Telecommunications network access rejection
First Claim
1. A method of controlling an attach procedure of a device to a telecommunications network following receipt of an attach rejection from the telecommunications network, the method including assessing the authenticity of the attach rejection, and selecting a criterion for performing a subsequent attach attempt by the device to the network in dependence upon the authenticity assessment.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of controlling an attach procedure of a device 1 to a telecommunications network 140 following receipt of an attach rejection from the telecommunications network, the method including assessing the authenticity of the attach rejection, and selecting a criterion for performing a subsequent attach attempt by the device to the network in dependence upon the authenticity assessment. The authenticity may be assessed by determining whether the rejection was received by an authenticated communication link or a signed message. The authenticity may also be assessed by checking that the cause of the reject is consistent with information held by the device. The selected criterion may be power cycling of the device or the passage of a time period.
-
Citations
15 Claims
- 1. A method of controlling an attach procedure of a device to a telecommunications network following receipt of an attach rejection from the telecommunications network, the method including assessing the authenticity of the attach rejection, and selecting a criterion for performing a subsequent attach attempt by the device to the network in dependence upon the authenticity assessment.
- 11. A method of controlling attachment of a telecommunications device to a telecommunications network, the method including establishing a trust relationship between the device and the network prior to accepting or rejecting an attachment request from the device.
-
14. A telecommunications device for controlling an attach procedure of the device to a telecommunications network following receipt of an attach rejection from the telecommunications network, the device including means operable to assess the authenticity of the attach rejection, and means operable to select a criterion for performing a subsequent attach attempt by the device to the network in dependence upon the authenticity assessment.
-
15. A telecommunications system for controlling attachment of a telecommunications device to a telecommunications network, the system including means operable to establish a trust relationship between the device and the network prior to accepting or rejecting an attachment request from the device.
Specification