WO2018227928A1 - 一种无线信号的屏蔽方法及装置 - Google Patents
一种无线信号的屏蔽方法及装置 Download PDFInfo
- Publication number
- WO2018227928A1 WO2018227928A1 PCT/CN2017/118701 CN2017118701W WO2018227928A1 WO 2018227928 A1 WO2018227928 A1 WO 2018227928A1 CN 2017118701 W CN2017118701 W CN 2017118701W WO 2018227928 A1 WO2018227928 A1 WO 2018227928A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- network device
- communication system
- cell
- virtual
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 60
- 238000004891 communication Methods 0.000 claims abstract description 120
- 230000011664 signaling Effects 0.000 claims abstract description 36
- 238000004590 computer program Methods 0.000 claims description 15
- 238000012545 processing Methods 0.000 claims description 14
- 238000003860 storage Methods 0.000 claims description 13
- 238000001228 spectrum Methods 0.000 claims description 10
- 230000000873 masking effect Effects 0.000 claims description 3
- 230000006870 function Effects 0.000 description 16
- 238000010586 diagram Methods 0.000 description 13
- 230000008569 process Effects 0.000 description 6
- 238000009826 distribution Methods 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 238000013461 design Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 239000000306 component Substances 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000008358 core component Substances 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000011022 operating instruction Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/60—Jamming involving special techniques
- H04K3/68—Jamming involving special techniques using passive jamming, e.g. by shielding or reflection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/13—Cell handover without a predetermined boundary, e.g. virtual cells
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/08—Reselecting an access point
Definitions
- the present application relates to the field of communications, and in particular, to a method and an apparatus for shielding a wireless signal.
- terminals of wireless communication systems such as mobile phones are increasingly becoming an indispensable tool in people's work and life. It is self-evident that the wide application of mobile phones brings convenience in communication, but at the same time, there are many hidden dangers that cannot be ignored. For example, in prisons, detention centers, examination sites, gas stations, gas stations, chemical warehouses, power dispatching rooms, hospital clinics, wards, operating rooms, as well as national intelligence agencies, military and important government departments, civil aviation management departments, etc. In the workplace, the signal of the mobile terminal may become a hidden danger of security and confidentiality, and needs to be shielded.
- the present invention provides a method and a device for shielding a wireless signal, which are used to solve the problem that the conventional shielding method cannot successfully shield the terminal.
- an embodiment of the present application provides a method for shielding a wireless signal, where the method includes:
- the first network device sends reselection signaling to the terminal, where the terminal is a terminal of the second network device that accesses the public network in the area to be shielded, and the reselection signaling is used to indicate that the terminal is reselected.
- the first network device is configured to block a wireless signal between the second network device and the terminal;
- the first network device establishes a virtual call link according to the call request, wherein the virtual call link is to maintain a communication link between the first network device and the terminal.
- the method further includes:
- the first network device determines that the spectrum resource corresponding to the current first communication system is not less than the first threshold, the first network device sends a second connection to the terminal.
- the second access instruction is used to indicate that the terminal accesses the cell of the first network device that supports the second communication system, and the access priority of the second communication system is lower than the first The access priority of a communication system.
- the method further includes:
- the first network device establishes a unique virtual cell of the second communication system in the to-be-masked area according to the first frequency point, where the first frequency point is smaller than the second threshold, and is the public network base station.
- the method further includes:
- the first network device establishes a unique virtual cell of the first communication system in the to-be-masked area according to the first frequency point, where the first frequency point and the frequency of each cell covered by the public network base station The point is the same, the physical cell identifier PCI of the virtual cell is different from the PCI of each cell of the second network device.
- an embodiment of the present application provides a shielding apparatus for a wireless signal, where the apparatus includes:
- a sending unit configured to send reselection signaling to the terminal, where the terminal is a terminal of the second network device that accesses the public network in the area to be shielded, and the reselection signaling is used to indicate that the terminal reselects Accessing the first network device, where the first network device is configured to block a wireless signal between the second network device and the terminal;
- a receiving unit configured to receive a call request sent by a terminal that accesses the first network device
- a establishing unit configured to establish a virtual call link according to the call request, wherein the virtual call link is to maintain a communication link between the first network device and the terminal.
- the embodiment of the invention further provides a shielding device for a wireless signal, the device comprising:
- a sending unit configured to send reselection signaling to the terminal, where the terminal is a terminal of the second network device that accesses the public network in the area to be shielded, and the reselection signaling is used to indicate that the terminal reselects Accessing the first network device, where the first network device is configured to block a wireless signal between the second network device and the terminal;
- a receiving unit configured to receive a call request sent by a terminal that accesses the first network device
- a establishing unit configured to establish a virtual call link according to the call request, wherein the virtual call link is to maintain a communication link between the first network device and the terminal.
- the receiving unit is further configured to receive an uplink signal sent by the terminal;
- the device further includes: a determining unit, configured to determine, according to the uplink signal, whether the terminal supports the first communication system;
- the sending unit is further configured to: when the determining unit determines to support the first communication system, send a first access instruction to the terminal, where the first access instruction is used to instruct the terminal to access the A cell of the first network device supporting the first communication system.
- the determining unit is further configured to determine whether the spectrum resource corresponding to the current first communication system is not less than the first threshold
- the sending unit is further configured to: when the determining unit determines that the threshold is not less than the first threshold, send a second access instruction to the terminal, where the second access command is used to indicate that the terminal accesses
- the cell of the first network device supporting the second communication system has an access priority of the second communication system lower than an access priority of the first communication system.
- the establishing unit is further configured to: before the sending unit sends the reselection signaling, establish a unique virtual cell of the second communication system in the to-be-masked area according to the first frequency point, where The first frequency point is smaller than the second threshold, and is a frequency point in each cell covered by the public network base station.
- the establishing unit is further configured to: acquire information about each cell covered by the public network base station corresponding to the first communication system in the to-be-masked area;
- the embodiment of the present application provides a network device, where the network device may be the first network device, including: a communication interface, a processor, and a memory;
- the processor calls an instruction stored in the memory to perform the following processing:
- the terminal is a terminal of a second network device that accesses the public network in the area to be shielded, and the reselection signaling is used to indicate that the terminal is reselected.
- the network device is configured to block a wireless signal between the second network device and the terminal;
- processor is further configured to:
- the processor is further configured to:
- the processor is further configured to:
- the processor Before the processor sends the reselection signaling to the terminal in the to-be-masked area, the processor is further configured to establish a unique virtual cell of the second communication system in the to-be-masked area according to the first frequency point, where the The frequency point is smaller than the second threshold and is a frequency point in each cell covered by the public network base station.
- the processor is further configured to acquire information about each cell covered by the public network base station corresponding to the first communication system in the to-be-masked area; Establishing a unique virtual cell of the first communication system in the to-be-masked area, wherein the first frequency point is the same as the frequency of each cell covered by the public network base station, and the virtual cell
- the physical cell identifier PCI is different from the PCI of each cell of the second network device.
- an embodiment of the present invention provides a non-transitory computer readable storage medium, where the non-transitory computer readable storage medium stores computer instructions, where the computer instructions are used to cause the computer to execute any of the above The method and device for shielding wireless signals.
- an embodiment of the present invention provides a computer program product, the computer program product comprising a computing program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions, when the program instruction is When the computer is executed, the computer is caused to perform the method and apparatus for shielding the wireless signal according to any of the above.
- the embodiment of the present application provides a new shielding method, and the virtual base station can simulate the core network function, transmit a strong signal to induce the public network terminal to access the virtual base station, and establish a virtual call link according to the call request of the terminal. Therefore, the terminal can not judge the access to the pseudo base station by checking the call link, so the terminal having the function of preventing the virtual base station can be successfully shielded, so that the shielding method has low cost, good effect, and has a good application prospect.
- FIG. 1 is a flowchart of a method for shielding a wireless signal according to an embodiment of the present application
- FIG. 2 is a schematic diagram of a usage scenario of a shield provided by an embodiment of the present application.
- FIG. 3 is a schematic structural diagram of a private network communication system according to an embodiment of the present application.
- FIG. 4 is a schematic diagram of a location update process of a UE accessing a virtual base station according to an embodiment of the present disclosure
- FIG. 5 is a schematic diagram of virtual virtual base station virtual call processing according to an embodiment of the present disclosure.
- FIG. 6 is a schematic flowchart of a shielding method according to an embodiment of the present disclosure.
- FIG. 7 is a schematic structural diagram of a wireless signal shielding apparatus according to an embodiment of the present disclosure.
- FIG. 8 is a schematic structural diagram of a network device according to an embodiment of the present invention.
- FIG. 1 is a flowchart of a method for shielding a wireless signal according to an embodiment of the present application. The method includes:
- the first network device sends reselection signaling to the terminal, where the terminal is a terminal of a second network device that accesses the public network in the area to be shielded, and the reselection signaling is used to indicate that the terminal is heavy. Selecting to access the first network device, the first network device is configured to block a wireless signal between the second network device and the terminal.
- the first network device receives a call request sent by a terminal that accesses the first network device.
- the first network device establishes a virtual call link according to the call request, where the virtual call link is to maintain a communication link between the first network device and the terminal.
- the first network device may refer to a mask in the private network communication system
- the second network device may refer to a public network macro base station.
- the reselection signaling sent by the first network device refers to an instruction to switch or reselect the virtual cell to which the mask is located, as shown in FIG. 2, accessing the to-be-shielded terminal of the public network macro base station, because After receiving the reselection signaling of the virtual base station, the macro base station is switched from the public network to the virtual base station.
- the private network communication system is shown in FIG. 3, and includes: a micro base station, a gateway, a private network core network device, and a mask.
- the mask is shielded by a virtual base station.
- the virtual base station mode means that the target shielding signal is not interfered, but the terminal entering the designated shielding area is logged into the designated network by means of switching or reselection, and the network can cut off the terminal direction by means of function limitation and parameter regulation.
- Externally transmitting information including calls, short multimedia messages, and data services, to achieve the purpose of wireless signal shielding, and does not interfere with macro base stations of existing networks.
- the private network communication system is shown in FIG.
- the private network core network device is a core component of the private network wireless communication service provided by the system, and the function of the private network core network device is mainly to provide a user plane connection and a user.
- Management and completion of the business; user connection establishment includes mobility management, call management, exchange and other functions.
- User management includes user description, QoS (Qos: Quality of Service), user communication record (Accounting), and security (the security measures provided by the authentication center include security management and protection for mobile services. Security handling of external network access).
- Bearer connections include to packet data networks and intranets.
- the micro base station is a single-mode micro base station, and only covers the coverage of one system of wireless signals of one operator.
- scenes that are generally required to be shielded, such as prisons, examination rooms, etc. allow few users to communicate, so that single-mode micro base stations can be used for coverage.
- the frequency can be configured very little, so you can select a small frequency band of a standard system to save spectrum resources and reduce costs. For example, China Mobile's 900MHz GSM standard 1M bandwidth can be selected for wireless communication in private networks.
- the single-mode micro base station can be connected to the gateway and the indoor distribution subsystem at the same time, and then accesses the core network equipment of the public network through the softswitch gateway, so that the downlink signal of the core network equipment of the public network is transmitted through the indoor distribution subsystem via the single-mode micro base station.
- the indoor terminal is covered.
- the single-mode micro base station transmits the uplink signal of the terminal in the indoor distribution subsystem to the carrier core network, thereby forming a normal and complete uplink and downlink wireless communication link.
- the internal voice communication signaling process of the private network communication system formed in the prison or the examination room covered by the micro base station is as follows: (1) The calling intelligent terminal accesses the private network core network device through the micro base station, and sends the uplink. Signal to the private network core network equipment; (2) The private network core network equipment through the network access control, data routing and forwarding processing of the private network core network, paging to the called intelligent terminal, sending downlink signals to the micro base station, and then The micro base station sends the smart terminal to the calling party to form a local voice communication loopback network inside the private network. It can be seen that the private network communication between the core network equipment and the micro base station of the private network, and the terminals inside the prison or the examination room covered by the micro base station can communicate with each other by using the private network.
- the shield can choose multi-mode signal shielding device.
- the so-called multi-mode signal shielding device is a multi-mode multi-band signal source, including 2G, 3G, 4G signal sources, and covers all operators and frequency bands, which can be set.
- the wireless signal of all modes and all frequency bands of various operators except the standard and frequency bands in which the private network is located it is ensured that the shielded area is covered without blind spots.
- the specific frequency bands of multi-mode multi-band signal sources include: China Mobile: GSM: 890-909/935-954MHz; TD-SCDMA: 2010-2025MHz; TD-LTE: 1880-1920MHz, 2575-2635MHz and 2300M-24000M; China Unicom : GSM: 909-915/954-960MHz; WCDMA: 1950-1955/2130-2145MHz; FDD-LTE: 1755-1765/1850-1860MHz; 1955-1980/2145-2170MHz; China Telecom: FDD-LTE: 1755- 1785/1850-1880MHz; 1920-1940/2110-2130MHz; CDMA: 870-880MHz.
- the multimode multi-band masking signal can be covered to a specific area of the room without blind spots, thereby realizing shielding processing of the terminal signal of the area, since the multimode signal shielding device does not It is connected to the carrier core network, so normal communication cannot be completed.
- the shielding method provided by the embodiment of the present invention improves the mask to maintain the virtual call link after the public network terminal is induced to access the virtual cell where the virtual base station is located.
- 4 is a schematic diagram of a location update process of a UE accessing a virtual base station according to an embodiment of the present application; if the UE redirects or reselects to a 2G virtual base station, if there is no service, a location update request as shown in FIG. 4 is initiated; The need to actively make a call, the UE or initiate a service request, the virtual base station will process the service according to the flow shown in FIG. 4, and from time to time maintain the link through the location update to ensure that the UE is in the virtual base station, thereby achieving the purpose of shielding. .
- FIG. 5 is a schematic diagram of a virtual base station virtual call processing in the present invention. Since the smart terminal has been connected to the virtual telephone according to the service flow of FIG. 5, it cannot perceive that the link is a false call link, and It is impossible to judge that the base station is a virtual base station, and thus the function of the anti-counterfeit base station of the intelligent terminal is not activated, and the shielding system functions.
- the masker first performs pre-setting of the virtual cell, so as to induce the terminal accessing the public network to switch to the virtual cell, wherein the principle of the 2G terminal accessing the mask is as follows:
- the virtual base station in order to support full-band full-band shielding, the virtual base station supports both 2G, 3G, and 4G modes and frequency bands. If the virtual base station supports 2G frequency bands and standards, the virtual base station can pass SON first. (Self Organized Network) operates to search 2G cell information of the macro network, obtain a 2G cell list, select a frequency point with the smallest power as a frequency point of the 2G multi-band multi-mode virtual base station, and the virtual cell is no longer Configure any 2G neighbor information. In this way, the 2G virtual cell becomes the strongest neighbor of the UE, and the 2G terminal of the network cuts into the 2G virtual cell of the virtual base station for access.
- SON Self Organized Network
- the virtual base station sets an abnormal TAC (Tracking Area Code) in advance, and establishes a PCI (physical-layer cell identity) by broadcasting. Identifying the virtual cell and sending a PAGING to notify the change of the ICT message, so that the UE in the RRC idle state at the frequency is reselected to the full-standard virtual base station and requests a location update (TAU Request).
- the base station can obtain the GUTI (Globally Unique Temporary UE Identity) information of the relevant UE.
- the signal strength of the full-standard virtual cell is used to interfere with the downlink of the air interface to make it heavy. Select the full-scale virtual base station, and the subsequent process is consistent with the link of the idle state.
- the virtual base station In order to ensure that the terminal of the 3G/4G virtual cell accessing the virtual base station is not off-network, the virtual base station first constructs a NAS (Non Access Stratum) message according to the GUTI information of the macro network where the UE is located, and the terminal requests the terminal to report the IMSI (International). Mobile Subscriber Identification Number, information. Then the UE will report an IMSI message back to a NAS message (Identity Response). In this way, the virtual base station repeats the above steps of reselection access, so that the UE can be disconnected from the network and cannot communicate with the macro base station.
- NAS Non Access Stratum
- the first network device determines the communication system supported by the terminal according to the uplink signal, and if it is determined that the terminal supports 2G, when the terminal reselects the access to the virtual base station, the 2G terminal accesses the 2G virtual cell of the virtual base station. . Assume that the terminal supports both the 2G and the 3G. Since the access priority of the virtual cell of the virtual base station 3G/4G is higher than that of the 2G virtual cell, the 3G terminal is connected to the 3G virtual cell of the virtual base station. This type of push 4G terminal and so on. Considering that if the capacity of the virtual cell of the 3G/4G is full, the terminal access failure is a virtual cell that can be redirected to the 2G.
- the embodiment of the present application needs to determine the first The network device determines whether the spectrum resource corresponding to the current first communication system is smaller than the first threshold, and if not, the terminal can access the cell of the first network device that supports the first communication system, that is, the virtual cell of the 3G , or 4G virtual cell.
- the first network device determines that the spectrum resource corresponding to the current first communication system is not less than the first threshold, the first network device sends a second access instruction to the terminal, where the second access The instruction is used to indicate that the terminal accesses the cell of the first network device that supports the second communication system, and the access priority of the second communication system is lower than the access priority of the first communication system.
- the 3G terminal may be redirected to the 2G virtual cell, or the virtual base station determines that the capacity of the current 4G virtual cell is full. Then, the 4G terminal can be redirected to the 2G virtual cell.
- the precondition is that the capacity of the 2G virtual cell is large enough.
- the virtual base station sends a second access command to the accessed terminal, that is, an instruction indicating that the terminal accesses the virtual cell of 2G, so that the terminal is redirected from 4G or 3G to the virtual cell of 2G.
- the 2G cell message is configured in the SIB7 (SystemInformation Block Type 7, System Information Block Type 7) message.
- SIB7 SystemInformation Block Type 7, System Information Block Type 7
- the L3 sends the RRC_RELEASE information, and the redirected cell information (Redirected Carrier Info, indicating the redirected frequency and scrambling code information) is brought to the UE, so that the UE can be implemented.
- the UE accesses the 2G virtual cell once the 2G mobile phone in the network accesses the 2G virtual cell, the full-standard virtual base station maintains the UE and the 2G multi-band multi-standard virtual base station link without interruption.
- the second principle is that when the UE accesses the 3G virtual cell, when the capacity exceeds 3G, the UE needs to be redirected to 2G.
- the principle of 3G redirection to 2G is as follows: After the UE initiates the access request, the RNC sends a reject (reject) or release (release) message to indicate the frequency of the 2G, and the redirected cell information is brought to the UE, so that the UE can be redirected from 3G to 2G.
- the UE accesses the 2G virtual cell once the 2G mobile phone of the network accesses the virtual 2G cell, the virtual base station maintains the link between the UE and the 2G virtual cell without interruption.
- step a the virtual base station initiates a handover and reselection operation on the terminal UE in the masked area, and sets the UE access parameter of the virtual base station as the priority access, and the UE in the induced mask area accesses the virtual base station by switching or reselecting.
- Step b When the terminal UE accesses the virtual base station, the virtual base station determines the communication standard of the terminal, such as 2G or 3G/4G.
- Step c When the UE is in the 2G system, it directly accesses the 2G virtual cell of the virtual base station and maintains the 2G link; when the UE is in the 3G/4G system, the process proceeds to step d.
- Step d when the UE is in the 3G/4G system, when the 3G and 4G virtual base station capacity is sufficient, the UE maintains the 3G/4G link; when the virtual base station's 3G and 4G virtual base station capacity is insufficient, the UE is heavy The 2G link is selected and the UE maintains the 2G link.
- the virtual base station can simulate the core network function and set the UE access parameter of the virtual base station as the priority access, it can ensure that the UE preferentially accesses the virtual base station.
- the embodiment of the present application further provides a shielding apparatus for a wireless signal, where the apparatus can perform the method embodiment performed by the first network device.
- the apparatus provided in this embodiment of the present application includes a sending unit 401, a receiving unit 402, and an establishing unit 403, where:
- the sending unit 401 is configured to send reselection signaling to the terminal, where the terminal is a terminal of the second network device that accesses the public network in the area to be shielded, and the reselection signaling is used to indicate that the terminal is heavy Selecting to access the first network device, where the first network device is configured to block a wireless signal between the second network device and the terminal;
- the receiving unit 402 is configured to receive a call request sent by a terminal that accesses the first network device.
- the establishing unit 403 is configured to establish a virtual call link according to the call request, wherein the virtual call link is to maintain a communication link between the first network device and the terminal.
- the receiving unit 402 is further configured to receive an uplink signal sent by the terminal;
- a determining unit 404 configured to determine, according to the uplink signal, whether the terminal supports the first communication system
- the sending unit 401 is further configured to: when the determining unit determines to support the first communication system, send a first access instruction to the terminal, where the first access instruction is used to indicate that the terminal accesses the A cell of the first network device supporting the first communication system.
- the determining unit 404 is further configured to determine whether the spectrum resource corresponding to the current first communication system is not less than the first threshold;
- the sending unit 401 is further configured to: when the determining unit determines that the threshold is not less than the first threshold, send a second access instruction to the terminal, where the second access command is used to indicate that the terminal accesses To the cell of the first network device supporting the second communication system, the access priority of the second communication system is lower than the access priority of the first communication system.
- the establishing unit 403 is further configured to: before the sending unit sends the reselection signaling, establish a unique virtual cell of the second communication system in the to-be-masked area according to the first frequency point, where The first frequency point is smaller than the second threshold, and is a frequency point in each cell covered by the public network base station.
- the establishing unit 403 is further configured to: acquire information about each cell covered by the public network base station corresponding to the first communication system in the to-be-masked area;
- the embodiment of the present application provides a new shielding method
- the virtual base station can simulate the core network function, transmit a strong signal to induce the public network terminal to access the virtual base station, and according to the call request of the terminal.
- Establishing a virtual call link so that the terminal cannot judge the access to the pseudo base station by checking the call link, so that the terminal having the function of preventing the virtual base station can be successfully shielded, so that the shielding method has low cost, good effect, and good performance.
- embodiments of the present application can be provided as a method, system, or computer program product.
- the present application can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment in combination of software and hardware.
- the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, optical storage, etc.) including computer usable program code.
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
- the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
- These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
- the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
- FIG. 8 is a schematic structural diagram of a network device according to the present disclosure.
- the network device 800 includes: a communication interface 801, a processor 802, a memory 803, and a bus system 804.
- the memory 803 is configured to store a computer program, and may also store some data information and the like received by the network device.
- the computer program can include program code, which can include computer operating instructions and the like.
- the memory 803 may be a random access memory (RAM) or a non-volatile memory (NVM), such as at least one disk storage. Only one memory is shown in the figure, of course, the memory can also be set to a plurality as needed.
- Memory 803 can also be a memory in processor 802.
- memory 803 can store elements, executable modules or data structures, etc., or a subset thereof, or an extended set thereof:
- Operation instructions include various operation instructions for implementing various operations.
- Operating system Includes a variety of system programs for implementing various basic services and handling hardware-based tasks.
- the processor 802 is used for operation of the network device 800, which may also be referred to as a central processing unit (CPU).
- CPU central processing unit
- the communication interface 801 is configured to perform processing such as information transmission and reception of other devices connected to the network device 800.
- the bus system 804 can include a power bus, a control bus, a status signal bus, and the like in addition to the data bus.
- various buses are labeled as bus system 804 in the figure. For ease of representation, only the schematic drawing is shown in FIG.
- Processor 802 may be an integrated circuit chip with signal processing capabilities. In the implementation process, each step of the foregoing method may be completed by hardware integrated logic circuits in the processor 802 or instructions in the form of software.
- the processor 802 described above may be a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, a discrete gate or transistor logic device, or discrete hardware. Component.
- DSP digital signal processor
- ASIC application specific integrated circuit
- FPGA field programmable gate array
- the methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
- the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
- the steps of the method disclosed in the embodiments of the present application may be directly implemented by the hardware decoding processor, or may be performed by a combination of hardware and software modules in the decoding processor.
- the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
- the storage medium can be located in memory 803, and processor 802 can read the information stored in memory 803 and perform the above method steps in conjunction with hardware.
- the processor provided in this embodiment may send reselection signaling to the terminal by using the communication interface, where the terminal is a terminal of a second network device that accesses the public network in the area to be shielded, and the reselection signaling is performed. And configured to instruct the terminal to reselect access to the network device, where the network device is configured to block a wireless signal between the second network device and the terminal; and receive, by using the communication interface, access to the a call request sent by a terminal of the network device;
- the embodiment of the present application provides a new shielding method
- the virtual base station can simulate the core network function, transmit a strong signal to induce the public network terminal to access the virtual base station, and establish a virtual according to the call request of the terminal.
- the call link so that the terminal cannot judge the access to the pseudo base station by checking the call link, so the terminal having the function of preventing the virtual base station can be successfully shielded, so that the shielding method has low cost, good effect, and good application. prospect.
- the present invention also provides a non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the wireless of any of the above Signal shielding method.
- the present invention also provides a computer program product comprising a computing program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions, when the program instructions are executed by a computer And causing the computer to perform the method of shielding the wireless signal according to any one of the above.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本申请公开了一种无线信号的屏蔽方法及装置,该方法包括:第一网络设备向终端发送重选信令,其中,所述终端为待屏蔽区域内的接入公网的第二网络设备的终端,所述重选信令用于指示所述终端重选接入到所述第一网络设备,所述第一网络设备用于屏蔽所述第二网络设备与所述终端之间的无线信号;所述第一网络设备接收接入到所述第一网络设备的终端发送的呼叫请求;所述第一网络设备根据所述呼叫请求,建立虚拟通话链路,其中,所述虚拟通话链路为维持所述第一网络设备与所述终端之间的通信链路,该方法用以解决提供传统屏蔽方法无法成功对终端进行屏蔽的问题。
Description
本申请要求在2017年06月12日提交中华人民共和国知识产权局、申请号为201710439643.X,发明名称为“一种无线信号的屏蔽方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请涉及通信领域,尤其涉及一种无线信号的屏蔽方法及装置。
现代社会,手机等无线通信系统的终端日益成为人们工作和生活中所不可缺少的重要工具。手机的广泛应用带来沟通上的便利是不言而喻的,但同时也产生了许多不容忽视的隐患。例如在监狱、看守所、考试现场、加油站、加气站、化工仓库、电力调度室、医院门诊、病房、手术室,以及国家的情报部门、军方和重要政府部门、民航空管部门等很多的场所中,移动终端的信号都可能成为安全和保密的隐患,需要被屏蔽。
传统的屏蔽方式有很多种,可以采用干扰器的方式干扰公网信号,也可以利用虚拟基站的方式诱导用户终端接入信号较强的虚拟基站。随着科技的进步,现在的智能终端具有防虚拟基站的功能,当智能终端发现链路(通话、短信、数据)链路不通的时候,会重新搜索网络,寻找合适的链路。即使虚拟基站信号很强,但智能终端一旦发现到链路不通,还是会主动搜索网络,寻找合适的能建立通信链路的网络,因此就会造成待屏蔽区域内部分终端不能成功屏蔽的问题。
发明内容
本申请提供一种无线信号的屏蔽方法及装置,用以解决提供传统屏蔽方 法无法成功对终端进行屏蔽的问题。
第一方面,本申请实施例提供了一种无线信号的屏蔽方法,该方法包括:
第一网络设备向终端发送重选信令,其中,所述终端为待屏蔽区域内的接入公网的第二网络设备的终端,所述重选信令用于指示所述终端重选接入到所述第一网络设备,所述第一网络设备用于屏蔽所述第二网络设备与所述终端之间的无线信号;
所述第一网络设备接收接入到所述第一网络设备的终端发送的呼叫请求;
所述第一网络设备根据所述呼叫请求,建立虚拟通话链路,其中,所述虚拟通话链路为维持所述第一网络设备与所述终端之间的通信链路。
进一步地,所述第一网络设备接收接入到所述第一网络设备的终端发送的呼叫请求之前,还包括:
所述第一网络设备接收所述终端发送的上行信号,若根据所述上行信号确定所述终端支持第一通信制式,则向所述终端发送第一接入指令,所述第一接入指令用于指示所述终端接入到所述第一网络设备的支持第一通信制式的小区。
在一种可能的设计中,还包括所述第一网络设备确定当前第一通信制式对应的频谱资源不小于所述第一阈值时,则所述第一网络设备向所述终端发送第二接入指令,所述第二接入指令用于指示所述终端接入到所述第一网络设备的支持第二通信制式的小区,所述第二通信制式的接入优先级低于所述第一通信制式的接入优先级。
进一步地,所述第一网络设备向待屏蔽区域内的终端发送重选信令之前,还包括:
所述第一网络设备根据第一频点在所述待屏蔽区域内建立一个唯一的第二通信制式的虚拟小区,其中,所述第一频点小于第二阈值,且为所述公网基站覆盖的各小区中的频点。
进一步地,所述述第一网络设备向待屏蔽区域内的终端发送重选信令之 前,还包括:
所述第一网络设备获取所述待屏蔽区域内的第一通信制式对应的公网基站覆盖的各小区的信息;
所述第一网络设备根据第一频点在所述待屏蔽区域内建立一个唯一的第一通信制式的虚拟小区,其中,所述第一频点与所述公网基站覆盖的各小区的频点相同,所述虚拟小区的物理小区标识PCI与所述第二网路设备的各小区的PCI不同。
第二方面,本申请实施例提供了一种无线信号的屏蔽装置,该装置包括:
发送单元,用于向终端发送重选信令,其中,所述终端为待屏蔽区域内的接入公网的第二网络设备的终端,所述重选信令用于指示所述终端重选接入到所述第一网络设备,所述第一网络设备用于屏蔽所述第二网络设备与所述终端之间的无线信号;
接收单元,用于接收接入到所述第一网络设备的终端发送的呼叫请求;
建立单元,用于根据所述呼叫请求,建立虚拟通话链路,其中,所述虚拟通话链路为维持所述第一网络设备与所述终端之间的通信链路。
进一步地,本发明实施例还提供一种无线信号的屏蔽装置,该装置包括:
发送单元,用于向终端发送重选信令,其中,所述终端为待屏蔽区域内的接入公网的第二网络设备的终端,所述重选信令用于指示所述终端重选接入到所述第一网络设备,所述第一网络设备用于屏蔽所述第二网络设备与所述终端之间的无线信号;
接收单元,用于接收接入到所述第一网络设备的终端发送的呼叫请求;
建立单元,用于根据所述呼叫请求,建立虚拟通话链路,其中,所述虚拟通话链路为维持所述第一网络设备与所述终端之间的通信链路。
进一步地,所述接收单元,还用于接收所述终端发送的上行信号;
所述装置还包括:确定单元,用于根据所述上行信号确定所述终端是否支持第一通信制式;
所述发送单元,还用于在所述确定单元确定支持第一通信制式时,向所 述终端发送第一接入指令,所述第一接入指令用于指示所述终端接入到所述第一网络设备的支持第一通信制式的小区。
进一步地,所述确定单元,还用于确定当前第一通信制式对应的频谱资源是否不小于所述第一阈值;
所述发送单元,还用于在所述确定单元确定不小于所述第一阈值时,向所述终端发送第二接入指令,所述第二接入指令用于指示所述终端接入到所述第一网络设备的支持第二通信制式的小区,所述第二通信制式的接入优先级低于所述第一通信制式的接入优先级。
进一步地,所述建立单元,还用于在所述发送单元发送重选信令之前,根据第一频点在所述待屏蔽区域内建立一个唯一的第二通信制式的虚拟小区,其中,所述第一频点小于第二阈值,且为所述公网基站覆盖的各小区中的频点。
进一步地,所述建立单元,还用于:获取所述待屏蔽区域内的第一通信制式对应的公网基站覆盖的各小区的信息;
根据第一频点在所述待屏蔽区域内建立一个唯一的第一通信制式的虚拟小区,其中,所述第一频点与所述公网基站覆盖的各小区的频点相同,所述虚拟小区的物理小区标识PCI与所述第二网路设备的各小区的PCI不同。
第三方面,本申请实施例提供一种网络设备,该网络设备可以是上文中的第一网络设备,包括:通信接口、处理器以及存储器;
所述处理器调用存储在所述存储器中的指令,执行以下处理:
通过所述通信接口向终端发送重选信令,其中,所述终端为待屏蔽区域内的接入公网的第二网络设备的终端,所述重选信令用于指示所述终端重选接入到所述网络设备,所述网络设备用于屏蔽所述第二网络设备与所述终端之间的无线信号;
通过所述通信接口接收接入到所述网络设备的终端发送的呼叫请求;
根据所述呼叫请求,建立虚拟通话链路,其中,所述虚拟通话链路为维持所述网络设备与所述终端之间的通信链路。
进一步地,所述处理器还用于:
通过所述通信接口接收所述终端发送的上行信号,若根据所述上行信号确定所述终端支持第一通信制式,则通过所述通信接口向所述终端发送第一接入指令,所述第一接入指令用于指示所述终端接入到所述网络设备的支持第一通信制式的小区。
在一种可能的设计中,所述处理器还用于:
确定当前第一通信制式对应的频谱资源不小于所述第一阈值时,则通过所述通信接口向所述终端发送第二接入指令,所述第二接入指令用于指示所述终端接入到所述网络设备的支持第二通信制式的小区,所述第二通信制式的接入优先级低于所述第一通信制式的接入优先级。
在一种可能的设计中,所述处理器还用于:
所述处理器向待屏蔽区域内的终端发送重选信令之前,还用于根据第一频点在所述待屏蔽区域内建立一个唯一的第二通信制式的虚拟小区,其中,所述第一频点小于第二阈值,且为所述公网基站覆盖的各小区中的频点。
进一步地,所述处理器向待屏蔽区域内的终端发送重选信令之前,还用于获取所述待屏蔽区域内的第一通信制式对应的公网基站覆盖的各小区的信息;根据第一频点在所述待屏蔽区域内建立一个唯一的第一通信制式的虚拟小区,其中,所述第一频点与所述公网基站覆盖的各小区的频点相同,所述虚拟小区的物理小区标识PCI与所述第二网路设备的各小区的PCI不同。
第四方面,本发明实施例提供一种非暂态计算机可读存储介质,所述非暂态计算机可读存储介质存储计算机指令,所述计算机指令用于使所述计算机执行上述任一项所述的无线信号的屏蔽方法及装置。
第五方面,本发明实施例提供一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行上述任一项所述的无线信号的屏蔽方法及装置。
本申请实施例通过提供一种新的屏蔽方法,虚拟基站既可以模拟核心网功能,发射较强的信号诱导公网终端接入到虚拟基站,又可以根据终端的呼叫请求,建立虚拟通话链路,这样终端通过检查通话链路就无法判断接入到伪基站,因此就可以成功地屏蔽掉具有防虚拟基站的功能的终端,这样屏蔽方法成本低,效果好,具有较好的应用前景。
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简要介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域的普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为本申请实施例提供的无线信号的屏蔽方法流程图;
图2为本申请实施例提供的一种屏蔽器的使用场景示意图;
图3为本申请实施例提供的一种专网通信系统结构示意图;
图4为本申请实施例提供的UE接入虚拟基站位置更新处理示意图;
图5为本申请实施例提供的虚拟基站虚拟通话处理示意图;
图6为本申请实施例提供的一种屏蔽方法流程示意图;
图7为本申请实施例提供的一种无线信号的屏蔽装置结构示意图;
图8为本发明实施例提供一种网络设备架构示意图。
下面将结合附图对本申请作进一步地详细描述。
参见图1,为本申请实施例提供的无线信号的屏蔽方法流程图。该方法包括:
S101,第一网络设备向终端发送重选信令,其中,所述终端为待屏蔽区 域内的接入公网的第二网络设备的终端,所述重选信令用于指示所述终端重选接入到所述第一网络设备,所述第一网络设备用于屏蔽所述第二网络设备与所述终端之间的无线信号。
S102,所述第一网络设备接收接入到所述第一网络设备的终端发送的呼叫请求。
S103,所述第一网络设备根据所述呼叫请求,建立虚拟通话链路,其中,所述虚拟通话链路为维持所述第一网络设备与所述终端之间的通信链路。
在步骤S101中,第一网络设备可以指的是专网通信系统内的屏蔽器,而第二网络设备则可以指的是公网宏基站。而第一网络设备发送的重选信令则指的是切换或者重选接入到屏蔽器所在的虚拟小区的指令,如图2所示,接入到公网宏基站的待屏蔽终端,因为接收到虚拟基站的重选信令,故从公网宏基站切换接入到虚拟基站。
其中,专网通信系统如图3所示,包括:微基站、网关、专网核心网设备、屏蔽器。屏蔽器采用虚拟基站方式进行屏蔽。所谓虚拟基站方式是指不对目标屏蔽信号进行干扰,而是让进入指定屏蔽区域的终端通过切换或者重选等方式登录到指定的网络,通过功能限制、参数调控的方式,该网络可切断终端向外传递信息,包括通话、短彩信、数据业务,以达到无线信号屏蔽的目的,且不对现有网络的宏基站产生干扰。具体地,专网通信系统如图1所示,其中,专网核心网设备是本系统提供专网无线通信服务的核心组成部分,专网核心网设备的功能主要是提供用户面连接、对用户的管理以及对业务完成承载;用户连接的建立包括移动性管理、呼叫管理、交换等功能。用户管理包括用户的描述、Qos(Qos:Quality of Service,服务质量)、用户通信记录(Accounting)、安全性(由鉴权中心提供相应的安全性措施包含了对移动业务的安全性管理和对外部网络访问的安全性处理)。承载连接包括到分组数据网和内部网等。
其中,微基站是单模微基站,只是服务于一个运营商的一个制式的无线信号的覆盖。而且,一般需要屏蔽的场景,如监狱、考场等场所,允许通信 的用户很少,所以,采用单模微基站覆盖即可。而且,频点可以配置的很少,所以选择一个制式的一小段频段即可,节约频谱资源,降低成本。如可以选择中国移动的900MHz的GSM制式1M带宽用于专网的无线通信。单模微基站可以同时与网关、室内分布子系统互相连接,再通过软交换网关接入到公网核心网设备,实现公网核心网设备的下行信号经由单模微基站通过室内分布子系统进行覆盖室内终端,另外,单模微基站将室内分布子系统内的终端的上行信号传输到运营商核心网,因此形成正常的、完整的上下行无线通信链路。
其中,在微基站覆盖的监狱或者考场等场所形成的专网通信系统的内部语音通信信令流程如下:(1)主叫的智能终端通过微基站,接入到专网核心网设备,发送上行信号至专网核心网设备;(2)专网核心网设备通过专网核心网的网络接入控制、数据路由和转发处理,寻呼到被叫的智能终端,发送下行信号至微基站,再由微基站发送至主叫的智能终端,形成专网内部的本地语音通信回环网络。可见,专网核心网设备和微基站构成了的专网通信,微基站覆盖的监狱或者考场等场所内部的终端可以利用专网相互之间进行通信。
其中,屏蔽器可以选择多模信号屏蔽器,所谓多模信号屏蔽器是一个多模多频段信号源,包括2G、3G、4G的信号源,而且,涵盖了所有的运营商和频段,可以设置成屏蔽除了专网所在的制式和频段之外的各种运营商的所有制式和所有频段的无线信号,确保被屏蔽的区域是无盲点覆盖的。如多模多频段信号源具体频段包括:中国移动:GSM:890-909/935-954MHz;TD-SCDMA:2010-2025MHz;TD-LTE:1880-1920MHz、2575-2635MHz和2300M-24000M;中国联通:GSM:909-915/954-960MHz;WCDMA:1950-1955/2130-2145MHz;FDD-LTE:1755-1765/1850-1860MHz;1955-1980/2145-2170MHz;中国电信:FDD-LTE:1755-1785/1850-1880MHz;1920-1940/2110-2130MHz;CDMA:870-880MHz。
当多模信号屏蔽器和室内分布子系统连接,就可以将多模多频段的屏蔽 信号无盲点的覆盖到室内特定区域,实现对该区域的终端信号的屏蔽处理,由于多模信号屏蔽器不与运营商核心网连接,所以不能够完成正常通信。
基于上述专网通信系统,本申请实施例提供的屏蔽方法对屏蔽器进行改进,使其在诱导公网终端接入至虚拟基站所在的虚拟小区后还能够维持虚拟通话链路。图4是本申请实施例提供的UE接入虚拟基站位置更新处理示意图;UE在重定向或者重选到2G虚拟基站后,若无业务,会发起如图4所示的位置更新请求;若有主动拨打电话的需求,UE或发起服务请求,虚拟基站将会按照图4所示的流程来处理该业务,并不时通过位置更新来维持链路保证UE处在虚拟基站内,从而达到屏蔽之目的。
进一步地,图5是本发明中的虚拟基站虚拟通话处理示意图;由于按照图5业务流程,智能终端已经接通了虚拟的电话,因此,它不能感知到该链路是虚假通话链路,也就无法判断出该基站是个虚拟基站,也就不会启动智能终端的防伪基站功能,屏蔽系统发挥作用。
另外,在执行步骤S101之前,屏蔽器会先进行虚拟小区的预先设置,以便于诱导周围接入公网的终端切换接入到虚拟小区,其中,2G终端接入到屏蔽器的原理如下,屏蔽器作为一个虚拟基站,为了支持全制式全频段的屏蔽,所以该虚拟基站同时支持2G、3G以及4G等制式和频段,假如该虚拟基站内部支持2G的频段和制式,那么虚拟基站可以先通过SON(Self Organized Network,自组织网络)操作,搜索宏网2G小区信息,获取2G小区列表,选择功率最小的频点作为2G多频段多制式虚拟基站的频点建立虚拟小区,并且该虚拟小区不再配置任何2G邻区信息。这样2G的虚拟小区就会成为UE最强的邻区,在网的2G终端会切入虚拟基站的2G虚拟小区进行接入。
进一步地,对于3G/4G制式和频段,虚拟基站会预先设置一个异常的TAC(Tracking Area Code,跟踪区编码),通过广播建立一个与宏网同频不同PCI(physical-layer Cell identity,物理小区标识)的虚拟小区,并下发PAGING(寻呼),通知信通消息改变,使得处于该频点的RRC空闲态的UE重选到全制式虚拟基站,并请求位置更新(TAU Request),此时基站可获取相关UE的 GUTI(Globally Unique Temporary UE Identity,全球唯一临时终端标识)信息;对于连接态的UE,通过全制式虚拟小区的信号强度,以干扰空口下行链路的方式,使其重选至全制式虚拟基站,后续流程与空闲态的链接一致。
为了保证接入虚拟基站的3G/4G的虚拟小区的终端不脱网,虚拟基站先根据UE所在宏网的GUTI信息构造一条NAS(Non Access Stratum,非接入层)消息要求终端上报IMSI(International Mobile Subscriber Identification Number,国际移动用户识别码)信息。然后UE会回一条NAS消息(Identity Response)上报IMSI信息。这样虚拟基站重复上述重选接入的步骤,就可以达到UE不脱网,并且无法与宏基站通信的目的。
进一步地,第一网络设备根据上行信号确定终端所支持的通信制式,假设确定出终端支持2G,则在终端重选接入到虚拟基站时,将该2G终端接入到虚拟基站的2G虚拟小区。假设,确定出终端既支持2G,也支持3G,由于虚拟基站3G/4G的虚拟小区的接入优先级高于2G的虚拟小区,所以将该3G终端接入到虚拟基站的3G虚拟小区,以此类推4G终端等。考虑到如果3G/4G的虚拟小区的容量满了,终端接入失败是可以重定向至2G的虚拟小区,所以本申请实施例在向终端发送第一接入指令之前,还需要确定所述第一网络设备确定当前第一通信制式对应的频谱资源是否小于第一阈值,若小于,则可以将终端接入到所述第一网络设备的支持第一通信制式的小区,也就是3G的虚拟小区,或者4G的虚拟小区。
如果所述第一网络设备确定当前第一通信制式对应的频谱资源不小于所述第一阈值时,则所述第一网络设备向所述终端发送第二接入指令,所述第二接入指令用于指示所述终端接入到所述第一网络设备的支持第二通信制式的小区,所述第二通信制式的接入优先级低于所述第一通信制式的接入优先级。
也就是说,虚拟基站判断出当前3G的虚拟小区的容量已经满了,则可以将3G终端重定向至2G的虚拟小区,或者说,虚拟基站判断出当前4G的虚拟小区的容量已经满了,则可以将4G终端重定向至2G的虚拟小区。当前, 前提条件是2G的虚拟小区的容量是足够大的。虚拟基站向接入的终端发送第二接入指令,也就是指示终端接入到2G的虚拟小区的指令,这样终端就从4G或者3G重定向至2G的虚拟小区。
对应重定向,4G和3G的重定向的方法是不一样的,下面分别进行介绍:
第一种,UE接入到4G的虚拟小区后,当超过4G虚拟基站的容量的时候,需要将UE重定向到2G,4G重定向到2G的原理如下:
在SIB7(SystemInformationBlockType7,系统信息块类型7)消息配置该2G小区讯息。对于满足条件的所有UE,在UE发起接入请求后,L3下发RRC_RELEASE信息,将重定向小区信息(Redirected Carrier Info,指示重定向的频点及扰码信息)带给UE,即可实现UE从4G重定向到2G。而根据UE接入到2G虚拟小区的原理,在网的2G手机一旦接入到2G虚拟小区,全制式虚拟基站会维持UE和2G多频段多制式虚拟基站链路不中断。
第二种,UE接入到3G的虚拟小区后,当容量超过3G的小区的时候,需要将UE重定向到2G,3G重定向到2G的原理如下:与4G重定向到2G的原理类似,在UE发起接入请求后,RNC下发reject(拒绝)或者release(释放)信息,指示2G的频点,将重定向小区信息带给UE,即可实现UE从3G重定向到2G。而根据UE接入到2G虚拟小区的原理,在网的2G手机一旦接入到虚拟2G小区,虚拟基站会维持UE和2G虚拟小区的链路不中断。
为了更加系统地描述本申请实施例提供的屏蔽方法,进一步地提供图6所示的方法流程图进行阐述。
步骤a,虚拟基站对屏蔽区域内的终端UE发起切换和重选的操作,并设置虚拟基站的UE接入参数为优先接入,诱导屏蔽区域的UE通过切换或者重选接入到虚拟基站。
步骤b,当终端UE接入到虚拟基站的时候,虚拟基站判断终端的通信制式,比如是2G还是3G/4G制式。
步骤c,当UE是2G制式,则直接接入到虚拟基站的2G虚拟小区,并维持2G链路;当UE是3G/4G制式,则进入到步骤d。
步骤d,当UE是3G/4G制式,当3G和4G虚拟基站容量是足够的,则UE维持3G/4G链路;当虚拟基站的3G和4G虚拟基站容量是不足够的,则将UE重选到2G链路,UE维持2G链路。
因此,由于虚拟基站可以模拟核心网功能,而且设置虚拟基站的UE接入参数为优先接入,可以确保UE优先接入到虚拟基站。
基于相同的技术构思,本申请实施例还提供一种无线信号的屏蔽装置,该装置可执行第一网络设备所执行的方法实施例。本申请实施例提供的装置如图7所示,包括发送单元401、接收单元402、建立单元403,其中:
发送单元401,用于向终端发送重选信令,其中,所述终端为待屏蔽区域内的接入公网的第二网络设备的终端,所述重选信令用于指示所述终端重选接入到所述第一网络设备,所述第一网络设备用于屏蔽所述第二网络设备与所述终端之间的无线信号;
接收单元402,用于接收接入到所述第一网络设备的终端发送的呼叫请求;
建立单元403,用于根据所述呼叫请求,建立虚拟通话链路,其中,所述虚拟通话链路为维持所述第一网络设备与所述终端之间的通信链路。
进一步地,所述接收单元402,还用于接收所述终端发送的上行信号;
确定单元404,用于根据所述上行信号确定所述终端是否支持第一通信制式;
所述发送单元401,还用于在所述确定单元确定支持第一通信制式时,向所述终端发送第一接入指令,所述第一接入指令用于指示所述终端接入到所述第一网络设备的支持第一通信制式的小区。
进一步地,所述确定单元404,还用于确定当前第一通信制式对应的频谱资源是否不小于所述第一阈值;
所述发送单元401,还用于在所述确定单元确定不小于所述第一阈值时,向所述终端发送第二接入指令,所述第二接入指令用于指示所述终端接入到所述第一网络设备的支持第二通信制式的小区,所述第二通信制式的接入优 先级低于所述第一通信制式的接入优先级。
进一步地,所述建立单元403,还用于在所述发送单元发送重选信令之前,根据第一频点在所述待屏蔽区域内建立一个唯一的第二通信制式的虚拟小区,其中,所述第一频点小于第二阈值,且为所述公网基站覆盖的各小区中的频点。
进一步地,所述建立单元403,还用于:获取所述待屏蔽区域内的第一通信制式对应的公网基站覆盖的各小区的信息;
根据第一频点在所述待屏蔽区域内建立一个唯一的第一通信制式的虚拟小区,其中,所述第一频点与所述公网基站覆盖的各小区的频点相同,所述虚拟小区的物理小区标识PCI与所述第二网路设备的各小区的PCI不同。
综上所述,本申请实施例通过提供一种新的屏蔽方法,虚拟基站既可以模拟核心网功能,发射较强的信号诱导公网终端接入到虚拟基站,又可以根据终端的呼叫请求,建立虚拟通话链路,这样终端通过检查通话链路就无法判断接入到伪基站,因此就可以成功地屏蔽掉具有防虚拟基站的功能的终端,这样屏蔽方法成本低,效果好,具有较好的应用前景。
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、光学存储器等)上实施的计算机程序产品的形式。
本申请是参照根据本申请的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装 置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
基于相同的技术构思,本申请实施例提供一种网络设备,该网络设备可以是上文中的第一网络设备。图8为本发明提供的网络设备的结构示意图,该网络设备800包括:包括:通信接口801、处理器802、存储器803和总线系统804。
其中,存储器803,用于存放计算机程序,还可以存储网络设备接收的一些数据信息等。具体地,计算机程序可以包括程序代码,程序代码可以包括计算机操作指令等。存储器803可能为随机存取存储器(英文:random-access memory,RAM),也可能为非易失性存储器(英文:non-volatile memory,NVM),例如至少一个磁盘存储器。图中仅示出了一个存储器,当然,存储器也可以根据需要,设置为多个。存储器803也可以是处理器802中的存储器。
一种示例说明,存储器803可以存储如下的元素、可执行模块或者数据结构等,或者是它们的子集,或者它们的扩展集:
操作指令:包括各种操作指令,用于实现各种操作。
操作系统:包括各种系统程序,用于实现各种基础业务以及处理基于硬件的任务。
处理器802用于网络设备800的操作,处理器802还可以称为中央处理单元(central processing unit,CPU)。
通信接口801,用于与网络设备800连接的其他设备进行信息收发等处理。
具体的应用中,网络设备800的各个组件可以通过总线系统804耦合在一起,其中总线系统804除包括数据总线之外,还可以包括电源总线、控制总线和状态信号总线等。但是为了清楚说明起见,在图中将各种总线都标为总线系统804。为便于表示,图8中仅是示意性画出。
上述本申请实施例揭示的方法可以应用于处理器802中,或者由处理器802实现。处理器802可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器802中的硬件集成逻辑电路或者软件形式的指令完成。上述的处理器802可以是通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、现场可编程门阵列(FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质可以位于存储器803中,处理器802可以读取存储器803中存储的信息,结合硬件执行以上方法步骤。
本实施例中提供的处理器可以所述通信接口向终端发送重选信令,其中,所述终端为待屏蔽区域内的接入公网的第二网络设备的终端,所述重选信令用于指示所述终端重选接入到所述网络设备,所述网络设备用于屏蔽所述第二网络设备与所述终端之间的无线信号;通过所述通信接口接收接入到所述网络设备的终端发送的呼叫请求;
根据所述呼叫请求,建立虚拟通话链路,其中,所述虚拟通话链路为维持所述网络设备与所述终端之间的通信链路。具体实现可以参照上述方法实施例中的具体描述,这里不再详细赘述。
综上,本申请实施例通过提供一种新的屏蔽方法,虚拟基站既可以模拟核心网功能,发射较强的信号诱导公网终端接入到虚拟基站,又可以根据终端的呼叫请求,建立虚拟通话链路,这样终端通过检查通话链路就无法判断接入到伪基站,因此就可以成功地屏蔽掉具有防虚拟基站的功能的终端,这样屏蔽方法成本低,效果好,具有较好的应用前景。
另外,本发明还提供一种非暂态计算机可读存储介质,所述非暂态计算机可读存储介质存储计算机指令,所述计算机指令用于使所述计算机执行上述任一项所述的无线信号的屏蔽方法。
另外,本发明还提供一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行上述任一项所述的无线信号的屏蔽方法。
尽管已描述了本发明的优选实施例,但本领域内的技术人员一旦得知了基本创造性概念,则可对这些实施例作出另外的变更和修改。所以,所附权利要求意欲解释为包括优选实施例以及落入本发明范围的所有变更和修改。
显然,本领域的技术人员可以对本发明进行各种改动和变型而不脱离本发明的精神和范围。这样,倘若本发明的这些修改和变型属于本发明权利要求及其等同技术的范围之内,则本发明也意图包含这些改动和变型在内。
Claims (17)
- 一种无线信号的屏蔽方法,其特征在于,该方法包括:第一网络设备向终端发送重选信令,其中,所述终端为待屏蔽区域内的接入公网的第二网络设备的终端,所述重选信令用于指示所述终端重选接入到所述第一网络设备,所述第一网络设备用于屏蔽所述第二网络设备与所述终端之间的无线信号;所述第一网络设备接收接入到所述第一网络设备的终端发送的呼叫请求;所述第一网络设备根据所述呼叫请求,建立虚拟通话链路,其中,所述虚拟通话链路为维持所述第一网络设备与所述终端之间的通信链路。
- 如权利要求1所述的屏蔽方法,其特征在于,所述第一网络设备接收接入到所述第一网络设备的终端发送的呼叫请求之前,还包括:所述第一网络设备接收所述终端发送的上行信号,若根据所述上行信号确定所述终端支持第一通信制式,则向所述终端发送第一接入指令,所述第一接入指令用于指示所述终端接入到所述第一网络设备的支持第一通信制式的小区。
- 如权利要求2所述的屏蔽方法,其特征在于,还包括:所述第一网络设备确定当前第一通信制式对应的频谱资源不小于所述第一阈值时,则所述第一网络设备向所述终端发送第二接入指令,所述第二接入指令用于指示所述终端接入到所述第一网络设备的支持第二通信制式的小区,所述第二通信制式的接入优先级低于所述第一通信制式的接入优先级。
- 如权利要求3所述的屏蔽方法,其特征在于,所述第一网络设备向待屏蔽区域内的终端发送重选信令之前,还包括:所述第一网络设备根据第一频点在所述待屏蔽区域内建立一个唯一的第二通信制式的虚拟小区,其中,所述第一频点小于第二阈值,且为所述公网基站覆盖的各小区中的频点。
- 如权利要求1所述的屏蔽方法,其特征在于,所述述第一网络设备向待屏蔽区域内的终端发送重选信令之前,还包括:所述第一网络设备获取所述待屏蔽区域内的第一通信制式对应的公网基站覆盖的各小区的信息;所述第一网络设备根据第一频点在所述待屏蔽区域内建立一个唯一的第一通信制式的虚拟小区,其中,所述第一频点与所述公网基站覆盖的各小区的频点相同,所述虚拟小区的物理小区标识PCI与所述第二网路设备的各小区的PCI不同。
- 一种无线信号的屏蔽装置,其特征在于,该装置包括:发送单元,用于向终端发送重选信令,其中,所述终端为待屏蔽区域内的接入公网的第二网络设备的终端,所述重选信令用于指示所述终端重选接入到所述第一网络设备,所述第一网络设备用于屏蔽所述第二网络设备与所述终端之间的无线信号;接收单元,用于接收接入到所述第一网络设备的终端发送的呼叫请求;建立单元,用于根据所述呼叫请求,建立虚拟通话链路,其中,所述虚拟通话链路为维持所述第一网络设备与所述终端之间的通信链路。
- 如权利要求6所述的屏蔽装置,其特征在于,所述接收单元,还用于接收所述终端发送的上行信号;所述装置还包括:确定单元,用于根据所述上行信号确定所述终端是否支持第一通信制式;所述发送单元,还用于在所述确定单元确定支持第一通信制式时,向所述终端发送第一接入指令,所述第一接入指令用于指示所述终端接入到所述第一网络设备的支持第一通信制式的小区。
- 如权利要求7所述的屏蔽装置,其特征在于,所述确定单元,还用于确定当前第一通信制式对应的频谱资源是否不小于所述第一阈值;所述发送单元,还用于在所述确定单元确定不小于所述第一阈值时,向 所述终端发送第二接入指令,所述第二接入指令用于指示所述终端接入到所述第一网络设备的支持第二通信制式的小区,所述第二通信制式的接入优先级低于所述第一通信制式的接入优先级。
- 如权利要求8所述的屏蔽装置,其特征在于,所述建立单元,还用于在所述发送单元发送重选信令之前,根据第一频点在所述待屏蔽区域内建立一个唯一的第二通信制式的虚拟小区,其中,所述第一频点小于第二阈值,且为所述公网基站覆盖的各小区中的频点。
- 如权利要求6所述的屏蔽装置,其特征在于,所述建立单元,还用于:获取所述待屏蔽区域内的第一通信制式对应的公网基站覆盖的各小区的信息;根据第一频点在所述待屏蔽区域内建立一个唯一的第一通信制式的虚拟小区,其中,所述第一频点与所述公网基站覆盖的各小区的频点相同,所述虚拟小区的物理小区标识PCI与所述第二网路设备的各小区的PCI不同。
- 一种网络设备,其特征在于,包括通信接口、处理器以及存储器;所述处理器调用存储在所述存储器中的指令,执行以下处理:通过所述通信接口向终端发送重选信令,其中,所述终端为待屏蔽区域内的接入公网的第二网络设备的终端,所述重选信令用于指示所述终端重选接入到所述网络设备,所述网络设备用于屏蔽所述第二网络设备与所述终端之间的无线信号;通过所述通信接口接收接入到所述网络设备的终端发送的呼叫请求;根据所述呼叫请求,建立虚拟通话链路,其中,所述虚拟通话链路为维持所述网络设备与所述终端之间的通信链路。
- 如权利要求11所述的网络设备,其特征在于,所述处理器还用于:通过所述通信接口接收所述终端发送的上行信号,若根据所述上行信号确定所述终端支持第一通信制式,则通过所述通信接口向所述终端发送第一 接入指令,所述第一接入指令用于指示所述终端接入到所述网络设备的支持第一通信制式的小区。
- 如权利要求12所述的网络设备,其特征在于,所述处理器还用于:确定当前第一通信制式对应的频谱资源不小于所述第一阈值时,则通过所述通信接口向所述终端发送第二接入指令,所述第二接入指令用于指示所述终端接入到所述网络设备的支持第二通信制式的小区,所述第二通信制式的接入优先级低于所述第一通信制式的接入优先级。
- 如权利要求13所述的网络设备,其特征在于,所述处理器向待屏蔽区域内的终端发送重选信令之前,还用于根据第一频点在所述待屏蔽区域内建立一个唯一的第二通信制式的虚拟小区,其中,所述第一频点小于第二阈值,且为所述公网基站覆盖的各小区中的频点。
- 如权利要求11所述的网络设备,其特征在于,所述处理器向待屏蔽区域内的终端发送重选信令之前,还用于获取所述待屏蔽区域内的第一通信制式对应的公网基站覆盖的各小区的信息;根据第一频点在所述待屏蔽区域内建立一个唯一的第一通信制式的虚拟小区,其中,所述第一频点与所述公网基站覆盖的各小区的频点相同,所述虚拟小区的物理小区标识PCI与所述第二网路设备的各小区的PCI不同。
- 一种计算机存储介质,其特征在于,所述计算机存储介质存储有计算机可执行指令,所述计算机可执行指令用于使计算机执行如权利要求1至5任一项所述的方法。
- 一种计算机程序产品,其特征在于,当所述计算机程序产品被计算机执行时,使所述计算机执如行权利要求1至5任一项所述的方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710439643.XA CN107332640B (zh) | 2017-06-12 | 2017-06-12 | 一种无线信号的屏蔽方法及装置 |
CN201710439643.X | 2017-06-12 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018227928A1 true WO2018227928A1 (zh) | 2018-12-20 |
Family
ID=60195532
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/118701 WO2018227928A1 (zh) | 2017-06-12 | 2017-12-26 | 一种无线信号的屏蔽方法及装置 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107332640B (zh) |
WO (1) | WO2018227928A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112713959A (zh) * | 2020-12-23 | 2021-04-27 | 几维通信技术(深圳)有限公司 | 5g终端屏蔽系统及方法 |
CN115802302A (zh) * | 2022-09-27 | 2023-03-14 | 浙江国润通信科技有限公司 | 信令解析与无线安全管控方法 |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107332640B (zh) * | 2017-06-12 | 2019-09-17 | 京信通信系统(中国)有限公司 | 一种无线信号的屏蔽方法及装置 |
CN109195193A (zh) * | 2018-08-21 | 2019-01-11 | 四川长虹网络科技有限责任公司 | WiFi模拟装置 |
CN109120359B (zh) * | 2018-09-11 | 2021-11-05 | 洛阳中科龙网创新科技有限公司 | 一种基于无线信号竞争的智能移动信号屏蔽方法 |
CA3111642C (en) * | 2018-09-17 | 2023-12-19 | Huawei Technologies Co., Ltd. | Network selection method and apparatus applied to mobile terminal |
CN116669142B (zh) * | 2023-07-26 | 2023-12-29 | 天津安力信通讯科技有限公司 | 一种屏蔽无线网络通信信号的方法 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120044876A1 (en) * | 2010-08-18 | 2012-02-23 | Pouya Taaghol | Method and apparatus for virtualization of wireless network |
CN102883267A (zh) * | 2012-09-25 | 2013-01-16 | 武汉邮电科学研究院 | 一种在小区范围内对lte终端进行定位的方法 |
CN107294641A (zh) * | 2017-06-12 | 2017-10-24 | 京信通信系统(中国)有限公司 | 一种无线信号的屏蔽方法及装置 |
CN107332640A (zh) * | 2017-06-12 | 2017-11-07 | 京信通信系统(中国)有限公司 | 一种无线信号的屏蔽方法及装置 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103607730A (zh) * | 2013-11-19 | 2014-02-26 | 成都西科微波通讯有限公司 | 一种移动设备通信的区域管控方法及系统 |
-
2017
- 2017-06-12 CN CN201710439643.XA patent/CN107332640B/zh active Active
- 2017-12-26 WO PCT/CN2017/118701 patent/WO2018227928A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120044876A1 (en) * | 2010-08-18 | 2012-02-23 | Pouya Taaghol | Method and apparatus for virtualization of wireless network |
CN102883267A (zh) * | 2012-09-25 | 2013-01-16 | 武汉邮电科学研究院 | 一种在小区范围内对lte终端进行定位的方法 |
CN107294641A (zh) * | 2017-06-12 | 2017-10-24 | 京信通信系统(中国)有限公司 | 一种无线信号的屏蔽方法及装置 |
CN107332640A (zh) * | 2017-06-12 | 2017-11-07 | 京信通信系统(中国)有限公司 | 一种无线信号的屏蔽方法及装置 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112713959A (zh) * | 2020-12-23 | 2021-04-27 | 几维通信技术(深圳)有限公司 | 5g终端屏蔽系统及方法 |
CN115802302A (zh) * | 2022-09-27 | 2023-03-14 | 浙江国润通信科技有限公司 | 信令解析与无线安全管控方法 |
Also Published As
Publication number | Publication date |
---|---|
CN107332640A (zh) | 2017-11-07 |
CN107332640B (zh) | 2019-09-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018227928A1 (zh) | 一种无线信号的屏蔽方法及装置 | |
WO2018227927A1 (zh) | 一种无线信号的屏蔽方法及装置 | |
US10034324B2 (en) | Optimization of power consumption in dual SIM mobiles in connected mode in a wireless network | |
WO2018137684A1 (zh) | 通信方法和通信装置 | |
RU2679182C1 (ru) | Сетевой узел, беспроводное устройство и способы, выполняемые в них для обработки контекстной информации сети радиодоступа (ran) в сети беспроводной связи | |
EP3048748A1 (en) | Mobile terminal communication method, device and related equipment | |
CN106714283A (zh) | 通信装置及同步方法 | |
GB2496018A (en) | Measurement reporting of neighbour frequencies for redirection to an alternative frequency | |
CN112399558A (zh) | 寻呼的方法和装置 | |
US11770748B2 (en) | Interconnections between the core networks | |
US11039452B2 (en) | LTE-U and WIFI 5G channel self-interference addressing method and system | |
US8971910B2 (en) | Network element, cellular communication system and method therefor | |
EP3790316B1 (en) | Method and device for acquiring terminal capability | |
WO2021152405A1 (en) | Optimizing paging collision in multi-usim scenarios | |
CN112640347B (zh) | 无线通信的方法、终端设备和网络设备 | |
JP4433152B2 (ja) | マルチモードの遠隔通信ネットワークにおけるハンドオーバの方法 | |
US10506485B2 (en) | Voice switching method and apparatus | |
CN112020899B (zh) | 网络接入方法及相关设备 | |
CN104170463B (zh) | 邻区添加方法和装置 | |
CN108282735B (zh) | 一种通信中的控制方法及基站、终端 | |
US20230224993A1 (en) | Communication method and apparatus | |
CN115152255A (zh) | 中继方法和通信设备 | |
US20220225197A1 (en) | Inter-network mobility method and apparatus, and communications device | |
US11910472B2 (en) | Systems and methods for cell selection and reselection based on user equipment (“UE”) access level | |
CN110809862B (zh) | 一种指示ue发射端口数量的方法、ue及网络设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17913177 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 30.04.2020) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17913177 Country of ref document: EP Kind code of ref document: A1 |