Procedure and base station for creating an account in a network featuring a VoIP protocol for DECT mobile parts.
In wireless multicell systems, particularly in DECT multicell systems, identification between DECT mobile parts and the DECT base station is controlled through allocation of access rights. According to ETSI Standard 300 175 (Digital Enhanced Cordless Telecommunications), each base station has a unique worldwide access rights identity (ARI). Each mobile station identifies itself via an access key, Portable Access Rights Key (PARK), together with an international user identification, the International Portable User Identification (IPUI). The identification system for a mobile station is designed to search for a DECT base station valid for it and then unambiguously to identify the mobile station itself within the network. The mobile station can register with a base station only if its ARI is recognized by one of its PARKs. This is the function of the Portable Access Rights Key (PARK) and the International Portable User Identity (IPUI). A mobile station should have at least one PARK and one IPUI. This function is also required for roaming and handover of mobile components from base station to base station, since this is designed to allow other base stations to identify the roaming mobile component and then establish whether it is authorized for a particular base station.
Furthermore, a DECT standard authentication code is required for registration of a DECT mobile component with an assigned base station for unambiguous authentication for registration with the base station—described as an “authentication code” in the standard. The authentication code will ordinarily be preset and then for security purposes changed at registration. In the context of authentication between mobile components and a base station, this authentication code functions as a password of the DECT subscriber.
For some time now, DECT mobile components have been provided for connection to an intranet or the Internet, for which the base station performs a DECT/SIP (Session Internet Protocol) conversion. For voice communications via networks with Internet Protocol (referred to in the professional world as Voice over IP (VoIP)), the SIP protocol (Session Initiation Protocol) is the protocol most often provided. For roaming or handover of DECT mobile components, an SIP account is assigned to the home system in an assigned server. An SIP account is usually formed from a user identification or user name and a password. This means that an SIP account will be entered from a DECT mobile component to provide unambiguous identification to the SIP server for every base station of the system.
The underlying object of the present invention is to provide an improved means of creating SIP accounts in DECT cordless systems with SIP conversion. It accomplishes this object by virtue of the features described in claims 1 and 7.
An essential aspect of the method according to the invention can be seen in the fact that within the context of the registration of the DECT mobile component with the base station, the latter acquires the DECT user identification and, in accordance with a mapping rule or format and protocol adjustment, uses it as the SIP user identification to create the account. For authentication between the DECT mobile component and the base station, the DECT mobile component and the base station share an authentication code AC as a common secret. In a useful embodiment of the method according to the invention, an SIP password can also be derived from this authentication code AC.
An important advantage of the invention can be seen in that, without further development or modification, the DECT mobile components can be used for base stations with DECT/SIP protocol conversion or VoIP communications and so permit particularly economical realization of DECT/VoIP mobile components with VoIP roaming. The mobile components can also be marketed for a broad range of applications. A further advantage consists in the fact that it is not necessary to store and administer different user IDs, passwords or authentication information.
Other useful embodiments of the method according to the invention and the configuration of a base station according to the invention can be visualized from the other claims.
The invention and modifications and improvements upon it are illustrated in the two diagrams below. They show the following:
The SIP Protocol was developed with regard to the Internet and is geared toward the architecture of current Internet applications. This places a premium on easy implementability, scalability, expandability and flexibility. The SIP Protocol can be used to administer any session or communication connections with one or several subscribers. For roaming or handover of VoIP communications an SIP server SIPS is integrated in the Internet IN, in which an SIP account is created for a DECT mobile component MT (designated in
The DECT mobile component MT communicates with the DECT base station BS in accordance with the DECT protocol implemented according to ETSI Standard 300 175. To permit VoIP communication between the DECT mobile component and the communication network IN, which is provided with the SIP protocol SIP, the base station will be implemented with a DECT/SIP protocol conversion.
The DECT protocol, SIP protocol and the protocol conversion are illustrated in
In both protocol layers, base is the physical layer PH. The physical layer PH of the DECT protocol is provided with the wireless interface and the access method. It is in the access layer, or Medium Access Control layer MAC, that the radio channel is selected and control information for the establishment, reconfiguration and disestablishment of the radio channel and the synchronization information are transmitted. The user and signaling data to be transmitted are also encoded there. In the data link layer, or Data Link Control layer DLC, the information to be transmitted is packed into packets. If necessary, these will also include checksums and control information for the data stream. The network layer NL controls information exchange for establishing and terminating the connection, or the signaling. The DECT mobile component MT is implemented with a similar layered protocol structure as well.
The physical layer PH, or the network layer, of the SIP protocol SIP incorporates the transmission medium, or the network (e.g., Ethernet), as well as the methods to be used to access the transmission medium, or network (e.g., CSMA). The adjacent Internet layer is implemented with the Internet Protocol IP in accordance with the IPv4 or IPv6 standards used. The next layer, the transport layer, uses a Transmission Control Protocol TCP or a User Datagram Protocol UDP in accordance with the SIP standard governing transmission of signaling information. As a rule, to transmit voice information the User Datagram Protocol is used. The SIP Protocol is implemented in the next layer and usefully configured in accordance with IETF Standard RFC 3261. The SIP server is implemented with a similarly configured layered structure as well. In this regard see also
In the base station BS, an interworking function IWF is placed between the two protocols. This interworking function IWF extracts the signaling information and user information from the DECT Protocol and adjusted to the formats and protocol contents. Following format and protocol adjustment, the adjusted signaling information will then be integrated into the SIP protocol and reversed in accordance with protocol requirements.
To permit unambiguous authentication of the subscriber, an International Portable User Identity (hereinafter designated as IPUI) is used. This will be unambiguously defined for an approved range, in one or several base station areas, represented by Portable Access Rights Keys (PARK). An IPUI is formed from information indicating the type of user and information indicating a user number. The length of the user number depends here on the user type employed (e.g., ISDN, PBX).
For unambiguous authentication of the DECT mobile component MT vis-à-vis the base station BS, during the process of registering the DECT mobile component MT with, or subscription of the DECT mobile component MT to, the DECT base station BS, a DECT standard authentication code AC (described as “authentication code” in DECT Standard 300 175) will be entered. For registration purposes, of course, the authentication code AC has been preestablished, but for security reasons it will be changed, i.e., reentered.
In DECT mobile components, for example, which are currently activated, i.e., currently enabled, or “roaming,” i.e., changing radio coverage areas, following reception of a radio fixed part identity message the accompanying identification (PARK) will be compared with a stored identification, the stored identification (PARK) indicating that the communication end device is permitted to access the area, or its base station BS. If an appropriate identification has been stored, the associated identification unambiguously assigned to the DECT mobile component (IPUI) is included in a location registration message and sent to the base station BS or the area. This location registration message then permits registration of the DECT mobile component MT in the area or its base station BS.
For roaming or handover of DECT mobile components MT, an SIP account SIPA will be assigned to the home system in the assigned SIP server SIPS. SIP accounts are usually formed from a user identification user or user name and a password pw. This means that the DECT mobile component must enter an SIP account SIPA to be able to unambiguously identify itself vis-à-vis the SIP server SIPS.
The present invention makes it possible to dispense with the entry of a user identification user and a password pw. This is achieved by virtue of the fact that in the registration procedure (indicated in the figure by A:) the IPUI transmitted is used as user identification user to create an SIP account SIPA in accordance with a mapping rule. The SIP password pw is formed from the authentication code AC known from the DECT authentication. The IPUI and the authentication code AC will accordingly be captured in the network layer NL of the DECT base station BS and transmitted to the interworking function IWP. Here both items of information, IPUI and AC, will be adjusted to the formats used in the SIP protocol SIP in accordance with a mapping rule and then, in accordance with the SIP protocol, used as adjusted user identification user (IPUI′) and password pw (AC′) and transferred to the SIP protocol layer SIP. Then here, both items of information thus formed and adjusted, user (IPUI′) and pw (AC), will be used as SIP account data to create an SIP account for the mobile component MT.
By way of example,
The adjustment of the IPUI to the user identification user (IPUI′) and of the authentication code AC to the password pw (AC′) proposed in the present invention permits simple implementation of roaming and handover of DECT mobile components MT in DECT systems featuring a VoIP connection, whereby, on the one hand, DECT mobile components MT can continue to be used without change even when connected to IP-oriented networks and, on the other, these components can be marketed for a broader ranges of uses.
Number | Date | Country | Kind |
---|---|---|---|
102007010582.9 | Mar 2007 | DE | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP08/52542 | 3/3/2008 | WO | 00 | 7/30/2009 |