FIELD: information technology.
SUBSTANCE: said method comprises powering up the base station, obtaining a unique IP address for the base station, performing network authentication, powering up an inter-station interface, initiating inter-station synchronisation over the interface, sending a request for network parameters and receiving network parameters enabling interaction with a core network.
EFFECT: high security of the base station.
19 cl, 7 dwg
Title | Year | Author | Number |
---|---|---|---|
INTERACTION AND INTEGRATION OF VARIOUS NETWORKS OF RADIO ACCESS | 2015 |
|
RU2669780C2 |
METHOD AND DEVICE FOR IMPLEMENTING PROTECTION IN WIRELESS LTE DEVICE | 2008 |
|
RU2446626C2 |
METHOD, SYSTEM AND DEVICES FOR MAINTAINING SERVICES OF MOBILE COMMUNICATIONS IP PROTOCOL, VERSION 6 | 2004 |
|
RU2322766C2 |
METHOD AND DEVICE FOR PROTECTION OF WIRELESS FORWARDING NODES | 2011 |
|
RU2533172C2 |
HOME (e)NODE-B WITH NEW FUNCTIONALITY | 2008 |
|
RU2429590C2 |
ACCESS CONTROL OF USER DEVICE TO NETWORK | 2018 |
|
RU2734694C1 |
METHOD AND DEVICE FOR PROVISION OF PROTECTION IN DATA PROCESSING SYSTEM | 2002 |
|
RU2333608C2 |
GENERATION OF PROTECTIVE KEY FOR DOUBLE CONNECTION | 2014 |
|
RU2628321C2 |
GENERATING A SECURITY KEY FOR DUAL CONNECTION | 2014 |
|
RU2747375C2 |
GENERATING SECURITY KEYS IN NEXT-GENERATION MOBILE COMMUNICATION NETWORKS | 2007 |
|
RU2416882C2 |
Authors
Dates
2011-07-20—Published
2007-12-27—Filed