WO2018227926A1 - 一种专网通信的实现方法及系统 - Google Patents

一种专网通信的实现方法及系统 Download PDF

Info

Publication number
WO2018227926A1
WO2018227926A1 PCT/CN2017/118698 CN2017118698W WO2018227926A1 WO 2018227926 A1 WO2018227926 A1 WO 2018227926A1 CN 2017118698 W CN2017118698 W CN 2017118698W WO 2018227926 A1 WO2018227926 A1 WO 2018227926A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
base station
micro base
private network
signal
Prior art date
Application number
PCT/CN2017/118698
Other languages
English (en)
French (fr)
Inventor
胡应添
Original Assignee
京信通信系统(中国)有限公司
京信通信系统(广州)有限公司
京信通信技术(广州)有限公司
天津京信通信系统有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 京信通信系统(中国)有限公司, 京信通信系统(广州)有限公司, 京信通信技术(广州)有限公司, 天津京信通信系统有限公司 filed Critical 京信通信系统(中国)有限公司
Publication of WO2018227926A1 publication Critical patent/WO2018227926A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/60Jamming involving special techniques
    • H04K3/68Jamming involving special techniques using passive jamming, e.g. by shielding or reflection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/04Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed

Definitions

  • the present invention relates to the field of communications, and in particular, to a method and system for implementing private network communication.
  • terminals of wireless communication systems such as mobile phones are increasingly becoming an indispensable tool in people's work and life. It is self-evident that the wide application of mobile phones brings convenience in communication, but at the same time, there are many hidden dangers that cannot be ignored. For example, in prisons, detention centers, examination sites, gas stations, gas stations, chemical warehouses, power dispatching rooms, hospital clinics, wards, operating rooms, as well as national intelligence agencies, military and important government departments, civil aviation management departments, etc. In the workplace, the signal of the mobile terminal may become a hidden danger of security and confidentiality, and needs to be shielded.
  • Some existing communication control systems implement full-system shielding of terminals covered in the target area, that is, in special places (such as prisons, examination rooms, etc.), all signals of illegal users are shielded even if they are legitimate users. Access to the public network, so that normal communication is not possible.
  • the embodiment of the invention provides a method and a system for implementing private network communication, which are used to provide a novel private network communication system, which can shield illegal users and realize normal communication of legitimate users.
  • the method of the present invention includes an implementation system for private network communication, the system comprising: a micro base station, a gateway, and a mask;
  • the mask is configured to block wireless signals of each frequency band in the non-private network standard in the coverage area of the micro base station, and to block a wireless signal in a private network standard and a non-private network frequency band in the coverage area of the micro base station;
  • the micro base station is configured to receive an uplink signal sent by the first terminal, and if the first terminal is determined to be a terminal in the whitelist set, send the uplink signal to the public network core network device by using the gateway;
  • the micro base station is further configured to receive a downlink signal sent by the public network core network device, and if it is determined that the second terminal corresponding to the downlink signal is a terminal in a whitelist set, send the downlink signal to the The second terminal.
  • the mask is specifically configured to: transmit a interference signal to interfere with a wireless signal of each frequency band of the non-private network system, and interfere with a wireless signal of a private network standard and a non-private network frequency band;
  • the mask is a multi-standard multi-band signal source, and is further configured to send reselection signaling to a terminal in the coverage area of the micro base station, and obtain an identifier of the accessed terminal, where The reselection signaling is used to indicate that the terminal reselects access to the mask.
  • system further includes a management operation client
  • the management operation client is configured to generate a whitelist set, and send the whitelist set to the management server, where the whitelist set includes an identifier of at least one terminal.
  • system further includes a management server
  • the control server is configured to receive and save a whitelist set sent by the management operation client, and send a whitelist to the micro base station.
  • management operation client is further configured to generate a management policy, where the management policy is used to control a function authority of an internal application of the terminal in the whitelist collection.
  • an embodiment of the present invention further provides a method for implementing private network communication, where the method includes:
  • the micro base station determines, according to the uplink signal, that the first terminal is a terminal in a whitelist set, and sends the uplink signal to a public network core network device.
  • the method further includes: the micro base station receiving the downlink signal sent by the public network core network device; and then the micro base station determining, according to the downlink signal, that the second terminal corresponding to the downlink signal is a whitelist set The terminal in the terminal sends the downlink signal to the second terminal.
  • the method further includes:
  • the micro base station receives the whitelist set delivered by the control server, where the whitelist set includes an identifier of at least one terminal.
  • the terminal in the whitelist set internally includes a management policy, and the control policy is used to control the function authority of the internal application of the terminal in the whitelist set.
  • the embodiment of the present application provides a network element, where the network element may be a micro base station, including: a communication interface, a processor, and a memory;
  • the processor calls an instruction stored in the memory to perform the following processing:
  • an uplink signal sent by the first terminal in the coverage area of the micro base station that is shielded by the mask where the mask masks wireless of each frequency band in the non-private network standard in the coverage area of the micro base station a signal, and a wireless signal shielding the private network standard and the non-private network frequency band in the coverage area of the micro base station;
  • processor is further configured to:
  • the processor is further configured to:
  • the whitelist set delivered by the management server receives, by the communication interface, the whitelist set delivered by the management server, where the whitelist set includes an identifier of at least one terminal.
  • the terminal in the whitelist set includes a management policy, where the control policy is used to control the function authority of the internal application of the terminal in the whitelist.
  • an embodiment of the present invention provides a non-transitory computer readable storage medium, where the non-transitory computer readable storage medium stores computer instructions, where the computer instructions are used to cause the computer to execute any of the above The method and system for implementing private network communication.
  • an embodiment of the present invention provides a computer program product, the computer program product comprising a computing program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions, when the program instruction is When the computer is executed, the computer is caused to execute the method and system for implementing the private network communication described in any of the above.
  • the micro base station provides a mobile communication private network of a specific standard and a specific frequency band, and the terminal in the white list accesses the micro base station and then connects to the core network of the public network through the gateway, so that the terminal under the private network coverage is connected to the public network.
  • the network network performs the purpose of normal communication.
  • the embodiment of the present invention further provides a shielding device, which can shield the public network network signal in the coverage area of the micro base station, thereby preventing illegal users from performing network communication in the coverage area of the micro base station.
  • the method can not only shield the coverage area of the micro base station, but also meet the purpose of normal users in the micro base station accessing the public network to perform normal communication, and the special network communication system is simple to deploy and low in cost. , has a good application prospects.
  • FIG. 1 is a schematic structural diagram of a system for implementing a special private network communication according to an embodiment of the present invention
  • FIG. 2 is a schematic diagram of an indoor distribution subsystem of private network communication according to an embodiment of the present invention
  • FIG. 3 is a schematic diagram of a core side deployment of an authorized communication system in a novel indoor wireless communication system according to an embodiment of the present invention
  • FIG. 4 is a schematic flowchart of a method for implementing private network communication according to an embodiment of the present invention
  • FIG. 5 is a schematic diagram of a network element architecture according to an embodiment of the present invention.
  • a terminal a device that provides voice and/or data connectivity to a user, including a wireless terminal or a wired terminal.
  • the wireless terminal can be a handheld device with wireless connectivity, or other processing device connected to a wireless modem, and a mobile terminal that communicates with one or more core networks via a wireless access network.
  • the wireless terminal can be a mobile phone (or "cellular" phone) and a computer with a mobile terminal.
  • the wireless terminal can also be a portable, pocket, handheld, computer built-in or in-vehicle mobile device.
  • the wireless terminal may be part of a mobile station (mobile station), an access point (English: access point), or a user equipment (English: user equipment, referred to as UE).
  • an embodiment of the present invention provides a novel implementation system for private network communication, where the system includes: a micro base station, a gateway, and a mask;
  • the mask is configured to block wireless signals of each frequency band in the non-private network standard in the coverage area of the micro base station, and to block a wireless signal in a private network standard and a non-private network frequency band in the coverage area of the micro base station;
  • the micro base station is configured to receive an uplink signal sent by the first terminal, and if the first terminal is determined to be a terminal in the whitelist set, send the uplink signal to the public network core network device by using the gateway;
  • the micro base station is further configured to receive a downlink signal sent by the public network core network device, and if it is determined that the second terminal corresponding to the downlink signal is a terminal in a whitelist set, send the downlink signal to the The second terminal.
  • the core network equipment of the public network that is, the carrier core network is a core component of the system providing normal wireless communication services.
  • the function of the operator core network is mainly to provide user plane connection, management of users, and completion of service bearers.
  • the bearer network provides an interface to the external network.
  • the establishment of the user connection includes mobility management, call management, exchange/routing, and recording notification (in combination with the connection relationship between the intelligent network service and the intelligent network peripheral device).
  • User management includes user description, QoS (Quality of Service), user communication record, and security.
  • the security measures provided by the authentication center include security management for mobile services and security for external network access. Sexual treatment).
  • the bearer connection includes an external PSTN (Public Switched Telephone Network), an external circuit data network and a packet data network, the Internet, and an intranet.
  • PSTN Public Switched Telephone Network
  • the micro base station is a single-mode micro base station, and only covers the coverage of one system of wireless signals of one operator.
  • scenarios that generally need to be shielded such as prisons, examination rooms, etc., allow few users to communicate, so that single-mode micro base stations can be used for coverage.
  • the frequency can be configured very little, so you can select a small frequency band of a standard system to save spectrum resources and reduce costs. For example, China Mobile's 900MHz GSM standard 1M bandwidth can be selected for wireless communication in private networks.
  • the single-mode micro base station can be connected to the gateway and the indoor distribution subsystem at the same time, and then accesses the core network equipment of the public network through the softswitch gateway, so that the downlink signal of the core network equipment of the public network is transmitted through the indoor distribution subsystem via the single-mode micro base station.
  • the indoor terminal is covered.
  • the single-mode micro base station transmits the uplink signal of the terminal in the indoor distribution subsystem to the carrier core network, thereby forming a normal and complete uplink and downlink wireless communication link.
  • the shield can choose multi-mode signal shielding device.
  • the so-called multi-mode signal shielding device is a multi-mode multi-band signal source, including 2G, 3G, 4G signal sources, and covers all operators and frequency bands, which can be set.
  • the wireless signal of all modes and all frequency bands of various operators except the standard and frequency bands in which the private network is located it is ensured that the shielded area is covered without blind spots.
  • the specific frequency bands of multi-mode multi-band signal sources include: China Mobile: GSM: 890-909/935-954MHz; TD-SCDMA: 2010-2025MHz; TD-LTE: 1880-1920MHz, 2575-2635MHz and 2300M-24000M; China Unicom : GSM: 909-915/954-960MHz; WCDMA: 1950-1955/2130-2145MHz; FDD-LTE: 1755-1765/1850-1860MHz; 1955-1980/2145-2170MHz; China Telecom: FDD-LTE: 1755- 1785/1850-1880MHz; 1920-1940/2110-2130MHz; CDMA: 870-880MHz.
  • the first shielding method is: the multimode signal masker can adopt the signal noise level of transmitting various standard signals, and deteriorate the signal to noise ratio of the signal of the public network macro base station. According to the principle of wireless communication, when the signal to noise ratio is lower than a certain threshold After that, the terminal will not be able to parse normally, ie the terminal will display “No Signal”.
  • the second shielding method may be to shield the mobile phone in the target area by using a "virtual base station".
  • the "virtual base station” uses the technology of the mobile communication protocol layer to superimpose the shielded network on the coverage of the operator's network, and allows the terminal in the target area to be transferred from the carrier network to the shielded network through reselection and the like through fine coverage and parameter adjustment. Therefore, the way in which the terminal transmits information (including calls, short multimedia messages, and data services) is cut off to achieve the purpose of shielding the operator's communication signals.
  • the shielding device with high-power full-band signal or virtual base station mode is used to distribute the shielding signal evenly in the area to be shielded by the indoor distribution distribution subsystem, which not only achieves the shielding effect of the area to be shielded, but also avoids the public network signal outside the shielding area. interference.
  • the indoor distribution subsystem is composed of RRU and antenna feeder system, which realizes indoor seamless coverage of wireless signals.
  • embodiments of the present invention further enhance the functionality of the mask such that the masker has the function of capturing the identity of the terminal of the illegitimate user.
  • the specific principle is as follows: According to the principle that the terminal accesses the core network, the multi-mode signal masker acts as a virtual base station to continuously send location update and request signaling, induces illegal users to access the virtual base station, and allows the user to always reside in the In the virtual base station.
  • the virtual base station is not connected to the carrier core network, so the normal wireless communication service functions, such as telephone and short message, cannot be completed.
  • information such as the IMSI (International Mobile Subscriber Identification Number) of the user can be captured by collecting the uplink signal of the terminal, which can be approximated by the virtual base station. The location information of the user is obtained, so that the terminal of the illegal user can be quickly captured.
  • IMSI International Mobile Subscriber Identification Number
  • the indoor distribution subsystem corresponding to the private network communication includes an RRU, an antenna feeder system, and the like.
  • the indoor distribution subsystem has a plurality of terminals, such as an authorized mobile terminal, an unlicensed mobile terminal, and a Unicom telecommunication terminal.
  • a mask and a micro base station are deployed on one side of the indoor, wherein the whitelist communication control is implemented on the single-mode micro base station, and the configuration, addition, deletion, and the like of the specific whitelist user are performed on the communication control operation platform.
  • the shield is used to shield non-dedicated network signals. In this case, the unlicensed mobile terminal and the Unicom telecommunication terminal cannot communicate normally because there is no signal displayed.
  • the uplink signal can be normally sent to the micro base station, because the micro base station obtains the whitelist user list and the corresponding IMSI signal sent by the management server in advance, so when the mobile phone user accesses the single-mode micro base station,
  • the single-mode micro base station compares the obtained user IMSI signal with the whitelist IMSI library. If the IMSI is successfully matched with one of the IMSI libraries, the user is allowed to access the single-mode micro base station and can communicate normally. Otherwise, The user is not allowed to access and cannot communicate normally.
  • FIG. 3 it is a schematic diagram of the core side deployment of the authorized communication system in a new type of indoor wireless communication system provided by the embodiment of the present invention
  • the single mode micro base station carries the host of the network through the PTN (Packet Transport Network)
  • the PTN device is connected to the gateway subsystem.
  • the gateway subsystem is also active and standby. This ensures the reliability of the core system.
  • the gateway subsystem accesses the core network pool of the active and standby devices through the IP bearer network.
  • the communication management server is also deployed in the cloud, such as the core equipment room, which is convenient for all application scenarios to share a set of servers.
  • the communication management and control platform is connected to the communication control server through the PTN network. For the reliability of communication, the communication management server is also the primary and backup backup.
  • the old indoor distribution subsystem already deployed in the room can be directly used without redeployment, which also greatly reduces the cost of system deployment and has good practicability.
  • the masker reports the detected service behavior to the management server in real time, and displays it on the management operation client.
  • the private network communication system can sound and light alarm, promptly remind management Quickly capture illegal users' mobile phones to avoid greater harm.
  • the control operation client is further configured to generate a whitelist set, and send the whitelist set to the management server, where the whitelist set includes an identifier of at least one terminal.
  • the management server is further configured to receive and save the whitelist set sent by the management operation client, and deliver the whitelist collection to the micro base station.
  • management server and the gateway and the management operation client are connected to each other, and some management and control policies are operated and saved to the management server by controlling the remote processing and control of the client.
  • management and control policies are operated and saved to the management server by controlling the remote processing and control of the client.
  • whitelist settings increase and decrease processing
  • whitelist users' communication policy settings including: only allow voice or SMS or data services, allow voice and SMS services, allow voice and data services, and so on.
  • the management operation client is further configured to generate a management policy, where the management policy is used to control the function authority of the internal application of the terminal in the whitelist collection. That is to say, for the terminal in the whitelist, the management server sends a control policy to the terminal in the whitelist, and can control the switch of some applications of the terminal in the terminal, for example, turning off functions such as Bluetooth, short message, etc., opening the call function, etc. .
  • the private network communication system may further include a network management server, the network management server and the gateway, the single mode micro base station, and the multimode signal shielding device are simultaneously connected to implement user interface management of the gateway, the single mode micro base station, and the multimode signal shielding device.
  • a network management server the network management server and the gateway, the single mode micro base station, and the multimode signal shielding device are simultaneously connected to implement user interface management of the gateway, the single mode micro base station, and the multimode signal shielding device.
  • Common network management interfaces are based on the TR-069 protocol.
  • the embodiment of the present invention provides a schematic flowchart of a method for implementing private network communication.
  • the specific implementation method includes:
  • Step S101 The micro base station receives an uplink signal sent by the first terminal in the coverage area of the micro base station that is shielded by the mask, where the mask blocks the wireless of each frequency band in the non-private network standard in the coverage area of the micro base station.
  • Step S102 The micro base station determines, according to the uplink signal, that the first terminal is a terminal in a whitelist set, and sends the uplink signal to the public network core network device by using the gateway.
  • the micro base station receives the whitelist set delivered by the management server, where the whitelist set includes an identifier of at least one terminal.
  • the micro base station receives a downlink signal sent by the public network core network device, and the micro base station determines, according to the downlink signal, that the second terminal corresponding to the downlink signal is a terminal in a whitelist set, The downlink signal is sent to the second terminal.
  • the management server delivers a management policy to the terminal in the whitelist, so the terminal in the whitelist collection internally includes a management policy, and the control policy is used to control the internal application of the terminal in the whitelist collection. Function permissions.
  • implementation steps of the implementation method of the private network communication are as follows:
  • Step a first selecting information such as an operator, a communication standard, and a communication frequency band for private network wireless communication, for example, a frequency band of 1805 to 1806 MHz of China Mobile DCS1800, which can be used for private network communication;
  • Step b determine the "white list" mobile phone users who can conduct private network communication, and the non-white list mobile phone users will not be able to communicate normally.
  • a whitelist can be set on the single-mode micro base station (in practical applications, the communication control server sends a whitelisted user list and corresponding IMSI signals, and automatically configures the single-mode micro base station system), and only the mobile phones in the whitelist It can reside in the cell of the micro base station and allow communication, and other mobile phones cannot be normally resident; the normal communication service of the whitelisted user is realized based on the operator core network, the gateway subsystem, the single mode micro base station, and the indoor distribution subsystem;
  • Step c based on the multimode signal masker and the indoor distribution subsystem, completely shields all communication systems and communication frequency bands except for the private network from the private network, such as the 1805 to 1806 MHz frequency band of the China Mobile DCS1800. It can be used for indoor normal communication.
  • Others include: China Unicom's full-range full-band signals, including GSM, DCS, WCDMA, LTE, etc.; shielding China Telecom's full-standard full-band signals, including CDMA, LTE, etc.; shielding China Mobile's TD-LTE TD-SCDMA, GSM 900MHz full-band signals, and shielding the China Mobile DCS1800MHz band 1806 ⁇ 1840MHz band signal.
  • the administrator controls the operation of the client to implement the addition and deletion of the whitelisted user.
  • the management and control policy can also be configured through the management and operation client.
  • the policy includes: only allowing voice or short message or data service, and allowing voice and short message services. Allow voice and data services, etc., and save specific policies and data to the communication management server.
  • Each user unit can increase or decrease according to the “white list” of the independent management authorization communication according to their needs; in addition, only the mobile phone number of the operator that is allowed to open the communication can apply for authorization, and the mobile phone numbers of other unauthorized operators cannot be obtained.
  • Authorization For example, whitelist users, only China Mobile’s mobile phone number can be authorized to communicate normally;
  • Step e based on the multi-mode signal masker and the indoor distribution subsystem, implements full-scale full-band shielding of signals in a specific area; based on the operator core network, the gateway subsystem, the single-mode micro base station, and the indoor distribution subsystem, Wireless coverage of specific carrier signals for a particular carrier. Therefore, the embodiment of the invention provides a novel indoor wireless communication system, which realizes the signal shielding of the full-system full-band and the wireless communication function of the specific system-specific signals of a specific operator.
  • the micro base station provides a mobile communication private network of a specific standard and a specific frequency band, and the terminal in the white list accesses the micro base station, and then connects to the core network of the public network through the gateway, thereby realizing the terminal connection under the coverage of the private network.
  • a mask is provided to shield the public network network signal in the coverage area of the micro base station, so as to prevent unauthorized users from being carried in the coverage area of the micro base station.
  • Network communication it can be seen that this method can not only shield the coverage of the micro base station coverage area, but also satisfy the purpose of normal users in the micro base station accessing the public network to perform normal communication, and the special network communication system is simple to deploy. The cost is low and has a good application prospect.
  • FIG. 5 is a schematic structural diagram of a network element provided by the present invention.
  • the network element 500 includes: a communication interface 501, a processor 502, a memory 503, and a bus system 504.
  • the memory 503 is configured to store a computer program, and may also store some data information and the like received by the network element.
  • the computer program can include program code, which can include computer operating instructions and the like.
  • the memory 503 may be a random access memory (RAM) or a non-volatile memory (NVM), such as at least one disk storage. Only one memory is shown in the figure, of course, the memory can also be set to a plurality as needed.
  • Memory 503 can also be a memory in processor 502.
  • the memory 503 can store elements, executable modules or data structures, etc., or a subset thereof, or an extended set thereof:
  • Operation instructions include various operation instructions for implementing various operations.
  • Operating system Includes a variety of system programs for implementing various basic services and handling hardware-based tasks.
  • the processor 502 is used for operation of the network element 500, and the processor 502 may also be referred to as a central processing unit (CPU).
  • CPU central processing unit
  • the communication interface 501 is configured to perform processing such as information transmission and reception on other devices connected to the network element 500.
  • the bus system 504 can include a power bus, a control bus, a status signal bus, and the like in addition to the data bus.
  • various buses are labeled as bus system 504 in the figure. For ease of representation, only the schematic drawing is shown in FIG.
  • Processor 502 may be an integrated circuit chip with signal processing capabilities. In the implementation process, each step of the foregoing method may be completed by hardware integrated logic circuits in the processor 502 or instructions in software form.
  • the processor 502 described above may be a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, a discrete gate or transistor logic device, or discrete hardware. Component.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • the methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present application may be directly implemented by the hardware decoding processor, or may be performed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
  • the storage medium can be located in the memory 503, and the processor 502 can read the information stored in the memory 503 and perform the above method steps in conjunction with the hardware.
  • the processor provided in this embodiment may receive, by using the communication interface, an uplink signal sent by the first terminal in the coverage area of the micro base station that is shielded by the mask, where the mask is shielded from the coverage area of the micro base station. a wireless signal in each frequency band of the non-private network system, and a wireless signal shielding the private network standard and the non-private network frequency band in the coverage area of the micro base station;
  • the network element in the embodiment of the present application provides a mobile communication private network with a specific standard and a specific frequency band, and the terminal in the white list accesses the micro base station and then connects to the core network of the public network through the gateway to implement terminal connection under the private network coverage.
  • a mask is provided to shield the public network network signal in the coverage area of the micro base station, so as to prevent unauthorized users from being carried in the coverage area of the micro base station.
  • Network communication it can be seen that this method can not only shield the coverage of the micro base station coverage area, but also satisfy the purpose of normal users in the micro base station accessing the public network to perform normal communication, and the special network communication system is simple to deploy. The cost is low and has a good application prospect.
  • the present invention also provides a non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the specialization described in any of the above The implementation method of network communication.
  • the present invention also provides a computer program product comprising a computing program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions, when the program instructions are executed by a computer And the method for causing the computer to perform the private network communication described in any of the above.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开一种专网通信的实现方法及系统,该系统包括:微基站、网关、屏蔽器;所述屏蔽器,用于屏蔽所述微基站覆盖区域内的非专网制式的各个频段的无线信号、以及屏蔽所述微基站覆盖区域内的专网制式且非专网频段的无线信号;所述微基站,用于接收第一终端发送的上行信号,若确定所述第一终端为白名单集合中的终端,则将所述上行信号通过所述网关发送至公网核心网设备;所述微基站,还用于接收所述公网核心网设备发送的下行信号,若确定所述下行信号对应的第二终端为白名单集合中的终端,则将所述下行信号发送至所述第二终端,本发明用以提供一种新型的专网通信系统,既可以屏蔽非法用户又能够实现合法用户的正常通信。

Description

一种专网通信的实现方法及系统
本申请要求在2017年06月12日提交中华人民共和国知识产权局、申请号为201710439125.8,发明名称为“一种专网通信的实现方法及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及通信领域,尤其涉及一种专网通信的实现方法及系统。
背景技术
现代社会,手机等无线通信系统的终端日益成为人们工作和生活中所不可缺少的重要工具。手机的广泛应用带来沟通上的便利是不言而喻的,但同时也产生了许多不容忽视的隐患。例如在监狱、看守所、考试现场、加油站、加气站、化工仓库、电力调度室、医院门诊、病房、手术室,以及国家的情报部门、军方和重要政府部门、民航空管部门等很多的场所中,移动终端的信号都可能成为安全和保密的隐患,需要被屏蔽。
现有的一些通信管控系统都是实现对目标区域内覆盖的终端进行全制式屏蔽,即在特殊的场所(如监狱、考场等),对非法用户的信号全部进行屏蔽即使是合法用户也不能正常接入到公网网络,从而无法实现正常通信。
因此,亟需一种新型的专网通信系统,可以解决现有通信管控系统存在的弊端。
发明内容
本发明实施例提供一种专网通信的实现方法及系统,用以提供一种新型的专网通信系统,既可以屏蔽非法用户又能够实现合法用户的正常通信。
第一方面,本发明方法包括一种专网通信的实现系统,该系统包括:微 基站、网关、屏蔽器;
所述屏蔽器,用于屏蔽所述微基站覆盖区域内的非专网制式的各个频段的无线信号、以及屏蔽所述微基站覆盖区域内的专网制式且非专网频段的无线信号;
所述微基站,用于接收第一终端发送的上行信号,若确定所述第一终端为白名单集合中的终端,则将所述上行信号通过所述网关发送至公网核心网设备;
所述微基站,还用于接收所述公网核心网设备发送的下行信号,若确定所述下行信号对应的第二终端为白名单集合中的终端,则将所述下行信号发送至所述第二终端。
进一步地,所述屏蔽器具体用于:发射干扰信号干扰所述非专网制式的各个频段的无线信号,以及干扰专网制式且非专网频段的无线信号;
或者,在所述微基站覆盖区域内的所述非专网制式的各个频段的无线信号上叠加屏蔽信号,以及在所述微基站覆盖区域内的专网制式且非专网频段的无线信号上叠加屏蔽信号。
在一种可能的设计中,所述屏蔽器为多制式多频段信号源,还用于向所述微基站覆盖区域内的终端发送重选信令,并获取接入的终端的标识,其中,所述重选信令用于指示终端重选接入到所述屏蔽器。
进一步地,所述系统还包括管控操作客户端;
所述管控操作客户端,用于生成白名单集合,并将所述白名单集合发送至管控服务器,其中,所述白名单集合中包括至少一个终端的标识。
在一种可能的设计中,所述系统还包括管控服务器;
所述管控服务器,用于接收并保存所述管控操作客户端发送的白名单集合,并向所述微基站下发白名单集合。
进一步地,所述管控操作客户端还用于生成管控策略,所述管控策略用于控制所述白名单集合中的终端的内部应用程序的功能权限。
第二方面,基于同样的发明构思,本发明实施例进一步地提供一种专网 通信的实现方法,该方法包括:
微基站接收屏蔽器屏蔽的所述微基站覆盖区域内的第一终端发送的上行信号,其中,所述屏蔽器屏蔽了所述微基站覆盖区域内非专网制式的各个频段的无线信号、以及屏蔽了所述微基站覆盖区域内专网制式且非专网频段的无线信号;
所述微基站根据所述上行信号确定所述第一终端为白名单集合中的终端,则将所述上行信号通过发送至公网核心网设备。
进一步地,所述方法还包括:所述微基站接收所述公网核心网设备发送的下行信号;然后所述微基站根据所述下行信号确定所述下行信号对应的第二终端为白名单集合中的终端,则将所述下行信号发送至所述第二终端。
其中,所述微基站接收屏蔽器屏蔽的所述微基站覆盖区域内的第一终端发送的上行信号之前,还包括:
所述微基站接收管控服务器下发的所述白名单集合,其中,所述白名单集合中包括至少一个终端的标识。
在一种可能的设计中,所述白名单集合中的终端内部包含管控策略,所述管控策略用于控制所述白名单集合中的终端的内部应用程序的功能权限。
第三方面,本申请实施例提供一种网元,该网元可以是上文中的微基站,包括:通信接口、处理器以及存储器;
所述处理器调用存储在所述存储器中的指令,执行以下处理:
通过所述通信接口接收屏蔽器屏蔽的所述微基站覆盖区域内的第一终端发送的上行信号,其中,所述屏蔽器屏蔽了所述微基站覆盖区域内非专网制式的各个频段的无线信号、以及屏蔽了所述微基站覆盖区域内专网制式且非专网频段的无线信号;
根据所述上行信号确定所述第一终端为白名单集合中的终端,则将所述上行信号通过所述通信接口发送至公网核心网设备。
进一步地,所述处理器还用于:
通过所述通信接口接收所述公网核心网设备发送的下行信号;
根据所述下行信号确定所述下行信号对应的第二终端为白名单集合中的终端,则将所述下行信号通过所述通信接口发送至所述第二终端。
在一种可能的设计中,所述处理器还用于:
通过所述通信接口接收管控服务器下发的所述白名单集合,其中,所述白名单集合中包括至少一个终端的标识。
其中,所述白名单集合中的终端内部包含管控策略,所述管控策略用于控制所述白名单集合中的终端的内部应用程序的功能权限。
第四方面,本发明实施例提供一种非暂态计算机可读存储介质,所述非暂态计算机可读存储介质存储计算机指令,所述计算机指令用于使所述计算机执行上述任一项所述的专网通信的实现方法及系统。
第五方面,本发明实施例提供一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行上述任一项所述的专网通信的实现方法及系统。
本发明实施例一方面微基站提供特定制式和特定频段的移动通信专网,白名单内的终端接入微基站后通过网关连接至公网核心网,实现专网覆盖下的终端接入到公网网络,进行正常通信的目的;另一方面,本发明实施例还提供屏蔽器,可以对微基站覆盖区域内公网网络信号进行屏蔽,从而避免微基站覆盖区域内有非法用户进行网络通信,可见,这一方法既可以实现对微基站覆盖区域进行信号屏蔽,还可以满足微基站内的合法用户接入到公网网络,进行正常通信的目的,而且该专网通信系统部署简单,成本低,具有较好的应用前景。
附图说明
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中 所需要使用的附图作简要介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域的普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为本发明实施例提供的一种新型的专网通信的实现系统结构示意图;
图2为本发明实施例提供的一种专网通信的室内分布子系统的示意图;
图3为本发明实施例提供的一种新型的室内无线通信系统中的授权通信系统核心侧部署示意图;
图4为本发明实施例提供一种专网通信的实现方法流程示意图;
图5为本发明实施例提供一种网元架构示意图。
具体实施方式
为了使本发明的目的、技术方案和优点更加清楚,下面将结合附图对本发明作进一步地详细描述,显然,所描述的实施例仅仅是本发明一部份实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其它实施例,都属于本发明保护的范围。
本文中结合终端和/或基站来描述各种方面。终端,指向用户提供语音和/或数据连通性的设备(device),包括无线终端或有线终端。无线终端可以是具有无线连接功能的手持式设备、或连接到无线调制解调器的其他处理设备,经无线接入网与一个或多个核心网进行通信的移动终端。例如,无线终端可以是移动电话(或称为“蜂窝”电话)和具有移动终端的计算机。又如,无线终端也可以是便携式、袖珍式、手持式、计算机内置的或者车载的移动装置。再如,无线终端可以为移动站(英文为:mobile station)、接入点(英文为:access point)、或用户设备(英文为:user equipment,简称UE)的一部分。
如图1所示,本发明实施例提供一种新型的专网通信的实现系统,该系 统包括:微基站、网关、屏蔽器;
所述屏蔽器,用于屏蔽所述微基站覆盖区域内的非专网制式的各个频段的无线信号、以及屏蔽所述微基站覆盖区域内的专网制式且非专网频段的无线信号;
所述微基站,用于接收第一终端发送的上行信号,若确定所述第一终端为白名单集合中的终端,则将所述上行信号通过所述网关发送至公网核心网设备;
所述微基站,还用于接收所述公网核心网设备发送的下行信号,若确定所述下行信号对应的第二终端为白名单集合中的终端,则将所述下行信号发送至所述第二终端。
其中,公网核心网设备,即运营商核心网是本系统提供正常无线通信服务的核心组成部分,运营商核心网的功能主要是提供用户面连接、对用户的管理以及对业务完成承载,作为承载网络提供到外部网络的接口。用户连接的建立包括移动性管理、呼叫管理、交换/路由、录音通知(结合智能网业务完成到智能网外围设备的连接关系)等功能。用户管理包括用户的描述、Qos(Quality of Service,服务质量)、用户通信记录、安全性(由鉴权中心提供相应的安全性措施包含了对移动业务的安全性管理和对外部网络访问的安全性处理)。承载连接包括到外部的PSTN(Public Switched Telephone Network,公共交换电话网络)、外部电路数据网和分组数据网、因特网和内部网等。
其中,微基站是单模微基站,只是服务于一个运营商的一个制式的无线信号的覆盖。而且,一般需要屏蔽的场景,如监狱、考场等场所,允许通信的用户很少,所以,采用单模微基站覆盖即可。而且,频点可以配置的很少,所以选择一个制式的的一小段频段即可,节约频谱资源,降低成本。如可以选择中国移动的900MHz的GSM制式1M带宽用于专网的无线通信。单模微基站可以同时与网关、室内分布子系统互相连接,再通过软交换网关接入到公网核心网设备,实现公网核心网设备的下行信号经由单模微基站通过室内分布子系统进行覆盖室内终端,另外,单模微基站将室内分布子系统内的终 端的上行信号传输到运营商核心网,因此形成正常的、完整的上下行无线通信链路。
其中,屏蔽器可以选择多模信号屏蔽器,所谓多模信号屏蔽器是一个多模多频段信号源,包括2G、3G、4G的信号源,而且,涵盖了所有的运营商和频段,可以设置成屏蔽除了专网所在的制式和频段之外的各种运营商的所有制式和所有频段的无线信号,确保被屏蔽的区域是无盲点覆盖的。如多模多频段信号源具体频段包括:中国移动:GSM:890-909/935-954MHz;TD-SCDMA:2010-2025MHz;TD-LTE:1880-1920MHz、2575-2635MHz和2300M-24000M;中国联通:GSM:909-915/954-960MHz;WCDMA:1950-1955/2130-2145MHz;FDD-LTE:1755-1765/1850-1860MHz;1955-1980/2145-2170MHz;中国电信:FDD-LTE:1755-1785/1850-1880MHz;1920-1940/2110-2130MHz;CDMA:870-880MHz。
当多模信号屏蔽器和室内分布子系统连接,就可以将多模多频段的屏蔽信号无盲点的覆盖到室内特定区域,实现对该区域的终端信号的屏蔽处理。其中第一种屏蔽方法是:多模信号屏蔽器可以采用发射各种制式信号干扰噪声电平,恶化公网宏基站信号的信噪比,根据无线通信原理,当信噪比低于某个阈值之后,终端将无法正常解析,即终端会显示“无信号”。第二种屏蔽方法可以是采用“虚拟基站”的方式对目标区域内的手机进行屏蔽。“虚拟基站”利用移动通信协议层面的技术,在运营商网络覆盖之上叠加屏蔽网络,通过精细覆盖、参数调整等方法让目标区域的终端通过重选等方式从运营商网络转移到屏蔽网络内,从而切断终端向外传递信息(包括通话、短彩信、数据业务)的途径,以达到屏蔽运营商通信信号的目的。采用大功率全频段信号或虚拟基站方式的屏蔽器设备,通过室内部署分布子系统,将屏蔽信号均匀地分布在待屏蔽区域,既达到待屏蔽区域屏蔽效果,同时避免对待屏蔽区域外公网信号的干扰。其中,室内分布子系统由RRU、天馈系统等构成,实现无线信号的室内无缝覆盖。
此外,除了正常的屏蔽之外,一些场景还需要在信号屏蔽的基础上,准 确地捕获到非法用户的终端标识,及时收缴非法用户的手机等终端,避免更大的破坏行为。为了实现这一功能,本发明实施例进一步地增强屏蔽器的功能,使得屏蔽器具有捕获非法用户的终端的标识的功能。具体地原理如下:根据终端接入核心网的原理,多模信号屏蔽器作为虚拟基站不间断发送位置更新和请求等信令,诱导非法用户接入到虚拟基站,并让用户始终驻留在该虚拟基站中。但该虚拟基站不连接至运营商核心网,所以不能完成正常的无线通信业务功能,如电话、短信等。但因为可以允许非法用户接入到该虚拟基站,所以就可以通过收集终端的上行信号,捕获到用户的IMSI(International Mobile Subscriber Identification Number,国际移动用户识别码)等信息,由于通过虚拟基站可以大致获得用户的位置信息,因此可以很快捕获到非法用户的终端。
如图2所示,专网通信所对应的室内分布子系统中包括由RRU、天馈系统等构成。该室内分布子系统中有多个终端,有授权移动终端、非授权移动终端、以及联通电信终端等。在室内的一侧部署有屏蔽器和微基站,其中,白名单通信管制在单模微基站上实现,具体白名单用户的配置、增删等操作在通信管控操作平台上。而屏蔽器则用于屏蔽非专网信号。这样的话,非授权移动终端和联通电信终端因为显示无信号,所以不能够正常通信。只有授权移动终端显示有信号,所以可以正常发送上行信号至微基站,因为微基站提前获得管控服务器下发的白名单用户列表以及对应的IMSI信号,所以当手机用户接入单模微基站时,单模微基站会将获取到的用户IMSI信号与白名单IMSI库进行对比,如果与IMSI库中某一个IMSI匹配成功,则允许该用户接入到单模微基站,可以正常通信,否则,则不允许该用户接入,无法正常通信。
如图3所示,是本发明实施例提供的一种新型的室内无线通信系统中的授权通信系统核心侧部署示意图;单模微基站通过PTN(分组传送网,Packet Transport Network)承载网的主备PTN设备接入到网关子系统,网关子系统也是主备备份的,保证了核心侧系统的可靠性,网关子系统通过IP承载网, 接入到主备的核心网池。通信管控服务器一般也部署在云端,如核心机房里,便于所有的应用场景公用一套服务器,通信管控操作平台通过PTN网络接入到通信管控服务器。为了通信的可靠性,通信管控服务器也是主备备份的。
对于室内分布子系统来说,还可以直接利用室内已经部署的旧的室内分布子系统,无需重新部署,这也大大降低了系统部署的成本,实用性好。
进一步地,屏蔽器实时将侦测到的业务行为上报到管控服务器,并在管控操作客户端上显示出来,非授权用户的业务行为出现时,专网通信系统可发出声光报警,及时提醒管理员快速捕获非法用户的手机,避免更大的危害。其中,所述管控操作客户端,还用于生成白名单集合,并将所述白名单集合发送至管控服务器,其中,所述白名单集合中包括至少一个终端的标识。另外,管控服务器,还用于接收并保存所述管控操作客户端发送的白名单集合,并向所述微基站下发白名单集合。
具体地,管控服务器和网关、管控操作客户端互相连接,通过管控操作客户端的远程处理和控制,将一些管控策略进行操作,并保存到管控服务器上。如白名单的设置,增减等处理,以及白名单用户的通信策略设置,包括:只允许语音或短信或数据业务,允许语音和短信业务,允许语音和数据业务等。
进一步地,管控操作客户端还用于生成管控策略,所述管控策略用于控制所述白名单集合中的终端的内部应用程序的功能权限。也就是说,针对白名单内的终端,管控服务器向白名单内的终端下发管控策略,可以控制该终端内的终端的部分应用程序的开关,例如关闭蓝牙、短信等功能,打开通话功能等。
其中,该专网通信系统还可以包括网管服务器,网管服务器与网关、单模微基站、多模信号屏蔽器同时相连接,实现对网关、单模微基站、多模信号屏蔽器的用户界面管理、用户管理、用户组管理、软件管理、日志管理、系统维护、参数设置、告警上报、系统功能开关等功能,常见的网管接口如基于TR-069协议。
基于同样的发明构思,本发明实施例提供一种专网通信的实现方法流程示意图,如图4所示,具体地实现方法包括:
步骤S101,微基站接收屏蔽器屏蔽的所述微基站覆盖区域内的第一终端发送的上行信号,其中,所述屏蔽器屏蔽了所述微基站覆盖区域内非专网制式的各个频段的无线信号、以及屏蔽了所述微基站覆盖区域内专网制式且非专网频段的无线信号。
步骤S102,所述微基站根据所述上行信号确定所述第一终端为白名单集合中的终端,则将所述上行信号通过所述网关发送至公网核心网设备。
需要说明的是,在执行步骤S101之前,所述微基站接收管控服务器下发的所述白名单集合,其中,所述白名单集合中包括至少一个终端的标识。
进一步地,所述微基站接收所述公网核心网设备发送的下行信号;所述微基站根据所述下行信号确定所述下行信号对应的第二终端为白名单集合中的终端,则将所述下行信号发送至所述第二终端。
进一步地,管控服务器向白名单内的终端下发管控策略,所以所述白名单集合中的终端内部包含管控策略,所述管控策略用于控制所述白名单集合中的终端的内部应用程序的功能权限。
具体来说,本发明实施例提供的专网通信的实现方法的实现步骤如下:
步骤a,先选定用于专网无线通信的运营商、通信制式和通信频段等信息,例如中国移动DCS1800的1805~1806MHz频段,可用于专网通信;
步骤b,再确定可以进行专网通信的“白名单”手机用户,非白名单手机用户,将无法正常通信。在单模微基站上可设置“白名单”(在实际应用中,通信管控服务器下发白名单用户列表以及对应的IMSI信号,并自动配置单模微基站系统上),仅白名单内的手机可驻留在该微基站小区内并允许通信,其他手机无法正常驻留;基于运营商核心网、网关子系统、单模微基站和室内分布子系统,实现白名单用户的正常通信业务;
步骤c,基于多模信号屏蔽器和室内分布子系统,对专网之外的所有其他不允许正常通信的运营商,通信制式和通信频段进行全部屏蔽,如中国移动 DCS1800的1805~1806MHz频段,可用于室内正常通信,其他的,包括:中国联通全制式全频段信号,包括GSM、DCS、WCDMA、LTE等;屏蔽中国电信全制式全频段信号,包括CDMA、LTE等;屏蔽中国移动TD-LTE、TD-SCDMA、GSM 900MHz全频段信号,以及屏蔽中国移动DCS1800MHz频段1806~1840MHz频段信号。
步骤d,管理员通过管控操作客户,实现对白名单用户的增删处理,而且,管控策略也可以通过管控操作客户端进行配置,策略包括:只允许语音或短信或数据业务,允许语音和短信业务,允许语音和数据业务等,具体策略和数据保存到通信管控服务器内。各个使用单位,根据各自独立管理授权通信的“白名单”,根据需要及时增减;另外,仅被允许通信开放的运营商的手机号才能申请获得授权,其他非授权的运营商的手机号无法授权。如,白名单用户,仅仅中国移动的手机号才能被授权正常通信;
步骤e,基于多模信号屏蔽器和室内分布子系统,实现对特定区域内的信号的全制式全频段屏蔽;基于运营商核心网、网关子系统、单模微基站和室内分布子系统,实现对特定运营商的特定制式信号的无线覆盖。因此,本发明实施例提供一种新型的室内无线通信系统,实现了全制式全频段的信号屏蔽和特定运营商的特定制式信号的无线通信功能。
综上,本发明实施例一方面微基站提供特定制式和特定频段的移动通信专网,白名单内的终端接入微基站后通过网关连接至公网核心网,实现专网覆盖下的终端接入到公网网络,进行正常通信的目的;另一方面,本发明实施例还提供屏蔽器,可以对微基站覆盖区域内公网网络信号进行屏蔽,从而避免微基站覆盖区域内有非法用户进行网络通信,可见,这一方法既可以实现对微基站覆盖区域进行信号屏蔽,还可以满足微基站内的合法用户接入到公网网络,进行正常通信的目的,而且该专网通信系统部署简单,成本低,具有较好的应用前景。
基于相同的技术构思,本申请实施例提供一种网元,该网元可以是上文中的微基站。图5为本发明提供的网元的结构示意图,该网元500包括:包 括:通信接口501、处理器502、存储器503和总线系统504。
其中,存储器503,用于存放计算机程序,还可以存储网元接收的一些数据信息等。具体地,计算机程序可以包括程序代码,程序代码可以包括计算机操作指令等。存储器503可能为随机存取存储器(英文:random-access memory,RAM),也可能为非易失性存储器(英文:non-volatile memory,NVM),例如至少一个磁盘存储器。图中仅示出了一个存储器,当然,存储器也可以根据需要,设置为多个。存储器503也可以是处理器502中的存储器。
一种示例说明,存储器503可以存储如下的元素、可执行模块或者数据结构等,或者是它们的子集,或者它们的扩展集:
操作指令:包括各种操作指令,用于实现各种操作。
操作系统:包括各种系统程序,用于实现各种基础业务以及处理基于硬件的任务。
处理器502用于网元500的操作,处理器502还可以称为中央处理单元(central processing unit,CPU)。
通信接口501,用于与网元500连接的其他设备进行信息收发等处理。
具体的应用中,网元500的各个组件可以通过总线系统504耦合在一起,其中总线系统504除包括数据总线之外,还可以包括电源总线、控制总线和状态信号总线等。但是为了清楚说明起见,在图中将各种总线都标为总线系统504。为便于表示,图5中仅是示意性画出。
上述本申请实施例揭示的方法可以应用于处理器502中,或者由处理器502实现。处理器502可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器502中的硬件集成逻辑电路或者软件形式的指令完成。上述的处理器502可以是通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、现场可编程门阵列(FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例 所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质可以位于存储器503中,处理器502可以读取存储器503中存储的信息,结合硬件执行以上方法步骤。
本实施例中提供的处理器可以通过所述通信接口接收屏蔽器屏蔽的所述微基站覆盖区域内的第一终端发送的上行信号,其中,所述屏蔽器屏蔽了所述微基站覆盖区域内非专网制式的各个频段的无线信号、以及屏蔽了所述微基站覆盖区域内专网制式且非专网频段的无线信号;
根据所述上行信号确定所述第一终端为白名单集合中的终端,则将所述上行信号通过所述通信接口发送至公网核心网设备。具体实现可以参照上述方法实施例中的具体描述,这里不再详细赘述。
综上,本申请实施例中的网元提供特定制式和特定频段的移动通信专网,白名单内的终端接入微基站后通过网关连接至公网核心网,实现专网覆盖下的终端接入到公网网络,进行正常通信的目的;另一方面,本发明实施例还提供屏蔽器,可以对微基站覆盖区域内公网网络信号进行屏蔽,从而避免微基站覆盖区域内有非法用户进行网络通信,可见,这一方法既可以实现对微基站覆盖区域进行信号屏蔽,还可以满足微基站内的合法用户接入到公网网络,进行正常通信的目的,而且该专网通信系统部署简单,成本低,具有较好的应用前景。
另外,本发明还提供一种非暂态计算机可读存储介质,所述非暂态计算机可读存储介质存储计算机指令,所述计算机指令用于使所述计算机执行上述任一项所述的专网通信的实现方法。
另外,本发明还提供一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行上述任一项所述的 专网通信的实现方法。
尽管已描述了本发明的优选实施例,但本领域内的技术人员一旦得知了基本创造性概念,则可对这些实施例作出另外的变更和修改。所以,所附权利要求意欲解释为包括优选实施例以及落入本发明范围的所有变更和修改。
显然,本领域的技术人员可以对本发明进行各种改动和变型而不脱离本发明的精神和范围。这样,倘若本发明的这些修改和变型属于本发明权利要求及其等同技术的范围之内,则本发明也意图包含这些改动和变型在内。

Claims (16)

  1. 一种专网通信的实现系统,其特征在于,该系统包括:微基站、网关、屏蔽器;
    所述屏蔽器,用于屏蔽所述微基站覆盖区域内的非专网制式的各个频段的无线信号、以及屏蔽所述微基站覆盖区域内的专网制式且非专网频段的无线信号;
    所述微基站,用于接收第一终端发送的上行信号,若确定所述第一终端为白名单集合中的终端,则将所述上行信号通过所述网关发送至公网核心网设备;
    所述微基站,还用于接收所述公网核心网设备发送的下行信号,若确定所述下行信号对应的第二终端为白名单集合中的终端,则将所述下行信号发送至所述第二终端。
  2. 如权利要求1所述的系统,其特征在于,所述屏蔽器具体用于:
    发射干扰信号干扰所述非专网制式的各个频段的无线信号,以及干扰专网制式且非专网频段的无线信号;
    或者,在所述微基站覆盖区域内的所述非专网制式的各个频段的无线信号上叠加屏蔽信号,以及在所述微基站覆盖区域内的专网制式且非专网频段的无线信号上叠加屏蔽信号。
  3. 如权利要求2所述的系统,其特征在于,所述屏蔽器为多制式多频段信号源,还用于向所述微基站覆盖区域内的终端发送重选信令,并获取接入的终端的标识,其中,所述重选信令用于指示终端重选接入到所述屏蔽器。
  4. 如权利要求1所述的系统,其特征在于,所述系统还包括管控操作客户端;
    所述管控操作客户端,用于生成白名单集合,并将所述白名单集合发送至管控服务器,其中,所述白名单集合中包括至少一个终端的标识。
  5. 如权利要求4所述的系统,其特征在于,所述系统还包括管控服务器;
    所述管控服务器,用于接收并保存所述管控操作客户端发送的白名单集合,并向所述微基站下发白名单集合。
  6. 如权利要求4所述的系统,其特征在于,所述管控操作客户端还用于生成管控策略,所述管控策略用于控制所述白名单集合中的终端的内部应用程序的功能权限。
  7. 一种专网通信的实现方法,其特征在于,该方法包括:
    微基站接收屏蔽器屏蔽的所述微基站覆盖区域内的第一终端发送的上行信号,其中,所述屏蔽器屏蔽了所述微基站覆盖区域内非专网制式的各个频段的无线信号、以及屏蔽了所述微基站覆盖区域内专网制式且非专网频段的无线信号;
    所述微基站根据所述上行信号确定所述第一终端为白名单集合中的终端,则将所述上行信号发送至公网核心网设备。
  8. 如权利要求7所述的方法,其特征在于,还包括:
    所述微基站接收所述公网核心网设备发送的下行信号;
    所述微基站根据所述下行信号确定所述下行信号对应的第二终端为白名单集合中的终端,则将所述下行信号发送至所述第二终端。
  9. 如权利要求7所述的方法,其特征在于,所述微基站接收屏蔽器屏蔽的所述微基站覆盖区域内的第一终端发送的上行信号之前,还包括:
    所述微基站接收管控服务器下发的所述白名单集合,其中,所述白名单集合中包括至少一个终端的标识。
  10. 如权利要求9所述的方法,其特征在于,所述白名单集合中的终端内部包含管控策略,所述管控策略用于控制所述白名单集合中的终端的内部应用程序的功能权限。
  11. 一种网元,其特征在于,包括通信接口、处理器以及存储器;
    所述处理器调用存储在所述存储器中的指令,执行以下处理:
    通过所述通信接口接收屏蔽器屏蔽的所述微基站覆盖区域内的第一终端发送的上行信号,其中,所述屏蔽器屏蔽了所述微基站覆盖区域内非专网制 式的各个频段的无线信号、以及屏蔽了所述微基站覆盖区域内专网制式且非专网频段的无线信号;
    根据所述上行信号确定所述第一终端为白名单集合中的终端,则将所述上行信号通过所述通信接口发送至公网核心网设备。
  12. 如权利要求11所述的网元,其特征在于,所述处理器还用于:
    通过所述通信接口接收所述公网核心网设备发送的下行信号;
    根据所述下行信号确定所述下行信号对应的第二终端为白名单集合中的终端,则将所述下行信号通过所述通信接口发送至所述第二终端。
  13. 如权利要求11所述的网元,其特征在于,所述处理器还用于:
    通过所述通信接口接收管控服务器下发的所述白名单集合,其中,所述白名单集合中包括至少一个终端的标识。
  14. 如权利要求13所述的网元,其特征在于,
    所述白名单集合中的终端内部包含管控策略,所述管控策略用于控制所述白名单集合中的终端的内部应用程序的功能权限。
  15. 一种计算机存储介质,其特征在于,所述计算机存储介质存储有计算机可执行指令,所述计算机可执行指令用于使计算机执行如权利要求7至10任一项所述的方法。
  16. 一种计算机程序产品,其特征在于,当所述计算机程序产品被计算机执行时,使所述计算机执如行权利要求7至10任一项所述的方法。
PCT/CN2017/118698 2017-06-12 2017-12-26 一种专网通信的实现方法及系统 WO2018227926A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710439125.8 2017-06-12
CN201710439125.8A CN107342838B (zh) 2017-06-12 2017-06-12 一种专网通信的实现方法及系统

Publications (1)

Publication Number Publication Date
WO2018227926A1 true WO2018227926A1 (zh) 2018-12-20

Family

ID=60220552

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/118698 WO2018227926A1 (zh) 2017-06-12 2017-12-26 一种专网通信的实现方法及系统

Country Status (2)

Country Link
CN (1) CN107342838B (zh)
WO (1) WO2018227926A1 (zh)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107342838B (zh) * 2017-06-12 2020-01-14 京信通信系统(中国)有限公司 一种专网通信的实现方法及系统
CN109788486A (zh) 2017-11-14 2019-05-21 中兴通讯股份有限公司 无线通信方法及装置
CN109195193A (zh) * 2018-08-21 2019-01-11 四川长虹网络科技有限责任公司 WiFi模拟装置
CN109673022B (zh) * 2018-12-14 2020-08-04 浙江三维通信科技有限公司 一种利用多个侦测基站的信令管控lte终端的方法及系统
CN111565436B (zh) * 2020-04-15 2022-08-12 中国联合网络通信集团有限公司 一种通信方法和接入网设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152121A (zh) * 2013-03-05 2013-06-12 京信通信系统(广州)有限公司 手机信号智能屏蔽信号发生器以及系统
CN203537405U (zh) * 2013-07-05 2014-04-09 成都天奥信息科技有限公司 一种多频段无线信号屏蔽系统
WO2016160851A1 (en) * 2015-03-30 2016-10-06 Zoll Medical Corporation Customer-or patient-based selective data encryption in medical device management
CN106686583A (zh) * 2016-02-05 2017-05-17 焦秉立 一种Wi-Fi环境下安全通信的方法及装置
CN107342838A (zh) * 2017-06-12 2017-11-10 京信通信系统(中国)有限公司 一种专网通信的实现方法及系统

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101527574B (zh) * 2009-03-27 2013-08-28 王方松 一种无缝分级管理的屏蔽系统
CN202364204U (zh) * 2011-12-07 2012-08-01 天津市英讯科技有限公司 一种考场无线信号屏蔽器
US8965365B2 (en) * 2012-07-11 2015-02-24 Apple Inc. Robust frequency scan in presence of strong adjacent systems

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152121A (zh) * 2013-03-05 2013-06-12 京信通信系统(广州)有限公司 手机信号智能屏蔽信号发生器以及系统
CN203537405U (zh) * 2013-07-05 2014-04-09 成都天奥信息科技有限公司 一种多频段无线信号屏蔽系统
WO2016160851A1 (en) * 2015-03-30 2016-10-06 Zoll Medical Corporation Customer-or patient-based selective data encryption in medical device management
CN106686583A (zh) * 2016-02-05 2017-05-17 焦秉立 一种Wi-Fi环境下安全通信的方法及装置
CN107342838A (zh) * 2017-06-12 2017-11-10 京信通信系统(中国)有限公司 一种专网通信的实现方法及系统

Also Published As

Publication number Publication date
CN107342838B (zh) 2020-01-14
CN107342838A (zh) 2017-11-10

Similar Documents

Publication Publication Date Title
WO2018227926A1 (zh) 一种专网通信的实现方法及系统
CN107332639B (zh) 一种专网通信的实现方法及系统
US20200037284A1 (en) System and method for determining a location for a device in a communication network
WO2018227927A1 (zh) 一种无线信号的屏蔽方法及装置
WO2018227929A1 (zh) 一种专网通信的实现方法及设备
US20220030502A1 (en) SIM Whitelisting and Multi-Operator Core Networks
US11997585B2 (en) SIM whitelisting and multi-operator core networks
CN110140380A (zh) 紧急呼叫的开放接入点
WO2018227928A1 (zh) 一种无线信号的屏蔽方法及装置
JP2016536864A (ja) データベース間またはスペクトル管理機能間の通信のための方法および手順
US9907054B2 (en) Method and device for setting operating channel in white space
US8660536B1 (en) Mobile Device Management Solution
US20220322429A1 (en) Channel detection method and apparatus for shared spectrum and storage medium
US9648587B2 (en) Method and apparatus for transmitting and receiving a whitespace map in a wireless communication system
EP4135376A1 (en) Method and device for secure communication
RU2660834C2 (ru) Выбор сети wlan
WO2020034107A1 (zh) 一种网络接入方法、终端设备及网络设备
WO2018166439A1 (zh) 发送功率的配置方法、终端、基站和基带芯片
WO2022252947A1 (zh) 干扰消除方法及装置、电子设备、计算机可读存储介质
Perkov et al. Recent advances in GSM insecurities
US20230156448A1 (en) Method and System for Supporting Emergency Voice Services Over Wireless Local Area Network (WLAN) Using Dynamic SSID Deployment
US20130045736A1 (en) System, method and product for verifying the allocation of locally unused radio frequencies
CN104185160A (zh) 一种移动业务应用迁移系统及其代理终端
WO2022249151A1 (en) Centralized afc system information function and procedures in 6 ghz afc controlled networks
Singh et al. An investigation on wireless mobile network and wireless lan (wi-fi) for performance evaluation

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17913546

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 30/04/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17913546

Country of ref document: EP

Kind code of ref document: A1