Abstract:
Un método de gestionar itinerancia de un Nodo Móvil en una red Visitada, estando el Nodo Móvil asociado a unared Local, estando el método caracterizado por: en un servidor de Autenticación, Autorización y Contabilización dispuesto en la red Visitada, seleccionar (706) unnodo de Puerta de Enlace en base a criterios de selección, estando el nodo de Puerta de Enlace dispuesto entre lared Local y la red Visitada; en el servidor de Autenticación Autorización y Contabilización, enviar (709) un mensaje a un nodo de acceso de lared Visitada al que está unido el Nodo Móvil, cuyo mensaje identifica el nodo de Puerta de Enlace seleccionado.
Abstract:
An IMS node communicating with a user node and an information node is provided. The information node is adapted to conduct access control based on IMS Public User Identity. The IMS node comprises: request mediation means for mediating an access request from the user node to the information node by converting a first protocol conforming to IMS into a second protocol interpretable to the information node; and response mediation means for mediating an access response from the information node to the user node by converting the second protocol into the first protocol. The access request includes the IMS Public User Identity and information identity specifying information which the information node is requested to retrieve.
Abstract:
The present invention concern a methods and an apparatus for exchanging data between a user equipment and a core network via a security gateway. The invention concerns the establishment of an inactive pair of tunnel mode security associations between the UE and the security gateway, as well as the application of the pair of security associations when the UE detects attachment to or need to attach to an untrusted access network.
Abstract:
The present invention concerns a method of handling a Local Break Out (LBO) session taking place in a first network between a user equipment and a corresponding node (CN). The invention addresses the problems that arise when using only one IP address in the user equipment and the user equipment moves to a second network. This is, for the downlink packets, solved by the steps of: converting, in a node in the first or the second network, the IP address of the downlink packets from an LHoA to a Global Home Address (GHoA) and routing, from the first node, directly or indirectly to a second node in the second network, any downlink packets being sent from the corresponding node, so that the downlink packets will arrive at the user equipment having a GHoA. For the uplink packets the problem is solved by converting, in a node in the first or the second network, the IP address of the uplink packets from a GHoA to an LHoA and routing, from the second node, directly or indirectly to the first node, any uplink packets being sent from the user equipment; so that the uplink packets will arrive at the corresponding node with a source address that is an LHoA. The invention also concerns nodes for handling an LBO session.
Abstract:
The present invention relates to a method for efficient routing in a multiple hop wireless communication network. The invention is characterized in that data packets are routed over transmission paths using the following steps providing link status information by acquiring link status quality between nodes in the network, updating a routing element (101) with said link status information, determining possible routes with essentially similar link quality status for said data packet, and routing said data packet via the determined routes.
Abstract:
A method of providing secure access to a remote communication network via a local communication network for a terminal device. A gateway node located outside the local communication network allocates an IP address to the terminal device. The gateway node subsequently receives a request to establish a secure tunnel between the gateway node and the terminal device. It identifies the terminal device as the same terminal device to which an IP address is allocated, and allocates the same IP address for use by the terminal device as both an inner IP address and an outer IP address for packets sent via the secure tunnel. This ensures that there are no issues as described above in selecting the IP address for use in the secure tunnel, and reduces the risk of a successful man-in-the-middle attack.
Abstract:
There is provided a user device that is equipped with IMS functionality. The user device includes: searching means for searching, based on UPnP technology, a UPnP network for another user device that has IMS subscription information, establishing means for establishing a session with the other user device discovered by the searching means, retrieving means for retrieving the IMS subscription information from the other user device via the session, and sending means for sending a first SIP register message including the IMS subscription information to an IMS network.