US20120210400A1 - Method of managing authorization of private node b in a wireless communication system and related device - Google Patents

Method of managing authorization of private node b in a wireless communication system and related device Download PDF

Info

Publication number
US20120210400A1
US20120210400A1 US13/454,096 US201213454096A US2012210400A1 US 20120210400 A1 US20120210400 A1 US 20120210400A1 US 201213454096 A US201213454096 A US 201213454096A US 2012210400 A1 US2012210400 A1 US 2012210400A1
Authority
US
United States
Prior art keywords
private node
position information
node
private
authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/454,096
Inventor
Chih-Hsiang Wu
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HTC Corp
Original Assignee
HTC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HTC Corp filed Critical HTC Corp
Priority to US13/454,096 priority Critical patent/US20120210400A1/en
Assigned to HTC CORPORATION reassignment HTC CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: WU, CHIH-HSIANG
Publication of US20120210400A1 publication Critical patent/US20120210400A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/084Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/086Access security using security domains
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/042Public Land Mobile systems, e.g. cellular systems
    • H04W84/045Public Land Mobile systems, e.g. cellular systems using private Base Stations, e.g. femto Base Stations, home Node B

Definitions

  • the present invention relates to methods and devices utilized in a wireless communication system, and more particularly, to methods and devices utilized in the wireless communication system for controlling selection for home cells.
  • a System Architecture Evolution (SAE) system set forth by 3GPP (3rd Generation Partnership Project) is a packet core network architecture for UMTS (Universal Mobile Telecommunications System), addressing cost-efficient deployment and operations for mass-market usage of IP services.
  • the main network evolutions include meeting the targets for a radio-interface of a long term evolution (LTE) system, simplified network architecture, an All-IP Network, only packet switched means for all services, no circuit switching, and support for mobility and service continuity between heterogeneous access networks, such as between 2G/3G, LTE, non-3GPP access systems.
  • LTE long term evolution
  • the SAE core network or an evolved packet system (EPS) core network, includes an MME (Mobility Management Entity), an S-GW (Serving Gateway) and a P-GW (PDN gateway).
  • MME Mobility Management Entity
  • S-GW Serving Gateway
  • P-GW Packet Data Network gateway
  • the MME is a control plane entity that manages the attachment to the network, the authentication of the user equipment (UE), and interfaces an E-RAN (evolved radio access network) for the creation of relevant radio bearers.
  • the S-GW is a user plane entity handling packet forwarding uplink and downlink between the PDN gateway and the radio environment (e.g. E-RAN). The S-GW is always located in the network where the UE is camping.
  • NAS Non-Access-Stratum
  • EPC evolved packet core network
  • eNBs evolved Node-Bs
  • layer 3 signalling procedures between the UE and the EPC via non-3GPP access networks.
  • home cell deployments are defined as a single eNB used in a building or a small group of cells, e.g. in a campus deployment. Access to home cells is restricted to particular subscribers.
  • a CSG (closed subscriber group) cell as part of the PLMN (public land mobile network) is only suitable for a UE if an id of the CSG cell is in a whitelist of the UE.
  • the whitelist is a list of CSG cell ids where the UE is allowed to camp.
  • a CSG area is defined as a tracking area (TA) that consists of a cell or group of cells to which access is restricted to a defined group of users.
  • TA tracking area
  • An eNB which belongs to a CSG area, sends the CSG cell area identity to the MME whenever authorization needs to be checked in the MME.
  • a private node-B usually owned by an individual is normally deployed in the home network to provide services for CSG subscribers.
  • a user attempting to be a CSG subscriber goes to an operator's store to subscribe the CSG services and thereby gets a private node-B.
  • the user can use the private node B at home via Internet.
  • the private node-B is set to communicate to the operator's EPS core network via IP connection.
  • the private node B and the EPS core network i.e. the MME or the Serving Gateway) authorize each other.
  • the user possibly takes the private node B out of the home network coverage, and the prior art does not specify how the private node-B and the EPS deal with this situation.
  • the private node B used in unauthorized area works in the same way as in home network coverage.
  • the private node-B may use a frequency band that belongs to other operators for data transmission. This is an illegal usage and makes interference to frequency bands licensed for other operators.
  • the present invention further discloses a method of managing authorization of a private node-B coupled to a packet core network terminal in a wireless communication system.
  • the method includes performing positioning measurement for the private node-B to generate a position information of the private node-B, providing the position information for the packet core network terminal, determining authorization validity of the private node-B according to the position information and home network coverage of the private node-B, and then rejecting the authorization of the private node-B when the position information indicates that the private node-B is located out of the home network coverage.
  • the present invention further discloses a communication device of a wireless communication system for managing authorization of a private node-B to avoid illegal usage of the private node-B.
  • the communication device includes a processor, a communication interfacing unit, a control unit and a computer readable recording medium.
  • the processor is used for processing storage data.
  • the communication interfacing unit is used for exchanging signals with a peer communication device.
  • the control unit is coupled to the processor and communication interfacing unit, and used for controlling the communication interfacing unit and the communication device according to processing results of the processor.
  • the computer readable recording medium is coupled to the processor and used for storing the storage data.
  • the storage data includes program code for performing positioning measurement for the private node-B to generate a position information of the private node-B, program code for providing the position information for the packet core network terminal, program code for determining authorization validity of the private node-B according to the position information and home network coverage of the private node-B, and program code for rejecting the authorization of the private node-B when the position information indicates that the private node-B is located out of the home network coverage.
  • FIG. 1 is a schematic diagram of a communication device according to embodiments of the present invention.
  • FIG. 2 is a flowchart of a process according to an embodiment of the present invention.
  • FIG. 3 is a flowchart of a process according to an embodiment of the present invention.
  • FIG. 4 is a flowchart of a process according to an embodiment of the present invention.
  • FIG. 5 is a flowchart of a process according to an embodiment of the present invention.
  • FIG. 6 is a flowchart of a process according to an embodiment of the present invention.
  • FIG. 1 illustrates a schematic diagram of a communication device 10 according to embodiments of the present invention.
  • the communication device 10 is preferably used in wireless communication system employing a system architecture evolution (SAE) core network and includes a processor 100 , a computer readable recording medium 110 , a communication interfacing unit 120 and a control unit 130 .
  • the computer readable recording medium 110 is any data storage device that stores storage data 112 , including program code and related parameters, and the storage data 112 is thereafter read and processed by the processor 100 .
  • Examples of the computer readable recording medium 110 include read-only memory (ROM), random-access memory (RAM), CD-ROMs, magnetic tapes, hard disks, optical data storage devices, and carrier waves (such as data transmission through the Internet).
  • the control unit 130 controls the communication interfacing unit 120 and related operations and states of the communication device 10 according to processed results of the process 100 .
  • the communication interfacing unit 120 is responsible for exchanging signals with a peer communication device which represents a communication device performs functions of a peer communication protocol.
  • the communication device 10 can be used in an EPS (evolved packet system) network device, such as an MME (Mobility Management Entity) or an S-GW (Serving Gateway), a Node-B in a UTRAN (UMTS radio access network), or an evolved Node-B in an E-UTRAN (evolved UTRAN).
  • EPS evolved packet system
  • MME Mobility Management Entity
  • S-GW Serving Gateway
  • Node-B in a UTRAN UMTS radio access network
  • E-UTRAN evolved Node-B in an E-UTRAN
  • the communication device 10 exchanges signals from a NB (Node-B) or an eNB (evolved Node-B) with the communication interfacing unit 120 via cable, xDSL, or other IP access technologies.
  • a radio interface function is provided in the communication interfacing unit 120 for wireless signal exchange in addition to signal exchange with the core network device.
  • FIG. 2 illustrates a flowchart of a process 20 according to an embodiment of the present invention.
  • the process 20 is applied to an EPS network for managing authorization of a private node-B.
  • the process 20 can be compiled into the program code of the storage data 112 of FIG. 1 and includes the following steps:
  • Step 200 Start.
  • Step 202 Determine authorization validity of the private node-B according to network information and the licensed band coverage of the private node-B.
  • Step 204 Reject the authorization of the private node-B when the network information of the private node-B is out of the licensed band coverage of the private node-B.
  • Step 206 End.
  • the EPS network knows the network information of the private node-B when the private node-B connects to the EPS network via a cable, xDSL or other IP (Internet Protocol) access technologies. Then, the EPS network determines the authorization validity of the private node-B according to network information and licensed band coverage. When the network information is determined to be out of the licensed band coverage, the EPS network rejects the authorization of the private node-B. On the contrary, when the network information is determined to be in the licensed band coverage, the EPS network accepts the authorization of the private node-B.
  • the network information used for the determination of authorization is an IP address of the private node-B, and the licensed band coverage includes a valid range of IP addresses for the private node-B.
  • the EPS network can prevent the user from using the private node-B in an unauthorized area with the IP address.
  • FIG. 3 illustrates a flowchart of a process 30 according to an embodiment of the present invention.
  • the process 30 is utilized for managing authorization of a private node-B coupled to an EPS network terminal that stores home network coverage indicating valid accessible geographical coverage of the private node-B.
  • the process 30 can be compiled into the program code of the storage data 112 of FIG. 1 and includes the following steps:
  • Step 300 Start.
  • Step 302 The private node-B performs positioning measurement to generate position information of the private node-B.
  • Step 304 The private node-B provides the position information for the EPS network terminal.
  • Step 306 The EPS network terminal determines authorization validity of the private node-B according to the position information and the home network coverage of the private node-B.
  • Step 308 The EPS network terminal rejects the authorization of the private node-B when the position information indicates that the private node-B is located out of the home network coverage.
  • Step 310 End.
  • the private node-B provides the EPS network with its position information revealing geographical information of the private node-B.
  • the EPS network terminal determines authorization validity of the private node-B according to the position information and the home network coverage.
  • the EPS network terminal rejects the authorization of the private node-B.
  • the Node-B performs positioning measurement by means of a GPS (global positioning) system.
  • the process 30 utilizes the geographical information of the private node-B to determine whether to grant authorization to the private node-B.
  • FIG. 4 illustrates a flowchart of a process 40 according to an embodiment of the present invention.
  • the process 40 is utilized for a private node-B including predetermined licensed band area to manage its authorization.
  • the process 40 can be compiled into the program code of the storage data 112 of FIG. 1 and includes the following steps:
  • Step 400 Start.
  • Step 402 Perform cell searching in a radio access network.
  • Step 404 When a cell is found in the radio access network, read system information corresponding to the cell.
  • Step 406 Determine authorization validity according to the system information and licensed band area corresponding to the private node-B.
  • Step 408 End.
  • the private node-B performs cell searching in the radio access network when powering on. When any cell is found, the private node-B reads the system information of the cell and then determines its authorization validity according to the system information and the licensed band area.
  • the private node-B stops performing cell searching and reading the system information when the system information of the found cell indicates that the private node-B is located in the licensed band area.
  • the system information indicates that the private node-B is out of the licensed band area, this means that the private node-B is used in the unauthorized area.
  • the private node-B keeps its transmitting functions deactivated. In other words, the private node-B does not perform any data transmission.
  • the private node-B uses a license-free band, which does not make interference to frequency bands of other operators, for data transmission.
  • the cell is a macro cell in a GSM EDGE radio access network (GERAN), a UMTS radio access network (UTRAN) or an evolved UMTS radio access network (E-UTRAN).
  • GERAN GSM EDGE radio access network
  • UTRAN UMTS radio access network
  • E-UTRAN evolved UMTS radio access network
  • the read system information is a public land mobile network (PLMN) identity, a location area code (LAC) or a routing area code (RAC).
  • PLMN public land mobile network
  • LAC location area code
  • RAC routing area code
  • the read system information is corresponding PLMN identity or Tracking Area Code (TAC).
  • TAC Tracking Area Code
  • FIG. 5 illustrates a flowchart of a process 50 according to an embodiment of the present invention.
  • the process 50 is utilized for managing authorization of a private node-B coupled to EPS network including predetermined licensed band area of the private node-B.
  • the process 50 can be compiled into the program code of the storage data 112 of FIG. 1 and includes the following steps:
  • Step 500 Start.
  • Step 502 The private node-B performs cell searching in a radio access network.
  • Step 504 When a cell is found, the private node-B reads system information including a PLMN identity of the cell.
  • Step 506 The private node-B sends the PLMN identity to the EPS network.
  • Step 508 The EPS network rejects the authorization of the private node-B when the PLMN identity indicates that the private node-B is out of the licensed band area.
  • Step 510 End.
  • the private node-B reads the PLMN identity from the found cell, which is preferably a GERAN, UTRAN, or E-UTRAN cell, and further sends the PLMN identity to the EPS network.
  • the EPS network examines the PLMN identity according to the licensed band area and thereby rejects the authorization of the private node-B when the PLMN identity indicates that the private node-B is out of the licensed band area.
  • the process 50 utilizes the PLMN identity of the cell found by the private node-B to determine whether to grant authorization to the private node-B.
  • FIG. 6 illustrates a flowchart of a process 60 according to an embodiment of the present invention.
  • the process 60 is utilized for managing authorization of a private node-B coupled to EPS network including predetermined licensed band area of the private node-B.
  • the process 60 can be compiled into the program code of the storage data 112 of FIG. 1 and includes the following steps:
  • Step 600 Start.
  • Step 602 The private node-B performs cell searching in a radio access network.
  • Step 604 When a cell is found, the private node-B reads system information including a PLMN identity, LAC, RAC or TAC of the cell.
  • Step 606 The private node-B sends the PLMN identity, LAC, RAC or TAC to the EPS network.
  • Step 608 The EPS network indicates the private node-B to use a license-free band for data transmission when the public land mobile network identity indicates that the private node-B is out of the licensed band area.
  • Step 610 End.
  • Steps 600 - 606 , 610 are executed in the same way as Steps 500 - 506 , 510 respectively.
  • the EPS network executing Step 608 allows the private node-B to perform data transmission via the license-free band when the private node-B is used in the unauthorized area.
  • the cell is a GERAN, UTRAN, or E-UTRAN cell.
  • the embodiments of the present invention avoid the private node B from being used in an unauthorized area by determining the authorization of the private node-B according to network, geographical or cell system information.

Abstract

A method of managing authorization of a private node-B coupled to a packet core network terminal in a wireless communication system. The method includes performing positioning measurement for the private node-B to generate a position information of the private node-B, providing the position information for the packet core network terminal, determining authorization validity of the private node-B according to the position information and home network coverage of the private node-B, and then rejecting the authorization of the private node-B when the position information indicates that the private node-B is located out of the home network coverage.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This is a divisional application of application Ser. No. 12/533,007, filed on 2009 Jul. 31, which is included in its entirety herein by reference.
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention relates to methods and devices utilized in a wireless communication system, and more particularly, to methods and devices utilized in the wireless communication system for controlling selection for home cells.
  • 2. Description of the Prior Art
  • A System Architecture Evolution (SAE) system, set forth by 3GPP (3rd Generation Partnership Project) is a packet core network architecture for UMTS (Universal Mobile Telecommunications System), addressing cost-efficient deployment and operations for mass-market usage of IP services. The main network evolutions include meeting the targets for a radio-interface of a long term evolution (LTE) system, simplified network architecture, an All-IP Network, only packet switched means for all services, no circuit switching, and support for mobility and service continuity between heterogeneous access networks, such as between 2G/3G, LTE, non-3GPP access systems.
  • The SAE core network, or an evolved packet system (EPS) core network, includes an MME (Mobility Management Entity), an S-GW (Serving Gateway) and a P-GW (PDN gateway). The MME is a control plane entity that manages the attachment to the network, the authentication of the user equipment (UE), and interfaces an E-RAN (evolved radio access network) for the creation of relevant radio bearers. The S-GW is a user plane entity handling packet forwarding uplink and downlink between the PDN gateway and the radio environment (e.g. E-RAN). The S-GW is always located in the network where the UE is camping.
  • Functions of the SAE include the Non-Access-Stratum (NAS) functions to be performed by the UE in idle mode, the NAS signalling procedures between the UE and an evolved packet core network (EPC) via an E-UTRAN (evolved UMTS radio access network) including eNBs (evolved Node-Bs), and layer 3 signalling procedures between the UE and the EPC via non-3GPP access networks.
  • Under NAS functions, home cell deployments are defined as a single eNB used in a building or a small group of cells, e.g. in a campus deployment. Access to home cells is restricted to particular subscribers. In home cell deployments, a CSG (closed subscriber group) cell as part of the PLMN (public land mobile network) is only suitable for a UE if an id of the CSG cell is in a whitelist of the UE. The whitelist is a list of CSG cell ids where the UE is allowed to camp.
  • In the home cell deployments, a CSG area is defined as a tracking area (TA) that consists of a cell or group of cells to which access is restricted to a defined group of users. An eNB, which belongs to a CSG area, sends the CSG cell area identity to the MME whenever authorization needs to be checked in the MME.
  • A private node-B usually owned by an individual is normally deployed in the home network to provide services for CSG subscribers. In provision of CSG business, a user attempting to be a CSG subscriber goes to an operator's store to subscribe the CSG services and thereby gets a private node-B. The user can use the private node B at home via Internet. The private node-B is set to communicate to the operator's EPS core network via IP connection. The private node B and the EPS core network (i.e. the MME or the Serving Gateway) authorize each other.
  • However, the user possibly takes the private node B out of the home network coverage, and the prior art does not specify how the private node-B and the EPS deal with this situation. AS a result, the private node B used in unauthorized area works in the same way as in home network coverage. In this situation, the private node-B may use a frequency band that belongs to other operators for data transmission. This is an illegal usage and makes interference to frequency bands licensed for other operators.
  • SUMMARY OF THE INVENTION
  • The present invention further discloses a method of managing authorization of a private node-B coupled to a packet core network terminal in a wireless communication system. The method includes performing positioning measurement for the private node-B to generate a position information of the private node-B, providing the position information for the packet core network terminal, determining authorization validity of the private node-B according to the position information and home network coverage of the private node-B, and then rejecting the authorization of the private node-B when the position information indicates that the private node-B is located out of the home network coverage.
  • The present invention further discloses a communication device of a wireless communication system for managing authorization of a private node-B to avoid illegal usage of the private node-B. The communication device includes a processor, a communication interfacing unit, a control unit and a computer readable recording medium. The processor is used for processing storage data. The communication interfacing unit is used for exchanging signals with a peer communication device. The control unit is coupled to the processor and communication interfacing unit, and used for controlling the communication interfacing unit and the communication device according to processing results of the processor. The computer readable recording medium is coupled to the processor and used for storing the storage data. The storage data includes program code for performing positioning measurement for the private node-B to generate a position information of the private node-B, program code for providing the position information for the packet core network terminal, program code for determining authorization validity of the private node-B according to the position information and home network coverage of the private node-B, and program code for rejecting the authorization of the private node-B when the position information indicates that the private node-B is located out of the home network coverage.
  • These and other objectives of the present invention will no doubt become obvious to those of ordinary skill in the art after reading the following detailed description of the preferred embodiment that is illustrated in the various figures and drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a schematic diagram of a communication device according to embodiments of the present invention.
  • FIG. 2 is a flowchart of a process according to an embodiment of the present invention.
  • FIG. 3 is a flowchart of a process according to an embodiment of the present invention.
  • FIG. 4 is a flowchart of a process according to an embodiment of the present invention.
  • FIG. 5 is a flowchart of a process according to an embodiment of the present invention.
  • FIG. 6 is a flowchart of a process according to an embodiment of the present invention.
  • DETAILED DESCRIPTION
  • Please refer to FIG. 1, which illustrates a schematic diagram of a communication device 10 according to embodiments of the present invention. The communication device 10 is preferably used in wireless communication system employing a system architecture evolution (SAE) core network and includes a processor 100, a computer readable recording medium 110, a communication interfacing unit 120 and a control unit 130. The computer readable recording medium 110 is any data storage device that stores storage data 112, including program code and related parameters, and the storage data 112 is thereafter read and processed by the processor 100. Examples of the computer readable recording medium 110 include read-only memory (ROM), random-access memory (RAM), CD-ROMs, magnetic tapes, hard disks, optical data storage devices, and carrier waves (such as data transmission through the Internet). The control unit 130 controls the communication interfacing unit 120 and related operations and states of the communication device 10 according to processed results of the process 100. The communication interfacing unit 120 is responsible for exchanging signals with a peer communication device which represents a communication device performs functions of a peer communication protocol.
  • The communication device 10 can be used in an EPS (evolved packet system) network device, such as an MME (Mobility Management Entity) or an S-GW (Serving Gateway), a Node-B in a UTRAN (UMTS radio access network), or an evolved Node-B in an E-UTRAN (evolved UTRAN). When the communication device 10 is used in the core network device, the communication device 10 exchanges signals from a NB (Node-B) or an eNB (evolved Node-B) with the communication interfacing unit 120 via cable, xDSL, or other IP access technologies. When the communication device 10 is used in the NB or eNB, a radio interface function is provided in the communication interfacing unit 120 for wireless signal exchange in addition to signal exchange with the core network device.
  • Please refer to FIG. 2, which illustrates a flowchart of a process 20 according to an embodiment of the present invention. The process 20 is applied to an EPS network for managing authorization of a private node-B. The process 20 can be compiled into the program code of the storage data 112 of FIG. 1 and includes the following steps:
  • Step 200: Start.
  • Step 202: Determine authorization validity of the private node-B according to network information and the licensed band coverage of the private node-B.
  • Step 204: Reject the authorization of the private node-B when the network information of the private node-B is out of the licensed band coverage of the private node-B.
  • Step 206: End.
  • According to the process 20, the EPS network knows the network information of the private node-B when the private node-B connects to the EPS network via a cable, xDSL or other IP (Internet Protocol) access technologies. Then, the EPS network determines the authorization validity of the private node-B according to network information and licensed band coverage. When the network information is determined to be out of the licensed band coverage, the EPS network rejects the authorization of the private node-B. On the contrary, when the network information is determined to be in the licensed band coverage, the EPS network accepts the authorization of the private node-B. Preferably, the network information used for the determination of authorization is an IP address of the private node-B, and the licensed band coverage includes a valid range of IP addresses for the private node-B.
  • Therefore, through the process 20, the EPS network can prevent the user from using the private node-B in an unauthorized area with the IP address.
  • Please refer to FIG. 3, which illustrates a flowchart of a process 30 according to an embodiment of the present invention. The process 30 is utilized for managing authorization of a private node-B coupled to an EPS network terminal that stores home network coverage indicating valid accessible geographical coverage of the private node-B. The process 30 can be compiled into the program code of the storage data 112 of FIG. 1 and includes the following steps:
  • Step 300: Start.
  • Step 302: The private node-B performs positioning measurement to generate position information of the private node-B.
  • Step 304: The private node-B provides the position information for the EPS network terminal.
  • Step 306: The EPS network terminal determines authorization validity of the private node-B according to the position information and the home network coverage of the private node-B.
  • Step 308: The EPS network terminal rejects the authorization of the private node-B when the position information indicates that the private node-B is located out of the home network coverage.
  • Step 310: End.
  • According to the process 30, the private node-B provides the EPS network with its position information revealing geographical information of the private node-B. After receiving the position information, the EPS network terminal determines authorization validity of the private node-B according to the position information and the home network coverage. When the position information indicates that the private node-B is located out of the home network coverage, the EPS network terminal rejects the authorization of the private node-B. Preferably, the Node-B performs positioning measurement by means of a GPS (global positioning) system.
  • Therefore, the process 30 utilizes the geographical information of the private node-B to determine whether to grant authorization to the private node-B.
  • Please refer to FIG. 4, which illustrates a flowchart of a process 40 according to an embodiment of the present invention. The process 40 is utilized for a private node-B including predetermined licensed band area to manage its authorization. The process 40 can be compiled into the program code of the storage data 112 of FIG. 1 and includes the following steps:
  • Step 400: Start.
  • Step 402: Perform cell searching in a radio access network.
  • Step 404: When a cell is found in the radio access network, read system information corresponding to the cell.
  • Step 406: Determine authorization validity according to the system information and licensed band area corresponding to the private node-B.
  • Step 408: End.
  • According to the process 40, the private node-B performs cell searching in the radio access network when powering on. When any cell is found, the private node-B reads the system information of the cell and then determines its authorization validity according to the system information and the licensed band area.
  • Preferably, the private node-B stops performing cell searching and reading the system information when the system information of the found cell indicates that the private node-B is located in the licensed band area. On the contrary, when the system information indicates that the private node-B is out of the licensed band area, this means that the private node-B is used in the unauthorized area. In this situation, the private node-B keeps its transmitting functions deactivated. In other words, the private node-B does not perform any data transmission. Alternatively, the private node-B uses a license-free band, which does not make interference to frequency bands of other operators, for data transmission.
  • Preferably, the cell is a macro cell in a GSM EDGE radio access network (GERAN), a UMTS radio access network (UTRAN) or an evolved UMTS radio access network (E-UTRAN). When the cell is a GERAN or UTRAN cell, the read system information is a public land mobile network (PLMN) identity, a location area code (LAC) or a routing area code (RAC). When the cell is an E-UTRAN cell, the read system information is corresponding PLMN identity or Tracking Area Code (TAC).
  • Please refer to FIG. 5, which illustrates a flowchart of a process 50 according to an embodiment of the present invention. The process 50 is utilized for managing authorization of a private node-B coupled to EPS network including predetermined licensed band area of the private node-B. The process 50 can be compiled into the program code of the storage data 112 of FIG. 1 and includes the following steps:
  • Step 500: Start.
  • Step 502: The private node-B performs cell searching in a radio access network.
  • Step 504: When a cell is found, the private node-B reads system information including a PLMN identity of the cell.
  • Step 506: The private node-B sends the PLMN identity to the EPS network.
  • Step 508: The EPS network rejects the authorization of the private node-B when the PLMN identity indicates that the private node-B is out of the licensed band area.
  • Step 510: End.
  • According to the process 50, the private node-B reads the PLMN identity from the found cell, which is preferably a GERAN, UTRAN, or E-UTRAN cell, and further sends the PLMN identity to the EPS network. After receiving the PLMN identity, the EPS network examines the PLMN identity according to the licensed band area and thereby rejects the authorization of the private node-B when the PLMN identity indicates that the private node-B is out of the licensed band area.
  • Therefore, the process 50 utilizes the PLMN identity of the cell found by the private node-B to determine whether to grant authorization to the private node-B.
  • Please refer to FIG. 6, which illustrates a flowchart of a process 60 according to an embodiment of the present invention. The process 60 is utilized for managing authorization of a private node-B coupled to EPS network including predetermined licensed band area of the private node-B. The process 60 can be compiled into the program code of the storage data 112 of FIG. 1 and includes the following steps:
  • Step 600: Start.
  • Step 602: The private node-B performs cell searching in a radio access network.
  • Step 604: When a cell is found, the private node-B reads system information including a PLMN identity, LAC, RAC or TAC of the cell.
  • Step 606: The private node-B sends the PLMN identity, LAC, RAC or TAC to the EPS network.
  • Step 608: The EPS network indicates the private node-B to use a license-free band for data transmission when the public land mobile network identity indicates that the private node-B is out of the licensed band area.
  • Step 610: End.
  • In the process 60, Steps 600-606, 610 are executed in the same way as Steps 500-506, 510 respectively. Instead of rejecting all possible transmissions of the private node-B in Step 508, the EPS network executing Step 608 allows the private node-B to perform data transmission via the license-free band when the private node-B is used in the unauthorized area. The cell is a GERAN, UTRAN, or E-UTRAN cell.
  • In conclusion, the embodiments of the present invention avoid the private node B from being used in an unauthorized area by determining the authorization of the private node-B according to network, geographical or cell system information.
  • Those skilled in the art will readily observe that numerous modifications and alterations of the device and method may be made while retaining the teachings of the invention. Accordingly, the above disclosure should be construed as limited only by the metes and bounds of the appended claims.

Claims (4)

1. A method of managing authorization of a private node-B coupled to a packet core network terminal in a wireless communication system, the method comprising:
performing positioning measurement for the private node-B to generate position information of the private node-B;
providing the position information for the packet core network terminal;
determining authorization validity of the private node-B according to the position information and home network coverage of the private node-B; and
rejecting the authorization of the private node-B when the position information indicates that the private node-B is located out of the home network coverage.
2. The method of claim 1, wherein the private node-B performing positioning measurement to generate the position information comprises the private node-B performing positioning measurement by means of a global positioning system to generate the position information.
3. A communication device of a wireless communication system for managing authorization of a private node-B to avoid illegal usage of the private node-B, the communication device comprising:
a processor for processing storage data;
a communication interfacing unit for exchanging signals with a peer communication device;
a control unit coupled to the processor and communication interfacing unit, for controlling the communication interfacing unit and the communication device according to processing results of the processor; and
a computer readable recording medium coupled to the processor, for storing the storage data;
wherein the storage data comprises:
program code for performing positioning measurement for the private node-B to generate position information of the private node-B;
program code for providing the position information for the packet core network terminal;
program code for determining authorization validity of the private node-B according to the position information and home network coverage of the private node-B; and
program code for rejecting the authorization of the private node-B when the position information indicates that the private node-B is located out of the home network coverage.
4. The communication device of claim 3, wherein the program code for the private node-B performing positioning measurement to generate the position information comprises the private node-B performing positioning measurement by means of a global positioning system to generate the position information.
US13/454,096 2009-07-31 2012-04-24 Method of managing authorization of private node b in a wireless communication system and related device Abandoned US20120210400A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/454,096 US20120210400A1 (en) 2009-07-31 2012-04-24 Method of managing authorization of private node b in a wireless communication system and related device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US12/533,007 US20110030035A1 (en) 2009-07-31 2009-07-31 Method of managing authorization of private node b in a wireless communication system and related device
US13/454,096 US20120210400A1 (en) 2009-07-31 2012-04-24 Method of managing authorization of private node b in a wireless communication system and related device

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US12/533,007 Division US20110030035A1 (en) 2009-07-31 2009-07-31 Method of managing authorization of private node b in a wireless communication system and related device

Publications (1)

Publication Number Publication Date
US20120210400A1 true US20120210400A1 (en) 2012-08-16

Family

ID=43528243

Family Applications (3)

Application Number Title Priority Date Filing Date
US12/533,007 Abandoned US20110030035A1 (en) 2009-07-31 2009-07-31 Method of managing authorization of private node b in a wireless communication system and related device
US13/454,096 Abandoned US20120210400A1 (en) 2009-07-31 2012-04-24 Method of managing authorization of private node b in a wireless communication system and related device
US14/019,530 Expired - Fee Related US9191816B2 (en) 2009-07-31 2013-09-05 Method of managing authorization of private node B in a wireless communication system and related device

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US12/533,007 Abandoned US20110030035A1 (en) 2009-07-31 2009-07-31 Method of managing authorization of private node b in a wireless communication system and related device

Family Applications After (1)

Application Number Title Priority Date Filing Date
US14/019,530 Expired - Fee Related US9191816B2 (en) 2009-07-31 2013-09-05 Method of managing authorization of private node B in a wireless communication system and related device

Country Status (3)

Country Link
US (3) US20110030035A1 (en)
CN (1) CN101990278B (en)
TW (1) TWI543643B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150078593A1 (en) * 2013-09-13 2015-03-19 Omron Corporation Acoustic transducer and microphone

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2377686B1 (en) * 2010-05-31 2013-02-13 Vodafone España, S.A.U. METHOD FOR MODIFYING THE FREQUENCY CONFIGURATION OF A BASE STATION OF FEMTOCELL 3G OR NODE-B DOMESTIC (HNB).
WO2012148329A1 (en) * 2011-04-27 2012-11-01 Telefonaktiebolaget Lm Ericsson (Publ) Methods and apparatuses for sharing a radio node
CN102149114B (en) * 2011-05-10 2013-12-11 北京邮电大学 Femto base station network control method
CN104703181A (en) * 2013-12-09 2015-06-10 重庆重邮信科通信技术有限公司 Access node authentication method and terminal
CN105376740B (en) * 2014-08-15 2019-12-06 深圳市中兴微电子技术有限公司 safe reconstruction method, equipment and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5732387A (en) * 1995-12-04 1998-03-24 Motorola Method and apparatus for call establishment in a satellite communication system
WO2004040938A1 (en) * 2002-10-25 2004-05-13 Ibis Telecom, Inc. Internet base station
US20080318596A1 (en) * 2007-06-21 2008-12-25 Qualcomm Incorporated Method and Apparatus for Determining the Position of a Base Station in a Cellular Communication Network
US20090005031A1 (en) * 2007-05-14 2009-01-01 Samsung Electronics Co., Ltd. Method for measuring home cell in mobile communication system
US20090180439A1 (en) * 2008-01-02 2009-07-16 Alcatel-Lucent Method of determining a location of a base station in a wireless communication network and base station in a wireless communication network
US7995482B2 (en) * 2009-06-08 2011-08-09 Alcatel-Lucent Usa Inc. Femto base stations and methods for operating the same
US8135403B1 (en) * 2008-11-06 2012-03-13 Sprint Spectrum L.P. Method and apparatus for providing a pilot beacon on behalf of one or more base stations

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU1458201A (en) * 1999-12-03 2001-06-12 Ericsson Inc. System and method for private communications system selection
US7068626B2 (en) 2001-08-16 2006-06-27 Interdigital Technology Corporation Method of using a mobile unit to autonomously determine a serving cell
US7127253B2 (en) 2003-02-13 2006-10-24 Asustek Computer Inc. Penalty of cell reselection for a wireless device
CN1816187A (en) * 2005-02-05 2006-08-09 广州天润信息科技有限公司 Multi-module mobile telecommunication terminal and method
US7995994B2 (en) * 2006-09-22 2011-08-09 Kineto Wireless, Inc. Method and apparatus for preventing theft of service in a communication system
KR100959330B1 (en) 2006-10-13 2010-05-20 삼성전자주식회사 Apparatus and method for idcell allocation in broadband wireless communication system
KR100799885B1 (en) 2006-11-03 2008-01-31 주식회사 카서 Broadcasting, communication, and control converged wireless network protocol in short ranged pico-cell
GB2445989A (en) 2007-01-23 2008-07-30 Siemens Ag Controlling interference between first and second communication systems
US8019331B2 (en) * 2007-02-26 2011-09-13 Kineto Wireless, Inc. Femtocell integration into the macro network
US8483719B2 (en) * 2007-06-01 2013-07-09 Qualcomm Incorporated Methods and apparatus for determining FEMTO base station location
GB2447569B (en) * 2007-06-06 2008-12-10 Ubiquisys Ltd Cellular basestation
US9572089B2 (en) 2007-09-28 2017-02-14 Interdigital Patent Holdings, Inc. Method and apparatus for supporting home Node B services
JP5106969B2 (en) 2007-10-01 2012-12-26 株式会社エヌ・ティ・ティ・ドコモ User device and cell search method
EP2046090A1 (en) * 2007-10-02 2009-04-08 Panasonic Corporation Management of session control signaling for multicast/broadcast services
WO2009045149A1 (en) * 2007-10-03 2009-04-09 Telefonaktiebolaget L M Ericsson (Publ) Access control during relocation of a user equipment into a femto base station
US20090124235A1 (en) * 2007-11-13 2009-05-14 Peter Bosch Method of confirming authorized microcell base station use
US8971888B2 (en) * 2008-03-21 2015-03-03 Qualcomm Incorporated Cell selection and reselection in deployments with home nodeBs
CN101345673B (en) * 2008-05-21 2012-03-21 华为技术有限公司 Method for position validity detection, communication system, access equipment and top management network element
CA2738372A1 (en) * 2008-09-24 2010-04-01 Interdigital Patent Holdings, Inc. Home node-b apparatus and security protocols
US8132256B2 (en) * 2009-01-21 2012-03-06 At&T Mobility Ii Llc Home networking using LTE radio
US8433325B2 (en) * 2009-07-24 2013-04-30 Cisco Technology, Inc. Access class based picocell
US8233481B2 (en) * 2009-07-27 2012-07-31 Cisco Technology, Inc. Access class based picocell policy enforcement

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5732387A (en) * 1995-12-04 1998-03-24 Motorola Method and apparatus for call establishment in a satellite communication system
WO2004040938A1 (en) * 2002-10-25 2004-05-13 Ibis Telecom, Inc. Internet base station
US20090005031A1 (en) * 2007-05-14 2009-01-01 Samsung Electronics Co., Ltd. Method for measuring home cell in mobile communication system
US8224329B2 (en) * 2007-05-14 2012-07-17 Samsung Electronics Co., Ltd Method for measuring home cell in mobile communication system
US20080318596A1 (en) * 2007-06-21 2008-12-25 Qualcomm Incorporated Method and Apparatus for Determining the Position of a Base Station in a Cellular Communication Network
US20090180439A1 (en) * 2008-01-02 2009-07-16 Alcatel-Lucent Method of determining a location of a base station in a wireless communication network and base station in a wireless communication network
US8135403B1 (en) * 2008-11-06 2012-03-13 Sprint Spectrum L.P. Method and apparatus for providing a pilot beacon on behalf of one or more base stations
US7995482B2 (en) * 2009-06-08 2011-08-09 Alcatel-Lucent Usa Inc. Femto base stations and methods for operating the same

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150078593A1 (en) * 2013-09-13 2015-03-19 Omron Corporation Acoustic transducer and microphone
US9549263B2 (en) * 2013-09-13 2017-01-17 Omron Corporation Acoustic transducer and microphone

Also Published As

Publication number Publication date
US20110030035A1 (en) 2011-02-03
CN101990278A (en) 2011-03-23
US20140010164A1 (en) 2014-01-09
US9191816B2 (en) 2015-11-17
CN101990278B (en) 2014-08-20
TW201105150A (en) 2011-02-01
TWI543643B (en) 2016-07-21

Similar Documents

Publication Publication Date Title
EP2206387B1 (en) Handling location information for femto cells
EP2304902B1 (en) Network discovery and selection
US9467911B2 (en) Mobility procedures and differentiated charging in home node-Bs
US8965370B2 (en) Method and apparatus of controlling cell selection for a wireless communication system
US20190069338A1 (en) Emergency services support for non-cellular wireless access
US8433317B2 (en) Method of controlling home cell selection for a wireless communication system and related device
US9191816B2 (en) Method of managing authorization of private node B in a wireless communication system and related device
EP3108695B1 (en) Network elements, wireless communication system and methods therefor
KR20090085640A (en) Method and apparatus for implementing tracking area update and cell reselection in a long term evolution system
KR20130055009A (en) Method and apparatus of resolving pci confusion for providing inbound mobility to closed subscriber group
US20100216426A1 (en) User-Customized Mobility Method and System in a Mobile Communication System
WO2009134659A2 (en) Method and apparatus for detecting closed subscriber group cells
KR20220124239A (en) Network Slice Aware Cell Selection
US9913203B2 (en) Wireless communication unit, access point and method for providing a presence service in a wireless communication system
US8868033B1 (en) Method and system for avoiding unauthorized wireless communication devices at a femtocell
JP5971094B2 (en) MEASUREMENT SYSTEM, MEASUREMENT CONTROL DEVICE, AND MEASUREMENT METHOD

Legal Events

Date Code Title Description
AS Assignment

Owner name: HTC CORPORATION, TAIWAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:WU, CHIH-HSIANG;REEL/FRAME:028092/0974

Effective date: 20090730

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION