Method for Implementing Access Restriction of Mobile Networks
First Claim
1. A method for implementing access restriction of mobile networks, comprising the steps of:
- a Mobile Station (MS) inquiring a list of forbidden Public Land Mobile Networks (PLMNs) and access technology identifiers, which is saved by the MS, when the MS selects a PLMN network;
the MS determining whether the selected PLMN network and the access technology exist in the list of forbidden PLMNs and access technology identifiers, if they exist, the MS sending no Location Updating Request to a Mobile Switching Center/Serving GPRS Support Node (MSC/SGSN) of a Core Network;
otherwise, the MS sending the Location Updating Request to the MSC/SGSN in order to access to the network.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention discloses a method for implementing access restriction of mobile networks. The method includes the following steps: a Mobile Station (MS) inquiring a list of forbidden Public Land Mobile Networks (PLMNs) and access technology identifiers, which is saved by itself, when selecting a PLMN network; the MS determining whether the selected PLMN network and the access technology exist in the list of forbidden PLMNs and access technology identifiers, if they exist, the MS will not send a Location Updating Request to a Mobile Switching Center/Serving GPRS Support Node (MSC/SGSN); otherwise, the MS will send the Location Updating Request to the MSC/SGSN in order to access to the network. The present invention makes it possible to implement the access restrictions upon different types of access networks using different restriction rules. Furthermore, during the process of implementing the access restriction, the modification to the existing networks and user terminals is very small, the method is easy to implement and can well satisfy demands on the access restriction of operators.
61 Citations
17 Claims
-
1. A method for implementing access restriction of mobile networks, comprising the steps of:
-
a Mobile Station (MS) inquiring a list of forbidden Public Land Mobile Networks (PLMNs) and access technology identifiers, which is saved by the MS, when the MS selects a PLMN network;
the MS determining whether the selected PLMN network and the access technology exist in the list of forbidden PLMNs and access technology identifiers, if they exist, the MS sending no Location Updating Request to a Mobile Switching Center/Serving GPRS Support Node (MSC/SGSN) of a Core Network;
otherwise, the MS sending the Location Updating Request to the MSC/SGSN in order to access to the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
Specification