Unlock instant, AI-driven research and patent intelligence for your innovation.

Putting in place of a security association of gba type for a terminal in a mobile telecommunications network

A security association and terminal technology, applied in the field of telecommunications and mobile network telecommunications

Active Publication Date: 2014-02-05
ORANGE SA (FR)
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] However, this procedure means that the terminal opens its own http browser to be able to then open an IP connection to the application, which does not necessarily have to be based on the http protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Putting in place of a security association of gba type for a terminal in a mobile telecommunications network
  • Putting in place of a security association of gba type for a terminal in a mobile telecommunications network
  • Putting in place of a security association of gba type for a terminal in a mobile telecommunications network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] according to figure 1 An embodiment of the invention is shown, the items of equipment implementing the invention are a mobile terminal 1, a network access server 2, a boot function server 3 called BSF and a subscriber server 4 called HSS (Home Subscriber Server) .

[0046] The invention is implemented for GPRS (General Packet Radio Service) type access. In this case, the network access server 2 is a Serving GPRS Support Node, called SGSN (Serving GPRS Support Node).

[0047] In another embodiment, the invention is implemented in an LTE / EPC (Long Term Evolution / Evolved Packet Core) type network. In this case, the network access server 2 is a server called MIME (Mobility Management Entity).

[0048] The mobile terminal 1 may be, for example, a mobile phone terminal, a laptop computer, a digital personal assistant, or the like. In the example shown, the mobile terminal 1 is a mobile telephone terminal belonging to a user.

[0049] Such as figure 1 As shown, the mobil...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method is provided for putting in place a security association of GBA type for a terminal. The method includes the following steps, executed in a network access server, following receipt of a request for attachment to the network from the terminal: dispatching a request for association of security to a priming function server; reception of a response comprising security association parameters, from the priming function server and dispatching a message including the security association parameters to the terminal.

Description

technical field [0001] The field of the invention is that of telecommunications, and more specifically of mobile networks. Background technique [0002] 3GPP has defined an architecture called GBA (Generic Bootstrapping Architecture), whose goal is to allow authentication of mobile terminals to establish a security association between mobile terminals and applications. [0003] The architecture includes a bootstrap function server BSF and relies on a protocol called AKA for identification keys. [0004] During the authentication process, the terminal equipped with the SIM card uses a connection based on the http protocol to authenticate itself to the bootstrap function server BSF. The general principles are as follows: [0005] The verification result is a security key valid for a duration determined by the server. The server also provides the terminal with the session identifier associated with the security key and the duration for which the key is valid. [0006] When ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04L29/06
CPCH04L63/08H04W12/06H04W12/0431
Inventor J.布尔内尔L.莫兰德
Owner ORANGE SA (FR)