摘要:
The invention provides a method for trust relationship detection between a core and access network for a user equipment. The gist is that a security tunnel establishment procedure is used so one entity, be it part of the core network or be it the user equipment itself, is provided with information to determine whether the access network is trusted or untrusted. The information may comprise a first IP address/prefix, which is initially assigned to the user equipment, upon attaching to the access network. The necessary information may further comprise a second IP address/prefix, which is an address/prefix that is allocated at a trusted entity of the core network. Depending which entity determines the trust relationship of the access network, it might be necessary to transmit either the first IP address/prefix or the second IP address/prefix or the first and the second IP address/prefix using the security tunnel establishment procedure.
摘要:
The invention provides a method for trust relationship detection between a core and access network for a user equipment. The gist is that a security tunnel establishment procedure is used so one entity, be it part of the core network or be it the user equipment itself, is provided with information to determine whether the access network is trusted or untrusted. The information may comprise a first IP address/prefix, which is initially assigned to the user equipment, upon attaching to the access network. The necessary information may further comprise a second IP address/prefix, which is an address/prefix that is allocated at a trusted entity of the core network. Depending which entity determines the trust relationship of the access network, it might be necessary to transmit either the first IP address/prefix or the second IP address/prefix or the first and the second IP address/prefix using the security tunnel establishment procedure.
摘要:
The invention relates to a method for discovering a home agent serving a mobile node upon the mobile node changing its mobility management scheme in a packet-switched network and the implementation of such method in a mobile node or home agent. In order to propose a home agent discover scheme that maintains session continuity in a seamless manner upon a mobile node changing its mobility management scheme, a mobile node comprises information on its location prior to changing the mobility management scheme to one of the first signaling messages transmitted upon changing the mobility management scheme (home agent discovery message). The receiving node uses this information to identify the home agent serving the mobile node or to provide a hint to the home agent where the mobile node is registered in a response message to the mobile node. This approach may also be used for path optimization when a mobile node moves from a trusted to an un-trusted access network.
摘要:
The invention relates to a method for a handover of a mobile node from a non-3GPP to a 3GPP network, and of a mobile node, which is located in a non-3GPP/3GPP network. The handover is improved by discovering an appropriate MME and registering the mobile node at the discovered MME, in advance. This includes to first determine the location of the mobile node in the non-3GPP network, so as to be able to detect an MME in the vicinity of the mobile node's location. The 3GPP contexts are then transmitted to the new MME before the handover is performed. Moreover, the invention teaches to change the Serving-Gateway in the 3GPP network before performing a handover, thereby accelerating the handover. When a handover gets likely, the mobile node's location is determined and a new Serving-Gateway is selected. The data path is changed to go via the new Serving-Gateway.
摘要:
The invention relates to a method for a handover of a mobile node from a non-3GPP to a 3GPP network, and of a mobile node, which is located in a non-3GPP/3GPP network. The handover is improved by discovering an appropriate MME and registering the mobile node at the discovered MME, in advance. This includes to first determine the location of the mobile node in the non-3GPP network, so as to be able to detect an MME in the vicinity of the mobile node's location. The 3GPP contexts are then transmitted to the new MME before the handover is performed. Moreover, the invention teaches to change the Serving-Gateway in the 3GPP network before performing a handover, thereby accelerating the handover. When a handover gets likely, the mobile node's location is determined and a new Serving-Gateway is selected. The data path is changed to go via the new Serving-Gateway.
摘要:
The invention relates to a method and mobile node capable of detecting whether or not the network to which the mobile node is attached is using a network-based mobility management function for the mobile node or not. In order to enable a mobile node to detect whether the network is using a network-based mobility function for the mobile node, upon establishment of a PDN connection or IP session, the mobile node sends a probe message to the network destined to itself and determines based on the modifications of the probe message returned to the mobile node whether the network is using a network-based mobility function for the mobile node or not.
摘要:
The invention relates to a method for informing two access gateways about each other's presence and identity, in order to establish a data path between them, thereby shortening the overall data path of data packets exchanged between two mobile nodes (MN), that are located in different networks. In particular, each access gateway is provided with the other gateway's address and additionally with the other MN's address for forwarding by the access gateway those data packets destined to the other MN to the other access gateway. A combination of Session Initiation Protocol messages (Invite and Ringing) and route optimization messages are used, so as to confer the information on the gateway's ID and MN's address to the gateways.
摘要:
The invention relates to a method for informing two access gateways about each other's presence and identity, in order to establish a data path between them, thereby shortening the overall data path of data packets exchanged between two mobile nodes (MN), that are located in different networks. In particular, each access gateway is provided with the other gateway's address and additionally with the other MN's address for forwarding by the access gateway those data packets destined to the other MN to the other access gateway. A combination of Session Initiation Protocol messages (Invite and Ringing) and route optimization messages are used, so as to confer the information on the gateway's ID and MN's address to the gateways.
摘要:
The invention relates to a method, mobile node and computer-readable medium for establishing (or pre-establishing) a secure tunnel to an ePDG to prepare for a mobile node attachment or handover to another access network. To reduce the delay of a handover or upon attachment of a mobile node to an access network implied by mechanisms to discover a ePDG, the mobile node maintains a reachability list that can be consulted to identify an ePDG or ePDGs that are reachable in the target access network, i.e. to which the mobile node may establish a secure tunnel. If the mobile node can identify a reachable ePDG for a given access network from the reachability list, the mobile node (pre-)establishes a secure tunnel to the ePDG upon attaching to the given access network. In alternative solutions DNS, DHCP or other mechanism can be used to provide the mobile node with information on ePDGs in its vicinity.
摘要:
The invention relates to a method, mobile node and computer-readable medium for establishing (or pre-establishing) a secure tunnel to an ePDG to prepare for a mobile node attachment or handover to another access network. To reduce the delay of a handover or upon attachment of a mobile node to an access network implied by mechanisms to discover a ePDG, the mobile node maintains a reachability list that can be consulted to identify an ePDG or ePDGs that are reachable in the target access network, i.e. to which the mobile node may establish a secure tunnel. If the mobile node can identify a reachable ePDG for a given access network from the reachability list, the mobile node (pre-)establishes a secure tunnel to the ePDG upon attaching to the given access network. In alternative solutions DNS, DHCP or other mechanism can be used to provide the mobile node with information on ePDGs in its vicinity.