摘要:
A technique for protecting location information of a subscriber in a mobile network is disclosed. A User Mobility Server (UMS) receives a first query from a first call state control function (CSCF). The UMS transmits a call setup and a subscriber identity to a servicing-call state control function (S-CSCF). The S-CSCF may have no record of the subscriber identity due to a restart are some other event. The UMS receives a second query from the S-CSCF based in part of the subscriber identity. The UMS transmits a home address of a mobile station to the S-CSCF. The UMS may also transmit a profile download to the S-CSCF.
摘要:
A technique for protecting location information of a subscriber in a mobile network is disclosed. A User Mobility Server (UMS) receives a first query from a first call state control function (CSCF). The UMS transmits a call setup and a subscriber identity to a servicing-call state control function (S-CSCF). The S-CSCF may have no record of the subscriber identity due to a restart are some other event. The UMS receives a second query from the S-CSCF based in part of the subscriber identity. The UMS transmits a home address of a mobile station to the S-CSCF. The UMS may also transmit a profile download to the S-CSCF.
摘要:
A technique for protecting location information of a subscriber in a mobile network is disclosed. A User Mobility Server (UMS) receives a first query from a first call state control function (CSCF). The UMS transmits a call setup and a subscriber identity to a servicing-call state control function (S-CSCF). The S-CSCF may have no record of the subscriber identity due to a restart are some other event. The UMS receives a second query from the S-CSCF based in part of the subscriber identity. The UMS transmits a home address of a mobile station to the S-CSCF. The UMS may also transmit a profile download to the S-CSCF.
摘要:
A technique for protecting location information of a subscriber in a mobile network is disclosed which forwards a registration request from the subscriber to an S-CSCF including the subscriber's TA and then forwarding a location update from the S-CSCF to an HSS including the subscriber's TA. Upon the S-CSCF losing data, lost data may be restored to the S-CSCF from the data stored in the HSS. The HSS may store data in a non-volatile memory such as a hard disk drive. The technique may also include forwarding a registration request from the subscriber to an S-CSCF including the subscriber's TA and then forwarding a location update from the S-CSCF to an HSS and storing data in a non-volatile memory such as a hard disk drive in the S-CSCF so as to be protected against loss. Upon the S-CSCF losing data, lost data including the subscriber's TA may be restored to the S-CSCF from the data stored in the S-CSCF.
摘要:
A technique for protecting location information of a subscriber in a mobile network is disclosed. A User Mobility Server (UMS) receives a first query from a first call state control function (CSCF). The UMS transmits a call setup and a subscriber identity to a servicing-call state control function (S-CSCF). The S-CSCF may have no record of the subscriber identity due to a restart are some other event. The UMS receives a second query from the S-CSCF based in part of the subscriber identity. The UMS transmits a home address of a mobile station to the S-CSCF. The UMS may also transmit a profile download to the S-CSCF.
摘要:
A technique for protecting location information of a subscriber in a mobile network is disclosed which forwards a registration request from the subscriber to an S-CSCF including the subscriber's TA and then forwarding a location update from the S-CSCF to an HSS including the subscriber's TA. Upon the S-CSCF losing data, lost data may be restored to the S-CSCF from the data stored in the HSS. The HSS may store data in a non-volatile memory such as a hard disk drive. The technique may also include forwarding a registration request from the subscriber to an S-CSCF including the subscriber's TA and then forwarding a location update from the S-CSCF to an HSS and storing data in a non-volatile memory such as a hard disk drive in the S-CSCF so as to be protected against loss. Upon the S-CSCF losing data, lost data including the subscriber's TA may be restored to the S-CSCF from the data stored in the S-CSCF.
摘要:
A technique for protecting location information of a subscriber in a mobile network is disclosed which forwards a registration request from the subscriber to an S-CSCF including the subscriber's TA and then forwarding a location update from the S-CSCF to an HSS including the subscriber's TA. Upon the S-CSCF losing data, lost data may be restored to the S-CSCF from the data stored in the HSS. The HSS may store data in a non-volatile memory such as a hard disk drive. The technique may also include forwarding a registration request from the subscriber to an S-CSCF including the subscriber's TA and then forwarding a location update from the S-CSCF to an HSS and storing data in a non-volatile memory such as a hard disk drive in the S-CSCF so as to be protected against loss. Upon the S-CSCF losing data, lost data including the subscriber's TA may be restored to the S-CSCF from the data stored in the S-CSCF.
摘要:
Performing an authentication of a subscriber in a communication system comprising at least two subsystems is disclosed, the authentication of the subscriber requiring authentications of the subscriber in any of the subsystems, the method performing a bundled subscriber authentication by using an authentication in a first one of the subsystems for an authentication in a second one of the subsystems.
摘要:
Methods, computer code products and systems for authenticating user equipment for access to a trusted network can include receiving a user identity uniquely identifying the user equipment. A proxying entity in the trusted network can generate a network-trusted header including the user identity and forward it to a serving entity in the network. The serving entity performs verification on the received carrier header and can compare the user identity with a list of approved user IDs and if a match is found, the user equipment can be authenticated for access to the network. IBCF that performs optional hiding for the proxying entity toward the Home IMS network can extract the proxying entity-generated parameter out of the encrypted token making it readable to the serving entity if it is encrypted in the carrier header. The proxying entity can also provide verification of the utilized header when processing the registration request from the user equipment. Alternatively the serving entity can be provisioned with data related to NBA support in various proxying entities or domains where proxying entities are located so that the serving entity can decide to proceed with NBA procedure or not for registration received via certain proxying entities or visited networks.
摘要:
A method for registering a session initiation protocol (SIP) client to an internet protocol multimedia subsystem (IMS), in which a SIP client having a given IP address, public identity and private identity sends a registration request to a session border controller (SBC) for registering the public identity to the IMS, the SBC responsively causes an authorization request to be sent to another network entity in the IMS, the authorization request indicating the IP address of the SIP client and a private identity, the another network entity obtaining from an LDAP/AAA server a reference address based on the private identity and deciding whether to allow the authorization of the public identity to the IMS based on the correspondence between the reference address and the IP address of the SIP client.