摘要:
Techniques for security association management on a home and foreign agent are described. In one embodiment, in response to a first mobile network registration request from a mobile node, a remote authentication facility is accessed to retrieve a security association for the mobile node for authenticating and providing a first network connectivity to the mobile node, wherein the security association is associated with a lifespan. The security association is inserted in a local security association database (SADB) to create a security association entry, wherein the security association entry includes the lifespan. A second mobile network registration request from the mobile node after the first connectivity is terminated is received and the security association entry in the local SADB that corresponds to the mobile node is used to provide authentication of the mobile node without having to access the remote authentication facility again if the lifespan associated with the security association entry is valid.
摘要:
Techniques for Mobile IP bulk registration revocation are described herein. According to one embodiment, a first mobile agent of a mobile IP network sends a registration revocation message to a second mobile agent of the mobile IP network. The registration revocation message includes information identifying multiple home IP addresses of multiple mobile nodes whose registrations are to be revoked. In response to the registration revocation, the second mobile agent terminates bindings of services associated with multiple mobile nodes identified by the multiple home IP addresses and sends an acknowledgement message to the first mobile agent. Other methods and apparatuses are also described.
摘要:
Caching content includes receiving at a cell site a content request for content. The cell site is associated with a cell, and the content request is received from a mobile node present in the cell. The content is retrieved in response to the content request. The content is cached at the cell site and sent to the mobile node. One or more recipient cell sites are identified. The content is distributed to the one or more recipient cell sites while the mobile node is present in the cell.
摘要:
A network system for authorizing an endpoint node for a communication service includes an operator network and an organization network. The operator network operates to perform a device authorization operation to authorize the endpoint node for a communication session. The organization network operates to facilitate a service authorization operation to authorize the endpoint node for the communication service of the communication session.
摘要:
In one embodiment, a security gateway receives an IPSec Initiation (IPSec INIT) request from a client. The security gateway may communicate with a AAA server to authenticate the client. After authentication, the security gateway intercepts a URR Discovery request from the client. The security gateway determines registration information for a response to the registration request. The registration information may be information on where the client can locate a D-GANC. A response is generated using the determined information and sent to the client. The response to the discovery request is performed without communicating with a P-GANC. Accordingly, a security gateway is used to authenticate the client and also to respond to the discovery request. This does not require that a P-GANC function be deployed in a network. Thus, cost and processing power may be saved.
摘要:
A system and method for providing service in a network having a wireless component is disclosed. The system and method comprise receiving a request for a dynamic address from a user node connected to a subscriber station having a convergence sub-layer, providing the dynamic address to the user node, associating the dynamic address with a service flow associated with the subscriber station, and sending data addressed to the dynamic address through the service flow. The dynamic address is based on a subscriber identifier associated with the subscriber station and a client identifier associated with the user node.
摘要:
In one embodiment, a method includes receiving a first request to join a conference from a first user device. The location of the first user device is determined. Based on the location of the first user device, the proximity of the first user device relative to endpoints configured to facilitate the conference is identified. A first one of the endpoints that is more proximate to the first user device than other endpoints is selected for handling the conferences.
摘要:
A system for facilitating persistent communications between entities in a network. In a specific embodiment, the system is adapted to facilitate fast reauthentication of a client performed by a server, such as an Authentication, Authorization, and Accounting (AAA) server, that is coupled to the client via a load balancer. The system includes a first message to be exchanged between the server and the client, wherein the first message includes a field identifying the server and/or the client. A matching module communicates with or is otherwise incorporated within the load balancer. The matching module includes one or more routines for employing the field to selectively route the first message to the client and/or server. In a more specific embodiment, the server a fast reauthentication module adapted to append the field in the message. The field includes sub-realm information identifying the server.
摘要:
Techniques for exchanging capabilities in a wireless network are provided. In one embodiment, a first device receives a capability message over a communication link from a second device in a WiMAX network. The communication link may be between any combination of base stations and gateways. For example, the R4, R6, or R8 interface may be used. Other interfaces may also be appreciated in a WiMAX network. The capability message includes one or more capabilities supported by a second device in the WiMAX network. Capabilities to support are then determined based on the one or more capabilities. These capabilities will be supported by the first device for communications with the second device. The first device is then configured to support the determined capabilities. Accordingly, the first device is dynamically configured based on the capability message received.
摘要:
In one embodiment, while being connected to the network, a security issue may be detected and associated with the device. The device may be placed on a blacklist for the security issue. The blacklist is a list that is used to deny service for the device when it attempts to connect. Thus, the device is disconnected from the network. Identification information for the device is added to the blacklist at the authentication server. If the device attempts to reconnect to the network, the request is received at the authentication server. The authentication server can then check the blacklist and deny the request for access to the network if the identification information is on the blacklist. This denial is determined without sending the request to the HLR. Accordingly, the HLR is protected in that requests from a device that may be considered a security issue are not sent to the HLR.