EP1829320A1 - Verfahren zum anmelden eines mobilen kommunikationsendgerätes gegenüber einem lokalen netzwerk - Google Patents
Verfahren zum anmelden eines mobilen kommunikationsendgerätes gegenüber einem lokalen netzwerkInfo
- Publication number
- EP1829320A1 EP1829320A1 EP05784531A EP05784531A EP1829320A1 EP 1829320 A1 EP1829320 A1 EP 1829320A1 EP 05784531 A EP05784531 A EP 05784531A EP 05784531 A EP05784531 A EP 05784531A EP 1829320 A1 EP1829320 A1 EP 1829320A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- communication terminal
- mobile communication
- server
- identity
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/162—Implementing security features at a particular protocol layer at the data link layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W60/00—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/022—Selective call receivers
- H04W88/023—Selective call receivers with message or information receiving capability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Definitions
- the invention relates to a method for registering a mobile communication terminal with respect to a local network, comprising the steps of: sending a start message from the mobile communication terminal to an access point of the local network, b) sending out an identity request message c) sending an identity-response message from the mobile communication terminal to the access point and forwarding the identity-response message to a server, e) performing an authentication procedure between the server and the mobile communication terminal, f) sending an authentication-successful message from the server to the access point and forwarding the authentication-successful message from the access point to the mobile communication terminal.
- EAP "Extensible Authentication Protocol”
- This protocol defines the message structure as well as an exchange of data, which serve primarily authentication of the mobile communication terminal to the network.
- a type of authentication between a client for example a mobile Ltdunikationsend ⁇ device, and an authentication server is negotiated.
- Supported authentication methods include, for example, generic token cards, MD5-CHAP (encryption of user names and passwords) and transport-level security (smart cards or other certificates).
- the EAP protocol has been extended in the standardization body IETF responsible for this so that in addition to the data mentioned above, which serve for the purpose of authentication, additional data, namely information about available network providers, can be transmitted.
- additional data namely information about available network providers
- Farid Adrangi entitled “Mediating Network Discovery and Selection” IETF, Internet Draft, draft-adrangi-eap-network-discovery-and-selection 02.txt, February 2004.
- the amount of data transmitted depends directly on a number of supported network providers and can therefore be very large.
- a transmission of data that differ from the data for authentication purposes, according to the illustrated prior art is therefore limited to that information about network providers from a server within the Netz ⁇ factory to a requesting mobile communication terminal ge be sent. According to Adrangi, this takes place in the form of a combined identity request / network information message, which is sent by the server via the access point to the mobile communication terminal.
- the object of the invention is to design the initially described application method for a mobile communication terminal in a local network in such a way that large amounts of data can be transmitted to the mobile communication terminal from the server with at most minor changes in the EAP protocol.
- this object is achieved by virtue of the fact that, in the step e), the server sends a first identity information request message, which contains an identity request message and network information, via the Access point is sent to the mobile communication terminal, wherein the network information includes the information to the mobile communication terminal that in the frame Further identity information request messages via the access point further data to the mobile Ltdunikationsend ⁇ device are transmitted, and at least one second Identi ⁇ tiquess information request message containing an ignorable I- dentistry request message and at least a part the wei ⁇ n data to the server via the access point contains, is sent to the mobile communication terminal.
- the basic idea of the invention is therefore to send out the intended identity information request message several times, whereby only the first identity request message which the mobile communication terminal receives is to be further processed by it in the context of an authentication.
- the further identity information request messages likewise contain identity request messages, which can however be ignored on the part of the mobile communication terminal.
- the purpose of the identity information request messages is, in the case of the first, to inform the mobile communication terminal that further data is provided by the server, and in the case of the further identity information request messages, while maintaining the format provided for the identity information request message, the notified data is to be transmitted.
- the identity information request messages both the first and the further, are sent by the server via the access point to the mobile communication terminal before an actual authentication, the method is highly advantageous in order to provide network information for the Client acting mobile communication terminal to send.
- the number of identity information request messages issued by the server to the mobile communication terminal. are unlimited by the EAP protocol, so that large amounts of data can be transported in that direction.
- the identity information request messages contain as data a number of still coming identity information request messages from the server via the access point to the mobile communication terminal. In this way, the latter is provided with information about how many identity information request messages are to be awaited until the data volume to be transmitted is completely received.
- identity information request messages may include as data an indication of an amount of data still to be transmitted from the server via the access point to the mobile communication terminal, so that information about bits / bytes to be received is provided on the mobile communication terminal side is present. In this respect, a performance check on received data volumes becomes possible.
- the identity information request messages may contain as data an indication of a number of identity information request messages or identity request messages already sent, so that it is possible to count for the mobile communication terminal when the notified number of messages has been received and thus the amount of data to be transmitted is complete.
- the identity-response message already provided within the EAP protocol can also be used as the basis for transporting data from the mobile communication terminal back to the server. NEN.
- the identity-response message is combined, for example, with data which contains an indication of a number of already sent identity request messages from the server via the access point to the mobile communication terminal. From this information, a conclusion can be drawn on the server side as to whether the identity information request messages already sent to the mobile communication terminal have been completely received so far.
- the mobile communication terminal upon receipt of the identity information request messages, sends identity information-response messages via the access point to the server, each of which confirms the receipt of the data from the preceding identity - Information request message included. In this way, a confirmation is sent back for each identity information request message arriving from the server to the mobile communication terminal, which acknowledges successful reception.
- the identity information response message may contain information about an already received amount of data. In this way, as the basis for a complete transmission of the network information from the server to the mobile communication terminal, the amount of data transmitted is used, that is, not the identity information request messages received from the mobile communication terminal.
- a follow-up of the data volume entails a lower error rate as a restriction on the number of received identity information request messages.
- the network information just received, or the associated data can be sent back to the server as a confirmation message.
- This data is then part of the Identity Information Response message.
- the method is preferably based on the EAP protocol, in particular according to the IETF RFC 3748. This document is available for example free of charge on the Internet for downloading.
- FIG. 1 shows a schematic representation of a log-on method according to the EAP protocol for a mobile communication terminal in relation to a local network
- FIG. 2 shows a method for registering a mobile communication terminal in a local network with transmission of network information out of the network to the mobile communication terminal.
- FIG. 1 shows a schematic representation of messages which according to the EAP protocol are available as a client at a server S, in particular an authentication server of a local area network (WLAN) with wireless access, in the context of a registration method for a mobile communication terminal K.
- a server S in particular an authentication server of a local area network (WLAN) with wireless access, in the context of a registration method for a mobile communication terminal K.
- WLAN local area network
- the mobile communication terminal K sends out an EAPOL message EM for starting a logon process, which is received by an access point AP of the local network.
- the access point AP then sends an identity request message IR back to the mobile communication terminal K, which in turn sends back an identity-response message IA to the access point AP, which sends the identity-response message IA to the server S.
- an authentication method AV takes place between the mobile communication terminal K and the server S by means of the access point AP, which is subsequently ter is explained in more detail with reference to FIG 2.
- the logon process is concluded by an authentication-successful message AE which arrives from the server S via the access point AP to the mobile communication terminal K.
- the services of the local network can be used by the mobile communication terminal K.
- the authentication method AV is initiated by an identity request message IRS of the server S, which arrives at the mobile communication terminal K from the access point AP.
- the identity request message IRS is embedded in an identity information request message IRML, IRM2, ..., IRMn, which in addition to the identity request message IRS contains a network information element NIL.
- NIL network information element
- Each identity information request message IRM1, IRM2,..., IRMn contains respective network information elements NI1, NI2, NI3,..., Which in turn contain information about a number of future identity information request messages IRM2, IRM2, ..., IRMn or the number of bits / bytes still to be transmitted and the number of identity information request messages IRM1, IRM2,..., IRMn already sent, all of which can be used on pages the mobile communication terminal K is determined whether a previous data transmission from the server S to the mobile communication terminal K has been error-free or preparations for further data transfer met the was ⁇ can.
- the confirmation elements BEI, BE2,..., BEn which contain data obtained with the previously received network information element NI1, NI2, NI3,..., Can be used to verify the correctness of the transmitted data can be further processed on the server side.
- the message IAK required to record the authentication method AV is sent to the server S.
- the user data NI1, NI2,... NIn received from the server S can be used for the evaluation, since it is clear from them when a data transfer from the server S to the communication terminal K has been completed.
- the message IAK does not have to be contained in all the identity information response messages IAM1, IAM2,..., IAMn. general It is safe to say that the authentication method AV is not started before the data transfer of user data NI1, NI2,..., NIn, from the server S to the communication terminal K has been completed.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102004051840A DE102004051840A1 (de) | 2004-10-25 | 2004-10-25 | Verfahren zum Anmelden eines mobilen Kommunikationsendgerätes gegenüber einem lokalen Netzwerk |
PCT/EP2005/054387 WO2006045665A1 (de) | 2004-10-25 | 2005-09-06 | Verfahren zum anmelden eines mobilen kommunikationsendgerätes gegenüber einem lokalen netzwerk |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1829320A1 true EP1829320A1 (de) | 2007-09-05 |
Family
ID=35354995
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP05784531A Withdrawn EP1829320A1 (de) | 2004-10-25 | 2005-09-06 | Verfahren zum anmelden eines mobilen kommunikationsendgerätes gegenüber einem lokalen netzwerk |
Country Status (9)
Country | Link |
---|---|
US (1) | US20070294758A1 (de) |
EP (1) | EP1829320A1 (de) |
KR (1) | KR20070065390A (de) |
CN (1) | CN101048997A (de) |
DE (1) | DE102004051840A1 (de) |
MX (1) | MX2007005008A (de) |
RU (1) | RU2007119383A (de) |
TW (1) | TW200625898A (de) |
WO (1) | WO2006045665A1 (de) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8037522B2 (en) * | 2006-03-30 | 2011-10-11 | Nokia Corporation | Security level establishment under generic bootstrapping architecture |
US9392434B2 (en) | 2007-01-22 | 2016-07-12 | Qualcomm Incorporated | Message ordering for network based mobility management systems |
US8689301B2 (en) * | 2008-09-30 | 2014-04-01 | Avaya Inc. | SIP signaling without constant re-authentication |
US9113500B2 (en) | 2011-07-10 | 2015-08-18 | Qualcomm Incorporated | Device and method for communication of management information in ad-hoc wireless networks |
US8843629B2 (en) * | 2012-05-14 | 2014-09-23 | Nokia Corporation | Method, apparatus, and computer program product for response criteria |
KR101863615B1 (ko) | 2017-05-24 | 2018-06-01 | (주)이스트소프트 | 신경망 학습 기반의 변종 악성 코드를 탐지하기 위한 장치, 이를 위한 방법 및 이 방법을 수행하기 위한 프로그램이 기록된 컴퓨터 판독 가능한 기록매체 |
US11019564B2 (en) * | 2018-11-21 | 2021-05-25 | Cisco Technology, Inc. | Roaming consortium identifier (RCOI)-based system for handling identity requirements |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7523306B2 (en) * | 2003-01-16 | 2009-04-21 | Texas Instruments Incorporated | Simplified CCMP mode for a wireless local area network |
-
2004
- 2004-10-25 DE DE102004051840A patent/DE102004051840A1/de not_active Ceased
-
2005
- 2005-09-06 KR KR1020077008787A patent/KR20070065390A/ko not_active Application Discontinuation
- 2005-09-06 CN CNA2005800365283A patent/CN101048997A/zh active Pending
- 2005-09-06 EP EP05784531A patent/EP1829320A1/de not_active Withdrawn
- 2005-09-06 US US11/666,248 patent/US20070294758A1/en not_active Abandoned
- 2005-09-06 WO PCT/EP2005/054387 patent/WO2006045665A1/de not_active Application Discontinuation
- 2005-09-06 MX MX2007005008A patent/MX2007005008A/es not_active Application Discontinuation
- 2005-09-06 RU RU2007119383/09A patent/RU2007119383A/ru unknown
- 2005-10-21 TW TW094136864A patent/TW200625898A/zh unknown
Non-Patent Citations (1)
Title |
---|
See references of WO2006045665A1 * |
Also Published As
Publication number | Publication date |
---|---|
KR20070065390A (ko) | 2007-06-22 |
CN101048997A (zh) | 2007-10-03 |
WO2006045665A1 (de) | 2006-05-04 |
MX2007005008A (es) | 2007-06-12 |
DE102004051840A1 (de) | 2006-05-04 |
RU2007119383A (ru) | 2008-11-27 |
US20070294758A1 (en) | 2007-12-20 |
TW200625898A (en) | 2006-07-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE19722424C5 (de) | Verfahren zum Sichern eines Zugreifens auf ein fernab gelegenes System | |
DE60114535T2 (de) | Zugriffsauthentifizierungssystem für eine Funkumgebung | |
DE60307482T2 (de) | Authentifizierung zwischen einem zellularen Mobilendgerät und einem kurzreichweitigen Zugangspunkt | |
EP1379935B1 (de) | Verfahren zur authentifizierung eines anwenders bei einem zugang zu einem softwarebasierten system über ein zugangsmedium | |
EP1829320A1 (de) | Verfahren zum anmelden eines mobilen kommunikationsendgerätes gegenüber einem lokalen netzwerk | |
DE60222810T2 (de) | Verfahren, system und einrichtung zur dienstauswahl über ein drahtloses lokales netzwerk | |
DE10392283T5 (de) | System, Verfahren und Vorrichtung für verbündete einzelne Dienstleistungen mit Anmeldeverfahren beziehungsweise Sign-On-Dienstleistungen | |
DE102006024041B4 (de) | Verfahren zum Personalisieren eines Sicherheitsmoduls eines Telekommunikations-Endgerätes | |
WO2009095048A1 (de) | Verfahren zur verwaltung der autorisierung von mobiltelefonen ohne sim-karte | |
DE29624480U1 (de) | System zum Ermöglichen des Bestellens und Bezahlens von Dienstleistungen mittels eines Kommunikationsnetzwerkes | |
EP1689125A1 (de) | Verfahren zum authentisierten Aufbau einer Verbindung | |
EP1565801B1 (de) | Verfahren zur authentisierung und vergebührung eines teilnehmers eines funknetzes | |
DE10158739B4 (de) | WAP-Browserfähiges Kommunikationssytem sowie Client und Server für ein solches Kommunikationssystem | |
DE60130899T2 (de) | Wap-sitzung tunneling | |
DE60219076T2 (de) | Herunterladung eines applets in einem kommunikationssystem | |
EP2575385B1 (de) | Verfahren zur Initialisierung und/oder Aktivierung wenigstens eines Nutzerkontos, zum Durchführen einer Transaktion, sowie Endgerät | |
DE60206592T2 (de) | Offset Sicherheitsverfahren zum Datenaustausch | |
EP1723815B1 (de) | Synchronisation von daten in zwei oder mehr teilnehmerkarten zum betreiben eines mobilen endgeräts | |
EP3785459A1 (de) | Einrichtung einer zugangsberechtigung zu einem teilnetzwerk eines mobilfunknetzes | |
EP3432539B1 (de) | Verfahren zum aufbau eines kommunikationskanals zwischen einer servereinrichtung und einer clienteinrichtung | |
DE60320511T2 (de) | Verfahren, Vorrichtung und System zur Behandlung von einem Authentifizierungsfehler von einem zwischen einem GSM-Netz und einem WLAN-Netz umherstreifenden Teilnehmer | |
DE69937718T2 (de) | Verfahren zum mobilstationseitigen Zugriff auf von einem Server gelieferte Dienste und zugehöriges Teilnehmeridentitätsmodul und Endgerät | |
EP1519603A1 (de) | Verfahren zur Authentisierung eines Teilnehmers für einen über ein Kommunikationssystem angebotenen Dienst | |
DE60202578T2 (de) | Drahtlose Verbindungen kurzer Reichweite in einem Telekommunikationsnetz | |
EP1424825B1 (de) | Verfahren und Vorrichtungen zum Aufbauen eines virtuellen privaten Kommunikationsnetzes zwischen Kommunikationsendgeräten |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20070525 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: NOKIA SIEMENS NETWORKS GMBH & CO. KG |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: GROETING, WOLFGANG Inventor name: BERG, STEFAN Inventor name: KOORA, KALYAN |
|
17Q | First examination report despatched |
Effective date: 20070928 |
|
RAP3 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: NOKIA SIEMENS NETWORKS S.P.A. |
|
RAP3 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: NOKIA SIEMENS NETWORKS GMBH & CO. KG |
|
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20080209 |