摘要:
A network implementing at least one firewall for providing protection for users on the network. The network includes at least one host system protected by the at least one firewall, the host system being configured to send and receive information from external host systems through the at least one firewall. The at least one firewall including installation means for installing policy rules that are transmitted from at least one network entity to the at least one firewall. The policy rules include an option field for allowing the at least one network entity to send additional information to the firewall. The additional information relating to at least one type of information used in at least one of a Internet Protocol version 6 protocol or a mobile Internet Protocol version 6 protocol. The additional information is optionally used by the at least one firewall to filter on data travelling through the at least one firewall.
摘要:
The invention proposes a method for providing traversal of a packet filtering function (D) for information transferred between a first network node (A) and a second network node (B) wherein the second network node (B) is associated with a home network control element (C) and the first network node (A) is protected by the packet filtering function (D), the method comprising the steps of sending (S1) a message including temporary identification information from the second node to the home network control element, sending (S3) a message including at least a part of the temporary identification information from the home network control element to the first node, and preparing (S4-S7) a direct connection between the first node and the second node via the packet filtering function based on the identification information. The invention also proposes corresponding network nodes, a corresponding home network control element and a corresponding network system.
摘要:
The invention proposes a method for controlling a connection between a first network node and a second network node, wherein the connection is controlled by a packet filtering function filtering packets such that a packet is discarded in case a source address and/or a destination address do not comply with a filtering rule, wherein the packet filtering function is configured at a connection set up, and at least one of the first or second network node is adapted to change its address, the method comprising the steps of informing, the packet filtering function about the new address of the network node having changed its address, and updating the packet filter of the packet filtering function by using the new address of the network node having changed its address. The invention also proposes a corresponding network system comprising at least a network node and a packet filtering network element. Furthermore, the invention proposes a corresponding packet filtering network device.
摘要:
A method and system for delegation of security procedures to a second domain. A first key is generated for a mobile node. The first key is stored at the mobile node and at a home domain of the mobile node. The mobile node is moved to the second domain. A request is sent from the second domain to the home domain to authenticate the mobile node. A second key is generated at the home domain using the first key and a random number. The random number and the second key are sent to the second domain. The random number is sent to the mobile node by the second domain. The mobile node generates the second key using the random number and the first key. The second key is used for authentication procedures and/or key derivation procedures between the mobile node and the second domain.
摘要:
Local IP Access (LIPA) allows an IP-capable user equipment (UE) connected via a femto cell direct access to other IP-capable devices in the local IP network. Selected IP Traffic Offload (SIPTO) is used to offload selected types of IP traffic towards a defined IP network close to the UE's point of attachment to the access network. LIPA PDN Connectivity indicates a PDP Context or a PDN Connection that gives access to services located in the local IP network of the femto cell subsystem. SIPTO PDN Connectivity indicates a PDP Context or PDN Connection that allows offload of selected types of IP traffic towards a defined IP network close to the UE's point of attachment to the access network. Systems, devices and methods are described herein that enable the identification of the type of connectivity available to a UE and enable session continuity for local cellular coverage.
摘要:
A wireless device comprises a first wireless interface, a second wireless interface, and a power control module. The first wireless interface is configured to communicate with a first access network. The second wireless interface is configured to communicate with a second access network. One of the first and second wireless interfaces comprises a circuit-switched interface. The other one of the first and second wireless interfaces comprises a packet-switched interface. The power control module selectively disables the first wireless interface, provides registration information with respect to the first wireless interface to a remote system, and updates the registration information in the remote system prior to disabling the first wireless interface.
摘要:
An IP flow is received by an Internet Protocol (IP) mobility anchor point, where the IP mobility anchor point is to anchor traffic of a mobile node. The IP mobility anchor point routes different subsets of the packets of the IP flow to corresponding different points of attachment of the mobile node.
摘要:
A first network configured to connect a terminal to a home network during a time that the terminal is roaming within the first network. The first network includes a plurality of attachment points, wherein a first attachment point is configured to receive an attach request from the terminal, and wherein the attach request includes a request from the terminal for an IP address from an anchoring point within the home network. The first network further includes an Authentication/Authorization/Accounting server proxy configured to determine whether the terminal is authorized to attach to the first attachment point, wherein in response to the terminal being authorized to attach to the first attachment point, i) a first tunnel is created between the first attachment point and a second attachment point, and ii) a second tunnel is created between the second attachment point and the anchoring point within the home network.
摘要:
The invention is a system and method of controlling an access of a subscriber to a network. The method includes sending an identification of the subscriber and a level of access to be provided to the subscriber from a visited network of a plurality of networks (12, 14, 16) connected to a home network (10); in response to the identification of the subscriber and a level of access to be provided to the subscriber, storing a subscriber profile of the authorized of access to be provided to the subscriber; and controlling access of the subscriber to any network dependent upon a comparison of access to be provided to the subscriber and the stored subscriber profile.
摘要:
A network control module including an access module and a selection control module. The access module is configured to determine whether a wireless terminal communicating with a first network via a first gateway is attempting to communicate with a second network via a second gateway. The access module is configured to determine whether the first gateway allows communication with the second network. The selection control module is configured to allow the wireless terminal to access the second network via the first gateway prior to the wireless terminal establishing a connection with the second gateway.