<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE ep-patent-document PUBLIC "-//EPO//EP PATENT DOCUMENT 1.7//EN" "ep-patent-document-v1-7.dtd">
<!--This XML data has been generated under the supervision of the European Patent Office -->
<ep-patent-document id="EP16305322B9W1" file="EP16305322W1B9.xml" lang="en" country="EP" doc-number="3169043" kind="B9" correction-code="W1" date-publ="20250122" status="c" dtd-version="ep-patent-document-v1-7">
<SDOBI lang="en"><B000><eptags><B001EP>ATBECHDEDKESFRGBGRITLILUNLSEMCPTIESILTLVFIROMKCYALTRBGCZEEHUPLSK..HRIS..MTNORS..SM..................</B001EP><B005EP>J</B005EP><B007EP>0009290-CORR01</B007EP></eptags></B000><B100><B110>3169043</B110><B120><B121>CORRECTED EUROPEAN PATENT SPECIFICATION</B121></B120><B130>B9</B130><B132EP>B1</B132EP><B140><date>20250122</date></B140><B150><B151>W1</B151><B155><B1551>de</B1551><B1552>Ansprüche EN</B1552><B1551>en</B1551><B1552>Claims EN</B1552><B1551>fr</B1551><B1552>Revendications EN</B1552></B155></B150><B190>EP</B190></B100><B200><B210>16305322.6</B210><B220><date>20160322</date></B220><B240><B241><date>20171117</date></B241><B242><date>20180917</date></B242></B240><B250>en</B250><B251EP>en</B251EP><B260>en</B260></B200><B300><B310>15306791</B310><B320><date>20151111</date></B320><B330><ctry>EP</ctry></B330></B300><B400><B405><date>20250122</date><bnum>202504</bnum></B405><B430><date>20170517</date><bnum>201720</bnum></B430><B450><date>20241030</date><bnum>202444</bnum></B450><B452EP><date>20240523</date></B452EP><B480><date>20250122</date><bnum>202504</bnum></B480></B400><B500><B510EP><classification-ipcr sequence="1"><text>H04W  12/06        20210101AFI20240502BHEP        </text></classification-ipcr><classification-ipcr sequence="2"><text>H04W   8/08        20090101ALI20240502BHEP        </text></classification-ipcr><classification-ipcr sequence="3"><text>H04W  12/062       20210101ALI20240502BHEP        </text></classification-ipcr><classification-ipcr sequence="4"><text>H04L   9/40        20220101ALI20240502BHEP        </text></classification-ipcr><classification-ipcr sequence="5"><text>H04W  84/12        20090101ALN20240502BHEP        </text></classification-ipcr></B510EP><B520EP><classifications-cpc><classification-cpc sequence="1"><text>H04L  63/0876      20130101 FI20160210BHEP        </text></classification-cpc><classification-cpc sequence="2"><text>H04W   8/082       20130101 LA20180614BHEP        </text></classification-cpc><classification-cpc sequence="3"><text>H04W  84/12        20130101 LA20160210BHEP        </text></classification-cpc><classification-cpc sequence="4"><text>H04W  12/062       20210101 LI20210101RHEP        </text></classification-cpc></classifications-cpc></B520EP><B540><B541>de</B541><B542>UNTERSTÜTZUNG VON IMEI-PRÜFUNG FÜR WLAN-ZUGRIFF AUF EINEN PAKETKERN EINES MOBILEN NETZWERKS</B542><B541>en</B541><B542>SUPPORT OF IMEI CHECKING  FOR WLAN ACCESS TO A PACKET CORE OF A MOBILE NETWORK</B542><B541>fr</B541><B542>SUPPORT DE VÉRIFICATION D'IMEI POUR UN ACCÈS WLAN À UN NOYAU DE PAQUETS D'UN RÉSEAU MOBILE</B542></B540><B560><B561><text>WO-A1-2014/117811</text></B561><B561><text>WO-A2-2010/013914</text></B561><B561><text>US-A1- 2014 165 149</text></B561><B562><text>"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Architecture enhancements for non-3GPP accesses (Release 13)", 17 September 2015 (2015-09-17), XP051071779, Retrieved from the Internet &lt;URL:http://www.3gpp.org/ftp/tsg_sa/WG2_Arch/Latest_SA2_Specs/DRAFT_INTERIM/Archive/&gt; [retrieved on 20150917]</text></B562></B560></B500><B700><B720><B721><snm>DREVON, Nicolas</snm><adr><str>Alcatel-Lucent International
Centre de Villarceaux
Route de Villejust</str><city>91620 NOZAY</city><ctry>FR</ctry></adr></B721><B721><snm>THIEBAUT, Laurent</snm><adr><str>Alcatel-Lucent International
Centre de Villarceaux
Route de Villejust</str><city>91620 NOZAY</city><ctry>FR</ctry></adr></B721><B721><snm>LANDAIS, Bruno</snm><adr><str>Alcatel-Lucent International
4 rue Louis de Broglie</str><city>22304 LANNION</city><ctry>FR</ctry></adr></B721></B720><B730><B731><snm>Alcatel Lucent</snm><iid>101729738</iid><irf>434739EP/MNE</irf><adr><str>Site Nokia Paris Saclay
Route de Villejust</str><city>91620 Nozay</city><ctry>FR</ctry></adr></B731></B730><B740><B741><snm>Page White Farrer</snm><iid>101662674</iid><adr><str>Bedford House
21a John Street</str><city>London WC1N 2BF</city><ctry>GB</ctry></adr></B741></B740></B700><B800><B840><ctry>AL</ctry><ctry>AT</ctry><ctry>BE</ctry><ctry>BG</ctry><ctry>CH</ctry><ctry>CY</ctry><ctry>CZ</ctry><ctry>DE</ctry><ctry>DK</ctry><ctry>EE</ctry><ctry>ES</ctry><ctry>FI</ctry><ctry>FR</ctry><ctry>GB</ctry><ctry>GR</ctry><ctry>HR</ctry><ctry>HU</ctry><ctry>IE</ctry><ctry>IS</ctry><ctry>IT</ctry><ctry>LI</ctry><ctry>LT</ctry><ctry>LU</ctry><ctry>LV</ctry><ctry>MC</ctry><ctry>MK</ctry><ctry>MT</ctry><ctry>NL</ctry><ctry>NO</ctry><ctry>PL</ctry><ctry>PT</ctry><ctry>RO</ctry><ctry>RS</ctry><ctry>SE</ctry><ctry>SI</ctry><ctry>SK</ctry><ctry>SM</ctry><ctry>TR</ctry></B840></B800></SDOBI>
<description id="desc" lang="en"><!-- EPO <DP n="1"> -->
<p id="p0001" num="0001">The present invention generally relates to mobile communication networks and systems.</p>
<p id="p0002" num="0002">Descriptions of mobile networks and systems can be found in the literature, such as in particular in Technical Specifications published by standardization bodies such as for example 3GPP (3<sup>rd</sup> Generation Partnership Project).</p>
<p id="p0003" num="0003">An example of 3GPP mobile system is EPS (Evolved Packet System). An EPS network comprises a Core Network called EPC (Evolved Packet Core) that can be accessed not only by 3GPP access, but also by non-3GPP access, such as in particular WLAN access will be considered more particularly in the following. WLAN access to EPC is specified in particular in 3GPP TS 23.402, and includes Trusted WLAN access and Untrusted WLAN access. An example of non-roaming architecture for 3GPP and Non 3GPP (Trusted or Untrusted) access to EPC is recalled in <figref idref="f0001">figure 1</figref> taken from 3GPP TS 23.402. An example of roaming architecture for 3GPP and Non 3GPP (Trusted or Untrusted) access to EPC is recalled in <figref idref="f0001">figure 2</figref> taken from 3GPP TS 23.402.</p>
<p id="p0004" num="0004">In a system such as EPS for example, a UE may connect to various external networks (referred to as Packet Data Network PDN, an example being an operator's IMS network), via EPC providing connectivity (referred to as PDN connectivity) services. User authentication and authorization procedures are generally performed before granting access and providing connectivity services at establishment of a PDN connection or EPC session.</p>
<p id="p0005" num="0005">Untrusted WLAN access to EPC involves entities such as ePDG (evolved Packet Data Gateway) and 3GPP AAA Server (and 3GPP AAA Proxy in case of rooming), and interfaces such as SWa interface between WLAN AN (WLAN Access Network) and 3GPP AAA Server(or between WLAN AN and 3GPP AAA Proxy in case of roaming), and SWm interface between ePDG and 3GPP AAA Server (or between ePDG and 3GPP AAA Proxy in case of roaming), as specified in particular by 3GPP TS 23.402. Authentication and authorization procedures and protocols for these procedures are specified in particular in 3GPP TS 33.402 and 3GPP TS 29.273.<!-- EPO <DP n="2"> --></p>
<p id="p0006" num="0006">Trusted WLAN access to EPC involves entities such as TWAN (Trusted WLAN Access Network) and 3GPP AAA Server (and 3GPP AAA Proxy in case of rooming), and interfaces such as STa interface between TWAN and 3GPP AAA Server (or between TWAN and 3GPP AAA Proxy in case of roaming), as specified in particular by 3GPP TS 23.402 and 3GPP TS 29.273. Authentication and authorization procedures and protocols for these procedures are specified in particular in 3GPP TS 33.402 and 3GPP TS 29.273.</p>
<p id="p0007" num="0007">In such systems, an IMEI (International Mobile Equipment Identity) has been defined for mobile equipment identification purpose. As specified in particular by 3GPP TS 23.002, an equipment may be classified as white-listed, grey-listed or black-listed or may be unclassified. Such lists are specified in particular in 3GPP TS 22.016. The white list is composed of all number series of equipment identities that are permitted for use. The black list contains all equipment identities that belong to equipment that need to be barred. Besides the black and white list, administrations have the possibility to use a grey list. Equipments on the grey list are not barred (unless on the black list or not on the white list), but are tracked by the network (for evaluation or other purposes).</p>
<p id="p0008" num="0008">IMEI checking procedures may be performed, whereby a mobile equipment (or UE) may provide its IMEI upon request, and the network may check the status of this IMEI with the EIR (Equipment Identity register).</p>
<p id="p0009" num="0009">As recognized by the inventors, and as will be explained with more details later, there is a need to enhance IMEI checking in such systems, in particular for WLAN access (Trusted or Untrusted) to EPC.</p>
<p id="p0010" num="0010">Embodiments of the present invention in particular address such needs.</p>
<p id="p0011" num="0011"><patcit id="pcit0001" dnum="WO2010013914A"><text>WO2010013914</text></patcit> describes a technique for permitting a UE to conditionally access an EPC network, when the UE is requesting the access to the EPC network using a non-3GPP access network.
<ul id="ul0001" list-style="bullet" compact="compact">
<li>There is hereby provided a 3GPP AAA server according to claim 1, a 3GPP AAA proxy according to claim 4, and methods according to claims 5 and 8.</li>
</ul><!-- EPO <DP n="3"> --></p>
<p id="p0012" num="0012">Some embodiments of apparatus and/or methods in accordance with embodiments of the present invention are now described, by way of example only, and with reference to the accompanying drawings, in which:
<ul id="ul0002" list-style="dash" compact="compact">
<li><figref idref="f0001">Figure 1</figref> is intended to recall an example of non-roaming architecture for 3GPP and Non 3GPP (Trusted or Untrusted) access to EPC,</li>
<li><figref idref="f0001">Figure 2</figref> is intended to recall an example of roaming architecture for 3GPP and Non 3GPP (Trusted or Untrusted) access to EPC,</li>
<li><figref idref="f0002">Figure 3</figref> is intended to illustrate an example of signaling flow for authentication and authorization procedure, for untrusted WLAN access to EPC,</li>
<li><figref idref="f0003">Figure 4</figref> is intended to illustrate signaling flow for authentication and authorization procedure including IMEI checking, for untrusted WLAN access to EPC,<!-- EPO <DP n="4"> --></li>
<li><figref idref="f0004">Figure 5</figref> is intended to illustrate signaling flow for authentication and authorization procedure including IMEI checking, for trusted WLAN access to EPC,</li>
<li><figref idref="f0005">Figure 6</figref> is intended to illustrate signaling flow for authentication and authorization procedure including IMEI checking, for trusted WLAN access to EPC,</li>
<li><figref idref="f0006">Figure 7</figref> is intended to illustrate signaling flow for authentication and authorization procedure including IMEI checking, for untrusted WLAN access to EPC,</li>
<li><figref idref="f0007">Figure 8</figref> is intended to illustrate an example of signaling flow for authentication and authorization procedure including IMEI checking, for trusted WLAN access to EPC, according to embodiments of the invention,</li>
<li><figref idref="f0008">Figure 9</figref> is intended to illustrate signaling flow for authentication and authorization procedure including IMEI checking, for untrusted WLAN access to EPC,</li>
<li><figref idref="f0009">Figure 10</figref> is intended to illustrate an example of signaling flow for authentication and authorization procedure including IMEI checking, for trusted WLAN access to EPC, according to embodiments of the invention.</li>
</ul></p>
<heading id="h0001"><u>Abbreviations</u></heading>
<p id="p0013" num="0013">
<dl id="dl0001" compact="compact">
<dt>AAA</dt><dd>Authentication Authorization Accounting</dd>
<dt>AKA</dt><dd>Authentication and Key Agreement</dd>
<dt>DEA</dt><dd>Diameter EAP Answer</dd>
<dt>DER</dt><dd>Diameter EAP Request</dd>
<dt>EAP</dt><dd>Extensible Authentication Protocol</dd>
<dt>EPC</dt><dd>Evolved Packet Core</dd>
<dt>ePDG</dt><dd>Evolved Packet Data Gateway</dd>
<dt>EPS</dt><dd>Evolved Packet System</dd>
<dt>HPLMN</dt><dd>Home Public Land Mobile Network</dd>
<dt>HSS</dt><dd>Home Subscriber Server</dd>
<dt>IMSI</dt><dd>International Mobile Subscriber Identity</dd>
<dt>IMEI</dt><dd>International Mobile Equipment Identity</dd>
<dt>IMS</dt><dd>IP Multimedia Subsystem</dd>
<dt>LTE</dt><dd>Long Term Evolution</dd>
<dt>PDN</dt><dd>Packet Data Network</dd>
<dt>PDN GW</dt><dd>PDN Gateway<!-- EPO <DP n="5"> --></dd>
<dt>PLMN</dt><dd>Public Land Mobile Network</dd>
<dt>TWAN</dt><dd>Trusted WLAN Access Network</dd>
<dt>UWAN</dt><dd>Untrusted WLAN Access Network</dd>
<dt>UE</dt><dd>User Equipment</dd>
<dt>HPLMN</dt><dd>Visited Public Land Mobile Network</dd>
<dt>WLAN</dt><dd>Wireless Local Area Network</dd>
</dl></p>
<p id="p0014" num="0014"><u>Description of various aspects and/or embodiments of the invention</u><!-- EPO <DP n="6"> --></p>
<p id="p0015" num="0015">IMEI(SV) checking is specified for 3GPP accesses for CS and PS domains in TS 23.002, TS 23.018, TS 23.060 and TS 23.401, as well as in appropriate stage 3 specifications. In order to check the IMEI(SV), the network needs to trigger the retrieval of the IMEI(SV) from the UE. NAS messages are specified for that. IMEI(SV) retrieval for non-3GPP accesses such as trusted and untrusted WLAN is specified but for such non-3GPP accesses IMEI(SV) checking in the EIR is not specified yet and a study is currently under progress in SA2 to define whether EIR should be interfaced to the TWAN (for trusted WLAN access) and to ePDG (for untrusted WLAN) or to the AAA server. All contributions up to now push for interfacing the EIR with the AAA server for various reasons, one reason being that the architecture would be common to both trusted and untrusted WLAN, another reason being that it reduces the number of interfaces to the EIR .</p>
<p id="p0016" num="0016">CT1 has recently agreed in CT1 two CRs that allow the network to retrieve the ME's IMEI(SV): 24.302 CR0460 for trusted WLAN and 24.302 CR0461 for untrusted WLAN. For the trusted WLAN case, the IMEI(SV) is retrieved from the UE by the AAA server (via EAP-AKA' new attribute AT_DEVICE_IDENTITY), while for the untrusted WLAN case the IMEI(SV) is retrieved from the UE by the ePDG (via a new IKEv2 attribute DEVICE_IDENTITY).</p>
<p id="p0017" num="0017">However, which entity should trigger the IMEI(SV) checking, and which entity should decide whether to continue the authorization process in case of black-listed, grey-listed or white-listed ME is not specified.</p>
<p id="p0018" num="0018">For non roaming PS sessions, the AAA server (in HPLMN) could be this entity. But for roaming sessions like emergency sessions, this might be in the VPLMN. The main reason is local regulatory policies which force the emergency sessions/calls to be handled by the VPLMN (or by the TWAN operator in the trusted WLAN access case) and thus to take decision on whether to accept emergency sessions issued by e.g. potentially stolen devices.</p>
<p id="p0019" num="0019">This would be in line with the mechanisms specified for the 3GPP accesses where the IMEI checking is fully performed in the VPLMN (by the MSC, SGSN, MME). See e.g. TS 23.401 clause 5.3.2.1, which specifies in step 5b:<br/>
"In order to minimise signalling delays, the retrieval of the ME Identity may be combined with NAS security setup in step 5a. The MME may send the ME Identity Check Request (ME Identity, IMSI) to the EIR. The EIR shall respond with ME Identity Check Ack (Result). Dependent upon the Result, the MME decides whether to continue with this Attach procedure or to reject the UE.</p>
<p id="p0020" num="0020">For an Emergency Attach, the IMEI check to the EIR may be performed. If the IMEI is blocked, operator policies determine whether the Emergency Attach procedure continues or is stopped."</p>
<p id="p0021" num="0021">In case of WLAN access to EPC, no solution is specified for triggering the IMEI(SV) checking and deciding whether to continue the Access authorization in case of in case of black-listed or grey-listed ME (Mobile Equipment) especially in case of roaming.</p>
<p id="p0022" num="0022">Only a partial solution for the HPLMN is disclosed:
<ul id="ul0003" list-style="dash" compact="compact">
<li>For untrusted WLAN case, the ePDG retrieves the IMEI(SV) from the UE per TS 29.273 CR0422. This can be done at step 6 of the authentication procedure described in TS 33.402 clause 8.2.2. The ePDG sends the IKE_AUTH<!-- EPO <DP n="7"> --></li>
<li>Response message to the UE together with the EAP Payload for AKA-Challenge, and the UE responds with its IMEI(SV) together with the EAP payload for AKA-Challenge in step 8 as specified by TS 24.302 CR0461. The IMEI(SV) is provided in step 8 to the AAA Server, which can then complete authentication and check IMEI in step 8a. No additional exchange with the AAA server is required.</li>
</ul>
<figref idref="f0007">Figure 8</figref>.2.2-1 in clause 8.2.2 of TS 33.402 (Tunnel full authentication and authorization - untrusted access) has been updated (<figref idref="f0002">figure 3</figref>) for enabling IMEI checking by the AAA server.</p>
<p id="p0023" num="0023">The signaling flows of <figref idref="f0003">Figures 4</figref>, <figref idref="f0004">5</figref> and <figref idref="f0005">6</figref> allow in roaming scenarios the ePDG orTWAN operator to request IMEI checking using an EIR (Equipment Identity Register) via the AAA server in the Home PLMN.</p>
<p id="p0024" num="0024">Unfortunately, the signaling flows of <figref idref="f0003">Figures 4</figref>, <figref idref="f0004">5</figref> and <figref idref="f0005">6</figref> are not applicable to all operators because, although some operators use a centralized EIR (e.g. the GSMA EIR), some other operators are willing to check the IMEI using an EIR that is local to their PLMN or to the country.</p>
<p id="p0025" num="0025">The signaling flows of <figref idref="f0006 f0007 f0008 f0009">Figures 7 to 10</figref>, in addition to allowing in roaming scenarios the ePDG orTWAN operator to request IMEI checking using an EIR (Equipment Identity Register) via the AAA server in the Home PLMN, allow the ePDG or the TWAN operator to request IMEI checking using an EIR located in the VPLMN country and connected to the 3GPP AAA proxy.</p>
<heading id="h0002"><b>1) <u>Figures 4, 5 and 6</u></b></heading>
<p id="p0026" num="0026">The signaling flows of <figref idref="f0003">Figures 4</figref>, <figref idref="f0004">5</figref> and <figref idref="f0005">6</figref> enhance the above mechanism for IMEI(SV) checking, which only allows the ePDG to decide whether to retrieve the IMEI(SV) from the UE, to allow the 3GPP AAA server to instruct the ePDG to retrieve the IMEI(SV) from the UE.</p>
<p id="p0027" num="0027">The signaling flows also include enhancing the above mechanism for IMEI(SV) checking, which only allows full IMEI checking procedure by the HPLMN, to allow the VPLMN or the TWAN operator to
<ul id="ul0004" list-style="dash" compact="compact">
<li>request to have IMEI checking performed</li>
</ul>
<ul id="ul0005" list-style="none" compact="compact">
<li>- - decide on whether to continue or stop the authorization process depending on the result of IMEI checking e.g. in case of black-listed, grey-listed or white-listed ME</li>
</ul>
although the IMEI checking is performed via the 3GPP AAA server in the HPLMN.</p>
<p id="p0028" num="0028">If it is required that the operator granting the access (VPLMN or TWAN operator) must decide whether to continue the Access authorization process in case<!-- EPO <DP n="8"> --> of black-listed, grey-listed or white-listed ME (at least for emergency session with Local Break Out). The signaling flows, allowing in particular to minimize the number of AAA server exchanges and the number of interfaces to the EIR include one or more of:
<ul id="ul0006" list-style="dash">
<li>In untrusted WLAN case, after it receives the IKE_AUTH Request from the UE, the ePDG may add an <b>"IMEI check request"</b> indication in the subsequent Authentication &amp; Authorization Request (Diameter DER) message to the AAA server.</li>
<li>As the AAA server in HPLMN may want to carry out an IMEI check, it needs to ensure that the IMEI is requested from the UE. In TWAN case it is the AAA server that requests the IMEI from the UE. In the untrusted WLAN case, it is the ePDG that requests the IMEI from the UE. Thus the AAA server needs to be able to instruct the ePDG to retrieve the IMEI from the UE: in the untrusted WLAN case, the AAA server may add an <b>"IMEI-request"</b> indicator in the signaling to the ePDG.</li>
<li>In trusted WLAN case, after it receives the first EAP-RSP/Identity message from the UE, the TWAN may add an <b>"IMEI check request"</b> indication in the subsequent Authentication &amp; Authorization Request (Diameter DER) message to the AAA server.</li>
<li>Then in both trusted and untrusted WLAN cases, the AAA server would request the EIR to check the IMEI.</li>
<li>To allow the ePDG/TWAN to decide whether the call setup should continue or should be stopped, it is proposed to add another indication <b>"action on IMEI check result"</b> in the DER message. The Authentication &amp; Authorization Answer (Diameter DEA) message would also contain a indication "IMEI check result" in order to inform the ePDG/TWAN whether the authorization for the emergency call was given to a user that uses a black-listed, grey-listed or white-listed ME. The ePDG/TWAN may then decide e.g. to inform the local authorities. This is depicted in the following two call flows.</li>
<li><b>"action on IMEI check result"</b> provides the AAA server with instructions on whether to continue or to stop the authorization process to the UE for each of the IMEI check result values provided by the EIR i.e. black-listed ME, grey-listed ME and white-listed ME. In the case of a trusted WLAN access, the instructions may also only allow to continue the authorization process for an emergency session (the UE indicates this is an emergency session in EAP signalling to the 3GPP AAA server, and the TWAN is not aware whether the authentication and authorization procedure initiated by the UE is to setup an emergency session till much later in the call flow).</li>
</ul></p>
<heading id="h0003"><b>Untrusted WLAN</b></heading>
<p id="p0029" num="0029">An example of call flow in case of Untrusted WLAN is depicted in <figref idref="f0003">figure 4</figref>. The IMEI retrieval has been recently agreed at 3GPP (i.e. IMEI Request parameter in step 6, IMEI parameter and the steps 8b and 8c in the figure). <figref idref="f0003">Figure 4</figref> includes the addition of IMEI Request in step 5, IMEI Check Request and Action on IMEI Check Result<!-- EPO <DP n="9"> --></p>
<p id="p0030" num="0030">(black-listed, grey-listed or white-listed ME).</p>
<heading id="h0004">Notes</heading>
<p id="p0031" num="0031">
<ul id="ul0007" list-style="bullet">
<li>The parameter <b>"Action on IMEI check result"</b> contains the action (Stop, Continue) for the case of regular attach/session requests and the action for the case of emergency attach/session requests. Or it may contain a single action (Stop, Continue, Continue Only for an emergency session)</li>
<li>the call flow (AA-answer in step 9 contains EAP-Success) depicts the case where the terminal was detected by the EIR check as not black/grey listed or where the "Action on IMEI Check Result" was "Continue"</li>
<li>In case where the terminal would be detected by the EIR check as black/grey listed and where the corresponding "Action on IMEI Check Result" would not be "Continue", the AA-answer in step 9 would contain an EAP-rejection.</li>
<li>In both cases, if the "IMEI Check Result" indicates that the terminal was detected by the EIR check as black/grey listed, the ePDG may log information and inform the local authorities.</li>
</ul></p>
<heading id="h0005"><b>Trusted WLAN</b></heading>
<p id="p0032" num="0032">An example of signaling flow related to a possible solution in case of Trusted WLAN is depicted in <figref idref="f0004">figure 5</figref>.</p>
<p id="p0033" num="0033">The IMEI retrieval has been recently agreed at 3GPP (i.e. IMEI Request parameter, IMEI parameter and the steps 22c and 22d in the figure).</p>
<p id="p0034" num="0034"><figref idref="f0004">Figure 5</figref> includes the addition of IMEI Request in steps 4 and 5, IMEI Check Request and Action on IMEI Check Result (black-listed, grey-listed or white-listed ME).</p>
<heading id="h0006">Notes:</heading>
<p id="p0035" num="0035">
<ul id="ul0008" list-style="bullet">
<li>The parameter <b>"Action on IMEI check result"</b> may contain the action (Stop, Continue) for the case of regular attach/session requests and the action for the case of emergency attach/session requests. Or it may contain a single action (Stop, Continue, Continue Only for an emergency session).</li>
<li>IMEI Request parameter in steps 4 and 5 is intended to request the AAA server to retrieve the IMEI(SV) from the UE and to return it to the TWAN. The absence of this parameter does not preclude the AAA server to decide the retrieval of the IMEI(SV) from the UE and to provide it to the TWAN.</li>
</ul></p>
<p id="p0036" num="0036">An alternative solution includes requesting IMEI Check as soon as possible i.e. in the EAP-RSP/Identity in step 4. An example of a corresponding call flow is depicted in <figref idref="f0005">figure 6</figref>.<!-- EPO <DP n="10"> --></p>
<p id="p0037" num="0037"><figref idref="f0005">Figure 6</figref> includes the addition of IMEI Check Request and Action on IMEI Check Result (black-listed, grey-listed or white-listed ME).</p>
<heading id="h0007">Notes</heading>
<p id="p0038" num="0038">
<ul id="ul0009" list-style="bullet">
<li>The parameter <b>"Action on IMEI check result"</b> may contain the action (Stop, Continue) for the case of regular attach/session requests and the action for the case of emergency attach/session requests. Or it may contain a single action (Stop, Continue, Continue Only for an emergency session).</li>
<li>the <b>"IMEI Request"</b> in steps 4 and 5 of the other alternative (intended to request the AAA server to retrieve the IMEI(SV) from the UE and to return it to the TWAN ) could also be used in this alternative in case the TWAN wants to trigger the acquisition of the IMEI for other purposes than EIR check .</li>
<li>the call flow (AA-answer in step 23 contains EAP-Success) depicts the case where the terminal was detected by the EIR check as not e.g. black or grey listed or where the "Action on IMEI Check Result" was "Continue".</li>
<li>In case the terminal would be detected by the EIR check as e.g. black or grey listed and where the corresponding "Action on IMEI Check Result" would not be "Continue", the AA-answer in step 23 would contain an EAP-rejection.</li>
<li>In both cases, if the "IMEI Check Result" indicates that the terminal was detected by the EIR check as black/grey listed, the TWAN may log information and inform the local authorities.</li>
</ul></p>
<heading id="h0008"><b>2) <u>Figures 7 to 10</u></b></heading>
<p id="p0039" num="0039">The signaling flows of <figref idref="f0006 f0007 f0008 f0009">Figures 7 to 10</figref> allow the handling of IMEI checking assuming two cases i.e. where the EIR is in the visited country and where the EIR is in the home country. It is also assumed that the AAA server/proxy is interfaced with the EIR.</p>
<p id="p0040" num="0040">It is assumed that the EIR (specified in particular in TS 23.002) is interfaced with the AAA server (or proxy) and not directly to the ePDG/TWAN to minimize the number of interfaces and to avoid the duplication of the procedures in ePDG and TWAN.</p>
<p id="p0041" num="0041">As already indicated, the non-roaming case mechanism is straight forward, but the roaming case requires more analysis.</p>
<p id="p0042" num="0042">For 3GPP access, TS 23.401 clause 5.3.2.1 specifies in step 5b: <i>"In order to minimise signalling delays, the retrieval of the ME Identity may be combined with NAS security setup in step 5a.</i> The MME may send <i>the ME Identity Check Request (ME Identity, IMSI) to the EIR. The EIR shall respond with ME Identity Check Ack (Result).</i> Dependent upon the Result, the MME decides whether to continue with this Attach procedure or to reject the UE." Therefore, for 3GPP access, the decision for triggering the IMEI check procedure, as well as the decision for continuing the procedure is performed in the VPLMN.<!-- EPO <DP n="11"> --></p>
<p id="p0043" num="0043">Moreover, depending on local regulations, the EIR may be located in the visited country (local EIR, not always synchronized with an EIR outside the country) or centralized (e.g. GSMA EIR). The solution should work with both alternatives.</p>
<p id="p0044" num="0044">In embodiments of the invention, the operator who is granting the access (i.e. the VPLMN or the TWAN operator) takes the responsibility of the action plan i.e.
<ul id="ul0010" list-style="dash" compact="compact">
<li>determining whether to trigger IMEI checking,</li>
<li>determining (via e.g. operator configuration) whether the EIR to be used is in the local country or in the home country, and</li>
<li>deciding whether to continue the authorization process in case of black-listed, grey-listed or white-listed UE (at least for emergency session with Local Break Out).</li>
</ul></p>
<p id="p0045" num="0045">In the untrusted WLAN case, the ePDG can retrieve the IMEI from the UE on its own. It is not the case for trusted WLAN case, in which only the 3GPP AAA server can do that. Hence, the solutions for untrusted WLAN and for trusted WLAN will necessarily be different.</p>
<p id="p0046" num="0046">Examples of signaling flows allowing in particular to minimize the number of AAA exchanges are illustrated in <figref idref="f0006 f0007 f0008 f0009">figures 7 to 10</figref>.</p>
<p id="p0047" num="0047">Examples of signaling flows illustrated in <figref idref="f0006">figures 7</figref> (untrusted WLAN) and 8 (trusted WLAN) are first described.</p>
<heading id="h0009"><b>Untrusted WLAN</b></heading>
<p id="p0048" num="0048">For untrusted WLAN, an example of signaling allowing to keep the same number of 3GPP AAA exchanges is illustrated in <figref idref="f0006">figure 7</figref>:
<ul id="ul0011" list-style="dash">
<li>After it receives the IKE_AUTH Request from the UE, the ePDG first decides to retrieve the IMEI from the UE (step 6 of <figref idref="f0006">figure 7</figref>). In order to allow the 3GPP AAA proxy or server to check the IMEI via the EIR, the ePDG just has to add the following parameters in the subsequent Authentication &amp; Authorization Request DER Diameter message to the 3GPP AAA server (step 8 of <figref idref="f0006">figure 7</figref>):
<ul id="ul0012" list-style="none">
<li>∘ the <b>IMEI</b> retrieved from the UE (part of Terminal Information IE in Authentication and Authorization Request message) ,</li>
<li>∘ an <b>"IMEI check request"</b> parameter that indicates whether the IMEI shall be checked by the visited country EIR, or by the home country EIR. The absence of this parameter indicates that IMEI check should not be performed.</li>
</ul></li>
<li>The ePDG also has to decide whether the authorization process should continue or should be stopped depending on the IMEI check result. Hence it is proposed to add another parameter <b>"Action upon IMEI check"</b> indicating whether the 3GPP AAA server shall continue or stop the authentication and authorization procedure for each of the potential IMEI check results from the EIR (e.g. unknown, black listed, grey listed, white listed).</li>
<li>The 3GPP AAA Proxy always forwards the <b>"Action upon IMEI check"</b> and <b>"IMEI check request"</b> parameters to the 3GPP AAAA server. In addition, if the <b>"IMEI check request"</b> parameter indicates the visited country EIR, the 3GPP AAA proxy will then request the EIR to check the IMEI and to provide the <b>"IMEI check result"</b> returned by the EIR to the 3GPP AAA server (step 8c in <figref idref="f0006">figure 7</figref>).<!-- EPO <DP n="12"> --></li>
<li>If the <b>"IMEI check request"</b> parameter indicates the home country EIR, the 3GPP AAA server requests the EIR to check the IMEI.</li>
<li>Based on <b>"Action upon IMEI check"</b> and <b>"IMEI check result"</b> returned by the visited or home EIR, the AAA server determines whether the authentication and authorization procedure shall continue or shall be stopped.</li>
</ul></p>
<heading id="h0010"><b>Trusted WLAN</b></heading>
<p id="p0049" num="0049">For trusted WLAN, an example of signaling flow which may require one more 3GPP AAA exchange is illustrated in <figref idref="f0007">figure 8</figref>. When the EIR is in the visited country, the TWAN cannot immediately provide the IMEI to the 3GPP AAA proxy. Hence, it may be necessary to have a preliminary step where the TWAN asks the 3GPP AAA server to retrieve the IMEI and to return it to the TWAN, before the 3GPP AAA proxy can check the IMEI via the local country EIR:
<ul id="ul0013" list-style="dash">
<li>After it receives the first EAP-RSP/Identity message from the UE, the TWAN adds to the subsequent Authentication &amp; Authorization Request DER Diameter message to the 3GPP AAA server (via the 3GPP AAA Proxy in roaming cases) (steps 4 and 5 in <figref idref="f0007">figure 8</figref>):
<ul id="ul0014" list-style="none">
<li>∘ The <b>"IMEI check request"</b> parameter indicates whether the IMEI shall be checked by the visited country EIR, or by the home country EIR. The absence of this parameter indicates that IMEI check should not be performed;</li>
<li>∘ The <b>"Action upon IMEI check"</b> parameter indicates whether the 3GPP AAA server shall continue or stop the authentication and authorization procedure for each of the potential IMEI check results from the EIR (e.g. unknown, black listed, grey listed, white listed);</li>
</ul></li>
<li>If the 3GPP AAA server receives the <b>"IMEI check request"</b> parameter from a TWAN, it shall perform the IMEI retrieval (step 13 to 17 in <figref idref="f0007">figure 8</figref>).</li>
<li>After the 3GPP AAA server has retrieved the IMEI,
<ul id="ul0015" list-style="none">
<li>∘ If the <b>"IMEI check request"</b> parameter indicates the visited country EIR, the 3GPP AAA server shall return the IMEI to the TWAN in <b>a new AAA-TWAN DEA Diameter message with EAP-Payload AVP absent,</b> with the result code set to DIAMETER_MULTI_ROUND_AUTH and with <b>a new "IMEI-in-VPLMN-Check" flag</b> set to 1 in the DEA-Flags AVP (same mechanism as specified in TS 29.273 for TWAN SCM mode) (steps 19a and 19b in <figref idref="f0007">figure 8</figref>);</li>
<li>∘ If the <b>"IMEI check request"</b> parameter indicates the home country EIR, the 3GPP AAA server requests the EIR to check the IMEI (steps 19c and 19d in <figref idref="f0007">figure 8</figref>);</li>
<li>∘ If no IMEI check was required, the 3GPP AAA server should/may still provide the IMEI to the TWAN if available. This may be done via any message other than step 19a/19b, e.g. in step 23a/23b or any other intermediate message not shown in <figref idref="f0007">figure 8</figref>.</li>
</ul><!-- EPO <DP n="13"> --></li>
<li>If the TWAN receives the above <b>AAA-TWAN DEA Diameter message</b> with the <b>"IMEI-in-VPLMN-Check" flag</b> set to 1,
<ul id="ul0016" list-style="none">
<li>∘ The TWAN re-issues a new DER command via the 3GPP AAA Proxy including the last EAP-Payload sent in the previous request, together with the <b>"IMEI-in-VPLMN-Check" flag</b> set to 1 in the DER-Flags AVP and the IMEI (step 20a in <figref idref="f0007">figure 8</figref>);</li>
<li>∘ The 3GPP AAA Proxy requests the EIR to check the IMEI and forwards the <b>"IMEI check result"</b> returned by the EIR to the AAA server (steps 20b to 20d in <figref idref="f0007">figure 8</figref>).</li>
</ul></li>
</ul></p>
<p id="p0050" num="0050">The AAA server applies the IMEI check instructions received in the <b>"Action upon IMEI check"</b> i.e., based on the <b>"Action upon IMEI check"</b> and on the <b>"IMEI check result"</b> from the visited or home EIR, determines whether the authentication and authorization procedure shall continue or shall be stopped (step 21 in <figref idref="f0007">figure 8</figref>).</p>
<p id="p0051" num="0051">Examples of signaling flows illustrated in <figref idref="f0008">figures 9</figref> (untrusted WLAN access) and 10 (trusted WLAN access) are now described.</p>
<heading id="h0011"><b>Untrusted WLAN</b></heading>
<p id="p0052" num="0052">For untrusted WLAN, an example of signaling flow allowing to keep the same number of 3GPP AAA exchanges is illustrated in <figref idref="f0008">figure 9</figref>:
<ul id="ul0017" list-style="dash">
<li>After it receives the IKE_AUTH Request from the UE, the ePDG first decides to retrieve the IMEI from the UE (step 6 of <figref idref="f0008">figure 9</figref>). In order to allow the 3GPP AAA proxy or server to check the IMEI via the EIR, the ePDG just has to add the following parameters in the subsequent Authentication &amp; Authorization Request DER Diameter message to the 3GPP AAA server (step 8 of <figref idref="f0008">figure 9</figref>):
<ul id="ul0018" list-style="none">
<li>∘ the <b>IMEI</b> retrieved from the UE (already existing and part of Terminal Information IE in Authentication and Authorization Request message),</li>
<li>∘ an <b>"IMEI check request"</b> parameter that indicates whether the IMEI shall be checked by the visited country EIR, or by the home country EIR. The absence of this parameter indicates that IMEI check should not be performed.</li>
</ul></li>
<li>The ePDG also has to decide whether the authorization process should continue or should be stopped depending on the IMEI check result. Hence it is proposed to add another parameter <b>"Action upon IMEI check"</b> indicating whether the 3GPP AAA server or AAA proxy shall continue or stop the authentication and authorization procedure for each of the potential IMEI check results from the EIR (e.g. unknown, black listed, grey listed, white listed).</li>
<li>If the <b>"IMEI check request"</b> parameter indicates the visited country EIR, the 3GPP AAA proxy will then have to request the EIR to check the IMEI and, based on the <b>"Action upon IMEI check"</b> provided by the ePDG, will determine whether the authentication and authorization procedure shall continue or shall be stopped. This indication will be provided to the 3GPP AAA server via the <b>"Decision to Proceed"</b> parameter.<br/>
<!-- EPO <DP n="14"> -->NOTE: An alternative could be that, instead of computing and sending the "Decision to Proceed" parameter, the 3GPP AAA Proxy signals to the 3GPP AAA server the result of the IMEI check (e.g. black, white ..) together with the "action upon IMEI check" parameter, leaving the 3GPP AAA server in the HPLMN behaving in a similar manner than if it did the IMEI check itself towards an EIR in the HPLMN.</li>
<li>If the <b>"IMEI check request"</b> parameter indicates the home country EIR, the 3GPP AAA proxy forwards the ePDG request unchanged to the 3GPP AAA server.</li>
</ul></p>
<heading id="h0012"><b>Trusted WLAN</b></heading>
<p id="p0053" num="0053">For trusted WLAN, an example of signaling flow which may require one more 3GPP AAA exchange is illustrated in <figref idref="f0009">figure 10</figref>. When the EIR is in the visited country, the TWAN cannot immediately provide the IMEI to the 3GPP AAA proxy. Hence, it may be necessary to have a preliminary step where the TWAN asks the 3GPP AAA server to retrieve the IMEI and to return it to the TWAN, before the 3GPP AAA proxy can check the IMEI via the local country EIR:
<ul id="ul0019" list-style="dash">
<li>After it receives the first EAP-RSP/Identity message from the UE, the TWAN just have to add the <b>"IMEI check request"</b> parameter in the subsequent Authentication &amp; Authorization Request DER Diameter message to the 3GPP AAA server (step 4 of <figref idref="f0009">figure 10</figref>). If the "IMEI check request" parameter indicates the home country EIR, the parameter <b>"Action upon IMEI check"</b> is also added.
<ul id="ul0020" list-style="none">
<li>∘ If the 3GPP AAA server receives the "IMEI check request" parameter from a TWAN, it shall perform the IMEI retrieval.</li>
<li>∘ After IMEI retrieval:
<ul id="ul0021" list-style="none">
<li>▪ If the "IMEI check request" parameter indicates the visited country EIR, the 3GPP AAA server returns the IMEI to the TWAN and postpones the final decision on Authentication and Authorization until explicit indication from the TWAN or the 3GPP AAA proxy (see further steps).</li>
<li>▪ If the "IMEI check request" parameter indicates the home country EIR, the 3GPP AAA server requests the EIR to check the IMEI (steps 19c and 19d in <figref idref="f0009">figure 10</figref>);</li>
</ul></li>
</ul></li>
<li>After the 3GPP AAA server has retrieved the IMEI and if the "IMEI check request" parameter indicates the visited country EIR, it shall return it to the TWAN in <b>a new AAA-TWAN DEA Diameter message with EAP-Payload AVP absent,</b> with the result code set to DIAMETER MULTI ROUND AUTH and with <b>a new "IMEI-in-VPLMN-Check" flag</b> set to 1 in the DEA-Flags AVP (same mechanism as specified in TS 29.273 for TWAN SCM mode).</li>
<li>The TWAN then re-issues a new DER command including the last EAP-Payload sent in the previous request, together with the <b>"IMEI-in-VPLMN-Check" flag</b> set to 1 in the DER-Flags AVP, the IMEI, the <b>"IMEI check request"</b> parameter and the <b>"Action upon IMEI check"</b> parameter.
<ul id="ul0022" list-style="none">
<li>∘ The <b>"IMEI check request"</b> parameter indicates that the IMEI shall be checked by the visited country EIR<!-- EPO <DP n="15"> --></li>
<li>∘ The <b>"Action upon IMEI check"</b> parameter indicates whether the 3GPP AAA server or AAA proxy shall continue or stop the authentication and authorization procedure for each of the potential IMEI check results from the EIR (e.g. unknown, black listed, grey listed, white listed).</li>
<li>∘ The <b>"IMEI-in-VPLMN-Check" flag</b> set to 1 in the DER-Flags AVP indicates to the AAA server that the EAP-Payload can be discarded since already sent in previous DER (same principle as for TS 29.273 for TWAN SCM mode).</li>
</ul></li>
<li>When the TWAN receives the IMEI from the 3GPP AAA server, the process continues in the same way as in the ePDG case:<br/>
If the <b>"IMEI check request"</b> parameter indicates the visited country EIR, the 3GPP AAA proxy requests the EIR to check the IMEI and, based on the <b>"Action upon IMEI check",</b> determines whether the authentication and authorization procedure shall continue or shall be stopped. This indication is provided to the 3GPP AAA server via the <b>"Decision to proceed"</b> parameter.</li>
</ul><!-- EPO <DP n="16"> --></p>
<p id="p0054" num="0054">A person of skill in the art would readily recognize that steps of various above-described methods can be performed by programmed computers. Herein, some embodiments are also intended to cover program storage devices, e.g., digital data storage media, which are machine or computer readable and encode machine-executable or computer-executable programs of instructions, wherein said instructions perform some or all of the steps of said above-described methods. The program storage devices may be, e.g., digital memories, magnetic storage media such as a magnetic disks and magnetic tapes, hard drives, or optically readable digital data storage media. The embodiments are also intended to cover computers programmed to perform said steps of the above-described methods.</p>
</description>
<claims id="claims01" lang="en"><!-- EPO <DP n="17"> -->
<claim id="c-en-01-0001" num="0001">
<claim-text>An Authentication Authorization Accounting server in a Home Public Land Mobile Network of a Third Generation Partnership Project packet core for a user equipment, wherein the Authentication Authorisation Accounting server is configured to:
<claim-text>receive from a Trusted WLAN access network a request for checking of an International Mobile Equipment Identity of the user equipment by an Equipment Identity Register in a Visited Public Land Mobile Network for the user equipment;</claim-text>
<claim-text>send an Authentication Authorization Accounting message to the Trusted WLAN access network, wherein the Authentication Authorization Accounting message comprises an International Mobile Equipment Identity retrieved from the user equipment via the Trusted WLAN access network, and an indication that the International Mobile Equipment Identity is to be checked by the Equipment Identity Register in said Visited Public Land Mobile Network.</claim-text></claim-text></claim>
<claim id="c-en-01-0002" num="0002">
<claim-text>An Authentication Authorization Accounting server according to claim 1, wherein receiving the request comprises receiving an Authentication Authorization Accounting Diameter Extensible Authentication Protocol message comprising an indication that the International Mobile Equipment Identity is to be checked by the Equipment Identity Register in said Visited Public Land Mobile Network, and wherein the Authentication Authorization Accounting message comprises an Authentication Authorization Accounting Diameter Extensible Authentication Protocol message.</claim-text></claim>
<claim id="c-en-01-0003" num="0003">
<claim-text>An Authentication Authorization Accounting server according to claim 1 or 2, configured to:<br/>
receive an indication of a determination whether to continue or stop an authentication and authorization procedure for the user equipment based on a result of checking the International Mobile Equipment Identity by said Equipment Identity Register in said Visited Public Land Mobile Network.<!-- EPO <DP n="18"> --></claim-text></claim>
<claim id="c-en-01-0004" num="0004">
<claim-text>An Authentication Authorization Accounting proxy of a Third Generation Partnership Project packet core, configured to:
<claim-text>receive a first Authentication Authorization Accounting message from a Trusted WLAN access network, wherein the first Authentication Authorization Accounting message comprises an International Mobile Equipment Identity retrieved from the user equipment via an Authentication Authorisation Accounting server for the user equipment in a Home Public Land Mobile Network of a Third Generation Partnership Project packet core, and an indication that the International Mobile Equipment Identity is to be checked by an Equipment Identity Register in a Visited Public Land Mobile Network for the user equipment; and</claim-text>
<claim-text>send a second Authentication Authorization Accounting message to the Authentication Authorization Accounting server for the user equipment, wherein the second Authentication Authorization Accounting message comprises an indication of a determination at the Authentication Authorization Accounting proxy whether to continue or stop an authentication and authorization procedure at the Authentication Authorization Accounting server for the user equipment based on a result of checking the International Mobile Equipment Identity by the Equipment Identity Register in the Visited Public Land Mobile Network for the user equipment.</claim-text></claim-text></claim>
<claim id="c-en-01-0005" num="0005">
<claim-text>An Authentication Authorization Accounting proxy according to claim 4, wherein the first Authentication Authorization Accounting message comprises an Authentication Authorization Accounting Diameter Extensible Authentication Protocol message, and wherein the second Authentication Authorization Accounting message comprises an Authentication Authorization Accounting Diameter Extensible Authentication Protocol message</claim-text></claim>
<claim id="c-en-01-0006" num="0006">
<claim-text>A method, comprising:
<claim-text>receiving at an Authentication Authorization Accounting server in a Home Public Land Mobile Network of a Third Generation Partnership Project<!-- EPO <DP n="19"> --> packet core for a user equipment from a Trusted WLAN access network a request for checking of an International Mobile Equipment Identity of the user equipment by an Equipment Identity Register in a Visited Public Land Mobile Network for the user equipment, and</claim-text>
<claim-text>sending an Authentication Authorization Accounting message from the Authentication Authorization Accounting server to the Trusted WLAN access network, wherein the Authentication Authorization Accounting message comprises an International Mobile Equipment Identity retrieved from the user equipment via the Trusted WLAN access network, and an indication that the International Mobile Equipment Identity is to be checked by the Equipment Identity Register in said Visited Public Land Mobile Network.</claim-text></claim-text></claim>
<claim id="c-en-01-0007" num="0007">
<claim-text>The method according to claim 6, wherein receiving the request comprises receiving an Authentication Authorization Accounting Diameter Extensible Authentication Protocol message comprising an indication that the International Mobile Equipment Identity is to be checked by the Equipment Identity Register in said Visited Public Land Mobile Network; and wherein the Authentication Authorization Accounting message comprises an Authentication Authorization Accounting Diameter Extensible Authentication Protocol message.</claim-text></claim>
<claim id="c-en-01-0008" num="0008">
<claim-text>The method according to claim 6 or claim 7, comprising:<br/>
receiving at the Authentication Authorization Accounting server an indication of a determination whether to continue or stop an authentication and authorization procedure for the user equipment based on a result of checking the International Mobile Equipment Identity by said Equipment Identity Register in said Visited Public Land Mobile Network.</claim-text></claim>
<claim id="c-en-01-0009" num="0009">
<claim-text>A method comprising:
<claim-text>receiving at an Authentication Authorization Accounting proxy of a Third Generation Partnership Project packet core a first Authentication Authorization Accounting message from a Trusted WLAN access network<!-- EPO <DP n="20"> --> entity, wherein the first Authentication Authorization Accounting message comprises an International Mobile Equipment Identity retrieved from the user equipment via an Authentication Authorisation Accounting server for the user equipment in a Home Public Land Mobile Network of a Third Generation Partnership Project packet core, and an indication that the International Mobile Equipment Identity is to be checked by an Equipment Identity Register in a Visited Public Land Mobile Network for the user equipment; and</claim-text>
<claim-text>sending a second Authentication Authorization Accounting message from the Authentication Authorization Accounting proxy to the Authentication Authorization Accounting server for the user equipment in the Home Public Land Mobile Network, wherein the second Authentication Authorization Accounting message comprises an indication of a result of a determination at the Authentication Authorization Accounting proxy whether to continue or stop an authentication and authorization procedure at the Authentication Authorisation Accounting server for the user equipment based on a result of checking the International Mobile Equipment Identity by the Equipment Identity Register in a Visited Public Land Mobile Network for the user equipment.</claim-text></claim-text></claim>
<claim id="c-en-01-0010" num="0010">
<claim-text>The method according to claim 9, wherein the first Authentication Authorization Accounting message comprises an Authentication Authorization Accounting Diameter Extensible Authentication Protocol message, and wherein the second Authentication Authorization Accounting message comprises an Authentication Authorization Accounting Diameter Extensible Authentication Protocol message.</claim-text></claim>
</claims>
<claims id="claims02" lang="de"><!-- EPO <DP n="21"> -->
<claim id="c-de-01-0001" num="0001">
<claim-text>Authentication Authorization Accounting Server in einem Home Public Land Mobile Network eines Third Generation Partnership Project Paketkerns für ein Benutzergerät, wobei der Authentication Authorization Accounting Server ausgestaltet ist zum:
<claim-text>Empfangen, von einem Trusted WLAN Zugangsnetz, einer Anforderung zur Prüfung einer International Mobile Equipment Identity des Benutzergeräts durch ein Equipment Identity Register in einem Visited Public Land Mobile Network für das Benutzergerät;</claim-text>
<claim-text>Senden einer Authentication Authorization Accounting Nachricht an das Trusted WLAN Zugangsnetz, wobei die Authentication Authorization Accounting Nachricht eine International Mobile Equipment Identity, die von dem Benutzergerät über das Trusted WLAN Zugangsnetz abgerufen wird, und eine Angabe umfasst, dass die International Mobile Equipment Identity durch das Equipment Identity Register in dem Visited Public Land Mobile Network zu prüfen ist.</claim-text></claim-text></claim>
<claim id="c-de-01-0002" num="0002">
<claim-text>Authentication Authorization Accounting Server nach Anspruch 1, wobei das Empfangen der Anforderung das Empfangen einer Authentication Authorization Accounting Diameter Extensible Authentication Protocol Nachricht umfasst, die eine Angabe umfasst, dass die International Mobile Equipment Identity durch das Equipment Identity Register in dem Public Land Mobile Network zu prüfen ist, und wobei die Authentication Authorization Accounting Nachricht eine Authentication Authorization Accounting Diameter Extensible Authentication Protocol Nachricht umfasst.<!-- EPO <DP n="22"> --></claim-text></claim>
<claim id="c-de-01-0003" num="0003">
<claim-text>Authentication Authorization Accounting Server nach Anspruch 1 oder 2, der ausgestaltet ist zum:<br/>
Empfangen einer Angabe einer Bestimmung, ob die Authentifizierungs- und Autorisierungsprozedur für das Benutzergerät fortzusetzen oder anzuhalten ist, basierend auf einem Ergebnis der Prüfung der International Mobile Equipment Identity durch das Equipment Identity Register in dem Visited Public Land Mobile Network.</claim-text></claim>
<claim id="c-de-01-0004" num="0004">
<claim-text>Authentication Authorization Accounting Proxy eines Third Generation Partnership Project Paketkerns, der ausgestaltet ist zum:
<claim-text>Empfangen einer ersten Authentication Authorization Accounting Nachricht von einem Trusted WLAN Zugangsnetz, wobei die erste Authentication Authorization Accounting Nachricht eine International Mobile Equipment Identity, die von dem Benutzergerät über einen Authentication Authorization Accounting Server für das Benutzergerät in einem Home Public Land Mobile Network eines Third Generation Partnership Project Paketkerns abgerufen wurde, und eine Angabe umfasst, dass die International Mobile Equipment Identity durch ein Equipment Identity Register in einem Visited Public Land Mobile Network für das Benutzergerät zu prüfen ist; und</claim-text>
<claim-text>Senden einer zweiten Authentication Authorization Accounting Nachricht an den Authentication Authorization Accounting Server für das Benutzergerät, wobei die zweite Authentication Authorization Accounting Nachricht eine Angabe einer Bestimmung an dem Authentication Authorization Accounting Proxy umfasst, ob eine Authentifizierungs- und Autorisierungsprozedur an dem Authentication Authorization Accounting Server für Benutzergerät fortzusetzen oder anzuhalten ist, basierend auf einem Ergebnis der Prüfung der International<!-- EPO <DP n="23"> --> Mobile Equipment Identity durch das Equipment Identity Register in dem Visited Public Land Mobile Network für das Benutzergerät.</claim-text></claim-text></claim>
<claim id="c-de-01-0005" num="0005">
<claim-text>Authentication Authorization Accounting Proxy nach Anspruch 4, wobei die erste Authentication Authorization Accounting Nachricht eine Authentication Authorization Accounting Diameter Extensible Authentication Protocol Nachricht umfasst, und wobei die zweite Authentication Authorization Accounting Nachricht eine Authentication Authorization Accounting Diameter Extensible Authentication Protocol Nachricht umfasst.</claim-text></claim>
<claim id="c-de-01-0006" num="0006">
<claim-text>Verfahren, umfassend:
<claim-text>Empfangen, an einem Authentication Authorization Accounting Server in einem Home Public Land Mobile Network eines Third Generation Partnership Project Paketkerns für ein Benutzergerät von einem Trusted WLAN Zugangsnetz, einer Anforderung zur Prüfung einer International Mobile Equipment Identity des Benutzergeräts durch ein Equipment Identity Register in einem Visited Public Land Mobile Network für das Benutzergerät, und</claim-text>
<claim-text>Senden einer Authentication Authorization Accounting Nachricht von dem Authentication Authorization Accounting Server an das Trusted WLAN Zugangsnetz, wobei die Authentication Authorization Accounting Nachricht eine International Mobile Equipment Identity, die von dem Benutzergerät über das Trusted WLAN Zugangsnetz abgerufen wird, und eine Angabe umfasst, dass die International Mobile Equipment Identity durch das Equipment Identity Register in dem Visited Public Land Mobile Network zu prüfen ist.</claim-text></claim-text></claim>
<claim id="c-de-01-0007" num="0007">
<claim-text>Verfahren nach Anspruch 6, wobei das Empfangen der Anforderung das Empfangen einer Authentication Authorization<!-- EPO <DP n="24"> --> Accounting Diameter Extensible Authentication Protocol Nachricht umfasst, die eine Angabe umfasst, dass die International Mobile Equipment Identity durch das Equipment Identity Register in dem Visited Public Land Mobile Network zu prüfen ist; und wobei die Authentication Authorization Accounting Nachricht eine Authentication Authorization Accounting Diameter Extensible Authentication Protocol Nachricht umfasst.</claim-text></claim>
<claim id="c-de-01-0008" num="0008">
<claim-text>Verfahren nach Anspruch 6 oder Anspruch 7, umfassend:<br/>
Empfangen, an dem Authentication Authorization Accounting Server, einer Angabe einer Bestimmung, ob eine Authentifizierungs- und Autorisierungsprozedur für das Benutzergerät fortzusetzen oder anzuhalten ist, basierend auf einem Ergebnis der Prüfung der International Mobile Equipment Identity durch das Equipment Identity Register in dem Visited Public Land Mobile Network.</claim-text></claim>
<claim id="c-de-01-0009" num="0009">
<claim-text>Verfahren, umfassend:
<claim-text>Empfangen, an einem Authentication Authorization Accounting Proxy eines Third Generation Partnership Project Paketkerns, einer ersten Authentication Authorization Accounting Nachricht von einer Trusted WLAN Zugangsnetzentität, wobei die erste Authentication Authorization Accounting Nachricht eine International Mobile Equipment Identity, die von dem Benutzergerät über einen Authentication Authorization Accounting Server für das Benutzergerät in einem Home Public Land Mobile Network eines Third Generation Partnership Project Paketkerns abgerufen wird, und eine Angabe umfasst, dass die International Mobile Equipment Identity durch ein Equipment Identity Register in einem Visited Public Land Mobile Network für das Benutzergerät zu prüfen ist; und<!-- EPO <DP n="25"> --></claim-text>
<claim-text>Senden einer zweiten Authentication Authorization Accounting Nachricht von dem Authentication Authorization Accounting Proxy an den Authentication Authorization Accounting Server für das Benutzergerät in dem Home Public Land Mobile Network, wobei die zweite Authentication Authorization Accounting Nachricht eine Angabe eines Ergebnisses einer Bestimmung an dem Authentication Authorization Accounting Proxy umfasst, ob eine Authentifizierungs- und Autorisierungsprozedur an dem Authentication Authorization Accounting Server für das Benutzergerät fortzusetzen oder anzuhalten ist, basierend auf einem Ergebnis des Prüfens der International Mobile Equipment Identity durch das Equipment Identity Register in einem Visited Public Land Mobile Network für das Benutzergerät.</claim-text></claim-text></claim>
<claim id="c-de-01-0010" num="0010">
<claim-text>Verfahren nach Anspruch 9, wobei die erste Authentication Authorization Accounting Nachricht eine Authentication Authorization Accounting Diameter Extensible Authentication Protocol Nachricht umfasst, und wobei die zweite Authentication Authorization Accounting Nachricht eine Authentication Authorization Accounting Diameter Extensible Authentication Protocol Nachricht umfasst.</claim-text></claim>
</claims>
<claims id="claims03" lang="fr"><!-- EPO <DP n="26"> -->
<claim id="c-fr-01-0001" num="0001">
<claim-text>Serveur d'authentification, d'autorisation et de comptabilité dans un réseau mobile terrestre public domestique d'un coeur de paquet de projet de partenariat de troisième génération pour un équipement utilisateur, dans lequel le serveur d'authentification, d'autorisation et de comptabilité est configuré pour :
<claim-text>recevoir d'un réseau d'accès WLAN de confiance une demande de vérification d'une identité internationale d'équipement mobile de l'équipement utilisateur par un registre d'identités d'équipements dans un réseau mobile terrestre public visité pour l'équipement utilisateur ;</claim-text>
<claim-text>envoyer un message d'authentification, d'autorisation et de comptabilité au réseau d'accès WLAN de confiance, dans lequel le message d'authentification, d'autorisation et de comptabilité comprend une identité internationale d'équipement mobile récupérée auprès de l'équipement utilisateur via le réseau d'accès WLAN de confiance, et une indication selon laquelle l'identité internationale d'équipement mobile doit être vérifiée par le registre d'identités d'équipements dans ledit réseau mobile terrestre public visité.</claim-text></claim-text></claim>
<claim id="c-fr-01-0002" num="0002">
<claim-text>Serveur d'authentification, d'autorisation et de comptabilité selon la revendication 1, dans lequel la réception de la demande comprend la réception d'un message de protocole d'authentification extensible de diamètre d'authentification, d'autorisation et de comptabilité comprenant une indication selon laquelle l'identité internationale d'équipement mobile doit être vérifiée par le registre d'identités d'équipements dans ledit réseau mobile terrestre public visité, et dans lequel le message d'authentification, d'autorisation et de comptabilité comprend un message de protocole d'authentification extensible<!-- EPO <DP n="27"> --> de diamètre d'authentification, d'autorisation et de comptabilité.</claim-text></claim>
<claim id="c-fr-01-0003" num="0003">
<claim-text>Serveur d'authentification, d'autorisation et de comptabilité selon la revendication 1 ou 2, configuré pour :<br/>
recevoir une indication d'une détermination quant à s'il faut poursuivre ou arrêter une procédure d'authentification et d'autorisation pour l'équipement utilisateur sur la base du résultat de la vérification de l'identité internationale d'équipement mobile par ledit registre d'identités d'équipements dans ledit réseau mobile terrestre public visité.</claim-text></claim>
<claim id="c-fr-01-0004" num="0004">
<claim-text>Mandataire d'authentification, d'autorisation et de comptabilité d'un coeur de paquet de projet de partenariat de troisième génération, configuré pour :
<claim-text>recevoir un premier message d'authentification, d'autorisation et de comptabilité d'un réseau d'accès WLAN de confiance, dans lequel le premier message d'authentification, d'autorisation et de comptabilité comprend une identité internationale d'équipement mobile récupérée auprès de l'équipement utilisateur via un serveur d'authentification, d'autorisation et de comptabilité pour l'équipement utilisateur dans un réseau mobile terrestre public domestique d'un coeur de paquet de projet de partenariat de troisième génération, et une indication selon laquelle l'identité internationale d'équipement mobile doit être vérifiée par un registre d'identités d'équipements dans un réseau mobile terrestre public visité pour l'équipement utilisateur ; et</claim-text>
<claim-text>envoyer un deuxième message d'authentification, d'autorisation et de comptabilité au serveur d'authentification, d'autorisation et de comptabilité pour l'équipement utilisateur, dans lequel le deuxième message d'authentification, d'autorisation et de comptabilité comprend une indication d'une<!-- EPO <DP n="28"> --> détermination au niveau du mandataire d'authentification, d'autorisation et de comptabilité quant à s'il faut poursuivre ou arrêter une procédure d'authentification et d'autorisation au niveau du serveur d'authentification, d'autorisation et de comptabilité pour l'équipement utilisateur sur la base du résultat de la vérification de l'identité internationale d'équipement mobile par le registre d'identités d'équipements dans le réseau mobile terrestre public visité pour l'équipement utilisateur.</claim-text></claim-text></claim>
<claim id="c-fr-01-0005" num="0005">
<claim-text>Mandataire d'authentification, d'autorisation et de comptabilité selon la revendication 4, dans lequel le premier message d'authentification, d'autorisation et de comptabilité comprend un message de protocole d'authentification extensible de diamètre d'authentification, d'autorisation et de comptabilité, et dans lequel le deuxième message d'authentification, d'autorisation et de comptabilité comprend un message de protocole d'authentification extensible de diamètre d'authentification, d'autorisation et de comptabilité</claim-text></claim>
<claim id="c-fr-01-0006" num="0006">
<claim-text>Procédé, comprenant :
<claim-text>au niveau d'un serveur d'authentification, d'autorisation et de comptabilité dans un réseau mobile terrestre public domestique d'un coeur de paquet de projet de partenariat de troisième génération pour un équipement utilisateur d'un réseau d'accès WLAN de confiance, la réception d'une demande de vérification d'une identité internationale d'équipement mobile de l'équipement utilisateur par un registre d'identités d'équipements dans un réseau mobile terrestre public visité pour l'équipement utilisateur, et</claim-text>
<claim-text>l'envoi d'un message d'authentification, d'autorisation et de comptabilité du serveur d'authentification, d'autorisation et de comptabilité au réseau d'accès WLAN de confiance, dans<!-- EPO <DP n="29"> --> lequel le message d'authentification, d'autorisation et de comptabilité comprend une identité internationale d'équipement mobile récupérée auprès de l'équipement utilisateur via le réseau d'accès WLAN de confiance, et une indication selon laquelle l'identité internationale d'équipement mobile doit être vérifiée par le registre d'identités d'équipements dans ledit réseau mobile terrestre public visité.</claim-text></claim-text></claim>
<claim id="c-fr-01-0007" num="0007">
<claim-text>Procédé selon la revendication 6, dans lequel la réception de la demande comprend la réception d'un message de protocole d'authentification extensible de diamètre d'authentification, d'autorisation et de comptabilité comprenant une indication selon laquelle l'identité internationale d'équipement mobile doit être vérifiée par le registre d'identités d'équipements dans ledit réseau mobile terrestre public visité ; et dans lequel le message d'authentification, d'autorisation et de comptabilité comprend un message de protocole d'authentification extensible de diamètre d'authentification, d'autorisation et de comptabilité.</claim-text></claim>
<claim id="c-fr-01-0008" num="0008">
<claim-text>Procédé selon la revendication 6 ou la revendication 7, comprenant :<br/>
au niveau du serveur d'authentification, d'autorisation et de comptabilité, la réception d'une indication d'une détermination quant à s'il faut poursuivre ou arrêter une procédure d'authentification et d'autorisation pour l'équipement utilisateur sur la base du résultat de la vérification de l'identité internationale d'équipement mobile par ledit registre d'identités d'équipements dans ledit réseau mobile terrestre public visité.</claim-text></claim>
<claim id="c-fr-01-0009" num="0009">
<claim-text>Procédé comprenant :<!-- EPO <DP n="30"> -->
<claim-text>au niveau d'un mandataire d'authentification, d'autorisation et de comptabilité d'un coeur de paquet de projet de partenariat de troisième génération, la réception d'un premier message d'authentification, d'autorisation et de comptabilité d'une entité de réseau d'accès WLAN de confiance, dans lequel le premier message d'authentification, d'autorisation et de comptabilité comprend une identité internationale d'équipement mobile récupérée auprès de l'équipement utilisateur via un serveur d'authentification, d'autorisation et de comptabilité pour l'équipement utilisateur dans un réseau mobile terrestre public domestique d'un coeur de paquet de projet de partenariat de troisième génération, et une indication selon laquelle l'identité internationale d'équipement mobile doit être vérifiée par un registre d'identités d'équipements dans un réseau mobile terrestre public visité pour l'équipement utilisateur ; et</claim-text>
<claim-text>l'envoi d'un deuxième message d'authentification, d'autorisation et de comptabilité du mandataire d'authentification, d'autorisation et de comptabilité au serveur d'authentification, d'autorisation et de comptabilité pour l'équipement utilisateur dans le réseau mobile terrestre public domestique,</claim-text>
<claim-text>dans lequel le deuxième message d'authentification, d'autorisation et de comptabilité comprend une indication du résultat d'une détermination au niveau du mandataire d'authentification, d'autorisation et de comptabilité quant à s'il faut poursuivre ou arrêter une procédure d'authentification et d'autorisation au niveau du serveur d'authentification, d'autorisation et de comptabilité pour l'équipement utilisateur sur la base du résultat de la vérification de l'identité internationale d'équipement mobile par le registre d'identités d'équipements dans un réseau mobile terrestre public visité pour l'équipement utilisateur.</claim-text><!-- EPO <DP n="31"> --></claim-text></claim>
<claim id="c-fr-01-0010" num="0010">
<claim-text>Procédé selon la revendication 9, dans lequel le premier message d'authentification, d'autorisation et de comptabilité comprend un message de protocole d'authentification extensible de diamètre d'authentification, d'autorisation et de comptabilité, et dans lequel le deuxième message d'authentification, d'autorisation et de comptabilité comprend un message de protocole d'authentification extensible de diamètre d'authentification, d'autorisation et de comptabilité.</claim-text></claim>
</claims>
<drawings id="draw" lang="en"><!-- EPO <DP n="32"> -->
<figure id="f0001" num="1,2"><img id="if0001" file="imgf0001.tif" wi="134" he="211" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="33"> -->
<figure id="f0002" num="3"><img id="if0002" file="imgf0002.tif" wi="137" he="200" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="34"> -->
<figure id="f0003" num="4"><img id="if0003" file="imgf0003.tif" wi="137" he="200" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="35"> -->
<figure id="f0004" num="5"><img id="if0004" file="imgf0004.tif" wi="150" he="215" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="36"> -->
<figure id="f0005" num="6"><img id="if0005" file="imgf0005.tif" wi="160" he="222" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="37"> -->
<figure id="f0006" num="7"><img id="if0006" file="imgf0006.tif" wi="137" he="208" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="38"> -->
<figure id="f0007" num="8"><img id="if0007" file="imgf0007.tif" wi="162" he="213" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="39"> -->
<figure id="f0008" num="9"><img id="if0008" file="imgf0008.tif" wi="137" he="201" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="40"> -->
<figure id="f0009" num="10"><img id="if0009" file="imgf0009.tif" wi="155" he="233" img-content="drawing" img-format="tif"/></figure>
</drawings>
<ep-reference-list id="ref-list">
<heading id="ref-h0001"><b>REFERENCES CITED IN THE DESCRIPTION</b></heading>
<p id="ref-p0001" num=""><i>This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.</i></p>
<heading id="ref-h0002"><b>Patent documents cited in the description</b></heading>
<p id="ref-p0002" num="">
<ul id="ref-ul0001" list-style="bullet">
<li><patcit id="ref-pcit0001" dnum="WO2010013914A"><document-id><country>WO</country><doc-number>2010013914</doc-number><kind>A</kind></document-id></patcit><crossref idref="pcit0001">[0011]</crossref></li>
</ul></p>
</ep-reference-list>
</ep-patent-document>
