首页>
外国专利>
telecommunications system, connection point support node, method for communicating internet packets between an external packet data communications network and a packet radio network, computer program, and, computer program product
telecommunications system, connection point support node, method for communicating internet packets between an external packet data communications network and a packet radio network, computer program, and, computer program product
"TELECOMMUNICATION SYSTEM, CONNECTION POINT SUPPORT Node, METHOD FOR COMMUNICATION INTERNET PACKAGES BETWEEN AN EXTERNAL PACKAGE DATA NETWORK AND A PACKAGE RADIO NETWORK," COMPUTER PROGRAM, AND PRODUCT PRODUCT PRODUCT. A telecommunications system for communicating Internet packets between a user's mobile communications equipment forming a corresponding node, and a mobile node via an external packet data communications network. The system comprises a packet radio network providing several packet data carriers for communicating Internet packets with nodes attached to the packet radio network. Each bearer is defined with respect to a source address of the Internet packet, the packet radio network including an operable connection point support node to provide an interface between the external network and the packet radio network. The connection point support node (GGSN) is operable to detect (56) whether an Internet packet is to provide a binding update for the corresponding node from a first mobile node source address to a 'care of' address of movable node. If the Internet packet is a bind update, the connection point support node allows (514) egress of Internet packets sent from the corresponding node, having the mobile node's 'care of' address as the destination address. to the external network. Obtaining the 'care of' address of the mobile node from the bind update and allowing packet egress from the corresponding node having this 'care of' address as the destination address in the Internet packet headers, a security measure is provided. , which can prevent or at least prevent service theft. Service theft can occur if an unscrupulous user uses an unauthorized destination address for IP data packets sent from the mobile user equipment acting as the corresponding node and having a legitimate address in the hop-by-hop extension field and an unauthorized address. authorized at the destination field address.
展开▼