摘要:
A communication system includes a plurality of first entities. Each of the plurality of first entities includes at least one database. The system also includes at least one second entity being dedicated to at least one of the plurality of first entities. The at least one second entity includes data from databases associated with the plurality of first entities. The system further includes a third entity for determining when one of the plurality of first entities malfunctions and for selecting another one of the plurality of first entities as a redundant entity. The at least one second entity is associated with the redundant entity and data is retrieved from the at least one second entity to process incoming requests to the redundant entity.
摘要:
A communication system includes a plurality of first entities. Each of the plurality of first entities includes at least one database. The system also includes at least one second entity being dedicated to at least one of the plurality of first entities. The at least one second entity includes data from databases associated with the plurality of first entities. The system further includes a third entity for determining when one of the plurality of first entities malfunctions and for selecting another one of the plurality of first entities as a redundant entity. The at least one second entity is associated with the redundant entity and data is retrieved from the at least one second entity to process incoming requests to the redundant entity.
摘要:
Authentication method for authenticating a mobile node to a packet data network, in which a shared secret for both the mobile node and the packet data network is arranged by using a shared secret of the mobile node and a telecommunications network authentication centre. In the method, the mobile node sends its subscriber identity to the packet data network together with a replay attack protector. The packet data network obtains authentication triplets, forms a session key using them, and sends back to the mobile node challenges and a cryptographic authenticator made by using the session key. The mobile node can then form the rest of the authentication triplets using the challenges and then form the session key. With the session key, the mobile node can check the validity of the cryptographic authenticator. If the authenticator is correct, the mobile node sends a cryptographic response formed using the session key to the packet data network for authenticating itself to the packet data network.
摘要:
Authentication method for authenticating a mobile node to a packet data network, in which a shared secret for both the mobile node and the packet data network is arranged by using a shared secret of the mobile node and a telecommunications network authentication centre. In the method, the mobile node sends its subscriber identity to the packet data network together with a replay attack protector. The packet data network obtains authentication triplets, forms a session key using them, and sends back to the mobile node challenges and a cryptographic authenticator made by using the session key. The mobile node can then form the rest of the authentication triplets using the challenges and then form the session key. With the session key, the mobile node can check the validity of the cryptographic authenticator. If the authenticator is correct, the mobile node sends a cryptographic response formed using the session key to the packet data network for authenticating itself to the packet data network.
摘要:
Authentication method for authenticating a mobile node to a packet data network, in which a shared secret for both the mobile node and the packet data network is arranged by using a shared secret of the mobile node and a telecommunications network authentication center. In the method, the mobile node sends its subscriber identity to the packet data network together with a replay attack protector. The packet data network obtains authentication triplets, forms a session key using them, and sends back to the mobile node challenges and a cryptographic authenticator made by using the session key. The mobile node can then form the rest of the authentication triplets using the challenges and then form the session key. With the session key, the mobile node can check the validity of the cryptographic authenticator. If the authenticator is correct, the mobile node sends a cryptographic response formed using the session key to the packet data network for authenticating itself to the packet data network.
摘要:
An apparatus comprising a data storage configured to store and update a copy of data that is stored in a plurality of registers of a network wherein the registers are provided for storing data associated with respective users of the network. The apparatus is configured to communicate data from the data storage to at least one of the registers subsequent to detection of a failure in association with at least one of the registers.
摘要:
Methods and apparatus for signal monitoring of messages in a telecommunications network having a plurality of switches and network elements therein alleviate the need for external hardware to be hooked up to nodes of the network to determine whether faults have occurred at the nodes. A signal monitoring application disclosed herein stores related message signals and messages in a relational database wherein messages and signals having common elements can be easily and quickly viewed. The SIMO application cross-references the messages and signals in the relational database according to a transaction table which categorizes and stores the messages according to parameters set out in the transaction table. This allows the messages to be ranked and viewed very quickly without the need to process them and expend valuable computational time and resources.
摘要:
A method of managing subscriber data in a communication network, the method comprising: sending a message associated with a subscriber and including data relating to the identity of said subscriber; routing said message to a first network entity based on identity and routing information stored at a register; subsequent to receiving said message at the first network entity provisioning a second network entity with subscriber data required by said second network entity to be able to service said subscriber; and updating routing information associated with the subscriber at the register to route subsequent signalling to the second network entity.
摘要:
In the present invention, a measuring device is proposed for measuring system resources which are used by a communication connection in a telecommunication network, said device comprising: means for receiving a request of allocation of system resources to establish said connection, said request indicating a preferred level of said resources, examining means (1) for examining parameters (BCIE1) indicating said requested resources, allocating means (3) for allocating, on the basis of the examination by said examining means (1), available resources indicated by parameters (BCIE2) of the communication network to the communication connection, and comparing means (4) for comparing the level of the requested resources (BCIE1) and the level of the resources allocated by the communication network (BCIE2). Furthermore, a corresponding measuring method is proposed. Using the present invention allows a operator to obtain improved knowledge of system resources.
摘要:
A method includes receiving a message regarding the initiation of a session from a non-mobile terminal, and making a request for subscriber profile information for the non-mobile terminal to a register that is also configured to receive requests for subscriber profile information for mobile terminals. The session is controlled on the basis of subscriber profile information for the non-mobile terminal received in reply to the request.