(19)
(11)EP 3 058 692 B1

(12)EUROPEAN PATENT SPECIFICATION

(45)Mention of the grant of the patent:
21.08.2019 Bulletin 2019/34

(21)Application number: 13782675.6

(22)Date of filing:  17.10.2013
(51)International Patent Classification (IPC): 
H04W 12/06(2009.01)
H04W 12/12(2009.01)
H04W 12/08(2009.01)
H04L 29/06(2006.01)
(86)International application number:
PCT/EP2013/071685
(87)International publication number:
WO 2015/055246 (23.04.2015 Gazette  2015/16)

(54)

AUTHENTICATION OF WIRELESS DEVICE ENTITY

AUTHENTIFIZIERUNG EINER DRAHTLOSEN VORRICHTUNG

AUTHENTIFICATION D'ENTITÉ DE DISPOSITIF SANS FIL


(84)Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

(43)Date of publication of application:
24.08.2016 Bulletin 2016/34

(73)Proprietor: Telefonaktiebolaget LM Ericsson (publ)
164 83 Stockholm (SE)

(72)Inventors:
  • MATTSSON, Ulf
    S-434 36 Kungsbacka (SE)
  • AVILA GONZALEZ, Victor Manuel
    28760 Madrid (ES)
  • LUNDSTRÖM, Anders
    S-192 73 Sollentuna (SE)

(74)Representative: Ericsson 
Patent Development Torshamnsgatan 21-23
164 80 Stockholm
164 80 Stockholm (SE)


(56)References cited: : 
WO-A2-2014/004590
  
  • SVEN BUGIEL ET AL: "Practical and lightweight domain isolation on Android", SECURITY AND PRIVACY IN SMARTPHONES AND MOBILE DEVICES, ACM, 2 PENN PLAZA, SUITE 701 NEW YORK NY 10121-0701 USA, 17 October 2011 (2011-10-17), pages 51-62, XP058005980, DOI: 10.1145/2046614.2046624 ISBN: 978-1-4503-1000-0
  • COLLIN MULLINER ET AL: "Taming Mr Hayes: Mitigating signaling based attacks on smartphones", DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2012 42ND ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON, IEEE, 25 June 2012 (2012-06-25), pages 1-12, XP032220320, DOI: 10.1109/DSN.2012.6263943 ISBN: 978-1-4673-1624-8
  
Note: Within nine months from the publication of the mention of the grant of the European patent, any person may give notice to the European Patent Office of opposition to the European patent granted. Notice of opposition shall be filed in a written reasoned statement. It shall not be deemed to have been filed until the opposition fee has been paid. (Art. 99(1) European Patent Convention).


Description

TECHNICAL FIELD



[0001] Embodiments herein relate generally to a wireless device, a method in the wireless device, a first network node and a method in the first network node. More particularly the embodiments herein relate to enabling trusted communication between a wireless device entity and a second network node via the first network node.

BACKGROUND



[0002] AAA, which is short for Authentication, Authorization and Accounting, is a protocol for controlling a wireless device's (or its user's) access to network resources. AAA is important for efficient network management and security.

[0003] Authentication may be described a process by which a wireless device and a network check if the other party has an authority to communicate with each other, i.e. the process of adding or denying individual wireless device access to a network and its resources. Authentication on both sides should be passed for the communication to proceed, i.e. the wireless device and network mutually authenticate each other. For example, a user must enter a valid user name and password before access is granted. The process of authentication is based on each wireless device or its user having a unique set of criteria for gaining access. An AAA server compares a user's authentication credentials with other user credentials stored in a database. If the credentials match, the user is granted access to the network. If the credentials are at variance, authentication fails and network access is denied.

[0004] A wireless device or its user may be given different authorization levels that limit its access to the network and associated resources. Authorization may be based on geographical location restrictions, date or time-of-day restrictions, frequency of logins or multiple logins by single individuals or entities. Other associated types of authorization services may comprise route assignments, Internet Protocol (IP) address filtering, bandwidth traffic management and encryption.

[0005] Today, most solutions build on wireless device or end-user authentication. Authentication of the wireless device or end-user only works if the wireless device or end-user is not "evil", meaning that it does not try to fool the server or network node, i.e. that it is not associated with a fraud third party.

[0006] Sven Bugiel et al: "Practical and lightweight domain isolation on Android", Security and Privacy in Smartphones and Mobile Devices, ACM, 17 October 2011 discloses a security framework for practical and lightweight domain isolation on Android to mitigate unauthorized data access and communication among applications of different trust levels. The framework enables isolation at different levels of the Android software stack.

[0007] Collin Mulliner et al: "Taming Mr Hayes: Mitigating Signaling Based Attacks on Smartphones", 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2012, IEEE, 25 June 2012 discloses a protection system that partitions the phone software stack into the application operating system and the communication partition. Communication to the cellular network is mediated by a flexible monitoring and enforcement system running on the communication partition. The protection system mitigates all currently known signaling based attacks. In addition, the system can protect users from cellular Trojans.

SUMMARY



[0008] An objective of embodiments herein is therefore to obviate at least one of the above disadvantages and to provide improved communication between the wireless device entity and a second network node.

[0009] According to a first aspect, the object is achieved by a method in a wireless device for enabling trusted communication between the wireless device entity and a second network node via a first network node, as defined in claim 1.

[0010] According to a second aspect, the object is achieved by a method in the first network node for enabling trusted communication between the wireless device entity and the second network node via the first network node, as defined in claim 9.

[0011] According to a third aspect, the object is achieved by the wireless device according to claim 17.

[0012] According to a fourth aspect, the object is achieved by the first network node according to claim 25.

[0013] Since the first network node receives information, via the secure communication channel, indicating that the wireless device entity is comprised in a trusted zone, the first network node knows that this is the real wireless device. The first network node can then open a network node port which is reserved only for communication between the wireless device entity and the second network node. The network node port is blocked from access by other wireless device entities in non-trusted zones of the wireless device. Thereby, the wireless device entity and the second network node can communicate with each other in a way that is trusted.

[0014] Embodiments herein afford many advantages, of which a non-exhaustive list of examples follows:
An advantage of at least some of the embodiments herein is that they provide a method to secure authentication of the wireless device entity which is close to fool proof.

[0015] Another advantage of at least some of the embodiments herein is that they are easy to implement and does not require any extra signaling, i.e. existing signaling is used.

[0016] The embodiments herein are not limited to the features and advantages mentioned above. A person skilled in the art will recognize additional features and advantages upon reading the following detailed description.

BRIEF DESCRIPTION OF THE DRAWINGS



[0017] The embodiments herein will now be further described in more detail in the following detailed description by reference to the appended drawings illustrating the embodiments and in which:
Fig. 1
is a schematic block diagram illustrating embodiments of a communication system.
Fig. 2
is a signaling diagram illustrating embodiments of a method in the communication system.
Fig. 3
is a signaling diagram illustrating embodiments of a method in the communication system.
Fig. 4
is a flow chart illustrating embodiments of a method in a wireless device.
Fig. 5
is a schematic block diagram illustrating embodiments of a wireless device.
Fig. 6
is a flow chart illustrating embodiments of a method in a first network node.
Fig. 7
is a schematic block diagram illustrating embodiments of a first network node.


[0018] The drawings are not necessarily to scale and the dimensions of certain features may have been exaggerated for the sake of clarity. Emphasis is instead placed upon illustrating the principle of the embodiments herein.

DETAILED DESCRIPTION



[0019] As mentioned above, today most authentication procedures build on wireless device or end-user authentication. The embodiment herein instead uses authentication of a certain wireless device entity comprised in the wireless device.

[0020] If a certain wireless device entity comprised in a wireless device shall communicate with a server/node in the network, it must be secured that the wireless device entity is the real entity and not a fraud third party entity. In other words, the communication between the wireless device entity and the second network node can be trusted.

[0021] Figure 1 depicts a communication network 100 in which embodiments herein may be implemented. The communication network 100 may in some embodiments apply to one or more radio access technologies, wired or wireless, such as for example Long Term Evolution (LTE), LTE Advanced, Wideband Code Division Multiple Access (WCDMA), Global System for Mobile Communications (GSM), or any other Third Generation Partnership Project (3GPP) radio access technology, or other radio access technologies such as WiFi and Wireless Local Area Network (WLAN).

[0022] The communication network 100 comprises a wireless device 101 comprising a wireless device entity 101a. The wireless device 101 may be a device by which a subscriber may access services offered by an operator's network and services outside the operator's network to which the operator's radio access network and core network provide access, e.g. access to the Internet. The wireless device 101 may be any device, mobile or stationary, enabled to communicate over a radio channel in the communication network, for instance but not limited to e.g. user equipment, mobile phone, smart phone, sensors, meters, vehicles, household appliances, medical appliances, media players, cameras, Machine to Machine (M2M) device or any type of consumer electronic, for instance but not limited to television, radio, lighting arrangements, tablet computer, laptop or Personal Computer (PC). The wireless device 101 may be portable, pocket storable, hand held, computer comprised, or vehicle mounted devices, enabled to communicate voice and/or data, via the radio access network, with another entity, such as another wireless device or a server.

[0023] The wireless device entity 101a, also referred to as a client, is located in a trusted zone of the wireless device 101. The wireless device entity 101a is located in the trusted zone and thereby acts as it is located there. The wireless device entity 101a may be a Central Processing Unit (CPU), a software, a firmware etc. The trusted zone is at least partly trusted by a first network node 103, i.e. it is at least semi-trusted. The zone may also be referred to as an area, a sector, a part, a region, a location or a collection of entities of the wireless device 101. That the zone is trusted refers to that the first network node 103 can be certain of, i.e. trust, that the wireless device entity 101a, which is comprised in the trusted zone, is a real wireless device entity and not a fraud or fake third party entity. For example, the trusted zone may be a modem part of the wireless device 101, which is considered to be a secure and trusted location of the wireless device 101 compared to the operating system or applications. The modem part may be located below a High Level Operating System (HLOS) (such as Android) in the wireless device 101. The modem part of the wireless device 101 may perform 3GPP signaling which is considered to be secure. Furthermore, a trusted zone may be a zone that is not easy to tamper with. For example, a trusted zone such as a modem zone is not easy to root, but a non-trusted zone such as e.g. an Android zone is easy to root and change code in. Entities in non-trusted parts of the wireless device 101 may be easily manipulated such that the communication from the entities in the non-trusted parts cannot be trusted by the first network node 103. The wireless device entity 101a may be uniquely identified with an entity ID. The trusted zone may also be referred to as a reliable zone, a dependable zone, a secure zone etc.

[0024] The wireless device entity 101a may be comprised in the wireless device 101 at manufacturing of the wireless device 101 or at some updating of the wireless device 101.

[0025] The wireless device 101 is adapted to be connected to the first network node 103. The first network node 103 may be a Packet data network GateWay (PGW), a Gateway General packet radio service Support Node (GGSN) or a co-located PGW and GGSN network node. The first network node 103 may therefore also be referred to as a gateway node. The PGW, also referred to as a PDN gateway, provides connectivity from the wireless device 101 to external Packet Data Networks (PDNs), i.e. it is the point of entry and exit of data traffic for the wireless device 101 for an LTE area. The wireless device may be connected to more than one PGW for accessing multiple PDNs. The PGW performs policy enforcement, packet filtering for each user, charging support, lawful interception, packet screening, and it acts as the anchor for mobility between 3GPP and non-3GPP technologies. The PGW may perform the same functions as the GGSN in GPRS. The GGSN enables transmission of Internet Protocol (IP) packets to external PDNs, such as e.g. the Internet, for a 3G area.

[0026] The first network node 103 may comprise at least one network node port 103a which may be dedicated to or reserved for certain types of communication, to certain applications, processes, wireless devices or network nodes etc. One purpose of the network node port 103a is to uniquely identify different applications or processes running on a single computer and thereby enable them to share a single physical connection to e.g. a packet-switched network like the Internet. The network node port 103a may be associated with an IP address of the host, as well as the type of protocol used for communication. The network node port 103a may be identified with a port number. The port number together with the IP address of the host of the communication completes the destination address for a communication session. The each network node port 103a may be opened or closed. The network node port 103a may be for example a Transmission Control Protocol (TCP) port, a User Datagram Protocol (UDP) port or a combined TCP and UDP port. TCP and UDP are transport layer protocols of the Internet protocol suite.

[0027] The wireless device 101 and the first network node 103 are adapted to communicate with each other using a secure communication channel. The secure communication channel may be Non Access Stratum (NAS) signaling. NAS signaling may be used to convey non-radio signaling in the communication network 100 and messages sent using NAS are encrypted using security algorithm. This secure communication channel is not used for the trusted communication between the wireless device entity 101a and the second network node 105. The trusted communication uses any communication channel to which the reserved network node port 103a is associated.

[0028] The first network node 103 is adapted to be connected to a second network node 105. The second network node 105 may be a network server or any other suitable network node or entity. In some embodiments, the first network node 103 and the second network node 105 are separate standalone network nodes. In other embodiments, the first network node 103 and the second network node 105 are co-located in one network node, i.e. the same network node. For example, the first network node 103 may be a GGSN and the second network node 105 is a node entity comprised in the GGSN.

[0029] It should be noted that the communication links between the wireless device 101, the wireless device entity 101a, the first network node 103 and the second network node 105 may be of any suitable kind including either a wired or wireless link. The links may use any suitable protocol depending on type and level of layer (e.g. as indicated by the Open Systems Interconnection (OSI) model) as understood by the person skilled in the art.

[0030] The method for enabling trusted communication between the wireless device entity 101a and the second network node 105 via the first network node 101 according to some embodiments will now be described with reference to the signaling diagram depicted in Figure 2. The method comprises the following steps, which steps may as well be carried out in another suitable order than described below.

Step 200



[0031] The wireless device entity 101a blocks other entities in non-trusted zones of the wireless device 101 to access a specific network node port 103a in the first network node 103 which is reserved for the trusted communication between the wireless device entity 101a and the second network node 105. In some embodiments, a whole non-trusted zone may be blocked from accessing the reserved network node port 103a. For example, the wireless device entity 101a prohibits HLOS such as Android to use a specific TCP/UDP-port 103a. As a consequence of the prohibition, the first network node 103 can trust that all communication from this network node port 103a is done from the wireless device entity 101a.

[0032] This step 200 may be performed at start of the method or at any other suitable place in the method exemplified in figure 2. The non-trusted zones may be blocked as long as the service and/or the wireless device entity 101a in the wireless device 101 are active.

Step 201



[0033] The wireless device 101 transmits a message to the first network node 103 using the secure communication channel. The message comprises information indicating that the wireless device entity 101a is comprised in the trusted zone of the wireless device 101. The trusted zone is at least partly trusted by the first network node 103. The wireless device entity 101a resides in a trusted zone of the wireless device 101 where the wireless device entity 101a can add information to messages on the secure communication channel. This information is used to identify that the wireless device entity 101a resides in the trusted zone. Even though the wireless device entity 101a adds the information to the message, it is the wireless device 101 which transmits the message over the secure communication channel. Non-trusted zones of the wireless device 101 do not have access to the secure communication channel, non-trusted zones such as e.g. a HLOS.

[0034] The information indicating that the wireless device entity 101a is comprised in the trusted zone may be of any suitable format such as e.g. an Information Element (IE), a text string, a flag etc.

[0035] The information in this step 201 may be triggered by that the wireless device 101 is powered on and is setting up a connection towards the network, for instance a PDP context activation procedure. At power on, the wireless device 101 can be put into flight mode and the first network node 103 sets up any connection towards network.

Step 202



[0036] The first network node 103 receives the message from the wireless device 101 from step 201 and determines that communication from the wireless device entity 101a may be trusted since it has received information indicating that the wireless device entity 101a is comprised in the trusted zone.

Step 203



[0037] In some embodiments, the first network node 103 obtains information indicating that a subscription associated with the wireless device 101 is valid. In other words, the first network node 103 obtains information whether the user is authorized to use the wireless device entity 101a in the wireless device 101. In addition, parameters/settings may be shared between the first network node 103 and the wireless device entity 101a that is part of the subscription. The first network node 103 may obtain this information from e.g. a policy node such as a Policy and Charging Rules Function (PCRF), a Policy and Charging Enforcement Function (PCEF), a Home Location Register (HLR), a Home Subscriber Server (HSS), a Remote Authentication Dial In User Service (RADIUS) server or any other suitable network node.

Step 204



[0038] In some embodiments, the first network node 103 opens at least one network node port 103a which is to be reserved for the trusted communication between the wireless device entity 101a and the second network node 105, i.e. the network node port 103a changes its state from closed to open. Any other network nodes and other entities in the wireless device 101 are denied access to this reserved network node port 103a.

[0039] The determination of which network node port 103a that should be reserved for the trusted communication may be performed in different ways. For example, information indicating at least one random port may be sent in the NAS communication between the wireless device 101 and the first network node 103. This random port is the port that is reserved for the trusted communication. In another example, the network vendor and the vendor of the wireless device 101 and/or the vendor of the wireless device entity 101a agrees upon which network node port 103a that should be reserved for the secure communication.

Step 205



[0040] In some embodiments, the first network node 103 sends, to the wireless device 101, a confirmation of that the network node port 103a has been opened so that the wireless device entity 101a can communicate with the second network node 105.

[0041] An alternative to sending a confirmation is that the wireless device 101 itself performs a test if the network node port 103a has been opened.

Step 206



[0042] The wireless device entity 101a and the second network node 105 communicate with each other. The communication is trusted. The trusted communication may be conveyed via the reserved network node port 103a. For example, the trusted communication may be transmitted by the wireless device entity 101a to inform the second network node 105 about which application that is running in the wireless device 101. The second network node 105 can adjust the bandwidth according to the application. With the embodiments herein, the second network node 105 can trust that the communication comes from the true wireless device entity 101a and not from a fraud third party entity which tries to fool the second network node 105 to provide increased bandwidth although it is not necessary. This requires that non-trusted zones in the wireless device 101 are blocked from using the reserved network node port 103a, which is performed in step 200.

[0043] The trusted communication may also be referred to as reliable communication, dependable communication, secure communication etc.

[0044] The method for enabling trusted communication between the wireless device entity 101a and the second network node 105 via the first network node 101 according to some embodiments will now be described with reference to the signaling diagram depicted in Figure 3. In figure 3, the communication network 100 is exemplified to implement WCDMA and the first network node 103 is represented by a GGSN. In figure 3, the first network node 103 is seen to communicate with a PCRF 108 (the PCRF 108 was not seen in figure 1 or 2). The method comprises the following steps, which steps may as well be carried out in another suitable order than described below.

Step 301



[0045] This step corresponds to step 200 in figure 2. The wireless device entity 101a blocks other entities in non-trusted zones of the wireless device 101 to access a specific network node port 103a in the GGSN 103 which is reserved for the trusted communication between the wireless device entity 101a and the second network node 105. In some embodiments, a whole non-trusted zone in the wireless device 101 may be blocked. For example, the wireless device entity 101a prohibits HLOS such as Android to use a specific TCP/UDP-port 103a. As a consequence of the prohibition, the GGSN 103 can trust that all communication from this network node port 103a is done from the wireless device entity 101a.

[0046] This step 301 may be performed at start of the method or at any other suitable place in the method exemplified in figure 3. The non-trusted zones may be blocked from accessing the reserved network node port 103a as long as the service and/or the wireless device entity 101a in the wireless device 101 are active.

Step 302



[0047] This step corresponds to step 201 in figure 2. The wireless device 101 transmits a message to the GGSN 103 using the NAS signal as the secure communication channel. The message may be a PDP context activation message comprising information which indicates that the wireless device entity 101a is located in the zone which is at least partly trusted by the GGSN 103. This information may be in the form of an Information Element (IE) where the value "yes" indicates that the wireless device entity 101a is located within the trusted zone, e.g. wireless device entity available=yes.

[0048] When the wireless device entity 101a resides in the trusted zone such as for example the modem part of the wireless device 101 it has the ability to write into e.g. the Protocol Configuration Options (PCO) used in the PDP context activation message. A message telling the GGSN 103 that the wireless device entity 101 resides in the trusted zone of the wireless device 101 might then be sent in the operator specific part of the PCO.

Step 303



[0049] This step corresponds to step 202 in figure 2. The GGSN 103 receives the message in step 302 and extracts the information indicating that the wireless device entity 101a is in the trusted zone. Thereby the GGSN 103 determines that it can trust that the wireless device entity 101a is running in the wireless device 101, i.e. that communication from the wireless device entity 101a can be trusted.

Step 304



[0050] This step corresponds to step 203 in figure 2. In some embodiments, it might be necessary for the GGSN 103 to check a subscription associated with the wireless device 101. In such embodiments, the GGSN 103 uses the Gx interface between the GGSN 103 and a PCRF 108 to transmit the PDP activation message to the PCRF 108 to request information whether the subscription is valid or not. The PDP activation may be sent using the Diameter protocol.

Step 305



[0051] This step corresponds to step 203 in figure 2. The PCRF 108 may check the validity of the subscription associated with the wireless device 101.

Step 306



[0052] This step corresponds to step 203 in figure 2. The PCRF 108 may send a response to the GGSN 103 using the Gx interface. The response may be in the form of a Credit Control Request Initial (CCR I) message. The CCR I message comprises the information of the validity of the subscription. Thus, the GGSN 103 knows whether the wireless device 101 has a valid subscription or not.

Step 307



[0053] This step corresponds to step 204 in figure 2. The GGSN 103 opens a connection from wireless device entity 101a to the second network node 105. The GGSN 103 opens the connection by opening the specific network node port 103a which is reserved for the trusted communication between the wireless device entity 101a and the second network node 105, since the GGSN 103 knows, from the NAS signaling, that the wireless device entity 101a is in the trusted zone. In some embodiments, a further criterion for opening the network node port 103a is that the wireless device 101 has a valid subscription. There may be one or more network node ports 103a which are reserved for this communication.

Step 308



[0054] In some embodiments, the GGSN 103 transmits a PDP context create response using the NAS signaling as the secure communication channel towards the wireless device 101. The PDP context create response is a response to the PDP activation message in step 302.

Step 309



[0055] This step corresponds to step 206 in figure 2. The wireless device entity 101a and the second network node 105 communicate with each other, i.e. exchange data with each other in way that it can be trusted that the communication really comes from the true wireless device entity 101a and not any fraud third party. This may also be seen as a fire wall protection. The trusted communication may be conveyed via the reserved network node port 103a which was opened in step 307.

[0056] The method described above will now be described seen from the perspective of the wireless device 101. Figure 4 is a flowchart describing the present method in the wireless device 101, for enabling trusted communication between the wireless device entity 101a and the second network node 105 via the first network node 103. The wireless device 101 and the first network node 103 are adapted to communicate using the secure communication channel. The first network node 103 and the second network node 105 may be co-located in one network node or the first network node 103 and the second network node 105 may each be standalone network nodes. The method comprises the following steps to be performed by the wireless device 101, which steps may be performed in any suitable order than described below:

Step 400



[0057] This step corresponds to step 200 in figure 2 and step 301 in figure 3. In some embodiments, the wireless device 101 blocks other wireless device entities in a non-trusted zone of the wireless device 101 from accessing a network node port 103a comprised in the first network node 103. The network node port 103a is reserved for the trusted communication between the wireless device entity 101a and the second network node 105. The nun-trusted zone is not trusted by the first network node 103.

Step 401



[0058] This step corresponds to step 201 in figure 2 and to step 302 in figure 3. The wireless device 101 transmits a message to the first network node 103 using the secure communication channel. The message comprises information indicating that the wireless device entity 101a is comprised in a trusted zone of the wireless device 101. The trusted zone is at least partly trusted by the first network node 103. The at least partly trusted zone may be a modem. The message may be a PDP context activation message. The information may be comprised in a PCO part of the PDP context activation message. Even though the PDP context activation is a message type associated with 3G, the PDP context activation message may also be used for other types of communication technology such as e.g. LTE and Wifi. Instead of the PDP context activation, any other suitable message type may be used.

Step 402



[0059] This step corresponds to step 205 in figure 2 and step 306 in figure 3. In some embodiments, the wireless device 101 receives a reply from the first network node 103. The reply comprises a confirmation of that the network node port 103a has been opened so that the wireless device entity 101 can communicate with the second network node 105 in a trusted way. The network node port 103a is to be reserved for the trusted communication between the wireless device entity 101a and the second network node 105.

[0060] The reply may be comprised in a PDP context create response message. Even though PDP context create response is a message type associated with 3G, the PDP context create response may also be used for other types of communication technology such as e.g. LTE and Wifi. Instead of the PDP context create response, any other suitable message type may be used.

[0061] An alternative to sending a confirmation is that the wireless device 101 itself performs a test if the network node port 103a has been opened.

Step 403



[0062] This step corresponds to step 206 in figure 2 and step 309 in figure 3. In some embodiments, the wireless device 101 communicates with the second network node 105 via a network node port 103a comprised in the first network node 103. The network node port 103a is reserved for the trusted communication between the wireless device entity 101a and the second network node 105.

[0063] To perform the method steps shown in figures 2, 3 and 4 for enabling trusted communication between the wireless device entity 101a and the second network node 105 via the first network node 103, the wireless device 101 comprises an arrangement as shown in Figure 5. As mentioned above, the wireless device 101 and the first network node 103 are adapted to communicate using a secure communication channel. In some embodiments, the first network node 103 and the second network node 105 are co-located in one network node. In other embodiments, the first network node 103 and the second network node 105 are each standalone network nodes.

[0064] The wireless device 101 comprises a transmitter 501 which is adapted to transmit a message to the first network node 103 using the secure communication channel. The message comprises information indicating that the wireless device entity 101a is comprised in a trusted zone of the wireless device 101. The trusted zone is at least partly trusted by the first network node 103. The at least partly trusted zone may be a modem. The transmitted message may be a PDP context activation message. The information may be comprised in a PCO part of the PDP context activation message.

[0065] The wireless device entity 101a comprised in the wireless device 101 is adapted to transmit trusted communication to the second network node 105 via the network node port 103a comprised in the first network node 103. The network node port 103a is reserved for the trusted communication between the wireless device entity 101a and the second network node 105. The wireless device entity 101a may be further adapted to receive trusted communication from the second network node 105 via the network node port 103a comprised in the first network node 103.

[0066] The wireless device 101 may comprise a receiver 503 which is adapted to receive a reply from the first network node 103. The reply comprises a confirmation of that the network node port 103a has been opened so that the wireless device entity 101 can communicate with the second network node 105 in a trusted way. The network node port 103a is to be reserved for the trusted communication between the wireless device entity 101a and the second network node 105. The reply may be comprised in a PDP context create response message.

[0067] The wireless device 101 may comprises a blocking unit 504 adapted to block other wireless device entities in a non-trusted zone of the wireless device 101 from accessing the reserved network node port 103a comprised in the first network node 103. The network node port 103a is reserved for the trusted communication between the wireless device entity 101a and the second network node 105. The non-trusted zone is not trusted by the first network node 103.

[0068] The wireless device 101 may further comprise a memory 505 comprising one or more memory units. The memory 505 is arranged to be used to store data, received data streams, power level measurements, messages, replies, communication, information about trusted and non-trusted zones, information about a user associated with the wireless device 101, threshold values, time periods, configurations, scheduling, and applications to perform the methods herein when being executed in the wireless device 101.

[0069] The method described above will now be described seen from the perspective of the first network node 103. Figure 6 is a flowchart describing the present method in the first network node 103 for enabling trusted communication between the wireless device entity 101a and the second network node 105 via the first network node 103. The wireless device 101 and the first network node 103 are adapted to communicate using the secure communication channel. The first network node 103 and the second network node 105 may be co-located in one network node, or the first network node 103 and the second network node 105 may each be standalone network nodes. The method comprises the following steps to be performed by the first network node 103, which steps may be performed in any suitable order than described below:

Step 601



[0070] This step corresponds to step 201 in figure 2 and to step 302 in figure 3. The first network node 103 receives a message from the wireless device 101 using the secure communication channel. The message comprises information indicating that the wireless device entity 101a is comprised in a trusted zone of the wireless device 101. The trusted zone is at least partly trusted by the first network node 103. The received message may be a PDP context activation message. The information indicating that the wireless device entity 101a may be comprised in the wireless device 101 is comprised in the PCO part of the PDP context activation message.

Step 602



[0071] This step corresponds to step 202 in figure 2 and step 303 in figure 3. In some embodiments, the first network node 103 determines that communication from the wireless device entity 101a can be trusted since it has received the information indicating that the wireless device entity 101a is comprised in the trusted zone of the wireless device 101.

Step 603



[0072] This step corresponds to step 203 in figure 2 and to steps 303 and 305 in figure 3. In some embodiments, the first network node 103 obtains information indicating that a subscription associated with the wireless device 101 is valid.

Step 604



[0073] This step corresponds to step 204 in figure 2 and step 307 in figure 3. In some embodiments, when the communication from the wireless device entity 101a is determined to be trusted, the first network node 103 opens the network node port 103a comprised in the first network node 103. The network node port 103a is to be reserved for the trusted communication between the wireless device entity 101a and the second network node 105, i.e. blocked for entities in non-trusted zones of the wireless device 101.

Step 605



[0074] This step corresponds to step 205 in figure 2 and step 306 in figure 3. In some embodiments, the first network node 103 transmits a reply to the wireless device 101. The reply comprises a confirmation of that the network node port 103a has been opened so that the wireless device entity 101 can communicate with the second network node 105. The reply may be comprised in a PDP context create response message.

Step 606



[0075] This step corresponds to step 206 in figure 2 and step 309 in figure 3. In some embodiments, the first network node 103 provides the trusted communication between the wireless device entity 101a and the second network node 105 via the opened network node port 103a.

[0076] To perform the method steps shown in figures 2, 3 and 6 for enabling trusted communication between the wireless device entity 101a and the second network node 105 via the first network node 103, the first network node 103 comprises an arrangement as shown in Figure 7. As mentioned above, the wireless device 101 and the first network node 103 are adapted to communicate using the secure communication channel. In some embodiments, the first network node 103 and the second network node 105 are co-located in one network node. In other embodiments, the first network node 103 and the second network node 105 are each standalone network nodes.

[0077] The first network node 103 comprises a receiver 701 which is adapted to receive a message from the wireless device 101 using the secure communication channel. The message comprises information indicating that the wireless device entity 101a is comprised in a trusted zone of the wireless device 101. The trusted zone is at least partly trusted by the first network node 103. The received message may be a PDP context activation message. The information indicating that the wireless device entity 101a is comprised in the wireless device 101 may be comprised in a PCO part of the PDP context activation message. The receiver 701 may be further adapted to receive the trusted communication from the wireless device entity 101a and the second network node 105 via an opened network node port 103a.

[0078] The first network node 103 comprises a determining unit 703 which is adapted to determine that communication from the wireless device entity 101a can be trusted since it has received the information indicating that the wireless device entity 101a is comprised in the trusted zone of the wireless device 101.

[0079] The first network node 103 may comprise an opening unit 705 which is adapted to open a network node port 103a which is to be reserved for the communication between the wireless device entity 101a and the second network node 105 when the communication from the wireless device entity 101a is determined to be trusted.

[0080] The first network node 103 may comprise a transmitter 708 adapted to transmit a reply to the wireless device 101. The reply comprises a confirmation of that the network node port 103a has been opened so that the wireless device entity 101a can communicate with the second network node 105. The reply may be comprised in a PDP context create response message. The transmitter 708 may be further adapted to transmit the trusted communication from the wireless device entity 101a and the second network node 105 via the opened network node port 103a.

[0081] The first network node 103 may further comprise an obtaining unit 710 adapted to obtain information indicating that a subscription associated with the wireless device 101 is valid.

[0082] The first network node 103 may further comprise a memory 713 comprising one or more memory units. The memory 713 is arranged to be used to store data, received data streams, power level measurements, messages, replies, communication, information about trusted and non-trusted zones, information about a user associated with the wireless device 101, threshold values, time periods, configurations, scheduling, and applications to perform the methods herein when being executed in the first network node 103.

[0083] The present mechanism for enabling trusted communication between the wireless device entity 101a and the second network node 105 via the first network node 103 may be implemented through one or more processors, such as a processor 510 in the wireless device arrangement depicted in Figure 5 and a processor 715 in the first network node arrangement 800 depicted in Figure 7, together with computer program code for performing the functions of the embodiments herein. The processor may be for example a Digital Signal Processor (DSP), Application Specific Integrated Circuit (ASIC) processor, Field-programmable gate array (FPGA) processor or microprocessor. The program code mentioned above may also be provided as a computer program product, for instance in the form of a data carrier carrying computer program code for performing the embodiments herein when being loaded into the wireless device 101 and/or the first network node 103. One such carrier may be in the form of a CD ROM disc. It is however feasible with other data carriers such as a memory stick. The computer program code can furthermore be provided as pure program code on a server and downloaded to the wireless device 101 and/or the first network node 103.

[0084] Summarized, the embodiment herein builds on that if a wireless device entity 101a in the modem or other trusted zones of the wireless device 101 can be seen as fool proof unbreakable, then it is possible to utilize a secure communication channel to authenticate that this wireless device entity 101a resides in the wireless device 101. One such near fool proof unbreakable wireless device entity 101a is if a wireless device entity 101a resides in the firmware or software in the modem part below HLOS (such as Android) in the wireless device 101.

[0085] The embodiments herein are not limited to the above described embodiments. Various alternatives, modifications and equivalents may be used. Therefore, the above embodiments should not be taken as limiting the scope of the embodiments, which is defined by the appending claims.

[0086] It should be emphasized that the term "comprises/comprising" when used in this specification is taken to specify the presence of stated features, integers, steps or components, but does not preclude the presence or addition of one or more other features, integers, steps, components or groups thereof. It should also be noted that the words "a" or "an" preceding an element do not exclude the presence of a plurality of such elements. The term "configured to" used herein may also be referred to as "arranged to" or "adapted to".

[0087] It should also be emphasised that the steps of the methods defined in the appended claims may, without departing from the embodiments herein, be performed in another order than the order in which they appear in the claims.


Claims

1. A method in a wireless device (101) for enabling trusted communication between a wireless device entity (101a) and a second network node (105) via a first network node (103), wherein the wireless device (101) and the first network node (103) are adapted to communicate using a secure communication channel, the method comprising:

transmitting (201, 302, 401) a message to the first network node (103) using the secure communication channel, wherein the message comprises information indicating that the wireless device entity (101a) is comprised in a trusted zone of the wireless device (101), wherein the trusted zone is at least partly trusted by the first network node (103), wherein that the zone is trusted refers to that the first network node (103) can be certain of that the wireless device entity (101a), which is comprised in the trusted zone, is a real wireless device entity (101a) and not a fraud or fake third party entity; and

providing (206, 309, 403) trusted communication between the wireless device entity (101a) and the second network node (105) via a network node port (103a) comprised in the first network node (103), wherein the network node port (103a) is reserved for the trusted communication between the wireless device entity (101a) and the second network node (105).


 
2. The method according to claim 1, further comprising:
receiving (205, 306, 402) a reply from the first network node (103), wherein the reply comprises a confirmation of that an network node port (103a) has been opened so that the wireless device entity (101) can communicate with the second network node (105), wherein the network node port (103a) is to be reserved for the trusted communication between the wireless device entity (101a) and the second network node (105).
 
3. The method according to any one of claim 2, wherein the reply is comprised in a Packet Data Protocol, PDP, context create response message.
 
4. The method according to any one of claims 1-3, further comprising:
blocking (200, 301, 400) other wireless device entities in a non-trusted zone of the wireless device (101) from accessing a network node port (103a) comprised in the first network node (103), wherein the network node port (103a) is reserved for the trusted communication between the wireless device entity (101a) and the second network node (105), and wherein the nun-trusted zone is not trusted by the first network node (103).
 
5. The method according to any one of claims 1-4, wherein the at least partly trusted zone is a modem.
 
6. The method according to any one of claims 1-5, wherein the message is a Packet data protocol, PDP, context activation message.
 
7. The method according to claim 6, wherein the information is comprised in a Protocol Configuration Options, PCO, part of the PDP context activation message.
 
8. The method according to any one of claims 1-7, wherein the first network node (103) and the second network node (105) are co-located in one network node; or
wherein the first network node (103) and the second network node (105) are each standalone network nodes.
 
9. A method in a first network node (103) for enabling trusted communication between a wireless device entity (101a) and a second network node (105) via the first network node (101), wherein the first network node (103) and a wireless device (101) are adapted to communicate using a secure communication channel, the method comprising:

receiving (201, 302, 601) a message from the wireless device (101) using the secure communication channel, wherein the message comprises information indicating that the wireless device entity (101a) is comprised in a trusted zone of the wireless device (101), wherein the trusted zone is at least partly trusted by the first network node (103), wherein that the zone is trusted refers to that the first network node (103) can be certain of that the wireless device entity (101a), which is comprised in the trusted zone, is a real wireless device entity (101a) and not a fraud or fake third party entity;

determining (202, 303, 602) that communication from the wireless device entity (101a) can be trusted since it has received the information indicating that the wireless device entity (101a) is comprised in the trusted zone of the wireless device (101); and

when the communication from the wireless device entity (101a) is determined to be trusted, opening (204, 307, 604) a network node port (103a) comprised in the first network node (103), which network node port (103a) is to be reserved for the trusted communication between the wireless device entity (101a) and the second network node (105).


 
10. The method according to claim 9, further comprising:
transmitting (205, 306, 605) a reply to the wireless device (101), wherein the reply comprises a confirmation of that the network node port (103a) has been opened so that the wireless device entity (101a) can communicate with the second network node (105).
 
11. The method according to claim 10, wherein the reply is comprised in a Packet Data Protocol, PDP, context create response message.
 
12. The method according to any one of claims 9-11, further comprising:
obtaining (203, 303, 305, 603) information indicating that a subscription associated with the wireless device (101) is valid.
 
13. The method according to any one of claims 9-12, further comprising:
providing (206, 309, 606) the trusted communication between the wireless device entity (101a) and the second network node (105) via an opened network node port (103a) reserved for the trusted communication between the wireless device entity (101a) and the second network node (105).
 
14. The method according to any one of claims 9-13, wherein the received message is a Packet data protocol, PDP, context activation message.
 
15. The method according to claim 14, wherein the information indicating that the wireless device entity (101a) is comprised in the trusted zone of the wireless device (101) is comprised in a Protocol Configuration Options, PCO, part of the PDP context activation message.
 
16. The method according to any one of claims 9-15, wherein the first network node (103) and the second network node (105) are co-located in one network node; or
wherein the first network node (103) and the second network node (105) are each standalone network nodes.
 
17. A wireless device (101) adapted to enable trusted communication between a wireless device entity (101a) and a second network node (105) via a first network node (103), wherein the wireless device (101) and the first network node (103) are adapted to communicate using a secure communication channel, the wireless device (101) comprising:
a transmitter (501) adapted to transmit a message to the first network node (103) using the secure communication channel, wherein the message comprises information indicating that the wireless device entity (101a) is comprised in a trusted zone of the wireless device (101), wherein the trusted zone is at least partly trusted by the first network node (103), wherein that the zone is trusted refers to that the first network node (103) can be certain of that the wireless device entity (101a), which is comprised in the trusted zone, is a real wireless device entity (101a) and not a fraud or fake third party entity,
wherein the wireless device entity (101a) is adapted to:

transmit trusted communication to the second network node (105) via a network node port (103a) comprised in the first network node (103), wherein the network node port (103a) is reserved for the trusted communication between the wireless device entity (101a) and the second network node (105); and to

receive trusted communication from the second network node (105) via the reserved network node port (103a) comprised in the first network node (103).


 
18. The wireless device (101) according to claim 17, further comprising:
a receiver (503) adapted to receive a reply from the first network node (103), wherein the reply comprises a confirmation of that an network node port (103a) has been opened so that the wireless device entity (101a) can communicate with the second network node (105), wherein the network node port (103a) is to be reserved for the trusted communication between the wireless device entity (101a) and the second network node (105).
 
19. The wireless device (101) according to any one of claim 18, wherein the reply is comprised in a Packet Data Protocol, PDP, context create response message.
 
20. The wireless device (101) according to any one of claims 17-19, further comprising:
a blocking unit (504) adapted to block other wireless device entities in a non-trusted zone of the wireless device (101) from accessing a network node port (103a) comprised in the first network node (103), wherein the network node port (103a) is reserved for the trusted communication between the wireless device entity (101a) and the second network node (105), and wherein the non-trusted zone is not trusted by the first network node (103).
 
21. The wireless device (101) according to any one of claims 17-20, wherein the at least partly trusted zone is a modem.
 
22. The wireless device (101) according to any one of claims 17-21, wherein the transmitted message is a Packet data protocol, PDP, context activation message.
 
23. The wireless device (101) according to claim 22, wherein the information is comprised in a Protocol Configuration Options, PCO, part of the PDP context activation message.
 
24. The wireless device (101) according to any one of claims 17-23, wherein the first network node (103) and the second network node (105) are co-located in one network node; or
wherein the first network node (103) and the second network node (105) are each standalone network nodes.
 
25. A first network node (103) adapted to enable trusted communication between a wireless device entity (101a) and a second network node (105) via the first network node (101), wherein the first network node (103) and a wireless device (101) are adapted to communicate using a secure communication channel, the first network node (103) comprising:

a receiver (701) adapted to receive a message from the wireless device (101) using the secure communication channel, wherein the message comprises information indicating that the wireless device entity (101a) is comprised in a trusted zone of the wireless device (101), wherein the trusted zone is at least partly trusted by the first network node (103), wherein that the zone is trusted refers to that the first network node (103) can be certain of that the wireless device entity (101a), which is comprised in the trusted zone, is a real wireless device entity (101a) and not a fraud or fake third party entity;

a determining unit (703) adapted to determine that communication from the wireless device entity (101a) can be trusted since it has received the information indicating that the wireless device entity (101a) is comprised in the trusted zone of the wireless device (101); and

an opening unit (705) adapted to open a network node port (103a) which is to be reserved for the trusted communication between the wireless device entity (101a) and the second network node (105) when the communication from the wireless device entity (101a) is determined to be trusted.


 
26. The first network node (103) according to claim 25, further comprising:
a transmitter (708) adapted to transmit a reply to the wireless device (101), wherein the reply comprises a confirmation of that the network node port (103a) has been opened so that the wireless device entity (101a) can communicate with the second network node (105).
 
27. The first network node (103) according to claim 26, wherein the reply is comprised in a Packet Data Protocol, PDP, context create response message.
 
28. The first network node (103) according to any one of claims 25-27, further comprising:
obtaining unit (710) adapted to obtain information indicating that a subscription associated with the wireless device (101) is valid.
 
29. The first network node (103) according to any one of claims 25-28, wherein the receiver (701) is further adapted to receive the trusted communication from the wireless device entity (101a) and the second network node (105) via an opened network node port (103a) reserved for the trusted communication between the wireless device entity (101a) and the second network node (105); and wherein the first network node (103) further comprises:
a transmitter (708) adapted to transmit the trusted communication from the wireless device entity (101a) and the second network node (105) via the opened network node port (103a).
 
30. The first network node (103) according to any one of claims 25-29, wherein the received message is a Packet data protocol, PDP, context activation message.
 
31. The first network node (103) according to claim 30, wherein the information indicating that the wireless device entity (101a) is comprised in the trusted zone of the wireless device (101) is comprised in a Protocol Configuration Options, PCO, part of the PDP context activation message.
 
32. The first network node (103) according to any one of claims 25-31, wherein the first network node (103) and the second network node (105) are co-located in one network node; or
wherein the first network node (103) and the second network node (105) are each standalone network nodes.
 


Ansprüche

1. Verfahren in einer drahtlosen Vorrichtung (101), um eine vertrauenswürdige Kommunikation zwischen einer drahtlosen Vorrichtungseinheit (101a) und einem zweiten Netzknoten (105) über einen ersten Netzknoten (103) zu ermöglichen, wobei die drahtlose Vorrichtung (101) und der erste Netzknoten (103) geeignet sind, unter Verwendung eines sicheren Kommunikationskanals zu kommunizieren, wobei das Verfahren umfasst:

Senden (201, 302, 401) einer Nachricht an den ersten Netzknoten (103) unter Verwendung des sicheren Kommunikationskanals, wobei die Nachricht Informationen umfasst, die anzeigen, dass die drahtlose Vorrichtungseinheit (101a) in einer vertrauenswürdigen Zone der drahtlosen Vorrichtung (101) enthalten ist, wobei der vertrauenswürdigen Zone von dem ersten Netzknoten (103) mindestens teilweise vertraut wird, wobei sich, dass der Zone vertraut wird, darauf bezieht, dass der erste Netzknoten (103) sicher sein kann, dass die drahtlose Vorrichtungseinheit (101a), die in der vertrauenswürdigen Zone enthalten ist, eine reale drahtlose Vorrichtungseinheit (101a) und keine betrügerische oder gefälschte Drittparteieneinheit ist; und

Herstellen (206, 309, 403) einer vertrauenswürdigen Kommunikation zwischen der drahtlosen Vorrichtungseinheit (101a) und dem zweiten Netzknoten (105) über einen Netzknotenport (103a), der in dem ersten Netzknoten (103) enthalten ist, wobei der Netzknotenport (103a) für die vertrauenswürdige Kommunikation zwischen der drahtlosen Vorrichtungseinheit (101a) und dem zweiten Netzknoten (105) reserviert ist.


 
2. Verfahren nach Anspruch 1, ferner umfassend:
Empfangen (205, 306, 402) einer Antwort von dem ersten Netzknoten (103), wobei die Antwort eine Bestätigung umfasst, dass ein Netzknotenport (103a) geöffnet wurde, so dass die drahtlose Vorrichtungseinheit (101a) mit dem zweiten Netzknoten (105) kommunizieren kann, wobei der Netzknotenport (103a) für die vertrauenswürdige Kommunikation zwischen der drahtlosen Vorrichtungseinheit (101a) und dem zweiten Netzknoten (105) zu reservieren ist.
 
3. Verfahren nach Anspruch 2, wobei die Antwort in einer Paketdatenprotokoll-, PDP-, Kontexterzeugungs-Antwortnachricht enthalten ist.
 
4. Verfahren nach einem der Ansprüche 1 bis 3, ferner umfassend:
Blockieren (200, 301, 400) anderer drahtloser Vorrichtungseinheiten in einer nicht vertrauenswürdigen Zone der drahtlosen Vorrichtung (101), auf einen Netzknotenport (103a) zuzugreifen, der in dem ersten Netzknoten (103) enthalten ist, wobei der Netzknotenport (103a) für die vertrauenswürdige Kommunikation zwischen der drahtlosen Vorrichtungseinheit (101a) und dem zweiten Netzknoten (105) reserviert ist, und wobei der nicht vertrauenswürdigen Zone von dem ersten Netzknoten (103) nicht vertraut wird.
 
5. Verfahren nach einem der Ansprüche 1 bis 4, wobei die mindestens teilweise vertrauenswürdige Zone ein Modem ist.
 
6. Verfahren nach einem der Ansprüche 1 bis 5, wobei die Nachricht eine Paketdatenprotokoll-, PDP-, Kontextaktivierungsnachricht ist.
 
7. Verfahren nach Anspruch 6, wobei die Informationen in einem Protokollauslegungsoptionen-, PCO-, Teil der PDP-Kontextaktivierungsnachricht enthalten sind.
 
8. Verfahren nach einem der Ansprüche 1 bis 7, wobei der erste Netzknoten (103) und der zweite Netzknoten (105) in einem Netzknoten gemeinsam angeordnet sind; oder
wobei der erste Netzknoten (103) und der zweite Netzknoten (105) jeweils unabhängige Netzknoten sind.
 
9. Verfahren in einem ersten Netzknoten (103), um eine vertrauenswürdige Kommunikation zwischen einer drahtlosen Vorrichtungseinheit (101a) und einem zweiten Netzknoten (105) über den ersten Netzknoten (103) zu ermöglichen, wobei der erste Netzknoten (103) und eine drahtlose Vorrichtung (101) geeignet sind, unter Verwendung eines sicheren Kommunikationskanals zu kommunizieren, wobei das Verfahren umfasst:

Empfangen (201, 302, 601) einer Nachricht von der drahtlosen Vorrichtung (101) unter Verwendung des sicheren Kommunikationskanals, wobei die Nachricht Informationen umfasst, die anzeigen, dass die drahtlose Vorrichtungseinheit (101a) in einer vertrauenswürdigen Zone der drahtlosen Vorrichtung (101) enthalten ist, wobei der vertrauenswürdigen Zone von dem ersten Netzknoten (103) mindestens teilweise vertraut wird, wobei sich, dass der Zone vertraut wird, darauf bezieht, dass der erste Netzknoten (103) sicher sein kann, dass die drahtlose Vorrichtungseinheit (101a), die in der vertrauenswürdigen Zone enthalten ist, eine reale drahtlose Vorrichtungseinheit (101a) und keine betrügerische oder gefälschte Drittparteieneinheit ist;

Bestimmen (202, 303, 602), dass der Kommunikation von der drahtlosen Vorrichtungseinheit (101a) vertraut werden kann, da sie die Informationen empfangen hat, die anzeigen, dass die drahtlose Vorrichtungseinheit (101a) in der vertrauenswürdigen Zone der drahtlosen Vorrichtung (101) enthalten ist; und

wenn bestimmt wird, dass der Kommunikation von der drahtlosen Vorrichtungseinheit (101a) zu vertrauen ist, Öffnen (204, 307, 604) eines Netzknotenports (103a), der in dem ersten Netzknoten (103) enthalten ist, wobei der Netzknotenport (103a) für die vertrauenswürdige Kommunikation zwischen der drahtlosen Vorrichtungseinheit (101a) und dem zweiten Netzknoten (105) zu reservieren ist.


 
10. Verfahren nach Anspruch 9, ferner umfassend:
Senden (205, 306, 605) einer Antwort an die drahtlose Vorrichtung (101), wobei die Antwort eine Bestätigung umfasst, dass der Netzknotenport (103a) geöffnet wurde, so dass die drahtlose Vorrichtungseinheit (101a) mit dem zweiten Netzknoten (105) kommunizieren kann.
 
11. Verfahren nach Anspruch 10, wobei die Antwort in einer Paketdatenprotokoll-, PDP-, Kontexterzeugungs-Antwortnachricht enthalten ist.
 
12. Verfahren nach einem der Ansprüche 9 bis 11, ferner umfassend:
Erhalten (203, 303, 305, 603) von Informationen, die anzeigen, dass eine Subskription, die mit der drahtlosen Vorrichtung (101) assoziiert ist, gültig ist.
 
13. Verfahren nach einem der Ansprüche 9 bis 12, ferner umfassend:
Herstellen (206, 309, 606) der vertrauenswürdigen Kommunikation zwischen der drahtlosen Vorrichtungseinheit (101a) und dem zweiten Netzknoten (105) über einen geöffneten Netzknotenport (103a), der für die vertrauenswürdige Kommunikation zwischen der drahtlosen Vorrichtungseinheit (101a) und dem zweiten Netzknoten (105) reserviert ist.
 
14. Verfahren nach einem der Ansprüche 9 bis 13, wobei die empfangene Nachricht eine Paketdatenprotokoll-, PDP-, Kontextaktivierungsnachricht ist.
 
15. Verfahren nach Anspruch 14, wobei die Informationen, die anzeigen, dass die drahtlose Vorrichtungseinheit (101a) in der vertrauenswürdigen Zone der drahtlosen Vorrichtung (101) enthalten ist, in einem Protokollauslegungsoptionen-, PCO-, Teil der PDP-Kontextaktivierungsnachricht enthalten sind.
 
16. Verfahren nach einem der Ansprüche 9 bis 15, wobei der erste Netzknoten (103) und der zweite Netzknoten (105) in einem Netzknoten gemeinsam angeordnet sind; oder wobei der erste Netzknoten (103) und der zweite Netzknoten (105) jeweils unabhängige Netzknoten sind.
 
17. Drahtlose Vorrichtung (101), welche geeignet ist, eine vertrauenswürdige Kommunikation zwischen einer drahtlosen Vorrichtungseinheit (101a) und einem zweiten Netzknoten (105) über einen ersten Netzknoten (103) zu ermöglichen, wobei die drahtlose Vorrichtung (101) und der erste Netzknoten (103) geeignet sind, unter Verwendung eines sicheren Kommunikationskanals zu kommunizieren, wobei die drahtlose Vorrichtung (101) umfasst:

einen Sender (501), der geeignet ist, eine Nachricht an den ersten Netzknoten (103) unter Verwendung des sicheren Kommunikationskanals zu senden, wobei die Nachricht Informationen umfasst, die anzeigen, dass die drahtlose Vorrichtungseinheit (101a) in einer vertrauenswürdigen Zone der drahtlosen Vorrichtung (101) enthalten ist, wobei der vertrauenswürdigen Zone von dem ersten Netzknoten (103) mindestens teilweise vertraut wird, wobei sich, dass der Zone vertraut wird, darauf bezieht, dass der erste Netzknoten (103) sicher sein kann, dass die drahtlose Vorrichtungseinheit (101a), die in der vertrauenswürdigen Zone enthalten ist, eine reale drahtlose Vorrichtungseinheit (101a) und keine betrügerische oder gefälschte Drittparteieneinheit ist;

wobei die drahtlose Vorrichtungseinheit (101a) geeignet ist:

eine vertrauenswürdige Kommunikation mit dem zweiten Netzknoten (105) über einen Netzknotenport (103a) zu senden, der in dem ersten Netzknoten (103) enthalten ist, wobei der Netzknotenport (103a) für die vertrauenswürdige Kommunikation zwischen der drahtlosen Vorrichtungseinheit (101a) und dem zweiten Netzknoten (105) reserviert ist; und

die vertrauenswürdige Kommunikation von dem zweiten Netzknoten (105) über den reservierten Netzknotenport (103a) zu empfangen, der in dem ersten Netzknoten (103) enthalten ist.


 
18. Drahtlose Vorrichtung (101) nach Anspruch 17, ferner umfassend:
einen Empfänger (503), der geeignet ist, eine Antwort von dem ersten Netzknoten (103) zu empfangen, wobei die Antwort eine Bestätigung umfasst, dass ein Netzknotenport (103a) geöffnet wurde, so dass die drahtlose Vorrichtungseinheit (101a) mit dem zweiten Netzknoten (105) kommunizieren kann, wobei der Netzknotenport (103a) für die vertrauenswürdige Kommunikation zwischen der drahtlosen Vorrichtungseinheit (101a) und dem zweiten Netzknoten (105) zu reservieren ist.
 
19. Drahtlose Vorrichtung (101) nach Anspruch 18, wobei die Antwort in einer Paketdatenprotokoll-, PDP-, Kontexterzeugungs-Antwortnachricht enthalten ist.
 
20. Drahtlose Vorrichtung (101) nach einem der Ansprüche 17 bis 19, ferner umfassend:
eine Blockierungseinheit (504), die geeignet ist, andere drahtlose Vorrichtungseinheiten in einer nicht vertrauenswürdigen Zone der drahtlosen Vorrichtung (101) zu blockieren, auf einen Netzknotenport (103a) zuzugreifen, der in dem ersten Netzknoten (103) enthalten ist, wobei der Netzknotenport (103a) für die vertrauenswürdige Kommunikation zwischen der drahtlosen Vorrichtungseinheit (101a) und dem zweiten Netzknoten (105) reserviert ist, und wobei der nicht vertrauenswürdigen Zone von dem ersten Netzknoten (103) nicht vertraut wird.
 
21. Drahtlose Vorrichtung (101) nach einem der Ansprüche 17 bis 20, wobei die mindestens teilweise vertrauenswürdige Zone ein Modem ist.
 
22. Drahtlose Vorrichtung (101) nach einem der Ansprüche 17 bis 21, wobei die gesendete Nachricht eine Paketdatenprotokoll-, PDP-, Kontextaktivierungsnachricht ist.
 
23. Drahtlose Vorrichtung (101) nach Anspruch 22, wobei die Informationen in einem Protokollauslegungsoptionen-, PCO-, Teil der PDP-Kontextaktivierungsnachricht enthalten sind.
 
24. Drahtlose Vorrichtung (101) nach einem der Ansprüche 17 bis 23, wobei der erste Netzknoten (103) und der zweite Netzknoten (105) in einem Netzknoten gemeinsam angeordnet sind; oder
wobei der erste Netzknoten (103) und der zweite Netzknoten (105) jeweils unabhängige Netzknoten sind.
 
25. Erster Netzknoten (103), welcher geeignet ist, eine vertrauenswürdige Kommunikation zwischen einer drahtlosen Vorrichtungseinheit (101a) und einem zweiten Netzknoten (105) über den ersten Netzknoten (103) zu ermöglichen, wobei der erste Netzknoten (103) und eine drahtlose Vorrichtung (101) geeignet sind, unter Verwendung eines sicheren Kommunikationskanals zu kommunizieren, wobei der erste Netzknoten (103) umfasst:

einen Empfänger (701), der geeignet ist, eine Nachricht von der drahtlosen Vorrichtung (101) unter Verwendung des sicheren Kommunikationskanals zu empfangen, wobei die Nachricht Informationen umfasst, die anzeigen, dass die drahtlose Vorrichtungseinheit (101a) in einer vertrauenswürdigen Zone der drahtlosen Vorrichtung (101) enthalten ist, wobei der vertrauenswürdigen Zone von dem ersten Netzknoten (103) mindestens teilweise vertraut wird, wobei sich, dass der Zone vertraut wird, darauf bezieht, dass der erste Netzknoten (103) sicher sein kann, dass die drahtlose Vorrichtungseinheit (101a), die in der vertrauenswürdigen Zone enthalten ist, eine reale drahtlose Vorrichtungseinheit (101a) und keine betrügerische oder gefälschte Drittparteieneinheit ist;

eine Bestimmungseinheit (703), die geeignet ist, zu bestimmen, dass der Kommunikation von der drahtlosen Vorrichtungseinheit (101a) vertraut werden kann, da sie die Informationen empfangen hat, die anzeigen, dass die drahtlose Vorrichtungseinheit (101a) in der vertrauenswürdigen Zone der drahtlosen Vorrichtung (101) enthalten ist; und

eine Öffnungseinheit (705), die geeignet ist, einen Netzknotenport (103a) zu öffnen, der für die vertrauenswürdige Kommunikation zwischen der drahtlosen Vorrichtungseinheit (101a) und dem zweiten Netzknoten (105) zu reservieren ist, wenn bestimmt wird, dass der Kommunikation von der drahtlosen Vorrichtungseinheit (101a) zu vertrauen ist.


 
26. Erster Netzknoten (103) nach Anspruch 25, ferner umfassend:
einen Sender (708), der geeignet ist, eine Antwort an die drahtlose Vorrichtung (101) zu senden, wobei die Antwort eine Bestätigung umfasst, dass der Netzknotenport (103a) geöffnet wurde, so dass die drahtlose Vorrichtungseinheit (101a) mit dem zweiten Netzknoten (105) kommunizieren kann.
 
27. Erster Netzknoten (103) nach Anspruch 26, wobei die Antwort in einer Paketdatenprotokoll-, PDP-, Kontexterzeugungs-Antwortnachricht enthalten ist.
 
28. Erster Netzknoten (103) nach einem der Ansprüche 25 bis 27, ferner umfassend:
eine Erhaltungseinheit (710), welche geeignet ist, Informationen zu erhalten, die anzeigen, dass eine Subskription, die mit der drahtlosen Vorrichtung (101) assoziiert ist, gültig ist.
 
29. Erster Netzknoten (103) nach einem der Ansprüche 25 bis 28, wobei der Empfänger (701) ferner geeignet ist, die vertrauenswürdige Kommunikation von der drahtlosen Vorrichtungseinheit (101a) und dem zweiten Netzknoten (105) über einen geöffneten Netzknotenport (103a) zu empfangen, der für die vertrauenswürdige Kommunikation zwischen der drahtlosen Vorrichtungseinheit (101a) und dem zweiten Netzknoten (105) reserviert ist; und wobei der erste Netzknoten (103) ferner umfasst:
einen Sender (708), der geeignet ist, die vertrauenswürdige Kommunikation von der drahtlosen Vorrichtungseinheit (101a) und dem zweiten Netzknoten (105) über den geöffneten Netzknotenport (103a) zu senden.
 
30. Erster Netzknoten (103) nach einem der Ansprüche 25 bis 29, wobei die empfangene Nachricht eine Paketdatenprotokoll-, PDP-, Kontextaktivierungsnachricht ist.
 
31. Erster Netzknoten (103) nach Anspruch 30, wobei die Informationen, die anzeigen, dass die drahtlose Vorrichtungseinheit (101a) in der vertrauenswürdigen Zone der drahtlosen Vorrichtung (101) enthalten ist, in einem Protokollauslegungsoptionen-, PCO-, Teil der PDP-Kontextaktivierungsnachricht enthalten sind.
 
32. Erster Netzknoten (103) nach einem der Ansprüche 25 bis 31, wobei der erste Netzknoten (103) und der zweite Netzknoten (105) in einem Netzknoten gemeinsam angeordnet sind; oder
wobei der erste Netzknoten (103) und der zweite Netzknoten (105) jeweils unabhängige Netzknoten sind.
 


Revendications

1. Procédé dans un dispositif sans fil (101) pour permettre une communication digne de confiance entre une entité de dispositif sans fil (101a) et un deuxième noeud de réseau (105) par l'intermédiaire d'un premier noeud de réseau (103), dans lequel le dispositif sans fil (101) et le premier noeud de réseau (103) sont aptes à communiquer en utilisant un canal de communication sécurisé, le procédé comprenant :

la transmission (201, 302, 401) d'un message à destination du premier noeud de réseau (103) en utilisant le canal de communication sécurisé, dans lequel le message comprend des informations indiquant que l'entité de dispositif sans fil (101a) est comprise dans une zone digne de confiance du dispositif sans fil (101), dans lequel le premier noeud de réseau (103) fait au moins partiellement confiance à la zone digne de confiance, dans lequel le fait que la zone soit digne de confiance signifie que le premier noeud de réseau (103) peut être certain que l'entité de dispositif sans fil (101a), qui est comprise dans la zone digne de confiance, est une entité de dispositif sans fil (101a) réelle et non pas une entité de tiers frauduleuse ou fausse ; et

la fourniture (206, 309, 403) d'une communication digne de confiance entre l'entité de dispositif sans fil (101a) et le deuxième noeud de réseau (105) par l'intermédiaire d'un port de noeud de réseau (103a) compris dans le premier noeud de réseau (103), dans lequel le port de noeud de réseau (103a) est réservé pour la communication digne de confiance entre l'entité de dispositif sans fil (101a) et le deuxième noeud de réseau (105).


 
2. Procédé selon la revendication 1, comprenant en outre :
la réception (205, 306, 402) d'une réponse en provenance du premier noeud de réseau (103), dans lequel la réponse comprend une confirmation qu'un port de noeud de réseau (103a) a été ouvert de sorte que l'entité de dispositif sans fil (101) puisse communiquer avec le deuxième noeud de réseau (105), dans lequel le port de noeud de réseau (103a) doit être réservé pour la communication digne de confiance entre l'entité de dispositif sans fil (101a) et le deuxième noeud de réseau (105).
 
3. Procédé selon la revendication 2, dans lequel la réponse est comprise dans un message de réponse de création de contexte de protocole de données en paquets, PDP.
 
4. Procédé selon l'une quelconque des revendications 1 à 3, comprenant en outre :
l'interdiction (200, 301, 400) à d'autres entités de dispositif sans fil dans une zone non digne de confiance du dispositif sans fil (101) d'accéder à un port de noeud de réseau (103a) compris dans le premier noeud de réseau (103), dans lequel le port de noeud de réseau (103a) est réservé pour la communication digne de confiance entre l'entité de dispositif sans fil (101a) et le deuxième noeud de réseau (105), et dans lequel le premier noeud de réseau (103) ne fait pas confiance à la zone non digne de confiance.
 
5. Procédé selon l'une quelconque des revendications 1 à 4, dans lequel la zone au moins partiellement digne de confiance est un modem.
 
6. Procédé selon l'une quelconque des revendications 1 à 5, dans lequel le message est un message d'activation de contexte de protocole de données en paquets, PDP.
 
7. Procédé selon la revendication 6, dans lequel les informations sont comprises dans une partie d'options de configuration de protocole, PCO, du message d'activation de contexte PDP.
 
8. Procédé selon l'une quelconque des revendications 1 à 7, dans lequel le premier noeud de réseau (103) et le deuxième noeud de réseau (105) sont situés dans un même noeud de réseau ; ou dans lequel le premier noeud de réseau (103) et le deuxième noeud de réseau (105) sont des noeuds de réseau indépendants.
 
9. Procédé dans un premier noeud de réseau (103) pour permettre une communication digne de confiance entre une entité de dispositif sans fil (101a) et un deuxième noeud de réseau (105) par l'intermédiaire du premier noeud de réseau (101), dans lequel le premier noeud de réseau (103) et un dispositif sans fil (101) sont aptes à communiquer en utilisant un canal de communication sécurisé, le procédé comprenant :

la réception (201, 302, 601) d'un message en provenance du dispositif sans fil (101) en utilisant le canal de communication sécurisé, dans lequel le message comprend des informations indiquant que l'entité de dispositif sans fil (101a) est comprise dans une zone digne de confiance du dispositif sans fil (101), dans lequel le premier noeud de réseau (103) fait au moins partiellement confiance à la zone digne de confiance, dans lequel le fait que la zone soit digne de confiance signifie que le premier noeud de réseau (103) peut être certain que l'entité de dispositif sans fil (101a), qui est comprise dans la zone digne de confiance, est une entité de dispositif sans fil (101a) réelle et non pas une entité de tiers frauduleuse ou fausse ;

la détermination (202, 303, 602) qu'une communication depuis l'entité de dispositif sans fil (101a) peut être digne de confiance puisqu'elle a reçu les informations indiquant que l'entité de dispositif sans fil (101a) est comprise dans la zone digne de confiance du dispositif sans fil (101) ; et

lorsqu'il est déterminé que la communication depuis l'entité de dispositif sans fil (101a) est digne de confiance, l'ouverture (204, 307, 604) d'un port de noeud de réseau (103a) compris dans le premier noeud de réseau (103), ledit port de noeud de réseau (103a) devant être réservé pour la communication digne de confiance entre l'entité de dispositif sans fil (101a) et le deuxième noeud de réseau (105).


 
10. Procédé selon la revendication 9, comprenant en outre :
la transmission (205, 306, 605) d'une réponse à destination du dispositif sans fil (101), dans lequel la réponse comprend une confirmation que le port de noeud de réseau (103a) a été ouvert de sorte que l'entité de dispositif sans fil (101a) puisse communiquer avec le deuxième noeud de réseau (105).
 
11. Procédé selon la revendication 10, dans lequel la réponse est comprise dans un message de réponse de création de contexte de protocole de données en paquets, PDP.
 
12. Procédé selon l'une quelconque des revendications 9 à 11, comprenant en outre :
l'obtention (203, 303, 305, 603) d'informations indiquant qu'un abonnement associé au dispositif sans fil (101) est valide.
 
13. Procédé selon l'une quelconque des revendications 9 à 12, comprenant en outre :
la fourniture (206, 309, 606) de la communication digne de confiance entre l'entité de dispositif sans fil (101a) et le deuxième noeud de réseau (105) par l'intermédiaire d'un port de noeud de réseau ouvert (103a) réservé pour la communication digne de confiance entre l'entité de dispositif sans fil (101a) et le deuxième noeud de réseau (105).
 
14. Procédé selon l'une quelconque des revendications 9 à 13, dans lequel le message reçu est un message d'activation de contexte de protocole de données en paquets, PDP.
 
15. Procédé selon la revendication 14, dans lequel les informations indiquant que l'entité de dispositif sans fil (101a) est comprise dans la zone digne de confiance du dispositif sans fil (101) sont comprises dans une partie d'options de configuration de protocole, PCO, du message d'activation de contexte PDP.
 
16. Procédé selon l'une quelconque des revendications 9 à 15, dans lequel le premier noeud de réseau (103) et le deuxième noeud de réseau (105) sont situés dans un même noeud de réseau ; ou dans lequel le premier noeud de réseau (103) et le deuxième noeud de réseau (105) sont des noeuds de réseau indépendants.
 
17. Dispositif sans fil (101) apte à permettre une communication digne de confiance entre une entité de dispositif sans fil (101a) et un deuxième noeud de réseau (105) par l'intermédiaire d'un premier noeud de réseau (103), dans lequel le dispositif sans fil (101) et le premier noeud de réseau (103) sont aptes à communiquer en utilisant un canal de communication sécurisé, le dispositif sans fil (101) comprenant :

un émetteur (501) apte à effectuer la transmission d'un message à destination du premier noeud de réseau (103) en utilisant le canal de communication sécurisé, dans lequel le message comprend des informations indiquant que l'entité de dispositif sans fil (101a) est comprise dans une zone digne de confiance du dispositif sans fil (101), dans lequel le premier noeud de réseau (103) fait au moins partiellement confiance à la zone digne de confiance, dans lequel le fait que la zone soit digne de confiance signifie que le premier noeud de réseau (103) peut être certain que l'entité de dispositif sans fil (101a), qui est comprise dans la zone digne de confiance, est une entité de dispositif sans fil (101a) réelle et non pas une entité de tiers frauduleuse ou fausse ; et

dans lequel l'entité de dispositif sans fil (101a) est apte à effectuer :

la transmission d'une communication digne de confiance à destination du deuxième noeud de réseau (105) par l'intermédiaire d'un port de noeud de réseau (103a) compris dans le premier noeud de réseau (103), dans lequel le port de noeud de réseau (103a) est réservé pour la communication digne de confiance entre l'entité de dispositif sans fil (101a) et le deuxième noeud de réseau (105) ; et

la réception d'une communication digne de confiance en provenance du deuxième noeud de réseau (105) par l'intermédiaire du port de noeud de réseau (103a) réservé compris dans le premier noeud de réseau (103) .


 
18. Dispositif sans fil (101) selon la revendication 17, comprenant en outre :
un récepteur (503) apte à effectuer la réception d'une réponse en provenance du premier noeud de réseau (103), dans lequel la réponse comprend une confirmation qu'un port de noeud de réseau (103a) a été ouvert de sorte que l'entité de dispositif sans fil (101a) puisse communiquer avec le deuxième noeud de réseau (105), dans lequel le port de noeud de réseau (103a) doit être réservé pour la communication digne de confiance entre l'entité de dispositif sans fil (101a) et le deuxième noeud de réseau (105).
 
19. Dispositif sans fil (101) selon la revendication 18, dans lequel la réponse est comprise dans un message de réponse de création de contexte de protocole de données en paquets, PDP.
 
20. Dispositif sans fil (101) selon l'une quelconque des revendications 17 à 19, comprenant en outre :
une unité de blocage (504) apte à effectuer l'interdiction à d'autres entités de dispositif sans fil dans une zone non digne de confiance du dispositif sans fil (101) d'accéder à un port de noeud de réseau (103a) compris dans le premier noeud de réseau (103), dans lequel le port de noeud de réseau (103a) est réservé pour la communication digne de confiance entre l'entité de dispositif sans fil (101a) et le deuxième noeud de réseau (105), et dans lequel le premier noeud de réseau (103) ne fait pas confiance à la zone non digne de confiance.
 
21. Dispositif sans fil (101) selon l'une quelconque des revendications 17 à 20, dans lequel la zone au moins partiellement digne de confiance est un modem.
 
22. Dispositif sans fil (101) selon l'une quelconque des revendications 17 à 21, dans lequel le message transmis est un message d'activation de contexte de protocole de données en paquets, PDP.
 
23. Dispositif sans fil (101) selon la revendication 22, dans lequel les informations sont comprises dans une partie d'options de configuration de protocole, PCO, du message d'activation de contexte PDP.
 
24. Dispositif sans fil (101) selon l'une quelconque des revendications 17 à 23, dans lequel le premier noeud de réseau (103) et le deuxième noeud de réseau (105) sont situés dans un même noeud de réseau ; ou
dans lequel le premier noeud de réseau (103) et le deuxième noeud de réseau (105) sont des noeuds de réseau indépendants.
 
25. Premier noeud de réseau (103) apte à permettre une communication digne de confiance entre une entité de dispositif sans fil (101a) et un deuxième noeud de réseau (105) par l'intermédiaire du premier noeud de réseau (103), dans lequel le premier noeud de réseau (103) et un dispositif sans fil (101) sont aptes à communiquer en utilisant un canal de communication sécurisé, le premier noeud de réseau (103) comprenant :

un récepteur (701) apte à effectuer la réception d'un message en provenance du dispositif sans fil (101) en utilisant le canal de communication sécurisé, dans lequel le message comprend des informations indiquant que l'entité de dispositif sans fil (101a) est comprise dans une zone digne de confiance du dispositif sans fil (101), dans lequel le premier noeud de réseau (103) fait au moins partiellement confiance à la zone digne de confiance, dans lequel le fait que la zone soit digne de confiance signifie que le premier noeud de réseau (103) peut être certain que l'entité de dispositif sans fil (101a), qui est comprise dans la zone digne de confiance, est une entité de dispositif sans fil (101a) réelle et non pas une entité de tiers frauduleuse ou fausse ;

une unité de détermination (703) apte à effectuer la détermination qu'une communication depuis l'entité de dispositif sans fil (101a) peut être digne de confiance puisqu'elle a reçu les informations indiquant que l'entité de dispositif sans fil (101a) est comprise dans la zone digne de confiance du dispositif sans fil (101) ; et

une unité d'ouverture (705) apte à effectuer l'ouverture d'un port de noeud de réseau (103a) devant être réservé pour la communication digne de confiance entre l'entité de dispositif sans fil (101a) et le deuxième noeud de réseau (105) lorsqu'il est déterminé que la communication depuis l'entité de dispositif sans fil (101a) est digne de confiance.


 
26. Premier noeud de réseau (103) selon la revendication 25, comprenant en outre :
un émetteur (708) apte à effectuer la transmission d'une réponse à destination du dispositif sans fil (101), dans lequel la réponse comprend une confirmation que le port de noeud de réseau (103a) a été ouvert de sorte que l'entité de dispositif sans fil (101a) puisse communiquer avec le deuxième noeud de réseau (105).
 
27. Premier noeud de réseau (103) selon la revendication 26, dans lequel la réponse est comprise dans un message de réponse de création de contexte de protocole de données en paquets, PDP.
 
28. Premier noeud de réseau (103) selon l'une quelconque des revendications 25 à 27, comprenant en outre :
une unité d'obtention (710) apte à effectuer l'obtention d'informations indiquant qu'un abonnement associé au dispositif sans fil (101) est valide.
 
29. Premier noeud de réseau (103) selon l'une quelconque des revendications 25 à 28, dans lequel le récepteur (701) est en outre apte à effectuer la réception de la communication digne de confiance en provenance de l'entité de dispositif sans fil (101a) et du deuxième noeud de réseau (105) par l'intermédiaire d'un port de noeud de réseau ouvert (103a) réservé pour la communication digne de confiance entre l'entité de dispositif sans fil (101a) et le deuxième noeud de réseau (105) ; et dans lequel le premier noeud de réseau (103) comprend en outre :
un émetteur (708) apte à effectuer la transmission de la communication digne de confiance depuis l'entité de dispositif sans fil (101a) et le deuxième noeud de réseau (105) par l'intermédiaire du port de noeud de réseau ouvert (103a).
 
30. Premier noeud de réseau (103) selon l'une quelconque des revendications 25 à 29, dans lequel le message reçu est un message d'activation de contexte de protocole de données en paquets, PDP.
 
31. Premier noeud de réseau (103) selon la revendication 30, dans lequel les informations indiquant que l'entité de dispositif sans fil (101a) est comprise dans la zone digne de confiance du dispositif sans fil (101) sont comprises dans une partie d'options de configuration de protocole, PCO, du message d'activation de contexte PDP.
 
32. Premier noeud de réseau (103) selon l'une quelconque des revendications 25 à 31, dans lequel le premier noeud de réseau (103) et le deuxième noeud de réseau (105) sont situés dans un même noeud de réseau ; ou
dans lequel le premier noeud de réseau (103) et le deuxième noeud de réseau (105) sont des noeuds de réseau indépendants.
 




Drawing


























Cited references

REFERENCES CITED IN THE DESCRIPTION



This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

Non-patent literature cited in the description