Authentication of termination messages in telecommunications system

作者: Ingrid Norstrand , Pontus Wallentin , Per Elmdahl

DOI:

关键词:

摘要: An authentication mechanism renders a communications network impervious to unauthorized requests for interaction termination or cessation. In release mode of operation, the protects against an connection message directed mobile node (30) network, e.g., station such as user equipment unit, thereby thwarting attempt request procedure concerning involving node. detach deceptively transmitted on behalf node, its modes involves first (Ni) at which key is provided. The uses derive indicia related key. provides second (Nr) network. Subsequently, when operation occur (e.g., detach), includes in over air interface between and As condition performing confirms that (which was included message) is, fact, indicia.

参考文章(13)
David A. Jones, Lauran F. Dean, Michael Marcovici, Invalid mobile telephone call terminating system and method ,(1998)
Thomas F. La Porta, Malathi Veeraraghavan, Ramachandran Ramjee, Method and system for distributed control in wireless cellular and personal communication systems ,(1995)
Lila Madour, Karim Shafik, Optimized packet-resource management ,(2001)
Akira Toshima-ku Yamaguchi, Toshio Sayama-shi Mizuno, Masayoshi Kounosu-shi Ohashi, Seiichiro Toshima-ku Sakai, Toshinori Itabashi-ku Suzuki, Yoshio Ohmiya-shi Takeuchi, Authentication method for mobile communications ,(1995)
Peter Douma, Hiroshi Yasuda, Masaaki Akahane, Geoffrey Anderson, Semyon Mizikovsky, Automatic generation of private authentication key for wireless communication systems ,(1994)
Eugene J. Bruckert, William R. Bayer, Michael J. Bach, Communication across regional entities ,(1994)
Louis David Finkelstein, Daniel Peter Brown, Method and apparatus for authentication in a communication system ,(1995)