摘要 |
<p>The method involves reaching of the first message to the access node (ZK) from the communication terminal (KEG). The first message is transferred by means of a first communication protocol, whereby the first message contains information, which describes the communication terminal or an user. The first message is passed on unaltered to a control computer (SR) of the access network (KN1) from the access nodes. The control computer selects the information from the first message. A second message is generated by the computer, whereby the second message is transferred by means of second communication protocol and which contains a part of the selected information. An identity checking computer (IR) is determined from the control computer as a result of the selected information, which is able to identify the communication terminal or the user. The second message is transferred to the identity checking computer from the control computer whereby the identity checking computer establishes a contact with the communication terminal and thereby identification of the communication terminal or the user is possible. The communication terminal is connected at least temporarily with an access node of an access network, which makes possible an access of the communication terminal for communication services (DR).</p> |