摘要:
A mobile internet protocol regional paging network 10 includes a paging foreign agent for handling a regional registration of a mobile node visiting a paging area, which includes internet protocol subnetworks. In operation, the mobile node periodically can provide an idle mode request to the paging foreign agent to enter an idle mode so as to deactivate one or more components for energy-saving purposes and reduce active communication with the mobile internet protocol regional paging network. The invention provides a small and link-layer independent extension to Mobile Internet Protocol with Regional Registrations to support power-constrained operation in the mobile nodes and to reduce routing state information in the visited domain. The extension allows a Mobile Node to enter a power saving Idle Mode during which its location is known with the coarse accuracy defined by a Paging Area. The mobile node and the visited domain may optionally agree on time slots used for Agent Advertisements and paging. The mobile node 14 may include a mobile phone, a pager, or any telecommunications device capable of wireless communicating, including communication over the internet.
摘要:
The invention relates to a method of arranging roaming in a telecommunications system comprising a local network, at least one public land mobile network, and a terminal equipment. In the telecommunications system, public land mobile network identifiers and network element identifiers linked therewith are defined. These public land mobile network identifiers and the network element identifiers linked therewith are transmitted to the terminal equipment. The terminal equipment selects a public land mobile network by means of a comparison of the received public land mobile network identifiers and public land mobile network identifiers stored in the terminal equipment. Access is arranged for the terminal equipment via the local network to the network element determined by the network element identifier linked with the identifier of the selected public land mobile network.
摘要:
The invention relates to a method of arranging roaming in a telecommunications system comprising a local network, at least one public land mobile network, and a terminal equipment. In the telecommunications system, public land mobile network identifiers and network element identifiers linked therewith are defined. These public land mobile network identifiers and the network element identifiers linked therewith are transmitted to the terminal equipment. The terminal equipment selects a public land mobile network by means of a comparison of the received public land mobile network identifiers and public land mobile network identifiers stored in the terminal equipment. Access is arranged for the terminal equipment via the local network to the network element determined by the network element identifier linked with the identifier of the selected public land mobile network.
摘要:
A method, program product and system of preventing or limiting the number of simultaneous sessions in a wireless local area network (WLAN). The method includes: determining whether subscriber terminal information has been changed between an old session and a new session, maintaining a connection with the old session if the subscriber terminal information has not changed, and establishing and authenticating the new session and disconnecting the old session if the subscriber terminal information has changed. A medium access control (MAC) address and a WLAN radio network identification can be compared between the old session and the new session to determine whether subscriber terminal information has been changed.
摘要:
Method for storing data in the memory (1.2) of an electronic device (1), wherein the data to be stored is encrypted with an encryption key (Ks). The electronic device (1) is provided with an identification card (2) equipped with a cryptographic algorithm and an individual identifier (ID). In the electronic device (1), at least one seed value (RAND1, RAND2, RAND3) is generated, and the at least one seed value is transmitted to the identification card (2). The cryptographic algorithm is performed on the identification card (2), with the seed value (RAND1, RAND2, RAND3) being used as the input, wherein at least one derived value (Kc1, Kc2, Kc3) is produced in the algorithm. The at least one derived value (Kc1, Kc2, Kc3) is transmitted to the electronic device (1), wherein the at least one derived value (Kc1, Kc2, Kc3) is used in the formation of the encryption key (Ks). The invention also relates to an electronic device (1), module, and computer software product.
摘要:
A method for use by a telecommunication terminal (10) in checking whether a candidate RAND in an EAP/SIM RAND challenge is likely a replay, based on using a Bloom filter including a vector data structure (21) for determining (admittedly sometimes erroneously) whether the candidate RAND is in a set of previously used RAND values. The components of the vector data structure (21) are set to one or left at zero depending on whether pointers corresponding to the previously used RAND values point to them. The pointers can be hash functions or can be constructed from the previously used RAND values. To provide for smooth filter performance at points in time when the Bloom filter is full and cannot hold information for any new previously used RAND values, the vector data structure (21) is partitioned into more than one part, and only one part is reset and re-initialized at a time.
摘要:
A method (and corresponding equipment) for use in reauthentication—after a first, full authentication by a first authentication server (23a)—of a communication session involving the exchange of information between a terminal (21) and a server (24), the method including: a step (11) in which the first authentication server (23a) and other authentication servers (23b) are each assigned a respective unique realm name; and a step (13) in which during authentication between the terminal and the first authentication server (23a), the first authentication server (23a) transmits to the terminal (21) a reauthentication identity including the unique realm name assigned to the first authentication server. Then, later, during reauthentication, to make possible that the reauthentication is performed by the same authentication server (23a) as performed the full authentication—i.e. by the first authentication server (23a)—the reauthentication identity is included in a request for reauthentication.
摘要:
For supporting an access to a destination network by a mobile device via a wireless access network, the mobile device generates a predetermined request, which is addressed to a connectivity test server in the destination network. The predetermined request is transmitted to the wireless access network. In case the predetermined request reaches the connectivity test server, it generates a predetermined response and transmits it to the mobile device via the wireless access network. The mobile device determines whether a response to the predetermined request is received from the wireless access network and whether a received response corresponds to the predetermined response.
摘要:
The invention relates to a method for authenticating the user of a terminal (5), in which terminal a device (15) for verifying the rights to use is applied for running an authentication protocol. The device (15) for verifying the rights to use is connected to the terminal (5). In the device (15) for verifying the rights to use, an extensible authentication protocol interface is applied, via which at least some of the authentication functions are carried out.
摘要:
The invention proposes a method and a network device comprising an operation entity (3) for handling network connection and at least one access client entity (1, 2) providing connection handling to a specific network access device, wherein the operation entity is adapted to identify a need for a network connection and to inform the access client entity, and the at least one access client entity is adapted to perform an authentication. Hence, an authentication procedure is delegated to a separate entity so that depending on the specification of a specific network connection, a suitable access entity for performing the authentication can be selected.