WO2006024218A1 - Methode pour effectuer une comptabilisation d'autorisations d'un utilisateur de plusieurs adresses dans un reseau ipv6 - Google Patents
Methode pour effectuer une comptabilisation d'autorisations d'un utilisateur de plusieurs adresses dans un reseau ipv6 Download PDFInfo
- Publication number
- WO2006024218A1 WO2006024218A1 PCT/CN2005/001232 CN2005001232W WO2006024218A1 WO 2006024218 A1 WO2006024218 A1 WO 2006024218A1 CN 2005001232 W CN2005001232 W CN 2005001232W WO 2006024218 A1 WO2006024218 A1 WO 2006024218A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- address
- server
- charging
- user
- information
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/14—Charging, metering or billing arrangements for data wireline or wireless communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/14—Charging, metering or billing arrangements for data wireline or wireless communications
- H04L12/1485—Tariff-related aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/35—Network arrangements, protocols or services for addressing or naming involving non-standard use of addresses for implementing network functionalities, e.g. coding subscription information within the address or functional addressing, i.e. assigning an address to a function
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0892—Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/167—Adaptation for transition between two IP versions, e.g. between IPv4 and IPv6
Definitions
- the present invention relates to the field of network communication technologies, and in particular, to a method for implementing authorization and charging for a multi-address user in an IPv6 network. Background of the invention
- authentication, authorization and charging for host users accessing the network are an important part of user management.
- the network operator For different users accessing the network, the network operator first needs to authorize the user, allows the user to access the corresponding service, and then separately performs charging based on different services accessed by different users.
- the billing for the same service that the same user accesses at different times can also be different.
- the network operator is required to be able to obtain various billing data of users accessing the network.
- the IETF In an IPv4 network, the IETF (Internet Engineering Task Force) defines RFC2865, RFC2866 (RFC, Request for Comments) and other related RADIUS (Remote Authentication Dial-In User Service) protocols to ensure unified accounting for users.
- RFC2865 and RFC2866 RFC3162 In IPv6 networks, the IETF defines RFC2865 and RFC2866 RFC3162 to describe the authentication and accounting procedures for IPv6 and IPv4 users.
- one or more unicast addresses can be assigned to the host user (unicast addresses are used for unicast transmission.
- unicast transmission a separate data transmission path is established for the source user to each destination user).
- the actual needs of the network operator may need to be On the RADIUS server, PHCP (Dynamic Host Configuration Protocol) server, or other server, different authorizations are provided for different addresses assigned by the host user, and different charging policies are adopted. For example, when different IP addresses of host users are used to access different services, each service uses different charging rates for the host users.
- PHCP Dynamic Host Configuration Protocol
- the object of the present invention is to provide a method for implementing multi-IP address authorization and accounting for a user in an IPy6 network, so that different authorizations can be performed according to different IP addresses of the host, and different charging policies are adopted. Billing is performed separately.
- the method for implementing authorization and charging for a multi-address user in an IPv6 network includes:
- the network access server and the authorized charging server obtain the authorized charging information of each address in the packet.
- the network access server and the authorized charging server respectively perform corresponding authorized charging operations on each address of the user.
- the authorized accounting server includes: a remote authentication dial-up user service RADIUS server.
- the authorization charging information includes the following attributes: Type Type, length Length, The number of sub-attributes Attr-Count and/or the sub-attribute content String.
- the sub-attribute content String includes the following attributes: type Type, length Length, and/or value Value.
- the value of the value includes one of the following attributes: Host IP address Framed-IP-Address; Host IPv6 address Framed-IPv6-Prefix; Login host IPv6 address Login-IPv6-Host.
- the value Value includes at least one of the following attributes or any combination: Level Class; State State; Session Duration Session-Timeout; Session Ending Action Flag Termination-Action ; Host Gateway Routing Framed-Routingo
- the step of performing the interaction between the authorized charging information of each address of the multi-address user and the packet of the expandable field content between the network access server and the authorized charging server according to the step A includes: The server carries the authorization information in an access confirmation message and sends the information to the network access server of the multi-address user.
- the value Value includes one or any combination of at least the following attributes: a charging session identifier Acct-Session-Id; a meter in units of bytes Charge downstream traffic Acct-Input-Octets; billing upstream traffic Acct-Output-Octets in bytes; billing downstream traffic Acct-Input-Packets in packet packets; packet count The unit's billing upstream traffic Acct-Output-Packets.
- the step of performing the interaction between the authorized charging information of each address of the multi-address user and the extended field content between the network access server and the authorized charging server according to the step A includes:
- the network access server carries the charging information in the charging request message and sends the charging information to the authorized charging server.
- the extensible field includes a self-designated attribute defined by RFC2865 Vendor-Specific field.
- the present invention extends the access confirmation message sent to the network access server in the RADIUS process and the charging request message sent to the R.ADIUS server, thereby targeting different host addresses.
- the authorization and accounting information is sent out, so that the RADIUS server, network access server, and other devices can obtain the authorization and accounting information of the corresponding host IP addresses. Therefore, the present invention implements the functions of separately performing authorization according to different IP addresses of the host in the IPv6 network, and performing charging separately by using different charging policies.
- FIG. 1 is a schematic diagram of a network environment of an application of the present invention
- the core of the method of the present invention is that in the RADIUS process for the host, the RADIUS server separately authorizes different IP addresses of the host, and sends the authorization information to the network access server, such as BFAS;
- the incoming server can send the accounting information of the different IP addresses of the same host to the RADIUS server for accounting, so as to implement the authorization and accounting operations for different IP addresses of a host in the IPv6 network.
- the broadband user ie, the host
- the broadband user is connected to the Internet through a LAN switch and a BRAS (Broadband Remote Access Server) at the edge of the Internet.
- broadband users must first perform corresponding identity authentication before going online. Users authenticate through PPP (Point-to-Point Protocol), 802.1X, WEB (World Wide Web) authentication, etc., enter the user name and Password, sent by BR.AS and sent to The RADIUS server authenticates.
- PPP Point-to-Point Protocol
- 802.1X Wi-Fi Protectet Access
- WEB Worldwide Wide Web
- the basic working principle of the RADIUS includes: after the user accesses the network access server (such as a BRAS device), the network access server submits the user information, including the username, to the RADIUS server using an Access-Require message. , password and other related information; RADIUS server checks the legality of the user name and password; if it is legal, returns an access confirmation (Access-Accept) to the network access server.
- the network access server such as a BRAS device
- the network access server submits the user information, including the username, to the RADIUS server using an Access-Require message. , password and other related information
- RADIUS server checks the legality of the user name and password; if it is legal, returns an access confirmation (Access-Accept) to the network access server.
- 4 ⁇ means to allow access, allowing the user to proceed to the next step, otherwise Returning an Access-Reject message, denying user access; if access is allowed, the network access server continues to send an Account-Request message to the RADIUS server, and the RADIUS server responds with a charge confirmation (Account-Response) ) The message, initiates the charging process for the user.
- the RADIUS server when the host user passes the authentication, the RADIUS server sends the access information of the different IP addresses of the same host to the BRAS through the corresponding access confirmation (Access-Accept) message, as shown in FIG. 2, and specifies the BRAS pair. The user performs the corresponding authorization operation.
- the present invention extends the Access-Accept message based on the RFC2865 protocol. Add the following attributes: Auth- Address- Author attribute information;
- Length The total length of the TLV of the attribute.
- the TLV is: Type Length, Value, and the value is the sum of Attr-Count and String.
- Attr-Count number of sub-attributes: The number of sub-attributes included
- the Auth-Address-Author attribute carried in the Access-Accept 4 may not appear, and may appear one or more times.
- the sub-attribute may use the attributes defined in RFC2865 and RFC3162, and the TLV (Type, Length, Value) of the attribute is unchanged; the Value value of the sub-attribute must have one of the following attributes to represent the specified IP. Address, and can only have one of the attributes:
- Framed-IP- Address host IP address
- Framed-IPv6-Prefix Host IPv6 address prefix
- Login-IPv6-Host Log in to the host IPv6 address.
- the value of the value of the sub-attribute can be extended and authorized according to the requirements, such as ACL (Access Control List) and CAR (Committed Access Rate).
- Application properties include:
- State Session-Timeout: session duration
- Termination-Action session termination action flag
- Framed-Routing Host gateway routing.
- Auth- Address-Author encapsulation sub-attribute is the same as ⁇ Vendor-Specific in RFC 2865.
- the message of the expandable field content between the network access server and the authorized charging server of the present invention may also include a Vendor-Specific field corresponding to the interaction between the network access server and the authorized charging server.
- the message such that the content contained in the sub-attribute of the Auth-Address-Author can be encapsulated in the Vendor-Specific defined by the RFC2865 protocol, and the Access-Accept is no longer needed.
- the Auth-Address-Author attribute is extended in the text, but the Type value of the sub-attribute needs to be changed accordingly to avoid conflicts.
- RADIUS-based processing in the present invention, in order to ensure that the accounting of different IP addresses of the host can be sent to the RADIUS server, and the RADIUS server can identify the accounting information corresponding to different IP addresses, the RADIUS is required.
- the protocol is supplemented accordingly, and the address charging (Acti-Address-Flow) attribute information is added to the packet sent by the network access server to the RADIUS server, and the present invention uses the address charging (Acct-Address). -Flow)
- the attribute information is sent to the RADIUS server in the Accounting-Request packet of the RADIUS process, as shown in Figure 2.
- the specific format of the address charging attribute information is the same as the format of the address authorization attribute information, except that the content information carried by the specific field is different, and the format of the address charging (Acct-Address-Flow) attribute information is shown in Table 3. Shown as follows:
- Type It can be 64. Of course, the value is not necessarily 64. It can be adjusted according to the actual situation, as long as it does not conflict with the existing attribute value.
- Length The total length of the TLV (Type, Length, Value) of the attribute, the value of which is the sum of Attr-Count and String;
- Attr-Count number of sub-attributes: number of sub-attributes
- the Acct-Address-Flow attribute is a new attribute.
- the attribute appears 0+, which means it can be absent and can appear one or more times.
- the attribute has the following sub-attributes (String).
- the overall structure of the sub-attribute is the same as the sub-attribute of the address authorization attribute information, except that the specific content carried by each field is different.
- the overall structure of the sub-attribute is shown in Table 4. :
- the sub-attribute may use an attribute defined in the RFC2866, RFC3162 protocol, and the TLV (Type, Length, Value) of the attribute does not change, and the sub-attribute Value value must have one of the following attributes to indicate the specified IP address:
- Framed-IP- Address frame IP address
- Framed-IPv6-Prefix ⁇ 4 ⁇ IPv6 address
- Login-IPv6-Host Log in to the IPv6 host.
- the value of the sub-attribute value can also be extended and related authorizations are performed as needed, for example, authorization of ACL, CAR, etc., and sub-attribute packages that may be used for related authorization. Includes:
- Acct-Session-Id the charging session identifier
- Acct-Input-Octets billing downstream traffic (bytes);
- Acct-Output-Octets Accounting upstream traffic (number of bytes);
- Acct-Input-Packets Accounting downlink traffic (number of packets);
- Acct-Output-Packets Accounting upstream traffic (number of packets).
- the encapsulation sub-attribute of the Acct-Address-Flow attribute information is the same as the Vendor-Specific in RFC 2865.
- the RADIUS server client (the client, the network access server) charges the accounting information of each host's IP address according to RFC2866. After the packet format is encapsulated with the attribute type defined above, it is directly sent to the RADIUS server to collect accounting information, such as traffic statistics, for different IP addresses of the host user.
- the packet of the expandable field content between the network access server and the authorized charging server may also be a packet including a Vendor-Specific field that is exchanged between the network access server and the authorized charging server, so that the The sub-attributes contained in the attribute information of the Acct-Address-Flow attribute can also be encapsulated in the Vendor-Specific defined in RFC2865, so that it is no longer necessary to add an address meter in the Accounting-Request message.
- the Acct-Address-Flow attribute, but the Type value of the sub-attribute needs to be adjusted accordingly to avoid conflicts.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP05772879A EP1777872B1 (en) | 2004-09-01 | 2005-08-10 | A METHOD REALIZING AUTHORIZATION ACCOUNTING OF MULTIPLE ADDRESSES USER IN THE IPv6 NETWORK |
AT05772879T ATE459148T1 (de) | 2004-09-01 | 2005-08-10 | Verfahren zur autorisierungsverwaltung eines benutzers von mehrfachadressen im ipv6 netzwerk |
DE602005019576T DE602005019576D1 (de) | 2004-09-01 | 2005-08-10 | Verfahren zur autorisierungsverwaltung eines benutzers von mehrfachadressen im ipv6 netzwerk |
US11/677,915 US8813217B2 (en) | 2004-09-01 | 2007-02-22 | Method and system for authorizing and charging host with multiple addresses in IPv6 network |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200410055381.X | 2004-09-01 | ||
CNB200410055381XA CN100344094C (zh) | 2004-09-01 | 2004-09-01 | IPv6网络中对多地址用户进行授权计费的实现方法 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/677,915 Continuation US8813217B2 (en) | 2004-09-01 | 2007-02-22 | Method and system for authorizing and charging host with multiple addresses in IPv6 network |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006024218A1 true WO2006024218A1 (fr) | 2006-03-09 |
Family
ID=35999696
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2005/001232 WO2006024218A1 (fr) | 2004-09-01 | 2005-08-10 | Methode pour effectuer une comptabilisation d'autorisations d'un utilisateur de plusieurs adresses dans un reseau ipv6 |
Country Status (7)
Country | Link |
---|---|
US (1) | US8813217B2 (zh) |
EP (1) | EP1777872B1 (zh) |
CN (1) | CN100344094C (zh) |
AT (1) | ATE459148T1 (zh) |
DE (1) | DE602005019576D1 (zh) |
ES (1) | ES2339575T3 (zh) |
WO (1) | WO2006024218A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111510915A (zh) * | 2020-03-23 | 2020-08-07 | 沈阳通用软件有限公司 | 一种无线准入环境下通用的扩展认证方法 |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010055630A1 (ja) * | 2008-11-11 | 2010-05-20 | パナソニック株式会社 | アドレス登録方法、アドレス登録システム、移動装置及び移動管理装置 |
CN101888389B (zh) * | 2010-07-19 | 2013-04-17 | 中国电信股份有限公司 | 一种实现icp联盟统一认证的方法和系统 |
CN102136938B (zh) * | 2010-12-29 | 2013-03-20 | 华为技术有限公司 | 向cgn设备提供用户信息的方法及装置 |
CN103178973B (zh) * | 2011-12-21 | 2016-04-20 | 中国电信股份有限公司 | 管理ip地址的方法、系统和设备 |
US11743162B1 (en) * | 2012-05-07 | 2023-08-29 | Amdocs Development Limited | System, method, and computer program for offering experience-based subscriptions to services |
CN102843240B (zh) * | 2012-09-13 | 2015-12-09 | 清华大学 | 基于多ip地址检测的网关计费方法 |
CN105376203B (zh) * | 2014-08-26 | 2019-11-05 | 阿里巴巴集团控股有限公司 | 交互信息的处理方法、装置及系统 |
CN113300961B (zh) * | 2021-05-14 | 2022-07-08 | 烽火通信科技股份有限公司 | 一种IPv4接入策略路由下发控制的方法与系统 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001013289A2 (en) * | 1999-08-16 | 2001-02-22 | Trivnet Ltd. | A retail method over a wide area network |
US6427170B1 (en) * | 1998-12-08 | 2002-07-30 | Cisco Technology, Inc. | Integrated IP address management |
WO2004002108A1 (en) * | 2002-06-20 | 2003-12-31 | Nokia Corporation | Method, system and devices for transferring accounting information |
WO2004064442A1 (en) * | 2003-01-10 | 2004-07-29 | Telefonaktiebolaget Lm Ericsson (Publ) | Single sign-on for users of a packet radio network roaming in a multinational operator network |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4009136B2 (ja) * | 2001-06-07 | 2007-11-14 | 富士通株式会社 | 課金システム |
JP2003008622A (ja) * | 2001-06-22 | 2003-01-10 | Fujitsu Ltd | サービス制御ネットワーク、及びそのサービス制御ネットワークにおいて使用されるルータ装置 |
CN1200532C (zh) * | 2001-12-05 | 2005-05-04 | 上海卓扬科技有限公司 | 一种宽带接入网络的用户识别方法 |
CN1231031C (zh) * | 2002-06-28 | 2005-12-07 | 华为技术有限公司 | 一种基于多网络服务提供商的地址分配及服务的方法 |
-
2004
- 2004-09-01 CN CNB200410055381XA patent/CN100344094C/zh not_active Expired - Fee Related
-
2005
- 2005-08-10 AT AT05772879T patent/ATE459148T1/de not_active IP Right Cessation
- 2005-08-10 WO PCT/CN2005/001232 patent/WO2006024218A1/zh active Application Filing
- 2005-08-10 EP EP05772879A patent/EP1777872B1/en not_active Not-in-force
- 2005-08-10 ES ES05772879T patent/ES2339575T3/es active Active
- 2005-08-10 DE DE602005019576T patent/DE602005019576D1/de active Active
-
2007
- 2007-02-22 US US11/677,915 patent/US8813217B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6427170B1 (en) * | 1998-12-08 | 2002-07-30 | Cisco Technology, Inc. | Integrated IP address management |
WO2001013289A2 (en) * | 1999-08-16 | 2001-02-22 | Trivnet Ltd. | A retail method over a wide area network |
WO2004002108A1 (en) * | 2002-06-20 | 2003-12-31 | Nokia Corporation | Method, system and devices for transferring accounting information |
WO2004064442A1 (en) * | 2003-01-10 | 2004-07-29 | Telefonaktiebolaget Lm Ericsson (Publ) | Single sign-on for users of a packet radio network roaming in a multinational operator network |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111510915A (zh) * | 2020-03-23 | 2020-08-07 | 沈阳通用软件有限公司 | 一种无线准入环境下通用的扩展认证方法 |
CN111510915B (zh) * | 2020-03-23 | 2023-12-05 | 三六零数字安全科技集团有限公司 | 一种无线准入环境下通用的扩展认证方法 |
Also Published As
Publication number | Publication date |
---|---|
DE602005019576D1 (de) | 2010-04-08 |
ES2339575T3 (es) | 2010-05-21 |
US20070169180A1 (en) | 2007-07-19 |
CN100344094C (zh) | 2007-10-17 |
CN1744508A (zh) | 2006-03-08 |
EP1777872B1 (en) | 2010-02-24 |
EP1777872A4 (en) | 2007-08-08 |
US8813217B2 (en) | 2014-08-19 |
ATE459148T1 (de) | 2010-03-15 |
EP1777872A1 (en) | 2007-04-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7389534B1 (en) | Method and apparatus for establishing virtual private network tunnels in a wireless network | |
EP1987629B1 (en) | Techniques for authenticating a subscriber for an access network using dhcp | |
WO2006024218A1 (fr) | Methode pour effectuer une comptabilisation d'autorisations d'un utilisateur de plusieurs adresses dans un reseau ipv6 | |
US9112909B2 (en) | User and device authentication in broadband networks | |
US7788705B2 (en) | Fine grained access control for wireless networks | |
US8509440B2 (en) | PANA for roaming Wi-Fi access in fixed network architectures | |
US20020174335A1 (en) | IP-based AAA scheme for wireless LAN virtual operators | |
US8336082B2 (en) | Method for realizing the synchronous authentication among the different authentication control devices | |
JP5982008B2 (ja) | 信頼される非3gppのアクセス・ネットワーク経由で接続されているユーザ機器に対する、3gppのhplmnにおけるサービス配送プラットフォームによって配送されるサービスへのアクセス許可 | |
JP5531355B2 (ja) | ネットワーク課金方法、システム及び装置 | |
WO2006118497A1 (en) | Operator shop selection | |
JP2008512958A (ja) | 無線アクセスゲートウェイのためのダイナミック・ファイアウォール機能 | |
WO2008006317A1 (fr) | Système et procédé pour accès multiservice | |
CN101064605B (zh) | 一种多主机网络的aaa系统及认证方法 | |
WO2012089039A1 (zh) | 向运营商级网络地址转换cgn设备提供用户信息的方法及装置 | |
US20050041808A1 (en) | Method and apparatus for facilitating roaming between wireless domains | |
WO2008138274A1 (fr) | Procédé et dispositif correspondant et système servant à accéder à un service distant | |
WO2014176964A1 (zh) | 一种通信管理方法及通信系统 | |
US20080155678A1 (en) | Computer system for controlling communication to/from terminal | |
WO2009059533A1 (fr) | Procédé, dispositif et système de commande de gestion de stratégie | |
Zhang et al. | Virtual operator based AAA in wireless LAN hot spots with ad-hoc networking support | |
Ventura | Diameter: Next generations AAA protocol | |
Xie et al. | A generic way for wireline and wireless access authentication | |
Zhang et al. | Access and accounting schemes of wireless broadband | |
Rubens et al. | AAA Working Group Pat R. Calhoun Internet-Draft Black Storm Networks Category: Standards Track William Bulley< draft-ietf-aaa-diameter-nasreq-08. txt> Merit Network, Inc. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 11677915 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2005772879 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWP | Wipo information: published in national office |
Ref document number: 2005772879 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 11677915 Country of ref document: US |