Method of authenticating mobile terminal
First Claim
1. A method for authenticating a mobile terminal in a first wireless network, comprising the steps of:
- transmitting a request for authenticating said mobile terminal in said first wireless network, wherein said first wireless network is operative to provide services at a location where said mobile terminal is currently present;
receiving said request at one base station out of a plurality of base stations associated with said first wireless network; and
selecting an authentication access entity from among a plurality of authentication access entities associated with said first wireless network to be operative as a single authentication access entity for said mobile terminal, as long as said mobile terminal remains within said first wireless network, and wherein said selected authentication access entity is operative to be in communication with a plurality of traffic conveying entities;
exchanging communications between said selected authentication access entity and an authentication server to allow authenticating said mobile terminal;
allowing transmission and reception of communications by said mobile terminal via at least one of said plurality of traffic conveying entities and via at least one of said plurality of base station, wherein when traffic is conveyed to/from said mobile terminal operating within said first wireless network, via any other of said plurality of traffic conveying entities, the authentication of said mobile terminal is carried out by said selected single authentication access entity.
5 Assignments
0 Petitions
Accused Products
Abstract
A method for authenticating a mobile terminal in a wireless network is disclosed. The method includes transmitting a request for authenticating the mobile terminal in that wireless network operative to provide services at a location where the mobile terminal is currently present, receiving the request at a base station associated with that wireless network, and determining an entity associated with the wireless network to be operative as a single authentication access entity for that mobile terminal, as long as the mobile terminal location remains within that wireless network and traffic is directed through any location associated with that wireless network.
-
Citations
8 Claims
-
1. A method for authenticating a mobile terminal in a first wireless network, comprising the steps of:
-
transmitting a request for authenticating said mobile terminal in said first wireless network, wherein said first wireless network is operative to provide services at a location where said mobile terminal is currently present;
receiving said request at one base station out of a plurality of base stations associated with said first wireless network; and
selecting an authentication access entity from among a plurality of authentication access entities associated with said first wireless network to be operative as a single authentication access entity for said mobile terminal, as long as said mobile terminal remains within said first wireless network, and wherein said selected authentication access entity is operative to be in communication with a plurality of traffic conveying entities;
exchanging communications between said selected authentication access entity and an authentication server to allow authenticating said mobile terminal;
allowing transmission and reception of communications by said mobile terminal via at least one of said plurality of traffic conveying entities and via at least one of said plurality of base station, wherein when traffic is conveyed to/from said mobile terminal operating within said first wireless network, via any other of said plurality of traffic conveying entities, the authentication of said mobile terminal is carried out by said selected single authentication access entity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification