Controlling network access
First Claim
1. A method for controlling network access, the method comprising receiving identity information for authentication from a communications device in a network, authenticating an identity module relating to the communications device and associated with a further network, when the identity information indicates the identity module, granting to the communications device access to a set of services of the further network in response to a successful authentication of the identity module, authenticating the communications device, when the identity information indicates the communications device, and granting to the communications device access to a subset of the set of services of the further network in response to a successful authentication of the communications device.
1 Assignment
0 Petitions
Accused Products
Abstract
In a method for controlling network access, identity information for authentication is received from a communications device in a network. When the identity information indicates an identity module, the identity module is authentication. The identity module relates to the communications device, and it is associated with a further network. In response to a successful authentication of the identity module, access is granted to the communications device to a set of services of the further network. When the identity information indicates the communications device, the communications device is authenticated. In response to a successful authentication of the communications device, access is granted to the communications device to a subset of the set of services of the further network.
-
Citations
39 Claims
-
1. A method for controlling network access, the method comprising
receiving identity information for authentication from a communications device in a network, authenticating an identity module relating to the communications device and associated with a further network, when the identity information indicates the identity module, granting to the communications device access to a set of services of the further network in response to a successful authentication of the identity module, authenticating the communications device, when the identity information indicates the communications device, and granting to the communications device access to a subset of the set of services of the further network in response to a successful authentication of the communications device.
-
11. A communications network, configured to
receive identity information for authentication from a communications device, authenticate an identity module relating to the communications device and associated with a further network, when the identity information indicates the identity module, grant to the communications device access to a set of services of the further network in response to a successful authentication of the identity module, authenticate the communications device, when the identity information indicates the communications device, and grant to the communications device access to a subset of the set of services of the further network in response to a successful authentication of the communications device.
-
13. A network element, configured to
receive identity information for authentication from a communications device, authenticate an identity module relating to the communications device and associated with a further network, when the identity information indicates the identity module, and authenticate the communications device, when the identity information indicates the communications device.
-
20. A method of operating a communications device, the method comprising
exchanging authentication protocol messages with a network, authenticating an identity module associated with a further network, when the identity module is operably connected to the communications device, storing identity information of the communications device and authentication information relating to the identity information, and indicating to the network that the communications device is to be authenticated based on the identity information of the communications device, when no identity module is operably connected to the communications device.
-
28. A communications device, configured to
store identity information of the communications device and authentication information relating to the identity information, and indicate to a network that the communications device is to be authenticated based the identity information of the communications device instead of using an identity module associated with a further network, when no identity module is operably connected to the communications device.
-
33. A method for making an emergency call from a communications device, comprising
indicating an identity of the communications device during an authentication procedure towards a network, when no identity module is operably connected to the communications device, sending during the authentication procedure a portion of verification information based on a portion of emergency call authentication information stored in the communications device, and establishing an emergency call via the network.
-
36. A method for authenticating a communications device for an emergency call, comprising
receiving information indicating an identity of the communications device instead of an identity of an identity module during an authentication procedure in a network, authenticating the communications device based on a piece of emergency call authentication information, and establishing an emergency call from the communications device after successful authentication of the communications device.
-
39. A method for providing emergency call authentication information to a communications device, comprising
authenticating an identity module relating to a communications device, and sending to the communications device a portion of emergency call authentication information for later use after successful authentication of the identity module.
Specification