摘要:
A method of operating a node for performing handover between access networks wherein a user has authenticated for network access in a first access network. The method comprises receiving from a home network a first session key and a temporary identifier allocated to the user for the duration of a communication session. The identifier is mapped to the first session key, and the mapped identifier and key are stored at the node. A second session key is derived from the first session key and the second session key is sent to an access network, and the identifier sent to a user terminal. When the user subsequently moves to a second access network, the node receives the identifier from the user terminal. The node then retrieves the first session key mapped to the received identifier, derives a third session key and sends the third session key to the second access network.
摘要:
Methods and systems for determining a location of a device and tagging signals from the device with the location involve receiving, by a plurality of positioning devices, a signal sent by the device; determining, by each of the plurality of positioning devices, respective location information based on the signal; determining, based on the respective location information of each of the plurality of positioning devices, the location of the device; and forming, from the signal, a second signal annotated with the location of the device.
摘要:
A group identity for a set of devices is generated by acquiring an identity for each one of the devices and joining the identities into a common identity data set. A group identity for the set of devices is created by performing a hash function on the common identity set and using a resulting hash value as the group identity. A group identity for a set of devices is verified by acquiring a first group identity from a trusted party. An identity is acquired from each device in the set and the identities are joined into a common identity data set and a second group identity is created for the set of devices by performing a hash function on the common identity data set. A determination is made whether there is a match between the first group identity and the second group identity.
摘要:
The present invention aims at an effective approach to radio access system attachment in a heterogeneous communication network environment. According to the present invention, cooperation between different radio access systems is executed to advertise one radio access system in another. After receipt of a secure advertisement from a control unit of the advertising radio access system, a broadcasting unit of the receiving radio access system broadcasts advertisement information in relation to the secure advertisement in the communication network. Therefore, according to the present invention, a user terminal may at any time receive broadcasted advertisement information while establishing a trusted relationship with advertiser.
摘要:
A method of routing traffic between external users and a communication network via a private access network. The method comprises establishing a secure outer tunnel between the private network and a gateway of a public access network to which the private network is coupled, based upon authentication of the private network to the public access network, said gateway being coupled to said communication network. For each external user wishing to connect to the communication network via the private network, a secure inner tunnel is established between the user and the gateway based upon authentication of the user to the gateway, the inner tunnel being within said outer tunnel. Traffic is caused to flow between external users and the gateway through the respective inner tunnels.
摘要:
A communications network is managed so that a user is enabled to manage user-related features provided in the network through a user interface. A call is established to a server provided with a feature management service including an individual register of characteristics and available features for predetermined user interfaces. The user's access to the network through the user interface to the server is then terminated. At least one characteristic of the user interface is used to identify the user interface. That characteristic is input into the server to enable the user to manage features associated with the characteristic.
摘要:
A method of collecting charging information relating to usage of the Internet by an Internet user. The method comprises constructing in a router of the Internet a routing table containing a set of destination address ranges and a set of respective next hop network nodes. Each address range in the routing table is assigned a cost class in dependence upon the route via which a packet must travel to an address within the range. Upon receiving a data packet from the network user, the destination address of the packet is identified by the router. The router then determines from the routing table the associated cost class. A corresponding cost class counter in the router is then incremented.
摘要:
A method and message server (204) for routing a speech message, received (2:1) from a user equipment (200) of a sending user, to at least one recipient (208, 210) in a communication network. After obtaining (2:2) a text version created by speech recognition (206) of the received speech message, the at least one recipient is identified (2:3) by the message server based on the obtained text version, and the speech message is then routed (2:5) to the identified at least one recipient.
摘要:
The access of a user equipment, UE, (10) configured for and activated to implement extended access barring, EAB, or included in a group of UEs addressed via group paging to a wireless communication network (20) is controlled. First, an access delay for the UE is determined. Second, a timing of an attempt by the UE to access a cell in the wireless communication network is controlled based on the determined access delay. Many example embodiments are described.
摘要:
A method of forwarding IP packets, sent to an old care-of-address of a mobile node, to the mobile node following a handover of the mobile node from a first old access router to a second new access router. The method comprises, prior to completion of said handover, providing said first router or another proxy node with information necessary to determine the new IP care-of address to be used by the mobile node when the mobile node is transferred to the second access router. At said first router or said proxy node, the new care-of-address for the mobile node is determined using said information and ownership of the new care-of-address by the mobile node confirmed, and subsequently packets received at said first access network and destined for said old care-of-address are forwarded to the predicted care-of-address address.