Triggering a usage of a service of a mobile packet core network

作者: Correia Fernandes António Carlos , Bindrim Walter

DOI:

关键词:

摘要: A method is provided for using a service of mobile packet core network in communication system comprising device, node, and wireless radio access network. The device accesses the via During setup connection to network, determines whether trustworthy. If it not trustworthy, establishes secure tunnel node triggering usage by an authentication entity. established token stored within received node. comprises at least certificate entity generated general security mechanisms (e.g., TPM and/or MD5).

参考文章(33)
Jordan Faulkner Thomas, Kyle J. Fiducia, Pierce Stephen Schmerge, Mobile enterprise smartcard authentication ,(2013)
Stephen William Edge, Andreas Klaus Wachter, Philip Michael Hawkes, Enabling secure access to a discovered location server for a mobile device ,(2013)
Lee H. Eckert, Lawrence R. Yeager, Gary Mark Shafer, Method and apparatus for powering a security device ,(2012)
William Gordon Mansfield, Judson John Flynn, Jefferey Thomas Seymour, Robert Wayne Lott, Kurt Donald Huber, Arthur Brisebois, Administration of access lists for femtocell service ,(2009)
David A. McGrew, Philip John Steuart Gladstone, Security for remote access vpn ,(2011)
Prasanna Ganapathi Basavapatna, Sven Schrecker, David Moshe Goldschlag, Satish Kumar Gaddala, Mobile risk assessment ,(2012)