摘要:
A system and method are described whereby interoperability is facilitated in a 3GPP network environment in combination with DIAMETER policy controls. Such interoperability enables updated policy rules to be fully communicated in on-line charging situations where quota expirations occur. This invention maintains centralized policy control in a 3GPP network with on-line charging.
摘要:
A system and method are described whereby interoperability is facilitated in a 3GPP network environment in combination with DIAMETER policy controls. Such interoperability enables updated policy rules to be fully communicated in on-line charging situations where quota expirations occur. This invention maintains centralized policy control in a 3GPP network with on-line charging.
摘要:
A system and method are described whereby interoperability is facilitated in a 3GPP network environment in combination with DIAMETER policy controls. Such interoperability enables updated policy rules to be fully communicated in on-line charging situations where quota expirations occur. This invention maintains centralized policy control in a 3GPP network with on-line charging.
摘要:
A flexible rule engine allows a network operator to dynamically create and modify business rules that govern a subscriber's access to a communications network. The flexible rule engine governs subscriber transitions between various session states by testing for subscriber conditions, network conditions, and then performing specified actions based on these conditions. A rule editor provides the network operator with the ability to compose, edit and delete one or more rules in real time, using an appropriate user interface.
摘要:
A flexible rule engine allows a network operator to dynamically create and modify business rules that govern a subscriber's access to a communications network. The flexible rule engine governs subscriber transitions between various session states by testing for subscriber conditions, network conditions, and then performing specified actions based on these conditions. A rule editor provides the network operator with the ability to compose, edit and delete one or more rules in real time, using an appropriate user interface.
摘要:
Wireless data services such as wireless email are becoming common, and in particular, “always-on” systems, where new email is automatically forwarded by the service provider to the wireless device. The problem is that there is no effective mechanism for implementing “always-on” systems when the user is moving around a network, or from one network to another. The invention addresses this problem by generating a session key at the service provider's system for a given data session, and returning this session key to the mobile device. Each time the mobile device communicates with the service provider, it enters this session key into a field that will simply pass through the communication network to the service provider. This allows the service provider to manage the data session, preparing proper accounting records and directing the deletion of stale data sessions on network resources.
摘要:
Wireless data services such as wireless email are becoming common, and in particular, “always-on” systems, where new email is automatically forwarded by the service provider to the wireless device. The problem is that there is no effective mechanism for implementing “always-on” systems when the user is moving around a network, or from one network to another. The invention addresses this problem by generating a session key at the service provider's system for a given data session, and returning this session key to the mobile device. Each time the mobile device communicates with the service provider, it enters this session key into a field that will simply pass through the communication network to the service provider. This allows the service provider to manage the data session, preparing proper accounting records and directing the deletion of stale data sessions on network resources.
摘要:
Wireless data services such as wireless email are becoming common, and in particular, “always-on” systems, where new email is automatically forwarded by the service provider to the wireless device. The problem is that there is no effective mechanism for implementing “always-on” systems when the user is moving around a network, or from one network to another. The invention addresses this problem by generating a session key at the service provider's system for a given data session, and returning this session key to the mobile device. Each time the mobile device communicates with the service provider, it enters this session key into a field that will simply pass through the communication network to the service provider. This allows the service provider to manage the data session, preparing proper accounting records and directing the deletion of stale data sessions on network resources.
摘要:
Wireless data services such as wireless email are becoming common, and in particular, “always-on” systems, where new email is automatically forwarded by the service provider to the wireless device. The problem is that there is no effective mechanism for implementing “always-on” systems when the user is moving around a network, or from one network to another. The invention addresses this problem by generating a session key at the service provider's system for a given data session, and returning this session key to the mobile device. Each time the mobile device communicates with the service provider, it enters this session key into a field that will simply pass through the communication network to the service provider. This allows the service provider to manage the data session, preparing proper accounting records and directing the deletion of stale data sessions on network resources.
摘要:
A RADIUS server is provided with the capability of authenticating a wireless access point whose IP network address has been dynamically allocated. One the wireless access point has received its IP network address on booting a request for authentication is sent to the RADIUS server from a wireless access point. The RADIUS server determines a MAC address, a IP network address, and an authenticator from the request. The MAC address is used to determine a shared secret which is used to verify the message attribute authenticator for the request, which is used for verifying both addresses. The method and apparatus can be applied to other AAA server protocols, for example Diameter protocol.