Abstract:
A multi-party commitment method is provided whereby a joining node uses contributions provided by contributor nodes in a peer-to-peer overlay network to generate a node identifier. The joining node generates a first contribution and sends a join request to an introducer node (or a plurality of contributor nodes), where the join request seeks to obtain one or more contributions for generating the node identifier within an identifier space of the overlay network. A hash of the first contribution may be included as part of the join request. In response, the joining node may receive a plurality of contributions, wherein the contributions are bound to each other and the first contribution by a prior external multi-node commitment operation. The joining node can then generate its node identifier as a function of the first contribution and the received contributions. Consequently, collusion between nodes and malicious manipulation during ID generation can be frustrated.
Abstract:
Techniques for supporting eCalls are described. In an aspect, an eCall indicator may be used to indicate an eCall being established. In one design, a terminal may generate a message including an eCall indicator and may send the message to originate an eCall. The eCall indicator may indicate (i) whether or not a call is an eCall or (ii) whether an eCall is initiated automatically by the terminal or manually by a user. In another aspect, a terminal may avoid sending signaling for mobility management and connection management to wireless networks except for eCalls and designated calls. The terminal may avoid performing location updating, performing registration, responding to paging requests, etc. The terminal may exchange signaling with a wireless network for an eCall initiated by the terminal. After the eCall is initiated, the terminal may perform location updating with the wireless network and call establishment for the eCall.
Abstract:
Techniques for archiving data exchanged between a terminal and a wireless communication network during a session are described. Session data may be archived at a network entity in real-time while the session is in progress or may be uploaded to the network entity for archival after the session has terminated. The network entity may archive all data exchanged during the session or only data of the terminal, depending on whether authorization is received from other terminals in the session. The network entity may assign an identifier for the session and may store the identifier and other attributes for the session. During or after the session, the network entity may receive from the terminal a request for all or a portion of the archived data and would then provide the requested data. The network entity may archive a single copy of the session data for all terminals in the session.
Abstract:
Systems and methodologies are described that facilitate fetching a native security context between network nodes in a core network after an inter-system handover of a mobile device. For instance, a mobility message that is integrity protected by a security context (e.g., the native security context, a mapped security context,..) can be obtained at a network node from the mobile device. Further, the network node can send a request to a disparate network node within a core network. The request can include information that can be used by the disparate network node to establish that the mobile device is authenticated. Moreover, the native security context can be received from the disparate network node in response to the request. Accordingly, the native security context need not be recreated between the network node and the mobile device.
Abstract:
Systems and methods for correlating multiple registrations from a single device are disclosed. A private ID used in an prior registration may be used to obtain subsequent private IDs. The subsequent private IDs may be used in subsequent registrations. An instance ID from an prior registration may be used in conjunction with different registration IDs in subsequent registrations.
Abstract:
Methods and apparatus are disclosed for session initiation in a conference. In one aspect, a method for communicating between multiple parties is disclosed. The method comprises generating, at a first device, a first message for transmission to a second device. The method further comprises receiving, at the first device, a second message for establishing a conference. The second message includes a list of one or more concurrent codec capabilities supported by the second device. The list of one or more concurrent codec capabilities supported by the second device comprises an indication of whether one or more resources usable for one or more concurrent instances of a first listed codec may instead be used for one or more concurrent instances of a second listed codec.
Abstract:
Systems, methods, and devices for priority based management of the connections between a device and a network are described herein. In some aspects, a device may include multiple applications with different access priorities. As a result of a mobility event, such as change in location or resuming operation after an idle period, the device may be configured to transmit a signal indicating its status. The signal may include an access priority value. Various methods and systems for determining an access priority value for devices configured to support one or more access priorities are described.
Abstract:
Systems, methods, and devices for priority based management of the connections between a device (MTC, M2M) and a network are described herein. In some aspects, a device may include multiple applications with different access priorities, e.g. low priority or normal priority. As a result of a mobility event, such as change in location or resuming operation after an idle period, the device may be configured to transmit a signal indicating its status, e.g. TAU, RAU. The signal may include an access priority value. Various methods and systems for determining an access priority value for devices configured to support one or more access priorities are described.
Abstract:
Un procedimiento para procedimientos de interrupción del servicio por parte de una entidad de red (306, 308, 310, 312) en un entorno de comunicaciones, que comprende: enviar a un primer dispositivo móvil (304) una invitación (326) para una sesión, siendo la invitación de un segundo dispositivo móvil (302) y teniendo portadores de conmutación de paquetes para medios; poner en espera la sesión (334) en función de un rechazo a la invitación por parte del primer dispositivo móvil (304) basándose en una indicación de reducción de señalización de modo inactivo recibida; recibir una llamada de conmutación de circuitos (338, 340, 342) desde el primer dispositivo móvil (304); correlacionar (346) la llamada de conmutación de circuitos con la sesión en espera; y establecer una comunicación entre el primer dispositivo móvil (204) y el segundo dispositivo móvil (202) por portadores de dominio de conmutación de circuitos (350) y portadores del subsistema multimedia de protocolo de Internet (352).
Abstract:
Un aparato de comunicación inalámbrica (300) operable en un sistema de comunicación (100), que comprende: un circuito de registro configurado para obtener un primer identificador que comprende una primera parte de identificación y una segunda parte de identificación, en el que la primera parte de identificación comprende un identificador de instancia, la segunda parte de identificación comprende un primer identificador de registro, en el que el identificador de instancia comprende una identidad de equipo móvil internacional, IMEI, y en el que el primer identificador se utiliza en un registro anterior, y obtener un segundo identificador que comprende la primera parte de identificación y que además comprende una tercera parte de identificación, en el que la tercera parte de identificación comprende un segundo identificador de registro y el segundo identificador se usa en un registro adicional; medios (396) para recibir al menos uno de voz, vídeo y datos multimedia; y medios (398) para transmitir el primer identificador y el segundo identificador a un servidor de red.