FIELD: network.
SUBSTANCE: method of user authentication data and traffic protection between mobile network and IMS network is proposed. When mobile user authenticates himself in mobile network and in IMS network one checks if identification of authenticated mobile user in IMS network corresponds the identification of user in mobile network. If the identifications correspond, mobile user receives confirmation message from IMS network. At that, data exchange between mobile user and IMS network is fulfilled through the protection protocol, secured with common key. At that, key for protection protocol is brought off the confirmation message.
EFFECT: possibility securing of provision of identic key material for mobile user and IMS network.
9 cl, 4 dwg
Authors
Dates
2008-06-27—Published
2004-10-13—Filed