Abstract:
PROBLEM TO BE SOLVED: To make it possible that the time required for renegotiating security associations at the time of hand-over can be shortened in a radio telecommunication system. SOLUTION: In this invention, the existing security associations corresponding to a mobile unit is reused at the time of hand-over. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
In a radio telecommunication system, the performance of a mobile unit can be significantly improved during a hand-over procedure by reusing existing security associations that correspond to the mobile unit. By reusing existing security associations, a mobile unit can begin secure communications immediately following the hand-over. Otherwise, and in accordance with conventional practice, the mobile unit will have to undertake the time consuming task of renegotiating the required security associations, before it can begin transmitting and receiving secure communications.
Abstract:
In a mobile, wireless telecommunications network, communications relating to a mobile terminal can be protected during a handover of the mobile terminal from a first access point to a second access point. This may be accomplished by transmitting a security token from the first access point to the mobile terminal, and then from the mobile terminal to the second access point, over the radio interface. Thereafter, the security token is transmitted from the first access point to the second access point through the fixed network to which both the first and the second access points are connected. The communications link between the mobile terminal and the second access point needed to achieve secure handover is then established only if the second access point determines that the security token received from the mobile terminal matches the security token received from the first access point.
Abstract:
By employing information contained in a gratuitous address resolution protocol (ARP) message, mobile terminal registration records can be effectively and efficiently established in and removed from a network host. When a mobile terminal changes its point-of-attachment from a first network host to a second network host in a subnetwork or local area network (LAN) segment, a gratuitous ARP message is generated by the second network host, wherein the gratuitous ARP message contains an IP address associated with the mobile terminal. As the mobile terminal is no longer attached to the subnetwork or LAN segment through the first network node, the first network node, upon identifying the mobile terminal's IP address contained in the gratuitous ARP message, may undertake the task of removing any and all registration records associated with the mobile terminal, which are themselves identified by the mobile terminal's IP address, from and distinguished any other registration records being maintained by the first network node.
Abstract:
In a mobile, wireless telecommunications network, communications relating to a mobile terminal can be protected during a handover of the mobile terminal from a first access point to a second access point. This may be accomplished by transmitting a security token from the first access point to the mobile terminal, and then from the mobile terminal to the second access point, over the radio interface. Thereafter, the security token is transmitted from the first access point to the second access point through the fixed network to which both the first and the second access points are connected. The communications link between the mobile terminal and the second access point needed to achieve secure handover is then established only if the second access point determines that the security token received from the mobile terminal matches the security token received from the first access point.
Abstract:
By employing information contained in a gratuitous address resolution protocol (ARP) message, mobile terminal registration records can be effectively and efficiently established in and removed from a network host. When a mobile terminal changes its point-of-attachment from a first network host to a second network host in a subnetwork or local area network (LAN) segment, a gratuitous ARP message is generated by the second network host, wherein the gratuitous ARP message contains an IP address associated with the mobile terminal. As the mobile terminal is no longer attached to the subnetwork or LAN segment through the first network node, the first network node, upon identifying the mobile terminal's IP address contained in the gratuitous ARP message, may undertake the task of removing any and all registration records associated with the mobile terminal, which are themselves identified by the mobile terminal's IP address, from and distinguished any other registration records being maintained by the first network node.
Abstract:
By employing information contained in a gratuitous address resolution protocol (ARP) message, mobile terminal registration records can be effectively and efficiently established in and removed from a network host. When a mobile terminal changes its point-of-attachment from a first network host to a second network host in a subnetwork or local area network (LAN) segment, a gratuitous ARP message is generated by the second network host, wherein the gratuitous ARP message contains an IP address associated with the mobile terminal. As the mobile terminal is no longer attached to the subnetwork or LAN segment through the first network node, the first network node, upon identifying the mobile terminal's IP address contained in the gratuitous ARP message, may undertake the task of removing any and all registration records associated with the mobile terminal, which are themselves identified by the mobile terminal's IP address, from and distinguished any other registration records being maintained by the first network node.
Abstract:
In a radio telecommunication system, the performance of a mobile unit can be significantly improved during a hand-over procedure by reusing existing security associations that correspond to the mobile unit. By reusing existing security associations, a mobile unit can begin secure communications immediately following the hand-over. Otherwise, and in accordance with conventional practice, the mobile unit will have to undertake the time consuming task of renegotiating the required security associations, before it can begin transmitting and receiving secure communications.
Abstract:
In a mobile, wireless telecommunications network, communications relating to a mobile terminal can be protected during a handover of the mobile terminal from a first access point to a second access point. This may be accomplished by transmitting a security token from the first access point to the mobile terminal, and then from the mobile terminal to the second access point, over the radio interface. Thereafter, the security token is transmitted from the first access point to the second access point through the fixed network to which both the first and the second access points are connected. The communications link between the mobile terminal and the second access point needed to achieve secure handover is then established only if the second access point determines that the security token received from the mobile terminal matches the security token received from the first access point.
Abstract:
In a mobile, wireless telecommunications network, communications relating to a mobile terminal can be protected during a handover of the mobile terminal from a first access point to a second access point. This may be accomplished by transmitting a security token from the first access point to the mobile terminal, and then from the mobile terminal to the second access point, over the radio interface. Thereafter, the security token is transmitted from the first access point to the second access point through the fixed network to which both the first and the second access points are connected. The communications link between the mobile terminal and the second access point needed to achieve secure handover is then established only if the second access point determines that the security token received from the mobile terminal matches the security token received from the first access point.