Authentication of mobile communication networks
A technology of mobile communication network and network, applied in the field of mobile communication network
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] Figure 1 schematically depicts part of a conventional GSM network. This network is essentially divided into a core network part 20 and an access part, also called Base Station Subsystem BSS 10 . Elements of the core network 20 shown in the figure include a Mobile Switching Center or MSC 202, an associated Home Location Register HLR 201 and a Visitor Location Register VLR 204. The function and structure of these conventional GSM architecture elements are known to those skilled in the art and will not be described in more detail here. Although not shown in the figure, those skilled in the art will appreciate that the core network portion may include access to other mobile and fixed line networks, such as ISDN and PSTN networks, packet and circuit switched packet, through one or more gateway nodes Data networks such as Intranets, Extranets, and the Internet. Also shown in the figure is an authentication center AUC 205, which is connected to the home location register HLR...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 