Abstract:
It is disclosed a method and a bootstrapping client (33) for assuring that a particular user (31) is present at local user authentication. It is also disclosed a method and a network application function (36) for authenticating a generic authentication architecture, GAA, client (34) to network application function, NAF (36). In addition, the NAF (36), requiring that the presence of the authorized user should be confirmed, sends a Nonce denoted as Nonce_UI, in which UI stands for “User Involvement”. The Nonce_UI indicates explicitly that the user involvement is required.
Abstract:
When setting up communication from a user equipment UE (1), such as for providing IP access for the UE in order to allow it to use some service, information or an indication of at least one network properly relating to a first network, e.g. the current access network (3, 3′), is sent to the UE from a node (13) in a second network such as the home network (5) of the subscriber ask UE. The information or indication can be sent in a first stage of an authentication procedure being part of the setting up of a connection from the UE. In particular, the network property can indicate whether the access network (3, 3′) is trusted or not.
Abstract:
segurança na comunicação de dados em uma rede de comunicações. trata-se de um método de segurança na comunicação de dados entre um primeiro nó (10) ligado a uma primeira rede (40-1) e um segundo nó (20/30) ligado a uma segunda rede (40-2). no segundo nó (20/30), o método compreende: receber (s1) a primeira informação (l1) sobre se a primeira rede (40-1) tem um caminho de camada de rede seguro para o primeiro nó (10) ou é conhecida por usar um caminho de camada de rede seguro para os nós ligados; receber (s2) a segunda informação (i2) sobre se o segundo nó (20/30) tem um caminho de camada de rede seguro para a segunda rede (40-2) ou é conhecida por usar um caminho de camada de rede seguro para a segunda rede (40 -2); receber (s3) a terceira informação (i3) sobre se a primeira rede (40-1) tem um caminho interno de camada de rede seguro e, quando a primeira e a segunda rede (40-1, 40-2) são diferentes, sobre se a primeira rede (40-1) tem um caminho de camada de rede seguro para a segunda rede (40-2), ou é conhecida por usar um caminho de camada de rede seguro para a segunda rede (40-2). é determinado (s5) a partir da primeira, da segunda e da terceira informação (i1, i2, i3) se o caminho inteiro entre o primeiro nó (10) e o segundo nó (20/30) é seguro no nível de camada de rede, e com base nessa determinação, é decidido se estabelecer (s6t, s7r) uma segurança da camada de aplicativo para a comunicação de dados entre o primeiro nó (10) e o segundo nó (20/30), ou se continua sem segurança de camada de aplicativo (s8t, s8r).
Abstract:
Methods and systems taught herein allow communication device manufacturers to preconfigure communication devices to use preliminary access credentials to gain temporary network access for downloading subscription credentials, and particularly allow the network operator issuing the subscription credentials to verify that individual devices requesting credentials are trusted. In one or more embodiments, a credentialing server is owned or controlled by the network operator, and is used by the network operator to verify that subscription credentials are issued only to trusted communication devices, even though such devices may be referred to the credentialing server by an external registration server and may be provisioned by an external provisioning server. Particularly, the credentialing server interrogates requesting devices for their device certificates and submits these device certificates to an external authorization server, e.g., an independent OCSP server, for verification. A common Public Key Infrastructure (PKI) may be used for operator and device certificates.
Abstract:
A system, method, and nodes for managing shared security keys between a User Equipment, UE, an authentication node such as an SCF/NAF, and a service node such as a BM-SC or AS. The SCF/NAF allocates to each BM-SC, a different SCF/NAF identifier such as a fully qualified domain name, FQDN, from the FQDN space the SCF/NAF administers. The SCF/NAF then locally associates these allocated FQDNs with the connected BM-SCs and with different services. The network sends the correct FQDN to the UE in a service description for a desired service, and the UE is able to derive a security key using the FQDN. When the UE requests the desired service, the SCF/NAF is able to associate the service identifier with the correct FQDN and an associated BM-SC. The SCF/NAF uses the FQDN to obtain the security key from a bootstrapping server and sends it to the associated BM-SC.As a result, the UE and the associated BM-SC share a specific security key.
Abstract:
A method is provided for use in interworking a single sign-on authentication architecture (Open ID) and a further authentication architecture (3GPP) in a split terminal scenario. The split terminal scenario is one in which authentication under the single sign-on authentication architecture is required of a browsing agent (8) being used to access a relying party and in response an associated authentication under the further authentication architecture is performed in relation to a separate authentication agent (7). A controlling agent (4) sends (C3) a token to the authentication agent (7). The controlling agent (4) sends (C4) a request to the browsing agent (8) to return a token for comparing with the token sent to the authentication agent (7). The controlling agent (4) waits (C6) for the authentication agent (7) or a user of the authentication agent (7) to communicate (A2) the received token to the browsing agent (8). The controlling agent (4) compares (C10) the received token with the token sent to the authentication agent (7) to determine whether the authentication agent (7) is authorised to perform authentication on behalf of the browsing agent (8).
Abstract:
The present invention relates to a method of recovering from a processor fault in a mobile communication network node provided with a plurality of processors. In use, connections are established between the network node and mobile stations for packet data communication between the network node and the mobile station. The connections are classified into priority order on basis of predefined classifying parameters. Working condition of at least one of the processors of the network node is monitored, and in case of detecting a processor fault, user plane connections are relocated within the network node from the faulted processor to another processor in accordance with the classified priority order of the connections. The invention relates further to a network node.
Abstract:
Un método para restablecer una conexión de control de recurso de radio, RRC, entre un equipo (1) de usuario, UE, y un NodoB (3) de destino evolucionado, eNB de destino, siendo el método realizado por el UE (1) y que comprende: recibir (S100) un mensaje de restablecimiento de conexión de RRC desde el eNB (3) de destino, incluyendo el mensaje de restablecimiento de conexión de RRC un token de autenticación de enlace descendente, DL, que ha sido generado por una entidad (4) de gestión de movilidad y ha tenido una clave de integridad de estrato sin acceso y un parámetro de actualización como entrada; y autenticar (S110) el token de autenticación DL recibido.