Abstract:
Un método de gestionar itinerancia de un Nodo Móvil en una red Visitada, estando el Nodo Móvil asociado a unared Local, estando el método caracterizado por: en un servidor de Autenticación, Autorización y Contabilización dispuesto en la red Visitada, seleccionar (706) unnodo de Puerta de Enlace en base a criterios de selección, estando el nodo de Puerta de Enlace dispuesto entre lared Local y la red Visitada; en el servidor de Autenticación Autorización y Contabilización, enviar (709) un mensaje a un nodo de acceso de lared Visitada al que está unido el Nodo Móvil, cuyo mensaje identifica el nodo de Puerta de Enlace seleccionado.
Abstract:
The present invention concern a methods and an apparatus for exchanging data between a user equipment and a core network via a security gateway. The invention concerns the establishment of an inactive pair of tunnel mode security associations between the UE and the security gateway, as well as the application of the pair of security associations when the UE detects attachment to or need to attach to an untrusted access network.
Abstract:
A gateway apparatus comprises a registration unit for registering a network address, a temporary address and a flag, a receiving unit for receiving data destined to a destination communication device with the network address of the destination communication device from a source communication device, a determination unit for determining whether the destination communication device is provided with the MCIM or not, based on a registered value of the flag, and transmitting unit for transmitting a bootstrap message for requesting initiation of provisioning of a predetermined identifier to the destination communication device, to a provision server, when it is determined that the destination communication device is not provided with the MCIM, wherein the transmitting unit transmits the data to the destination communication device using the assigned temporary address, when the destination communication device is provided with the MCIM.
Abstract:
The present invention concerns a method of handling a Local Break Out (LBO) session taking place in a first network between a user equipment and a corresponding node (CN). The invention addresses the problems that arise when using only one IP address in the user equipment and the user equipment moves to a second network. This is, for the downlink packets, solved by the steps of: converting, in a node in the first or the second network, the IP address of the downlink packets from an LHoA to a Global Home Address (GHoA) and routing, from the first node, directly or indirectly to a second node in the second network, any downlink packets being sent from the corresponding node, so that the downlink packets will arrive at the user equipment having a GHoA. For the uplink packets the problem is solved by converting, in a node in the first or the second network, the IP address of the uplink packets from a GHoA to an LHoA and routing, from the second node, directly or indirectly to the first node, any uplink packets being sent from the user equipment; so that the uplink packets will arrive at the corresponding node with a source address that is an LHoA. The invention also concerns nodes for handling an LBO session.
Abstract:
A method and apparatus for use in a Proxy Mobile IP communications network. An anchor point function serves at least one mobile host. The anchor point function generates an IP address for use by the mobile host, the address being generated using cryptographic materials owned by the anchor point function. The anchor point function can then perform signalling on behalfof the mobile host, using the IP address generated for the mobile host and at least part of the cryptographic materials used to generate the IP address.
Abstract:
A method of providing secure access to a remote communication network via a local communication network for a terminal device. A gateway node located outside the local communication network allocates an IP address to the terminal device. The gateway node subsequently receives a request to establish a secure tunnel between the gateway node and the terminal device. It identifies the terminal device as the same terminal device to which an IP address is allocated, and allocates the same IP address for use by the terminal device as both an inner IP address and an outer IP address for packets sent via the secure tunnel. This ensures that there are no issues as described above in selecting the IP address for use in the secure tunnel, and reduces the risk of a successful man-in-the-middle attack.
Abstract:
There is provided a mediation server. The mediation server comprises, among other things, a device identity receiving unit configured to receive, from a communication device, a device identity which enables the communication device to connect to a network operated by a network operator associated with the mediation server, a login request sending unit configured to send, to the communication device, a login request for requesting login credentials for one of at least one user identity associated with the device identity, and a login credentials receiving unit configured to receive the login credentials from the communication device. The mediation server also comprises a subscription information relaying unit configured to obtain subscription information for use by the communication device from a selected network, and forward the obtained subscription information to the communication device.