Implementing a common bootstrap architecture type security association for terminals in a mobile telecommunications network

A security association, telecommunication network technology, applied in the telecommunication field of telecommunication, mobile network

Active Publication Date: 2018-04-24
ORANGE SA (FR)
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] However, this procedure means that the terminal opens its own http browser to be able to then open an IP connection to the application, which does not necessarily have to be based on the http protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementing a common bootstrap architecture type security association for terminals in a mobile telecommunications network
  • Implementing a common bootstrap architecture type security association for terminals in a mobile telecommunications network
  • Implementing a common bootstrap architecture type security association for terminals in a mobile telecommunications network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] according to figure 1 An embodiment of the invention is shown, the items of equipment implementing the invention are a mobile terminal 1, a network access server 2, a boot function server 3 called BSF server and a subscriber server called HSS (Home Subscriber Server) 4.

[0046] The invention is implemented for GPRS (General Packet Radio Service) type access. In this case, the network access server 2 is a Serving GPRS Support Node, called SGSN (Serving GPRS Support Node).

[0047] In another embodiment, the invention is implemented in an LTE / EPC (Long Term Evolution / Evolved Packet Core) type network. In this case, the network access server 2 is a server called MIME (Mobility Management Entity).

[0048] The mobile terminal 1 may be, for example, a mobile phone terminal, a laptop computer, a digital personal assistant, or the like. In the example shown, the mobile terminal 1 is a mobile telephone terminal belonging to a user.

[0049] Such as figure 1 As shown, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method is provided for putting in place a security association of GBA type for a terminal. The method includes the following steps, executed in a network access server, following receipt of a request for attachment to the network from the terminal: dispatching a request for association of security to a priming function server; reception of a response comprising security association parameters, from the priming function server and dispatching a message including the security association parameters to the terminal.

Description

technical field [0001] The field of the invention is that of telecommunications, and more specifically of mobile networks. Background technique [0002] 3GPP has defined an architecture called GBA (Generic Bootstrapping Architecture), whose goal is to allow authentication of mobile terminals to establish a security association between mobile terminals and applications. [0003] This architecture includes a bootstrap function server (hereafter simply referred to as "BSF server") and relies on a protocol called AKA for identification keys. [0004] During the authentication process, the terminal equipped with the SIM card uses a connection based on the http protocol to authenticate itself to the BSF server. The general principles are as follows: [0005] The verification result is a security key valid for a duration determined by the server. The server also provides the terminal with the session identifier associated with the security key and the duration for which the key ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04L29/06
CPCH04L63/08H04W12/06H04W12/0431
Inventor J.布尔内尔L.莫兰德
Owner ORANGE SA (FR)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products