Method and apparatus for switching access between mobile networks

ABSTRACT

A method and apparatus for switching access between mobile networks for a mobile terminal comprising a first and a second radio device capable of communication with a first and a second mobile network, respectively. The second mobile network has priority over the first mobile network. A first connection is authorised and established between the firstradio device and the first mobile network. When it is detected that the mobile terminal moves into a coverage area of the second mobile network, a second connection is authorised and established between the second radio device and the second mobile network based on the authorising made for the first connection with the first mobile network. Both connections can then rely on the authorisation of the first connection.

TECHNICAL FIELD

The present invention relates generally to a method and apparatus for switching access for a mobile terminal between overlapping mobile networks. In particular, the handover procedure between mobile networks is facilitated.

BACKGROUND OF THE INVENTION AND PRIOR ART

Mobile access networks are often designed as cellular networks including a plurality of base stations being connected together by means of switching nodes such as Base Station Controllers (BSCs) and/or Mobile Switching Centres (MSCs). Each base station provides radio coverage over an area known as a cell, for communication over radio channels with mobile terminals located in the cell. When a communicating mobile terminal moves across a cell border, its radio connection switches between the corresponding base stations by means of a “handover” or “handoff” procedure. Each mobile network operator is allocated a certain limited radio frequency spectrum for transmissions, and efforts are made by network designers to provide a high traffic capacity within the allocated spectrum.

When setting up radio connections with mobile terminals, standardised communication protocols and radio channels are used, such as those defined for GSM, TDMA, PDC, UMTS, etc, for transmission of speech and/or data over the air interface as well as within the network, providing a certain data rate. Digital circuit switched radio channels of today, e.g., according to the GSM standard, are primarily designed for communication of encoded speech, providing data rates of less than 10 kbit/s.

Existing GSM networks are currently being extended with packet based GPRS (General Packet Radio Service) technology, providing packet switched radio communication with enhanced data rates ranging between 10 and 120 kbit/s for mobile terminals having GPRS capabilities. Further switching nodes, such as Gateway GPRS Service Nodes (GGSNs) and Serving GPRS Service Nodes (SGSNs), are included in GPRS networks. GSM/GPRS networks and other cellular networks typically provide radio coverage over large areas, often covering entire countries, more or less.

Currently, enhanced wireless access technologies are emerging having far greater data rates, such as WLAN (Wireless Local Area Network), covering much smaller areas and providing so-called “spot coverage” over distances around 100 meters. WLAN stands for a plurality of high-speed wireless technologies, e.g., employing frequency hopping and spread-spectrum radio technologies not further discussed here, for packet based radio communication with data rates ranging between approximately 2-54 Mbit/s. Radio channels are used in freely available frequency bands, such as 2,4 GHz and beyond, requiring no operator licence.

A WLAN may use one or more radio stations as access points to which mobile terminals having WLAN capabilities may be connected over predefined radio channels. A WLAN radio station may be directly connected to a extension of a fixed LAN (Local Area Network) which in turn, through various gateways and/or routers, may provide access to the global Internet or to a company intranet. In the case of Internet, a service is normally utilised from a public telecommunication operator.

WLAN typically provides a limited spot coverage geographically overlapping the larger coverage of cellular networks, such as GSM/GPRS networks. The cellular networks can offer connectivity in urban areas as well as in rural areas, whereas WLAN can offer high speed connections in small hot spot areas. WLAN for public access is currently used mainly in airports, hotels and conference venues, providing fast Internet access and other data services to visitors.

Today, work is in progress for developing a multitude of new mobile services, which will be possible to employ in particular as new technologies with greater capacity and higher data rates are introduced. The contents of the new services include voice, text, images, audio files and video files in various different formats and combinations. Internet browsing is also becoming very popular, and in recent years, the wireless and Internet domains are converging.

More sophisticated mobile terminals are also becoming available on the market, provided with functionality matching the new services. Furthermore, it is possible to combine different mobile terminals. For example, a portable laptop computer may be connected to a mobile phone by means of a cable or a wireless interface, such as a Bluetooth radio interface. The mobile phone can then be used as a radio unit providing access over a cellular network, such as a GSM/GPRS network, and the laptop is utilised as an enhanced user interface, whereas the mobile phone acts as a “modem”. Laptop computers may also be provided with a radio device, e.g., implemented as a PCCARD or the like, for radio access to a WLAN. Alternatively, plural radio devices may be integrated in a single terminal, e.g., a laptop computer, for radio communication with different networks, such as a WLAN and a GSM/GPRS network.

For users having a mobile terminal equipment capable of radio communication over multiple access networks, either as a single integrated device or as plural interconnected devices, it is desirable that the mobile terminal is automatically connected to the access network providing the highest data rates, if more than one network is currently available. The user will then benefit from the best available communication possibilities in any given location. For example, a user having a laptop with WLAN capabilities interconnected with a mobile phone with GSM/GPRS capabilities, will want to switch access to a WLAN when entering its coverage area, instead of being connected to the more limited GSM/GPRS network.

In applicant's own PCT application WO 01/35585, it is described a mechanism for selecting the “best” and optimal network connection, when more than one network is available to one or more end devices. The selection is made with respect to factors such as available bandwidth, charge rate, quality, individual preferences, etc.

An access switch between two networks requires that a new radio connection is established with the new network, involving the creation of a new communication session context. The present invention aims at facilitating the switching of access between different networks with maintained security.

Creating a communication session context includes performing certain pre-defined routines for authentication, authorisation and accounting, sometimes referred to as AAA for short. Cellular networks employ AAA routines according to their standardised communication protocols, which are regarded as having a fairly high level of security. For example, each mobile phone may be provided with a secret identity code or the like which is known in the network and is used for authentication and/or for generating encryption keys. The identity code may be stored in a smart card, such as a SIM (Subscriber Identity Module) card as used in GSM, which is movable between different terminals.

A WLAN connection may be secured by means of a certificate stored in the terminal, which is regarded as trustworthy and is used to verify the identity of the user or subscriber. The certificate may also be used for generating various encryption keys and/or session keys to authenticate the terminal and to protect an ongoing session according to well-known techniques, which will not be described here further. The certificate may be issued by a certification authority and may comprise one or more secret codes. However, such secret codes, certificates and encryption keys are cumbersome to administrate and distribute, in particular to subscribers of the general public.

In addition to using stored codes and certificates in the terminal, some services, e.g., Internet services, require a login procedure involving a shared secret, normally a user ID/password combination.

In present solutions, when a mobile terminal with multiple capabilities switches from a first network to a second network, it is a problem that the session context of the first connection is lost and a new session context must be established with the second network, involving a new authentication procedure, among other things. This is the case when, for example, switching between a GSM/GPRS network and a WLAN in either direction. The new session context may further determine different user interface features, available services and charge rates, as dictated by the second network.

Establishing a session context is a fairly complex procedure, and if two different networks are to be accessed, two separate authentication mechanisms having a certain level of security are required, each involving the distribution and storing of secret codes and/or certificates. Further, both networks need one or more nodes with protected links for performing authentication routines.

It is desirable to reduce the handling of shared secrets between a subscriber and network operators, at the same time maintaining security. It is also desirable that the amount of exchanged information and processing work are minimised when switching between networks for reducing the load on transmission resources and to reduce delays.

SUMMARY OF THE INVENTION

The object of this invention is to reduce or eliminate the problems outlined above. This object and others are obtained by providing a method and apparatus for switching access for a mobile terminal between mobile networks. The mobile terminal comprises a first radio device capable of communication with a first mobile network and a second radio device capable of communication with a second mobile network. The second mobile network has priority over the first mobile network, for example by offering a higher transmission bitrate, a higher quality and/or enhanced services.

According to the inventive method, an access request is made to the first mobile network by the mobile terminal using the first radio device. A first connection is authorised and established between the first radio device and the first mobile network. Payload data may then be communicated over the first connection with the limited bitrate/quality/services as offered by the first mobile network. Later, it is detected that the mobile terminal moves into a coverage area of the second mobile network. A second connection is then authorised and established between the second radio device and the second mobile network based on the authorising made for the first connection with the first mobile network.

When authorising the second connection, authentication information is exchanged between the first radio device and an authentication unit in the first mobile network, which authentication information is used by the second radio device for accessing the second mobile network. In this way, authorisation of the second connection relies on the authorisation made for the first connection, thereby substantially facilitating the access switch from the first to the second network. The security level of the first network is also maintained and utilised for the second mobile network.

The exchanged authentication information may comprise login information and one or more encryption keys, according to a predetermined authentication agreement between the first and second mobile networks. Payload data communicated between the second radio device and the second mobile network in the second connection may then be protected by the one or more exchanged encryption keys.

The present invention further embraces a mobile terminal comprising a first radio device capable of communication with a first mobile network and a second radio device capable of communication with a second mobile network, wherein the second mobile network has priority over the first mobile network. The first radio device includes means for making an access request to the first mobile network and means for authorising and establishing a first connection between the first radio device and the first mobile network. The first radio device further includes means for authorising a second connection between the second radio device and the second mobile network based on the first authorised connection with the first mobile network, when it is detected that the mobile terminal moves into a coverage area of the second mobile network.

The present invention further embraces an authentication unit for authenticating a mobile terminal comprising a first radio device capable of communication with a first mobile network and a second radio device capable of communication with a second mobile network, wherein the second mobile network has priority over the first mobile network. The authentication unit includes means for authorising and establishing a first connection between the first radio device and the first mobile network in response to an access request from the first radio device. The authentication unit further includes means for exchanging authentication information with the first radio device when it is detected that the mobile terminal moves into a coverage area of the second mobile network, wherein the exchanged authentication information is used by the second radio device for accessing the second mobile network.

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention will now be described in more detail and with reference to the accompanying drawings, in which:

FIG. 1 is a schematic view of a communication scenario in which the invention may be implemented.

FIG. 2 is a schematic signalling diagram of a procedure for switching between two networks.

DESCRIPTION OF PREFERRED EMBODIMENTS

FIG. 1 is a schematic view of an exemplary communication scenario in which the present invention may be implemented. 100 denotes a mobile terminal equipment generally comprising a first radio device 102 and a second radio device 104 for communication with first and second mobile access networks 106 and 108, respectively. By way of example, the first radio device 102 may be a mobile phone for radio communication with a cellular network 106, and the second radio device 104 may be a laptop computer equipped with a PCCARD or the like for radio communication with a WLAN 108. The mobile phone 102 and the laptop 104 are interconnected by means of a communication link, such as a cable, a Bluetooth interface or an infrared link. The functionality of both the mobile phone 102 and the laptop 104 may therefore be used, regardless of which network is connected.

It should be understood that the mobile terminal 100 is only logically represented in FIG. 1 as two radio devices 102, 104, but can be designed in many alternative ways within the scope of the present invention. For example, the mobile terminal 100 may instead be one integrated unit, such as a single laptop with a PCCARD or a single mobile phone, either being capable of radio communication with both networks 106 and 108.

Both networks 106, 108 are further connected to a backbone network 110, which may be the Internet, an intranet, a fixed public or private network, or any combination of such networks. A server 112 is connected to the backbone network 110, providing service to the mobile terminal 100 in this case.

The first network 106 covers a wide geographic area, and the second network 108 covers a limited overlapping spot area, and can provide a higher data transmission rate than the first network 106. It is therefore preferred that the mobile terminal 100 is connected to the second network 108 when being within the spot coverage area of the second network 108. The second network 108 may also provide a higher quality or enhanced services. Generally speaking, the second network 108 has priority over the first network 106.

The first network 106 comprises an authentication unit 114 having access to various authentication information which is used for authenticating the mobile terminal 100. The authentication information is stored in a database, such as a HLR (Home Location Register), not shown, and may include identity codes and/or certificates matching similar information stored in the terminal or in a SIM card or the like inserted therein.

An exemplary procedure will now be described for accessing the first network 106 and then switching access to the second network 108, with reference to a signalling diagram in FIG. 2. Corresponding elements are denoted with the same reference numbers as in FIG. 1.

Firstly, the mobile terminal 100 makes access to the first network 106 using the first radio device 102, in a first step 200. When setting up the connection, a session context is established, including an authentication procedure. The session context may further include setting parameters such as user interface features, service features, a charge rate and communication protocols, including a data rate.

The authentication procedure involves exchanging of secret codes and/or certificates between the mobile terminal 100 and the authentication unit 114, in a step 202, according to a routine which is predefined in the first network 106. For example, if the first network 106 is a GSM/GPRS network, a SIM card in a mobile phone is used. Different network types have their own specific predefined authentication procedures as dictated by standardised protocols, which will not be described here further.

When the session context is created and a connection is authorised, the mobile terminal 100 may begin to communicate payload data over the first network 106, in this case with a server 112 providing service to the mobile terminal 100, in a step 204. The data rate is then limited to the bitrate offered by the first network 106. Since the two radio devices 102, 104 are interconnected, the functionality and user interface of both may be used by a user, as described above. For example, an IP (Internet Protocol) connection may be established between a mobile phone 102 and a packet core network, not shown, in the first network 106, which IP connection may be available to a laptop computer connected to the mobile phone 102.

If the mobile terminal 100 moves into the coverage area of the second access network 108, this can be detected automatically in a step 206, preferably by means of the second radio device 104. The presence of the mobile terminal 100 in the coverage area of the second network 108 can in fact be detected in different ways. Three exemplary alternatives are given below:

-   1. The second network 108 transmits an identification signal which     the mobile terminal 100 can detect in the second radio device 104,     such as a PCCARD or the like installed in a laptop computer. For     example, in a WLAN, access points continuously transmit an     identifier, typically named ESSID (Extended Service Set Identifier)     and/or SSID, which the second radio device 104 can receive and     recognise as identifying the WLAN. -   2. The second radio device 104 transmits an identification signal     which is detected by the second network 108, which then may notify     the radio device 104 accordingly. -   3. A locating function determines that the mobile device 100 is     located within the second network 108. The locating may be performed     by a GPS (Global Location System) unit, or by a function in the     first network 106, such as triangulation. Such locating functions     are currently used for, e.g., transmitting location dependent     messages to mobile terminals and for searching purposes. The GPS     unit or the first network 106 may then notify the mobile terminal     100 accordingly.

When the availability of the second network 108 to the mobile terminal 100 has been detected, as described in step 206, a new connection with the second network 108 is authorised, based on the authorising for the connection with the first network 106 made in step 202. The first radio unit 102 and the authentication unit 114 then exchanges information, in a step 208, for authorising and establishing the new connection with the second network 108.

The first radio unit 102 may begin by sending an access request. The authentication unit 114 then replies by sending login information, such as a login identity and a temporary password, which the mobile terminal 100 can use when accessing the second network 108 by means of the second radio unit 104. The authentication unit 114 may also send one or more encryption keys to be used during the login procedure and/or during the communication session. The first network 106 has a predetermined authentication agreement with the second network 108, valid for the mobile terminal 100, including the exchanged login information and encryption keys, which are thus already known in the second network 108.

The second network 108 and the second radio unit 104 then exchanges various messages for establishing a new session context, in a step 210, using the login information and encryption keys obtained in step 208.

In this way, the authentication done with the first network 106 in step 202 is utilised for authorising the new session with the second network 108 in step 210. For example, the second network 108 may comprise a subscriber administration server having the agreed login information and encryption keys stored therein. The subscriber administration server of the second network 108 may be integrated with the authentication unit 114 of the first network 106 in one server common to both networks 106, 108.

Hence, the high level of security offered in the first network 106 is utilised by the second network without requiring its own administration and distribution of secret codes and certificates. The authentication procedure in step 210 is also facilitated by reducing the amount of exchanged information, thereby also reducing delays and transmission load.

When the new session context is established and a connection with the second network 108 is authorised, the mobile terminal 100 may communicate payload data with the server 112 by means of the second radio device 104, in a step 212. In this case, the data rate is then increased to the higher bitrate offered by the second network 106. Further, the communicated payload data may be protected by encryption keys issued by the authentication unit 114 of the first network 106 during step 208. The access switch over to the second network 108 is fully automatic, requiring no efforts from a user.

If the mobile terminal 100 moves out of radio coverage of the second network 108, the connection breaks down in a step 214, and the session automatically reverts to the first network 106 by means of the first radio device 102, in a step 216. Since this connection was already authorised in step 202, no further authentication actions are required.

In practice, the invention may be implemented in a computer program for use in the mobile terminal 100, and in a computer program for use in the authentication unit 114.

By using the described invention, access switching between two networks is facilitated with maintained security, without requiring manual efforts from a user. Also, delays and transmission load are reduced.

While the invention has been described with reference to specific exemplary embodiments, the description is only intended to illustrate the inventive concept and should not be taken as limiting the scope of the invention. Various alternatives, modifications and equivalents may be used without departing from the spirit of the invention, which is defined by the appended claims. 

1. A method of switching access for a mobile terminal between a first mobile network and a second different mobile network, the mobile terminal comprising a first radio device and a second radio device capable of communication with the first and second mobile networks, respectively, wherein the first and second radio devices are interconnected and the second mobile network has priority over the first mobile network, the method comprising the steps of: A) making an access request to the first mobile network by the mobile terminal using the first radio device, and B) authorising and establishing a first connection between the first radio device and the first mobile network, characterised by the following further steps: C) exchanging authentication information between the first radio device and an authentication unit in the first mobile network, when it is detected that the mobile terminal is present in a coverage area of the second mobile network, and D) authorising and establishing a second connection between the second radio device and the second mobile network based on the authorising step B) for the first connection with the first mobile network, wherein the authentication information exchanged in step C) is used by the second radio device for accessing the second mobile network.
 2. A method according to claim 1, wherein the exchanged authentication information comprises login information according to a predetermined authentication agreement between the first and second mobile networks.
 3. A method according to claim 2, wherein the exchanged authentication information further comprises one or more encryption keys according to the predetermined authentication agreement.
 4. A method according to claim 3, wherein payload data is communicated between the second radio device and the second mobile network in the connection authorised in step D), wherein the communicated payload data is protected by said one or more exchanged encryption keys.
 5. A method according to claim 1, wherein the mobile terminal presence in the coverage area of the second mobile network is detected by the second radio device detecting an identification signal transmitted by the second mobile network.
 6. A method according to claim 1, wherein the mobile terminal presence in the coverage area of the second mobile network is detected by the second mobile network detecting an identification signal transmitted by the second radio device.
 7. A method according to claim 1, wherein the mobile terminal presence in the coverage area of the second mobile network is detected by a locating function determining that the mobile terminal is located within the coverage area of the second mobile network.
 8. A method according to claim 1, wherein the first radio device is a mobile phone, the first mobile network is a GSM/GPRS network, the second radio device is a PCCARD in a laptop computer being connected to the mobile phone, and the second mobile network is a WLAN.
 9. A method according to claim 1, wherein the first mobile network covers a wide geographical area, and the second mobile network covers a limited overlapping spot area.
 10. A mobile terminal comprising a first radio device and a second radio device which are capable of communication with a first mobile network and a second different mobile network, respectively, wherein the first and second radio devices are interconnected and the second mobile network has priority over the first mobile network, the first radio device comprising: means for making an access request to the first mobile network, and means for authorising and establishing a first connection between the first radio device and the first mobile network, wherein the first radio device further comprises: means for exchanging authentication information with an authentication unit in the first mobile network, when it is detected that the mobile terminal is present in a coverage area of the second mobile network, and that the second radio device comprises: means for authorising and establishing a second connection with the second mobile network by using the authentication information exchanged between the first radio device and the authentication unit in the first mobile network.
 11. A mobile terminal according to claim 10, wherein the first radio device further includes means for receiving login information according to a predetermined authentication agreement between the first and second mobile networks.
 12. A mobile terminal according to claim 11, wherein the first radio device further includes means for receiving one or more encryption keys according to the predetermined authentication agreement.
 13. A mobile terminal according to claim 10, wherein the second radio device further comprises means for detecting an identification signal, transmitted by the second mobile network.
 14. A mobile terminal according to claim 10, wherein the first radio device is a mobile phone capable of communication with a GSM/GPRS network, and the second radio device is a PCCARD in a laptop computer capable of communication with a WLAN.
 15. An authentication unit for authenticating a mobile terminal comprising a first radio device and a second radio device, capable of communication with a first mobile network and a second different mobile network, respectively, wherein the first and second radio devices are interconnected and the second mobile network has priority over the first mobile network, the authentication unit comprising: means for authorising and establishing a first connection between the first radio device and the first mobile network in response to an access request from the first radio device, wherein the authentication unit further comprises: means for exchanging authentication information with the first radio device, when it is detected that the mobile terminal is present in a coverage area of the second mobile network, wherein the exchanged authentication information can be used by the second radio device for accessing the second mobile network.
 16. An authentication unit according to claim 15, characterised by means for transmitting login information to the mobile terminal according to a predetermined authentication agreement between the first and second mobile networks.
 17. An authentication unit according to claim 16, characterised by means for transmitting one or more encryption keys to the mobile terminal according to the predetermined authentication agreement.
 18. An authentication unit according to claim 15, wherein the authentication unit belongs to the first mobile network.
 19. An authentication unit according to claim 18, wherein the authentication unit also belongs to the second mobile network. 