摘要:
A set of associated keys for an authentication process to be performed in a second network is calculated based on a random value used in an authentication process of a first network.
摘要:
An enhanced connection control including maintaining a first connection between a first network node and a user equipment which has a second connection with a second network node, determining a third network node for re-establishing a third connection between the third network node and the user equipment, in response to a link failure of the second connection, and transferring context information of the user equipment from the first network node to the third network node.
摘要:
A method for identifying legal user equipments in a communication network is provided. The method comprises: sending to a user equipment a request for an identity of the user equipment; receiving from the user equipment a response to the request, the response comprising the identity of the user equipment and an associated credential; and determining whether the user equipment is a legal one, according to a result of authentication based at least in part on the received identity and the credential.
摘要:
The invention relates to a method comprising initiating a session from a subscriber terminal, wherein the subscriber terminal does not comprise a specific user identification module, and authenticating the session based on a temporary identification of the subscriber terminal, by using a procedure performing a server authentication and avoiding a client authentication.
摘要:
A method for key derivation may comprise: generating a second key based at least in part on a first key for a first connection between a user equipment and a first network node, in response to a decision to enter an idle mode; releasing the first connection to enter the idle mode; providing an identity of the user equipment to the first network node via a second network node, in response to initiating a setup procedure for a second connection between the user equipment and a second network node; and using the second key for the second connection, in response to receiving from the second network node an indication that the identity of the user equipment is successfully verified at the first network node.
摘要:
A method, system, and network elements for authentication and authorization of a mobile terminal (MT) roaming to or in a foreign network different from its home network is provided, the home network having an authentication and authorization home server (AAAH), and the foreign network having a plurality of domains each of which comprises at least one local server (AAAL1, AAAL2) for authentication, authorization and accounting, each of which local servers being connected to at least one network access server (NAS) for handling access for mobile terminals roaming to or in the foreign network, wherein an authentication and authorization of the mobile terminal is performed whenever the mobile terminal performs a roaming, wherein the authentication and authorization is performed according to a procedure pursuant to one of a plurality of hierarchy levels, whereby a combination of network elements involved in the roaming determines the hierarchy level to be used.
摘要:
A apparatus, system, and network elements for authentication and authorization of a mobile terminal (MT) roaming to or in a foreign network different from its home network is provided, the home network having an authentication and authorization home server (AAAH), and the foreign network having a plurality of domains each of which comprises at least one local server (AAAL1, AAAL2) for authentication, authorization and accounting, each of which local servers being connected to at least one network access server (NAS) for handling access for mobile terminals roaming to or in the foreign network, wherein an authentication and authorization of the mobile terminal is performed whenever the mobile terminal performs a roaming, wherein the authentication and authorization is performed according to a procedure pursuant to one of a plurality of hierarchy levels, whereby a combination of network elements involved in the roaming determines the hierarchy level to be used.
摘要:
A set of associated keys for an authentication process to be performed in a second network is calculated based on a random value used in an authentication process of a first network.
摘要:
A apparatus, system, and network elements for authentication and authorization of a mobile terminal (MT) roaming to or in a foreign network different from its home network is provided, the home network having an authentication and authorization home server (AAAH), and the foreign network having a plurality of domains each of which comprises at least one local server (AAAL1, AAAL2) for authentication, authorization and accounting, each of which local servers being connected to at least one network access server (NAS) for handling access for mobile terminals roaming to or in the foreign network, wherein an authentication and authorization of the mobile terminal is performed whenever the mobile terminal performs a roaming, wherein the authentication and authorization is performed according to a procedure pursuant to one of a plurality of hierarchy levels, whereby a combination of network elements involved in the roaming determines the hierarchy level to be used.
摘要:
The exemplary embodiments of the invention provide apparatus, methods and computer program products that enable improved sequence number handling in networks, such as an evolved universal terrestrial radio access network (E-UTRAN), for example. In one non-limiting, exemplary embodiment, a method includes: generating a sequence number offset value; and transmitting a protected message having the generated sequence number offset value over a wireless communication link from a first device towards a second device, wherein the generated sequence number offset value is for use by the second device in generating a sequence number for a subsequent transmission. As non-limiting examples, the first device may be one of a mobile station or a base station, the second device may be one of a mobile station, a base station or a center node, and if one of the first device or the second device is a mobile station then the other of the first device and the second device is not a mobile station. As another non-limiting example, the first device and the second device may be components of an evolved universal terrestrial radio access network (E-UTRAN). As further non-limiting examples, the first device may be one of an E-UTRAN node B (eNB) or a user equipment (UE), the second device may be one of an eNB, a UE or a service gateway, and if one of the first device or the second device is a UE then the other of the first device and the second device is not a UE.