摘要:
In one exemplary and non-limiting aspect thereof a method is provided that includes sending a wireless network (WN) a first message that includes a list of authentication mechanisms supported by a node and, in association with each authentication mechanism, a corresponding identity; determining in the WN an authentication mechanism to be used for bootstrapping, based at least on the list received from the node; and including information in a second message that is sent to the node, the information including the determined authentication mechanism in conjunction with a corresponding identity. The method further includes protecting at least the list of authentication mechanisms supported by the node and the corresponding identities and sending a second message to the network, the second message including at least the list of authentication mechanisms and the corresponding identities. The method further includes receiving a second response message from the network that is at least partially integrity protected, where the second response message includes an indication of the selected authentication mechanism and the corresponding identity.
摘要:
A method for tracing a session or call in a network environment, comprising the step of transmitting a trace invocation from a control plane network element to another control pane network element or a user plane network element. According to a first aspect, a trace report is generated in the S-CSCF of the called party. This overcomes the lack of being able to provide detailed information about the interworking between the User Equipment (UE) and the IMS, in setting up IP multimedia sessions. According to a second aspect trace reports are generated in all the network functions involved in session setup.
摘要:
This invention relates to a method of communication comprising attempting to set up a session between a calling party and a called party via at least one entity; after a confirming response has been received from at least one of said called party, said calling party and said at least one entity, determining if said attempt to set up a session has failed; and preventing at least one of said calling party and said called party from being charged for said session.
摘要:
The exemplary embodiments include a method to perform, based on at least one of hypertext transport protocol and non-hypertext transport protocol traffic tests failing, sending an hypertext transport protocol message to a subscription remediation server URI that carries a package1 message, receiving an hypertext transport protocol response from the subscription mediation server with a package2 message, and automatically replacing a password with a new value, automatically initiating creation of a new client certificate, or launching a browser to a URI provided in the response to enable user intervention. In addition, to receive an access request from a device, determining whether credentials are valid, and if the credentials are determined valid, sending an access-accept message with a success indication, and if the credentials are determined not valid, sending an access-accept message with a success indication and an indication that access by the device is limited to only a subscription remediation server.
摘要:
In accordance with an example embodiment of the present invention, there is provided an apparatus receiving or storing an indicator relating to an access point, the indicator indicating whether the first access point supports joint association and address provisioning. The apparatus is configured to transmit a request for joint association and address provisioning toward the access point, and to receive from the access point a response to the request for joint association and address provisioning.
摘要:
Systems and techniques for managing local communication between a network access point and a host device. Upon connection by a host device to an access point, a local connection link is established between the access point and the host device. A network connection may be established between the access point and the host device, with the network connection being able to pass through the host device to enable communication with and beyond an access network to which the access point provides a connection. Local messages may be passed between the access point and the host device over the local connection link, separately from and independent of communication that may occur over the network connection.
摘要:
The present invention relates to presence (PRES) and instant messaging (IM) services. The invention describes how wireless communication systems can handle messages related to presence and instant messaging services.
摘要:
Disclosed are examples of a method, system, devices and nodes to conduct communications between a device coupled to a communication network and a network security enforcement node, such as a firewall. An illustrative method includes, with a device coupled to a network security enforcement node through a communication network, requesting from the network security enforcement node information comprised of at least one of supported and enabled features and, in response to receiving the request, sending information descriptive of at least one of network security enforcement node supported and enabled features. The method may further include requesting by the device that at least one network security enforcement node feature be one of enabled or disabled.
摘要:
This invention relates to a method of communication between a calling party in a first network and a called party in a second network comprising the steps of determining in the first network an address associated with said called party, determining based on said address if said called party is in a trusted network, and controlling the communication between the called party and the calling party in dependence on if said called party is in a trusted network.
摘要:
A method for selecting a time length of a security association (SA) between user equipment (UE) which transmits and receives communications and a control entity in a communication system in accordance with the invention, includes transmitting a registration message (SM1) from the user equipment to the control entity (P-CSCF) requesting registration of the user equipment with the control entity; after transmission of the registration message, setting the time length of the security association between the user equipment and the control entity to be equal to a registration time length set between the user equipment and the control entity during which registration of the user equipment with the control entity is valid; and transmitting the set time length of the security association to the user equipment as part of an acknowledgment message (SM10 or SM12) to the registration message to cause the security association to have a time equal to the registration timer length.