Unlock instant, AI-driven research and patent intelligence for your innovation.

Method of checking access rights in a mobile radio system

A mobile wireless, access right technology, applied in transmission system, wireless communication, radio/induction link selection arrangement, etc., can solve the problem of increasing the amount of signaling exchange, imperfect solutions, and not making optimal use of existing processes, etc. question

Inactive Publication Date: 2005-08-31
ALCATEL LUCENT SAS
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0036] However, a solution of said type is not perfect, especially since it increases the amount of signaling exchange between the HLR and the 3GMSC / VLR; as the applicant also recognized, said solution does not make optimal use of existing procedures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of checking access rights in a mobile radio system
  • Method of checking access rights in a mobile radio system
  • Method of checking access rights in a mobile radio system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] in figure 2 with image 3 In the example shown, in order to solve the above-mentioned problems, the present invention specifically recommends that the core network service entity (such as the MSC / VLR service entity in the CS domain) uses the verification data, also called verification vector, to detect the Whether the user is a GSM user or a UMTS user, thus completing the verification process.

[0047] For example, in figure 2 with image 3 In the case of the location update process mentioned in the illustrated example, the verification data (or vector) is received from the HLR in the process performed during step 4 (not explained in detail).

[0048] The present invention proposes to use the fact that the authentication data (or vector) has different types according to the type of authorized service, as explained below, in this case according to the corresponding second-generation (for example, GSM) service or Authorized service for third-generation (such as UMTS) servic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

One aspect of the present invention is a method of checking access rights in a mobile radio system, comprising steps whereby: a core network serving entity receives from a mobile user database different types of authentication data according to the type of services authorized for said users, and said serving entity uses said authentication data to check the access rights of said users according to the type of services authorized.

Description

Technical field [0001] The present invention generally relates to mobile wireless systems. Background technique [0002] Mobile wireless systems are usually covered by standards, and you can refer to the corresponding standards promulgated by the corresponding standardization organizations for more information. [0003] according to figure 1 The general structure of the type of system is briefly described. This type of system includes a mobile wireless network 1 connected to a mobile terminal 2 and an external network (not specifically shown). The network 1 includes a radio access network (RAN) 3 and a core network (CN) 4. The radio access network 3 is mainly responsible for transmission and management of radio resources at the radio interface between the network and the mobile terminal. The core Network 4 is mainly responsible for routing and call management. [0004] Changing requirements and technological advancements often lead to differences between different types of syste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W88/02
CPCH04W12/06H04W88/02H04L63/10H04W8/02H04W12/08
Inventor J·A·埃弗努M·雅各布
Owner ALCATEL LUCENT SAS