EP1410569A2 - Verwendung von radius zum durchführen von hlr-funktionen und zum umherstreifen in umts - Google Patents
Verwendung von radius zum durchführen von hlr-funktionen und zum umherstreifen in umtsInfo
- Publication number
- EP1410569A2 EP1410569A2 EP01953216A EP01953216A EP1410569A2 EP 1410569 A2 EP1410569 A2 EP 1410569A2 EP 01953216 A EP01953216 A EP 01953216A EP 01953216 A EP01953216 A EP 01953216A EP 1410569 A2 EP1410569 A2 EP 1410569A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- user
- service provider
- radius
- network
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 claims description 24
- 238000012795 verification Methods 0.000 claims description 18
- 230000001413 cellular effect Effects 0.000 claims description 12
- 230000005641 tunneling Effects 0.000 claims description 6
- 238000004891 communication Methods 0.000 claims description 5
- 238000004590 computer program Methods 0.000 claims description 5
- 238000005516 engineering process Methods 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000001228 spectrum Methods 0.000 description 2
- 229910000906 Bronze Inorganic materials 0.000 description 1
- 230000004308 accommodation Effects 0.000 description 1
- 239000010974 bronze Substances 0.000 description 1
- KUNSUQLRTQLHQQ-UHFFFAOYSA-N copper tin Chemical compound [Cu].[Sn] KUNSUQLRTQLHQQ-UHFFFAOYSA-N 0.000 description 1
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 description 1
- 229910052737 gold Inorganic materials 0.000 description 1
- 239000010931 gold Substances 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 229910052709 silver Inorganic materials 0.000 description 1
- 239000004332 silver Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/04—Protocols specially adapted for terminals or networks with limited capabilities; specially adapted for terminal portability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/162—Implementing security features at a particular protocol layer at the data link layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Definitions
- the present invention is directed to the use of the Internet web technology to perform a home location register function in a wireless access network.
- HLR Home Location Register
- SS7 Signaling System #7
- PSTN Public Switched Telephone Network
- RADIUS server provides such function.
- a description of RADIUS is provided by an Internet article, RFC2138 Remote Authentication Dial-In User Service (RADIUS) by C. Rigney, et al., April 1997 which is available at WWW.IETF.ORG (Internet Engineering Task Force) .
- RADIUS Remote Authentication Dial-In User Service
- This system has only been used for Public Switched Telephone Network access.
- Traditional mobile communications roaming methods protocols may not satisfactorily support the roaming function of the Internet Protocol (IP) based wireless access system describe in the above co-pending application 09/432,824. There is therefore a need for provision of HLR functions and roaming in an IP based wireless access system whereby the above disadvantages may be alleviated.
- IP Internet Protocol
- a wireless access network system as claimed in claim 13.
- a RADIUS arrangement for use in a wireless access network system, as claimed in claim 25.
- a network controller for use in a wireless access network system, the network controller having a RADIUS client for use with a RADIUS server in authorising user access to the network, as claimed in claim 26.
- a computer program element comprising computer program means for performing the method of operation in a wireless access network system, as claimed in claim in claim 27.
- a method of operating a cellular wireless Internet access system using RADIUS Remote Authentication Dial-In User Service which is normally used for dial-up Internet access over the PSTN (Public Switched Telephone Network) where the user utilizes a portable subscriber terminal with a directly attached antenna for communicating in a wireless manner via a cellular network to an integrated network controller and then to a target Internet Service Provider (ISP), comprising the steps of providing the subscriber terminal with an access network operator identifier and user identifier and password, both related to said access network operator.
- the subscriber terminal requests Internet access from the integrated network controller.
- the integrated network controller requests verification of the user from the RADIUS server of the operator.
- the RADIUS server verifies the user identifier and password.
- the integrated network controller receives an acceptance message.
- the integrated network controller connects to a layer two tunneling protocol network server and a targeted Internet service provider and the subscriber terminal begins an Internet session.
- FIG. 1 is a block diagram of an Internet system illustrating the present invention.
- FIG. 2 is a flow chart illustrating the method of FIG. 1 of the present invention.
- FIG. 3 is a diagram illustrating the method of FIG. 1 of the present invention.
- FIG. 4 is a block diagram similar to FIG. 1.
- FIG. 5 is a flow chart for FIG. 4,
- FIG. 6 is a data format diagram.
- Each wireless access user has a personal computer PC and a UMTS user equipment (UE) 21' and 22' with a directly attached antenna 20 and is connected by typical data connections such as an RS232, USB or Ethernet to the PC.
- the user equipment is termed a portable subscriber terminal, operating in conjunction with its associated PC.
- the wireless access user is described in the above co- pending application and is a part of a UMTS/UTRAN system 23 as described in the above co-pending application, which communicates in a wireless manner via a UTRAN network to an integrated network controller (INC) 24, via a link 1.
- INC integrated network controller
- Such controller may be connected by wire or otherwise to an Internet system or web 31.
- the controller 24 includes an RNC or Radio Network Controller 26, which controls and allocates the radio network resources and provides reliable delivery of user traffic between a base station (NODE B) and subscriber terminal.
- An SGSN (Serving General Packet Radio Service Node) 27 provides session control.
- a RADIUS element designated RADIUS client 28 is incorporated to provide authentication and other functions.
- the Internet protocol network 31 is connected to INC 24 by an Internet Protocol connection 32 and then to a UMTS access network operator 35, through its Layer 2 Tunneling Protocol Network Server 35', having a RADIUS server 34.
- RADIUS server unit 34 may, for example, be in the user's home area of San Francisco (S.F.) and is the home Radius server. Thus, this is the server for both authentication and accounting functions as described in the above co- pending application.
- the user would communicate via the network 31 with target Internet service provider 36 through its Layer 2 Tunneling Protocol Network Server LNS 36'.
- the user's subscriber terminal may be in New York (N.Y.)
- he is a roaming user, who must use a partner access network operator.
- RADIUS server 37 N.Y.
- UMTS access network operator 38 which has a roaming agreement.
- that operator 38 would have an LNS unit 38' .
- FIG. 2 illustrates the typical home operation of the system using RADIUS servers where after start as shown in step 1, the integrated network controller (INC) receives a session request from the mobile wireless user (UE) for Internet access.
- the numbered steps of FIG. 2 correspond to the communication paths illustrated in FIG. 1.
- INC 24 requests access verification for the mobile wireless user from the RADIUS server 34.
- the link 2 is illustrated in network 31.
- the decision is made by RADIUS server 34 whether to accept or reject the user as shown by the accept and reject paths and verifies the user ID and password.
- Each user has both a user identifier, a user password, and also includes an identification for its access network operator 35.
- step 9 the INC 24 tears down the session and it comes to an end.
- the integrated network controller receives the accept message (see the link 4 in the network 31 in FIG. 1) with the subscribed-to-tier of service, roaming indicator (in this case it would be negative) and target ISP.
- step 5 see the link 5 in FIG. 1) the INC 24 connects to the LNS 36' of the target ISP 36 and the user does an end-to-end negotiation for ISP access with LNS 36'. Then the Internet session, between the user' s PC and the target ISP begins.
- FIG. 3 illustrates the normal authentication, connection and session tear down between the INC radius client 28 and the home server 34.
- access is requested and then accepted in 42.
- the connection is made as shown in 43 via a layer 2 tunneling protocol tunnel to the target ISP.
- a user disconnect notification is provided to the radius server 34 as discussed in the above co-pending application.
- FIG. 4 is very similar to FIG. 1 and simplified with the links 1, 2, 4, 5 being the same as illustrated in FIG. 1.
- the user is attempting to gain access via UMTS roaming where access is desired with the partner or operator 38 with a roaming agreement.
- step 1 the INC 24 receives a session request from the wireless user as before. Then, in step 2 the INC 24 requests access verification for the mobile wireless user from the radius server 34.
- the access network operator identifier which has been supplied to the UE 21' and 22' is sent up via the radius client 28 and the SGSN 27 but identifies a different UMTS access network operator, with whom this operator has a roaming agreement.
- the users 21 and 22, as illustrated in FIG. 4 are now out of their home territory as shown by the access network operator ID.
- step 3' the radius server 34 determines that this is a request from a roaming user (based on operator ID sent up in the request) and it forwards (link 3', FIG. 4) the request to the partner operator radius server 37.
- the partner radius server 37 verifies user ID and password. If no verification occurs, then a rejection and tear down occurs as shown in steps 8 and 9 similar to FIG. 2. However, if acceptance occurs then in step 10 via the link 10 as shown in FIG. 4 between partner operator 38 and home operator 35, the home radius server 34 receives the accept and passes it on to the INC 24. In step 4 and the link 4 shown in FIG. 4 (similar to that of FIG.
- step 5 the INC 24 receives the accept message with the subscribed-to-tier of service, the roaming indicator (which in this case is positive) , and the subscribed-to ISP.
- the INC 24 connects to the LNS of the target ISP 36. Again, the user begins a session.
- the message types, structure and encoding are standard as outlined in the RFC 2138 above. As shown in those standards, the data packets all have pre-assigned attributes which are given a standard attribute number. To facilitate the additional functionality required for a RADIUS server to perform the HLR function, the standard attributes are required and also additional attributes. These are all contained in the code format of FIG. 6 where octets relate to the data octets and the box labeled TYPE relates to the attribute number. In the RADIUS system, attribute number 26 is a vendor-specific attribute. Morever, this is believed to be the most convenient way in order to interface with the standard RADIUS system.
- FIG. 6 is a basic code format which would be modified for each particular function and, thus, it illustrates in general the basic code format.
- a user name attribute is included (that is, type number 1) and the data of the octet string takes the form of a network access identifier (NAI) defined by an attribute number 32.
- NAI network access identifier
- the vendor specific attribute which differentiates this system from the standard PSTN system would in the box of FIG. 6 labeled IPW-Type and have the number 10 to show a NODE B ID (that is, the base station ID) .
- the identification of that ID would actually be in the VALUE box as shown in FIG. 6.
- Another vendor-specific attribute is the ISP name indicated in the IPW-Type box by the number 9, and the actual name would be expressed as a string octet as indicated in FIG. 6.
- the present system provides a tier of service value which is related to the data capacity which the ultimate subscriber terminal is to have and also the latency.
- latency is defined as a time lag between the beginning of a request for data and the moment it begins to be received.
- tier of service is indicated by IPW-Type attribute number 1 and in the value field the following enumerated values are provided starting from a low level to a high level.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US62670000A | 2000-07-27 | 2000-07-27 | |
| US626700 | 2000-07-27 | ||
| PCT/GB2001/003385 WO2002011467A2 (en) | 2000-07-27 | 2001-07-27 | Use of radius (remote authentication dial-in user service) in umts to perform hlr function and for roaming |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| EP1410569A2 true EP1410569A2 (de) | 2004-04-21 |
Family
ID=24511458
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP01953216A Withdrawn EP1410569A2 (de) | 2000-07-27 | 2001-07-27 | Verwendung von radius zum durchführen von hlr-funktionen und zum umherstreifen in umts |
Country Status (7)
| Country | Link |
|---|---|
| EP (1) | EP1410569A2 (de) |
| JP (1) | JP5083718B2 (de) |
| AU (1) | AU784411B2 (de) |
| CA (1) | CA2384890A1 (de) |
| GB (1) | GB2369271B (de) |
| MX (1) | MXPA02003159A (de) |
| WO (1) | WO2002011467A2 (de) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7416714B2 (en) | 2006-03-28 | 2008-08-26 | Unimin Corporation | Preparation of hydroxysodalite |
Families Citing this family (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6865169B1 (en) | 1999-11-02 | 2005-03-08 | Ipwireless, Inc. | Cellular wireless internet access system using spread spectrum and internet protocol |
| US8117291B1 (en) | 1999-11-02 | 2012-02-14 | Wireless Technology Solutions Llc | Use of internet web technology to register wireless access customers |
| WO2002011467A2 (en) * | 2000-07-27 | 2002-02-07 | Ipwireless, Inc. | Use of radius (remote authentication dial-in user service) in umts to perform hlr function and for roaming |
| US20040246933A1 (en) * | 2001-09-12 | 2004-12-09 | Andras Valko | Arrangements and method in mobile internet communications systems |
| FI20021161L (fi) * | 2002-06-14 | 2003-12-15 | Sonera Oyj | Menetelmä lähiverkon tiedonsiirtolaitteen käyttäjätietojen välittämiseksi ja lähiverkkojärjestelmä |
| GB2394143B (en) * | 2002-10-08 | 2006-04-05 | Ipwireless Inc | System and method for use of internet authentication technology to provide umts authentication |
| CN1266891C (zh) | 2003-06-06 | 2006-07-26 | 华为技术有限公司 | 无线局域网中用户接入授权的方法 |
| CN1319337C (zh) * | 2003-07-02 | 2007-05-30 | 华为技术有限公司 | 基于以太网认证系统的认证方法 |
| CN1283072C (zh) * | 2003-07-03 | 2006-11-01 | 华为技术有限公司 | 无线局域网中用户终端网络选择信息的处理方法 |
| US8160580B2 (en) | 2003-09-15 | 2012-04-17 | Qualcomm Incorporated | Systems and methods for home carrier determination using a centralized server |
| US8910300B2 (en) * | 2010-12-30 | 2014-12-09 | Fon Wireless Limited | Secure tunneling platform system and method |
Family Cites Families (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6061650A (en) * | 1996-09-10 | 2000-05-09 | Nortel Networks Corporation | Method and apparatus for transparently providing mobile network functionality |
| US5889958A (en) * | 1996-12-20 | 1999-03-30 | Livingston Enterprises, Inc. | Network access control system and process |
| US6151628A (en) * | 1997-07-03 | 2000-11-21 | 3Com Corporation | Network access methods, including direct wireless to internet access |
| US6512754B2 (en) * | 1997-10-14 | 2003-01-28 | Lucent Technologies Inc. | Point-to-point protocol encapsulation in ethernet frame |
| US6577643B1 (en) * | 1997-10-14 | 2003-06-10 | Lucent Technologies Inc. | Message and communication system in a network |
| US6466571B1 (en) * | 1999-01-19 | 2002-10-15 | 3Com Corporation | Radius-based mobile internet protocol (IP) address-to-mobile identification number mapping for wireless communication |
| SE521002C2 (sv) * | 1999-10-08 | 2003-09-23 | Sendit Ab | Metod för att initiera omedelbar överföring av paketdata från en extern nätverksserver till en mobil kommunikationsenhet vars paketdatanätadress är okänd för servern |
| US6785823B1 (en) * | 1999-12-03 | 2004-08-31 | Qualcomm Incorporated | Method and apparatus for authentication in a wireless telecommunications system |
| US6834300B1 (en) * | 2000-03-10 | 2004-12-21 | Telefonaktiebolaget Lm Ericsson (Publ) | Method in a packet data network of negotiating reporting mechanisms and reporting accounting records |
| WO2002011467A2 (en) * | 2000-07-27 | 2002-02-07 | Ipwireless, Inc. | Use of radius (remote authentication dial-in user service) in umts to perform hlr function and for roaming |
-
2001
- 2001-07-27 WO PCT/GB2001/003385 patent/WO2002011467A2/en not_active Ceased
- 2001-07-27 AU AU75711/01A patent/AU784411B2/en not_active Ceased
- 2001-07-27 MX MXPA02003159A patent/MXPA02003159A/es unknown
- 2001-07-27 GB GB0118391A patent/GB2369271B/en not_active Expired - Lifetime
- 2001-07-27 EP EP01953216A patent/EP1410569A2/de not_active Withdrawn
- 2001-07-27 CA CA002384890A patent/CA2384890A1/en not_active Abandoned
- 2001-07-27 JP JP2002515858A patent/JP5083718B2/ja not_active Expired - Lifetime
Non-Patent Citations (1)
| Title |
|---|
| See references of WO0211467A2 * |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7416714B2 (en) | 2006-03-28 | 2008-08-26 | Unimin Corporation | Preparation of hydroxysodalite |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2002011467A2 (en) | 2002-02-07 |
| GB2369271A (en) | 2002-05-22 |
| JP2004505568A (ja) | 2004-02-19 |
| GB0118391D0 (en) | 2001-09-19 |
| WO2002011467A3 (en) | 2002-11-21 |
| CA2384890A1 (en) | 2002-02-07 |
| JP5083718B2 (ja) | 2012-11-28 |
| AU7571101A (en) | 2002-02-13 |
| GB2369271B (en) | 2004-11-10 |
| AU784411B2 (en) | 2006-03-30 |
| MXPA02003159A (es) | 2003-09-22 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN101248640B (zh) | 用于选择分组交换电信网络中移动终端的接入点名称(apn)的方法 | |
| CN100468990C (zh) | 在公共无线局域网中具有移动性的认证系统和方法 | |
| CN100440823C (zh) | 在无线局域网和蜂窝网络之间漫游的方法 | |
| CN1600036B (zh) | 基于服务质量提供服务的方法和移动通信系统核算方法 | |
| EP2403283B1 (de) | Verbesserte Teilnehmerauthentifizierung für unlizenzierte Mobilzugriffssignalisierung | |
| EP1693988B1 (de) | Verfahren, wodurch das teilnehmerendgerät das paketdaten-gateway in dem drahtlosen lokalen netzwerk auswählt | |
| US20030145091A1 (en) | Access terminal profile in a data cellular network | |
| US20030171112A1 (en) | Generic wlan architecture | |
| MXPA04012155A (es) | Red de area local inalambrica como un nodo logico de soporte (sgsn) para el interfuncionamiento entre la red de area local inalambrica y un sistema de comunicaciones moviles. | |
| AU784411B2 (en) | Use of radius in UMTS to perform HLR function and for roaming | |
| CN101106508B (zh) | 一种在异构系统中获取用户规格的方法 | |
| US8117291B1 (en) | Use of internet web technology to register wireless access customers | |
| US8463231B1 (en) | Use of radius in UMTS to perform accounting functions | |
| KR100399576B1 (ko) | 차세대이동통신시스템에서의 단순한 아이피와 이동성 아이피 서비스 지원시스템 및 방법 | |
| US20080076454A1 (en) | Method and system of forming a wlan for a dual mode cellular device | |
| US20060002329A1 (en) | Method and system for providing backward compatibility between protocol for carrying authentication for network access (PANA) and point-to-point protocol (PPP) in a packet data network | |
| KR100485517B1 (ko) | 무선랜 망간 시스템의 가입자 인증 제공 장치 및 방법 | |
| US20060002330A1 (en) | Method and system for providing network access to protocol for carrying authentication for network access (PANA) mobile terminals and point-to-point protocol (PPP) mobile terminals packet data network | |
| CN101009611A (zh) | 一种终端接入不同服务网络的方法 | |
| CN101790167A (zh) | 一种分组数据服务节点的分配方法及系统 | |
| US7904359B1 (en) | Providing accounting services for a communication network | |
| CA2527744C (en) | System and method for porting a personalized indicium assigned to a mobile communications device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| 17P | Request for examination filed |
Effective date: 20030616 |
|
| AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
| AX | Request for extension of the european patent |
Extension state: AL LT LV MK RO SI |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
| 18D | Application deemed to be withdrawn |
Effective date: 20040202 |