摘要:
The invention is a method of providing a user (12) a terminal network address (14) in a first network (16) through which the user communicates with a data network (18) and authenticating connection of the user to the first network. The invention includes transmitting to at least one server in the first network a request to obtain the terminal network address in the first network to provide connection of the user to the data network and an identification of the user in a second network (20) through which the user communicates to the first network; transmitting the identification of the user to the second network; transmitting from the second network to the first network authentication information of the user stored in the second network associated with the identification of the user; transmitting from the first network to the user at least one advertisement of the terminal network address and information within the authentication information; and processing the received at least one advertisement and the received information within the authentication information and determining if the authentication information is correct.
摘要:
Authentication method for authenticating a mobile node to a packet data network, in which a shared secret for both the mobile node and the packet data network is arranged by using a shared secret of the mobile node and a telecommunications network authentication centre. In the method, the mobile node sends its subscriber identity to the packet data network together with a replay attack protector. The packet data network obtains authentication triplets, forms a session key using them, and sends back to the mobile node challenges and a cryptographic authenticator made by using the session key. The mobile node can then form the rest of the authentication triplets using the challenges and then form the session key. With the session key, the mobile node can check the validity of the cryptographic authenticator. If the authenticator is correct, the mobile node sends a cryptographic response formed using the session key to the packet data network for authenticating itself to the packet data network.
摘要:
Authentication method for authenticating a mobile node to a packet data network, in which a shared secret for both the mobile node and the packet data network is arranged by using a shared secret of the mobile node and a telecommunications network authentication centre. In the method, the mobile node sends its subscriber identity to the packet data network together with a replay attack protector. The packet data network obtains authentication triplets, forms a session key using them, and sends back to the mobile node challenges and a cryptographic authenticator made by using the session key. The mobile node can then form the rest of the authentication triplets using the challenges and then form the session key. With the session key, the mobile node can check the validity of the cryptographic authenticator. If the authenticator is correct, the mobile node sends a cryptographic response formed using the session key to the packet data network for authenticating itself to the packet data network.
摘要:
Authentication method for authenticating a mobile node to a packet data network, in which a shared secret for both the mobile node and the packet data network is arranged by using a shared secret of the mobile node and a telecommunications network authentication center. In the method, the mobile node sends its subscriber identity to the packet data network together with a replay attack protector. The packet data network obtains authentication triplets, forms a session key using them, and sends back to the mobile node challenges and a cryptographic authenticator made by using the session key. The mobile node can then form the rest of the authentication triplets using the challenges and then form the session key. With the session key, the mobile node can check the validity of the cryptographic authenticator. If the authenticator is correct, the mobile node sends a cryptographic response formed using the session key to the packet data network for authenticating itself to the packet data network.
摘要:
A method for billing in a packet data network (WISP1) comprising at least one user's terminal (MN), comprising the steps of: forming a data link between the terminal and the packet data network; requesting a user identity from the terminal; generating billing data based on the user identity; and sending the billing data to an accounting server (HAAA) of an external telecommunications network.
摘要:
A method for billing in a packet data network (WISP1) comprising at least one user's terminal (MN), comprising the steps of: forming a data link between the terminal and the packet data network; requesting a user identity from the terminal; generating billing data based on the user identity; and sending the billing data to an accounting server (HAAA) of an external telecommunications network.
摘要:
Arranging data ciphering in a telecommunication system comprising at least one wireless terminal, a wireless local area network and a public land mobile network. At least one first ciphering key according to the mobile network is calculated in the mobile network and in the terminal for a terminal identifier using a specific secret key for the identifier. Data transmission between the mobile network and the terminal is carried out through the wireless local area network. A second ciphering key is calculated in the terminal and in the mobile network using said at least one first ciphering key. The second ciphering key is sent from the mobile network to the wireless local area network. The data between the terminal and the network is ciphered using said second ciphering key.
摘要:
A method for billing in a packet data network (WISP1) comprising at least one user's terminal (MN), comprising the steps of:forming a data link between the terminal and the packet data network; requesting a user identity from the terminal; generating billing data based on the user identity; and sending the billing data to an accounting server (HAAA) of an external telecommunications network.
摘要:
A method, apparatus and computer program for applying a predetermined transmission process to the transmission of IP packets of a particular Internet Protocol (IP) flow in an IP network. The invention is implemented by defining in a host, such as a wireless terminal, a Quality of Service (QoS) management protocol between an IP session management protocol of the host and each of an IP layer and a link layer of the host, and defining in another apparatus, such as a wireless access point, a QoS management protocol between the QoS management protocol of the host and each of an IP layer and a link layer of the wireless access point. The wireless access point communicates with the wireless terminal via a link and allows the wireless terminal to communicate with the IP network. IP session information is configured in the wireless terminal and the wireless access point in each of the IP and link layers based on IP session management information from the IP session management protocol of the wireless terminal. Based on the defined configuration, an IP flow between the wireless terminal and the wireless access point is identified as a particular IP flow. Thereafter, a predetermined transmission process can be applied to the transmission of IP packets of the identified IP flow.
摘要:
Arranging data ciphering in a telecommunication system comprising at least one wireless terminal, a wireless local area network and a public land mobile network. At least one first ciphering key according to the mobile network is calculated in the mobile network and in the terminal for a terminal identifier using a specific secret key for the identifier. Data transmission between the mobile network and the terminal is carried out through the wireless local area network. A second ciphering key is calculated in the terminal and in the mobile network using said at least one first ciphering key. The second ciphering key is sent from the mobile network to the wireless local area network. The data between the terminal and the network is ciphered using said second ciphering key.