1. Field of the Invention
The present invention relates to network access authentication and authorization for gaining access to network and service resources in a communication network. In particular, the present invention relates to a mechanism usable for a network access authentication and authorization in a wireless network environment, such as WiMAX, by using a combination of two authentication methods based, for example, on the Extensible Authentication Protocol (EAP) and http authentication.
2. Related Prior Art
In the last years, an increasing extension of communication networks, e.g. of wire based communication networks, such as the Integrated Services Digital Network (ISDN), or wireless communication networks, such as the cdma2000 (code division multiple access) system, cellular 3rd generation (3G) communication networks like the Universal Mobile Telecommunications System (UMTS), cellular 2nd generation (2G) communication networks like the Global System for Mobile communications (GSM), the General Packet Radio System (GPRS), the Enhanced Data Rates for Global Evolutions (EDGE), or other wireless communication system, such as the Wireless Local Area Network (WLAN) or Worldwide Interoperability for Microwave Access (WiMAX), took place all over the world. Various organizations, such as the 3rd Generation Partnership Project (3GPP), Telecoms & Internet converged Services & Protocols for Advanced Networks (TISPAN), the International Telecommunication Union (ITU), 3rd Generation Partnership Project 2 (3GPP2), Internet Engineering Task Force (IETF), the IEEE (Institute of Electrical and Electronics Engineers), the WiMAX Forum and the like are working on standards for telecommunication network and access environments.
In order to gain access to a communication network and corresponding service resources, it is necessary that a subscriber performs an authentication and authorization procedure, which forms part of Authentication-Authorization-Accounting (AAA) framework.
Authentication refers to the confirmation that the subscriber who is requesting services is a valid user of the network services requested. For this purpose, an identity and credentials are used. Authorization describes the grant of services to the requesting subscriber on the basis of the service request and the authentication result. Accounting, on the other hand, is related to the tracking of the consumption of resources and is used for management, billing and the like.
There have been proposed a plurality of authentication mechanisms usable in the AAA procedure. One example is the so-called Extensible Authentication Protocol (EAP). EAP is a universal authentication framework defined by the IETF and provides several functions and a negotiation of the desired authentication mechanism. Such mechanisms are called EAP methods, for example EAP-TLS (EAP-Transport Layer Security), EAP-TTLS (EAP-Tunneled Transport Layer Security), EAP-AKA (EAP Authentication and Key Agreement), EAP-IKEv2 (EAP Internet Key Exchange Protocol version 2), a number of vendor specific methods and the like.
The WiMAX Forum Network Working Group (NWG) standard includes, for example, the following three basic authentication frameworks: device authentication with EAP-TLS, user authentication with EAP-TTLS (or EAP-AKA), and device and user authentication with EAP-TTLS. All of these authentication schemes require provisioned credentials in the mobile station (MS), or user interaction in case of user-authentication. For example, for the device authentication, X.509 device certificates may be required which may be installed by the device manufacturer (X.509 is a ITU-T standard for a public key infrastructure and used for digital certificates). Furthermore, for user authentication, user credentials depending on the EAP method are required, for example in case of EAP-TTLS\MS-CHAP-v2 (Microsoft® challenge-handshake authentication protocol), a username and a password are required. These can be provisioned in the subscriber's end user device, or supplied by the end-user in an interactive manner.
The EAP-TTLS\MS-CHAP-v2 method is one example of a frequently deployed user authentication scheme, for example in WiMAX network architectures. There are also other authentication schemes, such as EAP-AKA, which rely on different mechanisms, like a USIM (Universal Subscriber Identity Module) in the terminal, which are also supported by the WiMAX standards. It is to be noted that a fixed WiMAX network based on IEEE 802.16d, for example, may rely on certificate based device authentication via PKMv1 (PKM: Private Key Management). Mobile WiMAX networks, on the other hand, rely on EAP authentication via PKMv2 over radio link.
Presently, the WiMAX NWG standards support different frameworks for device provisioning, which are based, for example on Open Mobile Alliance Device Management (OMA-DM, which is a device management protocol specified by the Open Mobile Alliance) and TR-069 (which defines an application layer protocol for remote management of end-user devices). Amongst other things, these frameworks enable provisioning of the subscriber credentials during the first network entry.
However, these frameworks require further equipment in the network and increase thus the costs and complexity which may not always be feasible (technically and/or economically). Furthermore, compatibility of user terminals and corresponding support is necessary. Thus, deployment of such device provisioning functionality using e.g. OMA DM or TR-069 is often not effected by operators.
However, as an alternative usable for such operators not deploying OMA-DM or TR-069 solutions for provisioning user credentials in the MS, configuration of user credentials has to be done by the subscriber himself/herself, which depends on the subscriber's ability to configure his/her credentials manually. In some types of terminals (like mobile phones, integrated PC modules and the like) such configuration is rather straightforward due to the availability of configuration clients that can directly provision the EAP client running on the same host. In other device form factors, however, particularly in the case of CPE (Customer Premises Equipment) the same configuration is not as straightforward as the EAP client is running on a separate host (on board of the CPE) compared to the end-user terminal equipment (e.g. PC or laptop). CPE configuration involves steps that may not be within the capability of all potential customers. This may lead to a loss of potential customers for operators and/or more customer support overhead.
One solution of this problem may be to integrate browser-based authentication within WiMAX ASN (Access Service Network) and to bypass EAP authentication. However, this approach suffers from following drawbacks. First, there can not be provided any standardized solution for cryptographically protecting the Mobile WiMAX radio link, which includes message authentication for MAC management messages, and user plane protection. Therefore, network security is not ensured. Second, a web portal for browser authentication is open to any device/subscriber without prior authentication. Any other security holes in the system are also exposed to any device/subscriber without any prior authentication, thus there is no traceability/audit capability.
Thus, it is an object of the invention to provide an improved mechanism for performing authentication/authorization of a user equipment (a subscriber) in a communication network for gaining access to network and service resources, wherein no complex and cost intensive infrastructure and support are necessary while the network security is maintained.
These objects are achieved by the measures defined in the attached claims.
In particular, according to one example of the proposed solution, there is provided, for example, a method comprising executing an authentication session in an authentication, authorization and accounting procedure for a user equipment for providing an initial network access, obtaining a first identification element related to the user equipment, performing a user credential validation procedure, obtaining, in the user credential validation procedure, a second identification element related to the user equipment or related to a user of the user equipment, processing the first and second identification elements for determining whether a match between the first and second identification elements exists, identifying the authentication session executed for the user equipment on the basis of the result of the processing of the first and second identification elements, and initializing a change of an authorization of the user equipment for providing a modified network access.
Furthermore, according to one example of the proposed solution, there is provided, for example, an apparatus comprising an authentication processor configured to execute an authentication session in an authentication, authorization and accounting procedure for a user equipment for providing an initial network access, a first processor portion configured to obtain a first identification element related to the user equipment, an validation processor configured to perform a user credential validation procedure, a second processor portion configured to obtain, in the user credential validation procedure, a second identification element related to the user equipment or related to a user of the user equipment, an information processor configured to process the first and second identification elements for determining whether a match between the first and second identification elements exists, a third processor portion configured to identify the authentication session executed for the user equipment on the basis of the result of the information processor processing of the first and second identification elements, and an initiator configured to initialize a change of an authorization of the user equipment for providing a modified network access.
According to further refinements, the above examples comprise one or more of the following:
Furthermore, according to one example of the proposed solution, there is provided, for example, a method comprising executing an authentication session in an authentication, authorization and accounting procedure for a user equipment for providing an initial network access, re-directing a request message from the user equipment to a predetermined address of an captive portal, and inserting a unique address, in particular a media access control address, of the user equipment into the redirected request message, said inserted unique address being provided as an identification element of the user equipment.
Furthermore, according to one example of the proposed solution, there is provided, for example, an apparatus comprising an authentication processor configured to execute an authentication session in an authentication, authorization and accounting procedure for a user equipment for providing an initial network access, a forwarder configured to re-direct a request message from the user equipment to a predetermined address of an captive portal, and an inserter configured to insert a unique address, in particular a media access control address, of the user equipment into the redirected request message, said inserted unique address being provided as an identification element of the user equipment.
The above measures may be implemented as a method or apparatus in one of an access service network element comprising an authentication, authorization and accounting client and a mobile Internet Protocol home agent in a WiMAX based communication network.
By virtue of the proposed solutions, it is possible to provide an easy and secure authentication/authorization procedure without involving high costs or support work. In particular, the proposed solution avoids the need for manual configuration outside the end-user's terminal equipment, while at the same time a deployment of costly centralized device provisioning systems is not necessary. Hence, the proposed solution does not rely, for example, on remote device provisioning or manual provisioning of the subscriber credentials of a subscriber's CPE. Instead, subscriber credentials may be supplied in an easy way, e.g. by input of information in a web browser template, which is a procedure being familiar to a huge amount of users. Thus, it is possible to obtain the following benefits: from an end-user perspective a user friendly access is provided which increases the acceptability, while from the operator perspective the user-friendly access can be provided without the need for complex and expensive solutions.
Moreover, it is possible to provide a cryptographic protection of the radio link by means of the keying material obtained in the processing, such as in the initial network access procedure. For this cryptographic protection, standardized procedures as defined, for example, in WiMAX may be used so that no customization of the end-user device is necessary for this to be possible.
In addition, network security can be ensured since by using the proposed solution an access to the network resources, such as a web-portal used for inputting identification of the user, is limited to devices that have passed a (first) authentication phase. Thus, any attempted abuse of the system (e.g. denial of service attacks or the like) is limited and traceable.
The above and still further objects, features and advantages of the invention will become more apparent upon referring to the description and the accompanying drawings.
In the following, examples and embodiments of the present invention are described with reference to the drawings. For illustrating the present invention, the examples are based on a WiMAX system according to IEEE standards. However, it is to be noted that examples of embodiments of the invention are not limited to an application in such a system or environment but are also applicable in other network systems, connection types and the like, for example in networks according to 3GPP specifications, in Wireless Local Area Networks (WLAN) or the like.
A basic system architecture of a communication network may comprise a commonly known architecture of a wired or wireless access network subsystem. Such an architecture comprises one or more access network control units, radio access network elements or base transceiver stations, with which a user equipment or terminal device as a subscriber's communication unit is capable of communicating via one or more channels for transmitting several types of data. The general functions and interconnections of these elements are known to those skilled in the art and described in corresponding specifications so that a detailed description thereof is omitted herein. However, it is to be noted that there are provided several additional (not shown) network elements and signaling links used for a communication connection or a call between end terminals and/or servers.
Furthermore, the network elements and their functions described herein may be implemented by software, e.g. by a computer program product for a computer, or by hardware. In any case, for executing their respective functions, correspondingly used devices, such as a server or network element, like an Authentication-Authorization-Accounting (AAA) server or an Access Service Network (ASN) element (like a ASN Gateway (GW)), comprises several means and components (not shown) which are required for control, processing and communication/signaling functionality. Such means may comprise, for example, a processor unit for executing instructions, programs and for processing data, memory means for storing instructions, programs and data, for serving as a work area of the processor and the like (e.g. ROM, RAM, EEPROM, and the like), input means for inputting data and instructions by software (e.g. floppy diskette, CD-ROM, EEPROM, a network access and the like), user interface means for providing monitor and manipulation possibilities to a user (e.g. a screen, a keyboard and the like), interface means for establishing links and/or connections under the control of the processor unit (e.g. wired and wireless interface means, an antenna, etc.) and the like.
In the network system according to
Reference sign 10 designates a user equipment or subscriber station/mobile station (SS/MS) of a user. Reference 20 denotes an ASN GW (Access Service Network Gateway). The ASN GW 20 may be part of an access service network providing radio access to a WiMAX subscriber. In particular, via the ASN (Access Service Network), connections to servers and other networks/the Internet may be established, and AAA signaling to and from the user equipment 10 is exchanged. The connection between the user equipment 10 and the ASN GW is provided, for example, by an interface (I/F) for access to the network via a base station (BS) communicating with the user equipment.
Reference sign 30 denotes an AAA server executing authentication, authorization and accounting procedures for the user equipment 10 (the subscriber). For authentication procedures, the AAA server may use EAP based mechanisms for which an I/F to/from the ASN GW 20 is provided for processing a network access attempt of the user equipment 10.
Reference sign 40 denotes a device or server providing a captive (web) portal. The captive portal 40 may be used in connection with a restricted network access in examples of embodiments of the invention. According to WiMAX NWG standards, a capability referred to as “hotlining” is supported whereby an access of subscriber seeking access to the network can be restricted and/or redirected to a specific address, i.e. in the depicted network structure according to
It is to be noted that the ASN GW 20 is connectable to other networks or the Internet by a “normal” user plane path, i.e. which is not hotlined (restricted to a specific destination).
In the following, with reference to
In
In the first example according to
According to
In step S2, assuming that the device certificate is valid, the AAA server successfully authenticates the user equipment MS and sends an Access-Accept message to the WiMAX access service network. In this message of step S2, keying material and an indication of restricted access to a web portal (the captive portal 40) is included, i.e. the access is indicated to be restricted to a “hotlining” access following predetermined hotline rules. The address of the captive (web) portal to be used for the restricted “hotline” access may be either indicated directly in the Accept-Access message in step S2, or an indicator may be provided which is related to a pre-stored list of address candidates for a captive portal. Furthermore, the AAA server stores an address or identifier of an AAA client, which may be part of the ASN, wherein a binding between the MAC address (the unique address) of the user equipment and the AAA client identifier may be performed.
In step S3, the radio link between the user equipment MS and the ASN is cryptographically protected, e.g. on the basis of the keying material indicated by the AAA server. As the ASN has learned by the message of the AAA server that the subscriber (the user equipment MS) is to be handled in the “hotlined” state (i.e. with restricted access to the web portal or captive portal 40, for example), the ASN prepares in step S4 to redirect specific traffic, such as IP based requests (http traffic), to this destination. Other traffic may be dropped. It is to be noted that there may be also other variations for traffic handling, depending of preset access rules. Furthermore, it is to be noted that steps S3 and S4 may be executed also in the reverse order (i.e. first step S4 and then step S3 are executed)
In step S5a, the user launches a web browser. Therefore, a corresponding request (http request) is sent through the ASN in step S5a. Due to the measures in step 4, a http request (step S5a) is redirected in step S5b to the captive portal. This can be done either automatically by instructing the http client or instructing the user in manual redirection technique.
Then, in step S6, a user credential submission procedure is executed between the user equipment MS and the captive portal. For example, the captive portal provides a login page prompting for an input of the subscriber credentials which have been received via the out-of-band mechanism indicated above. The subscriber inputs the credentials (user identification) to the captive portal by writing them, for example, in respective fields of the login page, and transmits the information to the captive portal.
When the information (user identification or credentials) are received by the captive portal, the identification is validated in step S7 by communicating the credentials to the AAA server, e.g. via a RADIUS based AAA interface. The AAA server used for validating the user identification is the same AAA server as that executing the initial network access in steps S1 and S2.
If the validation of the user credentials in step S7 is successful, i.e. when the web authentication of the user is successful, the AAA server processes in step S8 the identification information (i.e. the device identification received in step S1 and the user identification received in step S7). According to the present example, since the AAA server has also stored therein the subscriber profile indicated above, the user identification, such as a username or the like input in the user credential submission procedure of step S6 and obtained by the captive portal in step S7, is mapped to the unique device identification, such as the end-user's device MAC address, listed in the subscriber profile. By means of this <user name>-to-<MAC address> mapping, the AAA server is able to identify the EAP session over which the corresponding MAC address has been authenticated (step S1) since the corresponding MAC address has also been stored (as a first identification element).
Then, in step S9, the AAA server identifies the AAA client corresponding to the EAP session identified in step S8. This is done by using the identifier or address of the AAA client which is maintained in connection with step S2, i.e. with the help of the state maintained in step S2. In other words, the AAA client can be identified by a binding of the unique (MAC) address and the client identifier in step S2.
Depending on the result of the web authentication in step S7, the AAA server is triggered to change the state of the authorization provided to the subscriber by the initial network access mode, i.e. the restricted access.
For example, in case the web authentication in step S7 is successful, the AAA server sends a Change of Authorization message to the AAA client (in the ASN) identified in step S9. This Change of Authorization message may comprise also elements related to the subscriber profile stored in the AAA server, such as specific service authorization information, granted bandwidth and the like. Otherwise, in case the web authentication was not successful (e.g. the password is wrong), the network access may be denied, which involves a corresponding Change of Authorization message (e.g. for rejecting the connection).
Assuming that the web authentication was successful in step S7, the Change of Authorization message in step S10 may lift the initial (i.e. anonymous) access restriction rules (hotlined state) and indicates the subscriber specific access profile.
Thus, in step S11, the ASN cancels the restrictions provided in step S2 (the hotlining state) so that the user equipment MS is able to access to services as prescribed in the subscriber profile, for example, access to all IP services (as defined in his/her profile) is granted.
In
In the second example according to
However, different to the first example, in the second example according to
According to
In step S22, assuming that the device certificate is valid, the AAA server successfully authenticates the user equipment MS and sends an Access-Accept message to the WiMAX access service network. In this message of step S22, keying material and an indication of restricted access to a web portal (the captive portal 40) is included, i.e. the access is indicated to be restricted to a “hotlining” access following predetermined hotline rules. The address of the captive (web) portal to be used for the restricted “hotline” access may be either indicated directly in the Accept-Access message in step S22, or an indicator may be provided which is related to a pre-stored list of address candidates for a captive portal. In addition, the AAA server allocates a settable address, such as an IP address (IP@), to the user equipment MS which is to be used for further communication. Furthermore, the AAA server stores an address or identifier of an AAA client, which may be part of the ASN, wherein a binding between the allocated IP address of the user equipment and the AAA client identifier may be performed.
In step S23, the radio link between the user equipment MS and the ASN is cryptographically protected, e.g. on the basis of the keying material indicated by the AAA server.
As the ASN has learned by the message of the AAA server that the subscriber (the user equipment MS) is to be handled in the “hotlined” state (i.e. with restricted access to the web portal or captive portal 40, for example), the ASN prepares in step S24 to redirect specific traffic, such as IP based requests (http traffic), to this destination. Other traffic may be dropped. It is to be noted that there may be also other variations for traffic handling, depending of preset access rules. Furthermore, it is to be noted that steps S23 and S24 may be executed also in the reverse order (i.e. first step S24 and then step S23 are executed)
In step S25, the user equipment MS configures its IP address with the ASN wherein the IP address is that received in step S22 from the AAA server.
In step S27a, the user launches a web browser. Therefore, a corresponding request (http request) is sent through the ASN in step S27a. Due to the measures in step 24, a http request (step S27a) is redirected in step S27b to the captive portal. This can be done either automatically by instructing the http client or instructing the user in manual redirection technique.
Then, in step S28, a user credential submission procedure is executed between the user equipment MS and the captive portal. For example, the captive portal provides a login page prompting for an input of the subscriber credentials which have been received via the out-of-band mechanism indicated above. The subscriber inputs the credentials (user identification) to the captive portal by writing them, for example, in respective fields of the login page, and transmits the information to the captive portal. Furthermore, a settable address such as the IP address of the user equipment MS used in the IP based session between the user equipment MS and the captive portal for the user credential submission is stored by the captive portal in connection with the credential information provided by the MS. It is to be noted that the IP address of the MS is that of step S25.
When the information (user identification or credentials) are received by the captive portal, the identification is validated in step S29 by communicating the credentials to the AAA server, e.g. via a RADIUS based AAA interface. In this connection, also the stored IP address information retrieved in step S28 are transmitted to the AAA server. The AAA server used for validating the user identification is the same AAA server as that executing the initial network access in steps S21 and S22.
If the validation of the user credentials in step S29 is successful, i.e. when the web authentication of the user is successful, the AAA server processes in step S30 the identification information (i.e. the identification element in the form of the IP address allocated in step S22 and the user identification in the form of the IP address received in step S29). According to the present example, it is determined whether there is a match between the IP address of step S22 and that of step S29. By means of this settable address matching process, the AAA server is able to identify the EAP session over which the corresponding MS IP is allocated in the initial authentication session (step S22) since the corresponding MS IP address has also been stored (as a first identification element).
Then, in step S31, the AAA server identifies the AAA client corresponding to the EAP session identified in step S30. This is done by using the identifier or address of the AAA client which is maintained in connection with step S22, i.e. with the help of the state maintained in step S22. In other words, the AAA client can be identified by a binding of the allocated settable (IP) address and the client identifier in step S22.
Depending on the result of the web authentication in step S29, the AAA server is triggered to change the state of the authorization provided to the subscriber by the initial network access mode, i.e. the restricted access.
For example, in case the web authentication in step S29 is successful, the AAA server sends in step S32 a Change of Authorization message to the AAA client (in the ASN) identified in step S31. This Change of Authorization message may comprise also elements related to the subscriber profile stored in the AAA server, such as specific service authorization information, granted bandwidth and the like. Otherwise, in case the web authentication was not successful (e.g. the password is wrong), the network access may be denied, which involves a corresponding Change of Authorization message (e.g. for rejecting the connection).
Assuming that the web authentication was successful in step S29, the Change of Authorization message in step S32 may lift the initial (i.e. anonymous) access restriction rules (hotlined state) and indicates the subscriber specific access profile.
Thus, in step S33, the ASN cancels the restrictions provided in step S22 (the hotlining state) so that the user equipment MS is able to access services as prescribed in the subscriber profile, for example, access to all IP services (as defined in his/her profile) is granted.
In
The third example according to
Like in the second example, in the third example of
According to
Step S23 and S24 of the third example are equivalent to that of
In step S26, the ASN uses a signaling to the AAA server for informing it about the settable address, i.e. the IP address of the MS, allocated in step S25x. For this purpose, for example, an Accounting Start message may be sent to the AAA server in which a mapping between the settable address (the allocated MS IP address) and the unique address of the user equipment (permanent identifier of the user equipment like the MS MAC address) is indicated. It is to be noted that the Accounting Start procedure is usually used for accounting purposes, but it may be used here for signaling the <IP address> to <MAC address> mapping. Thus, the AAA server has a link between the MAC address and the IP address used by the user equipment.
Step S27a, S27b, S28 and S29 are again equivalent to
If the validation of the user credentials in step S29 is successful, i.e. when the web authentication of the user is successful, the AAA server processes in step S30x the identification information (i.e. the identification element in the form of the IP address received in step S26 and the user identification in the form of the IP address received in step S29). According to the present example, it is determined whether there is a match between the IP address of step S26 and that of step S29. Then, by the mapping of the MS IP address to the MS MAC address in step S26, the MAC address information of the user equipment can be obtained. By means of the address matching process, the AAA server is able to identify the EAP session over which the corresponding MAC address has been authenticated (step S21) since the corresponding MAC address has also been stored (as a first identification element).
Then, in step S31, the AAA server identifies the AAA client corresponding to the EAP session identified in step S30x. This is done by using the identifier or address of the AAA client which is maintained in connection with step S22x, i.e. with the help of the state maintained in step S22x. In other words, the AAA client can be identified by a binding of the unique address and the client identifier in step S22x.
Depending on the result of the web authentication in step S29, the AAA server is triggered to change the state of the authorization provided to the subscriber by the initial network access mode, i.e. the restricted access. The following steps S32 and S33 are equivalent to that of
In
In the fourth example according to
However, different to the first example, in the fourth example according to
According to
In step S42, assuming that the device certificate is valid, the AAA server successfully authenticates the user equipment MS and sends an Access-Accept message to the WiMAX access service network. In this message of step S42, keying material and an indication of restricted access to a web portal (the captive portal 40) is included, i.e. the access is indicated to be restricted to a “hotlining” access following predetermined hotline rules. The address of the captive (web) portal to be used for the restricted “hotline” access may be either indicated directly in the Accept-Access message in step S42, or an indicator may be provided which is related to a pre-stored list of address candidates for a captive portal. Furthermore, the AAA server stores an address or identifier of an AAA client, which may be part of the ASN, wherein a binding between the received unique address (MAC address) of the user equipment and the AAA client identifier may be performed.
In step S43, the radio link between the user equipment MS and the ASN is cryptographically protected, e.g. on the basis of the keying material indicated by the AAA server.
As the ASN has learned by the message of the AAA server that the subscriber (the user equipment MS) is to be handled in the “hotlined” state (i.e. with restricted access to the web portal or captive portal 40, for example), the ASN prepares in step S44 to redirect specific traffic, such as IP based requests (http traffic), to this destination. Other traffic may be dropped. It is to be noted that there may be also other variations for traffic handling, depending of preset access rules. Furthermore, it is to be noted that steps S43 and S44 may be executed also in the reverse order (i.e. first step S44 and then step S43 are executed)
In step S45, the user equipment MS configures its IP address with the ASN wherein the IP address may be allocated, for example, by the ASN.
In step S46a, the user launches a web browser. Therefore, a corresponding request (http request) is sent through the ASN in step S46a.
After receiving the request in step S46a, the ASN (like the ASN GW 20) processes the request in S46b and recognizes by the settings of step S44 the hotline state for this message. Therefore, it includes in S46b an identification element into the message, for example in the form of a unique address (MAC address) of the user equipment MS. Thus, the http request (step S46a) is redirected in step S46c together with an indication of the MS MAC address to the captive portal. This can be done either automatically by instructing the http client or instructing the user in manual redirection technique.
Then, in step S47, a user credential submission procedure is executed between the user equipment MS and the captive portal. For example, the captive portal provides a login page prompting for an input of the subscriber credentials which have been received via the out-of-band mechanism indicated above. The subscriber inputs the credentials (user identification) to the captive portal by writing them, for example, in respective fields of the login page, and transmits the information to the captive portal. The credential information provided by the MS are stored by the captive portal, wherein it is to be noted that also the MS MAC address received in the initial message for the validation procedure (i.e. the message in S46c) is stored.
When the information (user identification or credentials) are received by the captive portal, the identification is validated in step S48 by communicating the credentials to the AAA server, e.g. via a RADIUS based AAA interface. In this connection, also the stored unique address information (MAC address) retrieved in step S46c are transmitted to the AAA server. The AAA server used for validating the user identification is the same AAA server as that executing the initial network access in steps S41 and S42.
If the validation of the user credentials in step S48 is successful, i.e. when the web authentication of the user is successful, the AAA server processes in step S49 the identification information (i.e. the identification element in the form of the MS MAC address received in step S41 and the user identification in the form of the MS MAC address transmitted in step S46c and obtained by step S48). According to the present example, it is determined whether there is a match between the MAC address of step S42 and that of step S48. By means of this unique address matching process, the AAA server is able to identify the EAP session over which the corresponding MS MAC address is received in the initial authentication session (step S41) since the corresponding MS MAC address has also been stored (as a first identification element).
Then, in step S50, the AAA server identifies the AAA client corresponding to the EAP session identified in step S49. This is done by using the identifier or address of the AAA client which is maintained in connection with step S42, i.e. with the help of the state maintained in step S42. In other words, the AAA client can be identified by a binding of the unique (MAC) address and the client identifier in step S42.
Depending on the result of the web authentication in step S48, the AAA server is triggered to change the state of the authorization provided to the subscriber by the initial network access mode, i.e. the restricted access.
For example, in case the web authentication in step S48 is successful, the AAA server sends a Change of Authorization message to the AAA client (in the ASN) identified in step S50. This Change of Authorization message may comprise also elements related to the subscriber profile stored in the AAA server, such as specific service authorization information, granted bandwidth and the like. Otherwise, in case the web authentication was not successful (e.g. the password is wrong), the network access may be denied, which involves a corresponding Change of Authorization message (e.g. for rejecting the connection).
Assuming that the web authentication was successful in step S48, the Change of Authorization message in step S51 may lift the initial (i.e. anonymous) access restriction rules (hotlined state) and indicates the subscriber specific access profile.
Thus, in step S52, the ASN cancels the restrictions provided in step S42 (the hotlining state) so that the user equipment MS is able to access to services as prescribed in the subscriber profile, for example, access to all IP services (as defined in his/her profile) is granted.
Next, with reference to
In
In step S100, an initial authentication session for a user equipment 10 is executed in accordance with an authentication, authorization and accounting procedure for providing an initial network access. When implemented in a network structure as shown in
In connection with this initial authentication session, a first identification element related to the user equipment is obtained in step S110. For example, the first identification element may be a unique device identification, such as a permanent identifier of the user equipment like a MAC address of the user equipment, or an address which is allocated by a network element, like an IP address for the user equipment. In the latter case, this IP address may be allocated by the AAA server or by another network element, like an ASN element.
In step S120, a user credential validation procedure is executed. For example, a captive (web) portal used for user credential submission initiates the user credential validation by request and provides data corresponding to the submitted user credentials. In connection with the user credential validation procedure of step S120, in step S130, a second identification element is retrieved. This second identification element may be related either to the user (e.g. in form of an indication of a username or the like) or to an address of the user equipment (unique (MAC) address or settable (IP) address) which the web portal receives during the submission of the user credentials and forwards for the validation processing.
Then, a further processing of the obtained first and second identification elements is executed. In this processing, in step S140, it is determined whether a matching between the first and second identification elements exists. This determination may be based, for example, on a direct comparison between the first and second identification elements in case both identification elements are of a corresponding type (two MAC/IP addresses), or it may be based on a mapping procedure in case the first and second identification elements are of different types (username and MAC address, or the like). As a further step of the processing, in step S150, it is then identified (provided that the matching determination is successful) to which authentication session the identification elements are related. In other words, it is determined which initial authentication session executed for the user equipment belongs to the user equipment related to the user credential validation procedure, on the basis of the result of the processing of the first and second identification elements.
Also in step S150, an AAA client involved in the initial authentication session is identified. This may be done, for example, by using a binding between a stored identifier of the AAA client with the first identification element obtained beforehand in connection with the initial authentication session. The link to the second identification element, which is obtained in connection with the validation procedure of steps S120, S130 is provided by the processing steps S140, S150.
Then, in step S160, it is determined which type of authorization change is to be effected for the user equipment, in accordance with the results of the validation procedure, for example. In case the validation procedure results in a successful authorization, settings for the network access of the user equipment according to authorization indications in a subscriber profile can be set for granting access to services/networks. Otherwise, in case the validation procedure does not result in a successful authorization, the connection may be rejected, maintained in a restricted state, or the like.
In step S170, a change of authorization message indicating the type of authorization change determined in step S160 is transmitted to the determined AAA client which may then put the respective settings into force.
In
It is to be noted that only those parts of the AAA server 30 are depicted in
In detail, the AAA server 30 comprises a processor 301 as the main control unit, input/output units (I/O) 302, 303 connected to the processor 301 for establishing a connection with the access network subsystem (e.g. the WiMAX ASN GW of
In the processor 301, a processor portion 305 (authentication processor) for executing the initial authentication procedure, e.g. via EAP based communication, with the user equipment (via the ASN) is provided (according to steps S1, S2, S21, S22, S41, S42, and S100, for example). The processor portion 305 may provide the initial (restricted) network access including the indication of the hotlining state. Furthermore, linked to the authentication processor 305, a (first) processor portion 306 configured to obtain a first identification element related to the user equipment is provided. The processor portion 306 may obtain the first identification element in the form of a MAC address or an IP address which in turn may be allocated by the processor portion 306 or received in a further communication, for example, from the ASN.
A validation processor portion 307 comprising parts 307a and 307b is also provided in the processor 301. The processor portion 307a is configured to perform a user credential validation procedure by communicating with the web portal 40, for example. The processor portion 307b (second processor portion) is configured to obtain, in the user credential validation procedure, a second identification element related to the user equipment or related to a user of the user equipment. In other words, the processor portion 307b may obtain the second identification element in the form of a username, an unique (MAC) address of the user equipment provided by the web portal, or a settable (IP) address of the user equipment provided by the web portal.
In a processor portion 308 (information processor), the first and second identification elements from the processor portions 306 and 307b, respectively, are processed so as to determine whether a match between the first and second identification elements exists. The processing of the processor portion 308 may correspond to step S140 of
In a processor portion 309, the authorization change is determined as a result of the processing of the information processor. For example, settings according to a subscriber portal may be learned in case the authentication of the user equipment is successful.
In a processor portion 310 (third processor portion), the authentication session executed for the user equipment is identified. This is done, for example, on the basis of the result of the information processor 308 processing the first and second identification elements. The processor portion 310 may also be configured to identify the AAA client which is involved in the authorization session for forwarding authorization change signaling to it.
The authorization change processor portion 309 may initiate also the change of the authorization of the user equipment for providing a modified network access by initiating the transmission of the determined authorization settings to the AAA client.
It is to be noted that the structure of the authentication and authorization element (the AAA servers) described in connection with
With regard to
As indicated in connection with the authentication and authorization procedure according to the fourth example, the ASN provides to the captive portal an indication of an identification element in the form of the unique (MAC) address of the user equipment MS (see steps S46b, S46c in
For this purpose, in the block circuit diagram of an apparatus according to
In detail, the apparatus being part of the network element 20 comprises a processor 201 as the main control unit, input/output units (I/O) 202, 203 connected to the processor 201 for establishing a connection with the network access (e.g. a base station BS and the MS via the WiMAX access) or with an element or server providing the captive (web) portal, and a memory 204 connected to the processor 201 for storing data and programs executed by the processor 201.
In the processor 201, a processor portion 205 as an authentication processor is provided which is used for the execution of an authentication session in an authentication, authorization and accounting procedure for the user equipment for providing an initial network access.
A processor portion 206 determines that a request message from the user equipment is to be processed in the hotlined state, i.e. that it is to be re-directed to the captive portal. If this is determined, then in a processor portion 207 comprising parts 207a and 207b a corresponding processing is effected. This means that in the processing portion 207a the destination for the re-directing is determined (based on information received in the initial authentication processing, for example, from the processor portion 205). Furthermore, in the processor portion 207b, the message to be forwarded to the captive portal (in the hotlined mode) is added by an indication of a unique address (MAC address) of the user equipment. Hence, the processor portion 207b adds an identification element of the user equipment.
Even though in the preceding description of the examples of embodiments of the invention the ASN GW 20 is described as being the network element, it is to be noted that as an alternative the hotlining processing, i.e. the re-directing to the captive portal of specific requests (http requests) from the user equipment, and access gating processing can be alternatively or additionally executed by an Mobile IP Home Agent.
For the purpose of the present invention as described herein above, it should be noted that
As described above, there is proposed a network access authentication and authorization mechanism in which an authentication session in an authentication, authorization and accounting procedure for a user equipment for providing an initial network access is executed. A first identification element related to the user equipment is obtained. Then, a user credential validation procedure is performed wherein a second identification element related to the user equipment or related to a user of the user equipment is obtained. The obtained first and second identification elements are processed for determining whether a match between the first and second identification elements exists. In addition, the authentication session executed for the user equipment is identified on the basis of the result of the processing of the first and second identification elements. Then, a change of an authorization of the user equipment is executed for providing a modified network access.
Although the present invention has been described herein before with reference to particular embodiments thereof, the present invention is not limited thereto and various modifications can be made thereto.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP2009/053817 | 3/31/2009 | WO | 00 | 8/18/2011 |