Abstract:
A system for efficiently reauthenticating a client of a network. In a specific embodiment, the system includes an authentication server and a Security GateWay (SGW) in communication with the client. The SGW includes reauthentication information associated with the client. In a more specific embodiment, the authentication server includes an Authentication, Authorization, and Accounting (AAA) server. The SGW further includes one or more routines for employing the reauthentication information to reauthenticate the client. The AAA server performs initial authentication of the client to enable client access to the network, which yields the reauthentication information. The reauthentication information includes one or more keys and/or counters, such as an authorization key, an encryption key, and a master key, which is/are predetermined by the AAA server.
Abstract:
Communicating packets along a bearer path includes receiving a home network address and a visited network address at an access terminal. The home network address corresponds to a home anchored bearer path anchored at a home network of the access terminal. The visited network address corresponds to a visited anchored bearer path anchored at a visited network. The access terminal determines whether to use the home anchored bearer path or the visited anchored bearer path, and communicates packets using the home network address or the visited network address in accordance with the determination.
Abstract:
In one embodiment, while bei.ng connected, to the network (110), a security issue may be detected and associated with a device (104). The device may be placed on a blacklist for the security issue. The blacklist is a list that is used to deny service for the device when it attempts to connect. Thus, the device is disconnected from the. network. Identification information for the device is added to the blacklist at the authentication server (102). If the device attempts to reconnect to the network, the request is received at the authentication server. The authentication server can then check the blacklist and deny the request for access to the network if the identification information is on the blacklist. This denial is determined without sending the request to the HLR (108). Accordingly, the HLR is protected in that requests from a device that may be considered a security issue are not sent to the HLR.
Abstract:
Providing a multicast service to a mobile node includes receiving a first request to join a multicast group from a first cell site. The first request requests that a first mobile node be permitted to join the multicast group. A first multicast source operable to provide content to the first mobile node is identified. The multicast group and the first multicast source are associated to yield a first group-source combination. A first key is assigned to the first group-source combination, and the first key is provided to the first cell site.
Abstract:
Particular embodiments provide an optimal allocation of a bearer manager or home agent. In one embodiment, a message is received from a mobile node requesting access to a visiting network that is different from a home network for the mobile node. An authentication request is sent to the home network requesting authentication for access. The authentication request indicates that a home agent has not been assigned. The home AAA server then sends a response that indicates the visiting AAA server can assign a home agent for the mobile node. The visiting AAA server then assigns a home agent that is optimally determined. The visiting home agent is different from a home agent that is found in the mobile node's home network. When a registration request is received, an IP gateway may send the registration request to the visiting home agent, which may not be sent back to the home network.
Abstract:
An Unlicensed Mobile Access (UMA) network architecture. In a specific embodiment, the network architecture includes a mobile station and an access point in communication with the mobile station. A UMA Controller (UNC) communicates with the access point. A Service GateWay (SGW) communicates with the UMA controller. The SGW includes functionality to route user-plane packets in the UMA. In a more specific embodiment, the functionality includes UNC user-plane functionality offloaded from the UNC to the SGW; Serving GPRS Support Node (SGSN) user-plane functionality; access-authentication functionality sufficient to enable the SGW to enable the SGW to bypass a legacy SGSN control plane; and/or Radio Network Controller (RNC) user-plane functionality sufficient to enable communications between the SGW and the RNC.
Abstract:
Facilitating node mobility includes facilitating a communication session for a mobile node communicated along a first communication path. A first anchor point manages context information for the communication session, where the context information comprises information for supporting the communication session. A command to transfer the context information to a second anchor point is received from a home agent. The second anchor point is operable to facilitate communication of the communication session along a second communication path. The context information is transferred in response to the command.
Abstract:
Facilitating node mobility includes facilitating a communication session for a mobile node communicated along a first communication path. A first anchor point manages context information for the communication session, where the context information comprises information for supporting the communication session. A command to transfer the context information to a second anchor point is received from a home agent. The second anchor point is operable to facilitate communication of the communication session along a second communication path. The context information is transferred in response to the command.
Abstract:
A system and method is provided for authenticating access in a mobile wireless network. The system and method comprise exchanging an extensible authentication protocol (EAP) packet with an access terminal over a high rate packet data radio link and a signaling interface through a radio access network, encapsulating the EAP packet in an authentication authorization and accounting (AAA) packet, and sending the AAA packet to an authentication server for authentication.
Abstract:
Obtaining neighborhood information for a cell includes establishing the presence of a mobile node in a first cell having a first cell site. A communication session for the mobile node is facilitated. Neighborhood information is determined in response to facilitating the communication session. The neighborhood information describes a second cell having a second cell site. The neighborhood information is recorded in a neighborhood information record.