户标识代号, 并将所分配的用户标识代号发送给所述用户数据服务器和 家用基站;
所述 CSG成员信息还包括: 所述用户标识代号。
12、 如权利要求 10或 11所述的方法, 其中, 所述用户标识代号具有如 下特征:
在家用基站上, 一个用户标识代号、 或一个用户标识代号结合一个网络 标识对应一个终端用户的真实用户标识;
和 /或,
在 AAA服务器上,一个终端用户的真实用户标识、或一个终端用户的真 实用户标识结合一个家用基站的标识对应一个(组)终端用户的用户标识代 号;
和 /或,
在用户数据服务器上, 一个终端用户的真实用户标识、 或一个终端用户 的真实用户标识结合一个家用基站的标识、 或一个终端用户的真实用户标识 结合一个家用基站的标识和一个网络标识对应一个(组)终端用户的用户标 识代号。
13、 一种闭合用户组用户管理方法, 其包括:
用户数据服务器接收到将终端用户增加为家用基站的闭合用户组 CSG 成员的 CSG成员管理请求后, 用户数据服务器、 或用户数据服务器和鉴权授 权计费 AAA服务器对所述 CSG成员管理请求进行认证授权, 认证授权通过 后保存更新的 CSG成员信息, 并由用户数据服务器将更新的 CSG成员信息 发送给家用基站;
家用基站保存更新的 CSG成员信息; 所述 CSG成员信息包括: 所述终端用户的真实用户标识、 或所述家用基 站标识、 或所述终端用户的真实用户标识和所述家用基站的标识。
14、 如权利要求 13所述的方法, 其中,
所述方法在用户数据服务器对所述 CSG成员管理请求进行认证授权且 认证授权通过的步骤之后还包括:
所述用户数据服务器为所述终端用户分配用户标识代号, 并将所分配的 用户标识代号发送给家用基站、 或将所分配的用户标识代号发送给家用基站 并将该用户标识代号与所述终端用户的真实用户标识或与所述终端用户的真 实用户标识和所述家用基站的标识一起发送给所述 AAA服务器; 或者
所述方法在用户数据服务器和 AAA服务器对所述 CSG成员管理请求进 行认证授权且认证授权通过的步骤之后还包括:
所述 AAA服务器为所述终端用户分配用户标识代号 ,并将所分配的用户 标识代号发送给家用基站和用户数据服务器;
所述 CSG成员信息还包括: 所述用户标识代号。
15、 如权利要求 13所述的方法, 其中, 所述方法在用户数据服务器对所 述 CSG成员管理请求进行认证授权且认证授权通过的步骤之后还包括: 所述用户数据服务器向 AAA服务器发送 CSG信息更新消息, 该消息中 携带所述终端用户的真实用户标识、 或携带所述终端用户的真实用户标识和 所述家用基站的标识;
接收到所述 CSG信息更新消息后, 所述 AAA服务器为所述终端用户分 配用户标识代号, 并将所分配的用户标识代号发送给用户数据服务器和家用 基站;
所述 CSG成员信息还包括: 所述用户标识代号。
16、 如权利要求 14或 15所述的方法, 其中, 所述用户标识代号具有如 下特征:
在家用基站上, 一个用户标识代号、 或一个用户标识代号结合一个网络 标识对应一个终端用户的真实用户标识; 和 /或,
在 AAA服务器上,一个终端用户的真实用户标识、或一个终端用户的真 实用户标识结合一个家用基站的标识对应一个(组)终端用户的用户标识代 号;
和 /或,
在用户数据服务器上, 一个终端用户的真实用户标识、 或一个终端用户 的真实用户标识结合一个家用基站的标识、 或一个终端用户的真实用户标识 结合一个家用基站的标识和一个网络标识对应一个(组)终端用户的用户标 识代号。
17、 如权利要求 13所述的方法, 其中, 用户数据服务器将更新的 CSG 成员信息发送给家用基站的所述步骤中, 是釆用如下方式之一进行发送的: 用户数据服务器将所述 CSG成员信息包含在 CSG成员信息更新消息中 发送给家用基站; 或者
在执行家用基站的接入鉴权授权的过程中, 用户数据服务器将所述 CSG 成员信息包含在鉴权成功响应消息中发送给家用基站。
18、 一种终端用户通过家用基站接入无线通信网络的接入系统, 该系统 包括: 家用基站、 接入网关、 及鉴权授权计费 AAA服务器; 其中,
所述接入网关设置成向终端发送用户标识请求, 接收所述终端通过所述 家用基站发送的用户标识响应消息, 并将所述用户标识响应消息中携带的终 端用户的伪标识发送给所述 AAA服务器;
所述 AAA服务器设置成使用所述伪标识发起对终端用户的鉴权流程,在 所述鉴权流程中获取终端用户的真实用户标识;
所述 AAA服务器还设置成将所述真实用户标识、或所述真实用户标识对 应的用户标识代号通过所述接入网关发送给所述家用基站;
所述家用基站设置成使用所述真实用户标识或所述用户标识代号对终端 用户进行接入控制。
19、 如权利要求 18所述的系统, 其中, 所述 AAA服务器还设置成通过如下方式之一获取所述真实用户标识对 应的用户标识代号:
所述 AAA服务器使用所述真实用户标识、或使用所述真实用户标识和所 述家用基站的标识在本地获取所述用户标识代号; 或者
所述系统中还包含用户数据服务器;所述 AAA服务器还设置成使用所述 真实用户标识、 或使用所述真实用户标识和所述家用基站的标识从所述用户 数据服务器获取所述用户标识代号。
20、 一种闭合用户组用户管理系统, 该系统包括: 家用基站、 及用户数 据服务器; 其中:
所述家用基站设置成在接收到将终端用户增加为闭合用户组 CSG成员 的 CSG成员管理请求后,请求用户数据服务器授权将所述终端用户增加为该 家用基站的 CSG成员;
所述用户数据服务器设置成对所述 CSG成员管理请求进行认证授权,认 证授权通过后保存更新的 CSG成员信息,并授权将所述终端用户增加为所述 家用基站的 CSG成员;
所述家用基站还设置成在获得所述用户数据服务器的授权后, 将所述终 端用户增加为 CSG成员, 并保存更新的 CSG成员信息;
所述 CSG成员信息包括: 所述终端用户的真实用户标识、 或所述家用基 站的标识、 或所述终端用户的真实用户标识和所述家用基站的标识。
21、 如权利要求 20所述的系统, 其中,
所述系统中还包括鉴权授权计费 AAA服务器, 所述 AAA服务器设置成 对所述 CSG成员管理请求进行认证授权, 并保存更新的 CSG成员信息; 所述家用基站还设置成在在获得所述用户数据服务器和所述 AAA服务 器的授权后, 将所述终端用户增加为 CSG成员, 并保存更新的 CSG成员信 息。
22、 如权利要求 21所述的系统, 其中,
所述家用基站还设置成在接收到 CSG成员管理请求后,为所述终端用户 分配用户标识代号, 并将所分配的用户标识代号与所述终端用户的真实用户 标识一起、 或将所分配的用户标识代号与所述终端用户的真实用户标识和所 述家用基站的标识一起发送给所述用户数据服务器、 或发送给所述用户数据 服务器和所述 AAA服务器; 或者
所述用户数据服务器还设置成在对所述 CSG成员管理请求认证授权通 过后, 为所述终端用户分配用户标识代号, 并将所分配的用户标识代号发送 给所述家用基站、 或将所分配的用户标识代号发送给所述家用基站并将该用 户标识代号与所述终端用户的真实用户标识一起或与所述终端用户的真实用 户标识和所述家用的基站标识一起发送给所述 AAA服务器; 或者
所述 AAA服务器还设置成在对所述 CSG成员管理请求认证授权通过后、 或在接收到所述用户数据服务器发送的 CSG信息更新消息后,为所述终端用 户分配用户标识代号, 并将所分配的用户标识代号发送给所述家用基站和所 述用户数据服务器;
所述 CSG成员信息还包括: 所述用户标识代号。
23、 一种闭合用户组用户管理系统, 该系统包括: 家用基站、 及用户数 据服务器; 其中,
所述用户数据服务器设置成在接收到将终端用户增加为家用基站的闭合 用户组 CSG成员的 CSG成员管理请求后, 对所述 CSG成员管理请求进行认 证授权, 认证授权通过后保存更新的 CSG成员信息, 并将更新的 CSG成员 信息发送给所述家用基站;
所述家用基站设置成保存更新的 CSG成员信息;
所述 CSG成员信息包括: 所述终端用户的真实用户标识、 或所述家用基 站的标识、 或所述终端用户的真实用户标识和所述家用基站标识。
24、 如权利要求 23所述的系统, 其中,
所述系统还包括鉴权授权计费 AAA服务器, 所述 AAA服务器设置成对
CSG成员管理请求进行认证授权, 认证授权通过后保存更新的 CSG成员信 息, 并授权将终端用户增加为所述家用基站的 CSG成员; 所述用户数据服务器还设置成在获得所述 AAA服务器的授权后 ,保存所 述更新的 CSG成员信息, 并将所述更新的 CSG成员信息发送给所述家用基 站。
25、 如权利要求 24所述的系统, 其中,
所述用户数据服务器还设置成在接收到 CSG成员管理请求后,为所述终 端用户分配用户标识代号,并将所分配的用户标识代号发送给所述家用基站、 或将所分配的用户标识代号发送给所述家用基站并将该用户标识代号与所述 终端用户的真实用户标识一起或与所述终端用户的真实用户标识和所述家用 基站标识一起发送给所述 AAA服务器; 或者
所述 AAA服务器还设置成在对所述 CSG成员管理请求认证授权通过后、 或在接收到所述用户数据服务器发送的 CSG信息更新消息后,为所述终端用 户分配用户标识代号, 并将所分配的用户标识代号发送给所述家用基站和所 述用户数据服务器;
所述 CSG成员信息还包括: 所述用户标识代号。
PCT/CN2009/073973 2009-06-04 2009-09-16 用户接入方法及系统、闭合用户组用户管理方法及系统 WO2010139147A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200910203279.2A CN101909248B (zh) 2009-06-04 2009-06-04 用户接入方法及系统、闭合用户组用户管理方法及系统
CN200910203279.2 2009-06-04

Publications (1)

Publication Number Publication Date
WO2010139147A1 true WO2010139147A1 (zh) 2010-12-09

Family

ID=43264537

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/073973 WO2010139147A1 (zh) 2009-06-04 2009-09-16 用户接入方法及系统、闭合用户组用户管理方法及系统

Country Status (2)

Country Link
CN (1) CN101909248B (zh)
WO (1) WO2010139147A1 (zh)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012126290A1 (zh) * 2011-03-24 2012-09-27 中兴通讯股份有限公司 一种本地访问移动性管理方法及系统
CN103391544B (zh) * 2012-05-10 2017-04-26 华为技术有限公司 基站接入控制方法、相应的装置以及系统
WO2016101285A1 (zh) * 2014-12-27 2016-06-30 华为技术有限公司 网络接入的方法和设备
EP3311600A4 (en) * 2015-06-17 2019-01-23 Telefonaktiebolaget LM Ericsson (PUBL) METHOD AND DEVICE FOR DEVICE IDENTITY TESTING IN A CORE NETWORK FOR A WIRELESS NETWORK
CN106920382B (zh) * 2015-12-26 2020-02-21 华为技术有限公司 控制智能仪表入网的方法、主站和数据集中单元
CN116545777B (zh) * 2023-07-05 2023-09-26 中国电信股份有限公司 用户类别切换方法、装置、存储介质与电子设备

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030214958A1 (en) * 2002-04-12 2003-11-20 Lila Madour Linking of bearer and control for a multimedia session
US20040203914A1 (en) * 2003-01-15 2004-10-14 Jan Kall Provision of location information in a communication system
CN1874287A (zh) * 2005-05-30 2006-12-06 中兴通讯股份有限公司 移动通信网与无线城域网的互通系统及其方法
CN101159679A (zh) * 2004-01-14 2008-04-09 华为技术有限公司 一种无线局域网中分组数据关口获取用户身份标识的方法
CN101248640A (zh) * 2005-01-24 2008-08-20 艾利森电话股份有限公司 用于选择分组交换电信网络中移动终端的接入点名称(apn)的方法
CN101400153A (zh) * 2007-09-27 2009-04-01 北京三星通信技术研究有限公司 用户设备通过hnb接入系统直接通信的方法

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127659B (zh) * 2007-09-06 2010-06-16 中兴通讯股份有限公司 在WiMAX系统中实现用户鉴权控制移动终端上线方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030214958A1 (en) * 2002-04-12 2003-11-20 Lila Madour Linking of bearer and control for a multimedia session
US20040203914A1 (en) * 2003-01-15 2004-10-14 Jan Kall Provision of location information in a communication system
CN101159679A (zh) * 2004-01-14 2008-04-09 华为技术有限公司 一种无线局域网中分组数据关口获取用户身份标识的方法
CN101248640A (zh) * 2005-01-24 2008-08-20 艾利森电话股份有限公司 用于选择分组交换电信网络中移动终端的接入点名称(apn)的方法
CN1874287A (zh) * 2005-05-30 2006-12-06 中兴通讯股份有限公司 移动通信网与无线城域网的互通系统及其方法
CN101400153A (zh) * 2007-09-27 2009-04-01 北京三星通信技术研究有限公司 用户设备通过hnb接入系统直接通信的方法

Also Published As

Publication number Publication date
CN101909248A (zh) 2010-12-08
CN101909248B (zh) 2014-07-30

Similar Documents

Publication Publication Date Title
CN110800331B (zh) 网络验证方法、相关设备及系统
JP3869392B2 (ja) 公衆無線lanサービスシステムにおけるユーザ認証方法および該方法をコンピュータで実行させるためのプログラムを記録した記録媒体
CN101616410B (zh) 一种蜂窝移动通信网络的接入方法和系统
US7493084B2 (en) Method for grouping 802.11 stations into authorized service sets to differentiate network access and services
CN102111766B (zh) 网络接入方法、装置及系统
JP4864094B2 (ja) 通信制御システム
US8949602B2 (en) Method and apparatus for authenticating per M2M device between service provider and mobile network operator
KR100741996B1 (ko) 액세스 네트워크를 경유하여 접속을 설정하는 방법 및시스템
WO2019137030A1 (zh) 安全认证方法、相关设备及系统
WO2009000206A1 (fr) Procédé et système de commande d'accès de nœud initial b
WO2007045147A1 (fr) Procede, systeme et terminal de reseau d’acces du terminal de reseau local sans fil
CN101102188A (zh) 一种移动接入虚拟局域网的方法与系统
CN103329091A (zh) 交叉接入登录控制器
WO2010139147A1 (zh) 用户接入方法及系统、闭合用户组用户管理方法及系统
WO2010130118A1 (zh) 一种对家用基站用户实施鉴权的系统及方法
CN103906055A (zh) 业务数据分流方法及系统
CN103139772A (zh) 处理终端接入局域网的方法及使用数据统计的方法及装置
CN101990207B (zh) 接入控制方法、家用基站及家用基站授权服务器
WO2011015091A1 (zh) 用于家用基站的接入方法、装置、系统及aaa服务器
CN102883265B (zh) 接入用户的位置信息发送和接收方法、设备及系统
WO2010124569A1 (zh) 用户接入控制方法和系统
KR20130009836A (ko) 무선 원격통신 네트워크, 및 메시지를 인증하는 방법
WO2008148348A1 (fr) Procédé de communication, système et station de base domestique
JP2010074481A (ja) Lanシステム、端末装置、利用申請装置、ユーザアカウント取得方法
JP5213563B2 (ja) ネットワーク処理装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09845427

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09845427

Country of ref document: EP

Kind code of ref document: A1