摘要:
An authentication method and apparatus in a communication system are provided. In a method for authenticating a first node at a second authentication server in a communication system comprising the first node registered to a first authentication server and a second node registered to the second authentication server, an authentication request message requesting authentication of the first node is received from the second node, the authentication request message is transmitted to the first authentication server, and upon receipt of an authentication success message indicating successful authentication of the first node from the first authentication server, the authentication success message is transmitted to the second node.
摘要:
A system is capable of authenticating a service per Machine to Machine (M2M) device between an M2M service provider and a mobile communication operator. The system includes an authentication server for generating an M2M device IDentifier (ID), a first authentication key, and an M2M service provider ID per M2M device, The authentication server also generates a second authentication key, a first hash function value, and a first random variable based on the M2M device ID, the first authentication key, and the M2M service provider ID, and transmitting the second authentication key, the first hash function, and the first random variable to an M2M agent to an M2M agent.
摘要:
A method and an apparatus reduce overhead for data integrity checks in a wireless communication system. When receiving a message, a first Integrity Check Value (ICV) is compared with a second ICV to detect an integrity error in the message. When the integrity error exists in the message, a frequency of the integrity error is counted. When the frequency of the integrity error is more than a threshold, a key update procedure is performed. Therefore, the overhead of the information for integrity check may be reduced in the wireless communication system.
摘要:
A method and an apparatus reduce overhead for data integrity checks in a wireless communication system. When receiving a message, a first Integrity Check Value (ICV) is compared with a second ICV to detect an integrity error in the message. When the integrity error exists in the message, a frequency of the integrity error is counted. When the frequency of the integrity error is more than a threshold, a key update procedure is performed. Therefore, the overhead of the information for integrity check may be reduced in the wireless communication system.
摘要:
An apparatus and a method support Machine to Machine (M2M) communication in a communication system. A method for providing an M2M service includes determining at least one of identifier (ID) information of an M2M device, ID information of an M2M Service Provider (MSP), and service type information of the M2M device to provide the M2M service. The method also includes determining a profile of the M2M device using the at least one information determined. The method further includes transmitting the profile of the M2M device to an Authentication, Authorization and Accounting (AAA) server.
摘要:
A method and apparatus for network reentry of a Mobile Station (MS) in a wireless communication system are provided. The method includes receiving allocation of a context search identifier from a network while a network entry procedure is performed, and transmitting a ranging request message including the allocated context search identifier to a Base Station (BS) when a network reentry event occurs.
摘要:
A method and system for authenticating in a communication system are provided. The method includes, in a first authenticator, sending an authenticator relocation request to a second authenticator transmitting a hash value for an authentication parameter of a Mobile Terminal (MT), a random parameter 1, and a random parameter 2 from the second authenticator to the first authenticator; in the first authenticator, transmitting the hash value received from the second authenticator and the random parameter 1 to an Authentication, Authorization, and Accounting (AAA) server; in the AAA server, determining a validity of the hash value received from the first authenticator, and in the AAA server, transmitting the authentication parameter ever used at the time of authenticating the MT, to the first authenticator.
摘要:
A method and an apparatus for providing a Quality of Service (QoS)-based service in a wireless communication system are provided. The method includes providing a Mobile Station (MS) with at least one QoS plan indicating a price policy for a QoS acceleration service having a higher QoS than a default QoS designated for a user of the MS in response to a request from the MS, providing the MS with an authorized token and a QoS quota based on a selected QoS plan in response to a purchase request of the MS, providing the MS with service contents selected by the user through a radio bearer for the QoS acceleration service, notifying the MS, if a usage of the QoS acceleration service reaches a threshold, of an impending expiration of the QoS acceleration service, and notifying the MS of the expiration of the QoS acceleration service.
摘要:
A method and system for authenticating in a wireless communication system. The system includes a Mobile Terminal (MT), an authenticator, and an Authentication, Authorization, Accounting (AAA) server. When the authenticator requests NAI information for authentication, the MT adds an authentication code to the NAI, and sends a response message including the NAI information to the authenticator. The authenticator relays the NAI to which the authentication code is added, to the AAA server. The AAA server extracts the authentication code from the NAI information, verifies the authentication of the MT, generates a new authentication key, and transmits the new authentication key to the authenticator.
摘要:
A system and a method for grant authorization of an application in a wireless communication system. A method for being assigned authorization of an application in a mobile station includes when an application is installed, transmitting permission request information for at least one authorization required by the application, to a server; when receiving a response message from the server, identifying authorization assigned to the application in the response message; and controlling the application using the assigned authorization.