Device managed access point lists in wireless communications

    公开(公告)号:AU2009228222A1

    公开(公告)日:2009-10-01

    申请号:AU2009228222

    申请日:2009-03-26

    Applicant: QUALCOMM INC

    Abstract: Systems and methodologies are described that facilitate device-side access point list management. Blacklists of access points unsuitable for providing network access to a related mobile device can be maintained as well as whitelists of suitable access points. The lists can be managed using an interface provided at the mobile device. In addition, lists can be modified according to provisioned network updates. Also, the lists can be of maximum size such that older entries can be purged upon insertion of newer entries based on a number of factors; timed entry deletion is provided as well. Access points in the lists can be stored and presented according to various identifiers related to the access points.

    METHODS AND APPARATUS FOR MOBILITY SUPPORT BETWEEN NETWORK DOMAINS

    公开(公告)号:CA2792422A1

    公开(公告)日:2009-04-16

    申请号:CA2792422

    申请日:2008-10-03

    Applicant: QUALCOMM INC

    Abstract: A method for domain activation during communication device power-up, comprising powering-up a communication device that is communicable with at least a first and second domain; attempting to acquire the first domain upon powering-up the communication device; attempting to acquire the second domain simultaneous with the attempt to acquire the first domain; and attempting to register on whichever of the first and second domains is acquired first-in-time as well as a corresponding apparatus.

    PROVISIONING COMMUNICATION NODES
    113.
    发明专利

    公开(公告)号:CA2701961A1

    公开(公告)日:2009-04-16

    申请号:CA2701961

    申请日:2008-10-07

    Applicant: QUALCOMM INC

    Abstract: Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier (402) for sets of one or more nodes such as restricted access points (102, 104) and access terminals (106, 108) that are authorized to receive service from the restricted access points (102, 104). Access control may be provided by operation of a restricted access point and/or a network node (110). In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.

    Distributed mobile access point acquisition

    公开(公告)号:AU2008311103A1

    公开(公告)日:2009-04-16

    申请号:AU2008311103

    申请日:2008-10-03

    Applicant: QUALCOMM INC

    Abstract: Providing for centralized access management to diverse types of mobile network access points is described herein. By way of example, network components can generate a system determination list (SDL) for a user terminal (UT) that is customized to access capabilities of the UT and/or current position of the UT. The SDL can be employed by the UT to determine which network access points to camp on, handoff to, or the like. The network components can include a network database that maintains UT subscriber and related home Femto cell information, or such information can be maintained at a network operator's home location register. In some aspects, the information can be obtained over the air from the UT or from a base station serving the UT.

    Centralized mobile access point acquisition

    公开(公告)号:AU2008311101A1

    公开(公告)日:2009-04-16

    申请号:AU2008311101

    申请日:2008-10-03

    Applicant: QUALCOMM INC

    Abstract: Providing for centralized access management to diverse types of mobile network access points is described herein. By way of example, network components can generate a system determination list (SDL) for a user terminal (UT) that is customized to access capabilities of the UT and/or current position of the UT. The SDL can be employed by the UT to determine which network access points to camp on, handoff to, or the like. The network components can include a network database that maintains UT subscriber and related home Femto cell information, or such information can be maintained at a network operator's home location register. In some aspects, the information can be obtained over the air from the UT or from a base station serving the UT.

    SYSTEM SELECTION BASED ON APPLICATION REQUIREMENTS AND PREFERENCES

    公开(公告)号:CA2687856A1

    公开(公告)日:2008-12-24

    申请号:CA2687856

    申请日:2008-06-14

    Applicant: QUALCOMM INC

    Abstract: Techniques for performing system selection based on requirements and pref erences of applications are described. A terminal maintains a policy table c ontaining applications supported by the terminal, priorities of the applicat ions, radio technologies that can be used for each application, and prioriti es of the radio technologies for each application. The terminal manages poli cies associated with the supported applications and radio technologies, dete rmines the most suitable radio technology for each application, and activate s and deactivates radio technologies in response to events, e.g., the termin al being turned on, a call being placed, the terminal leaving the coverage o f a radio technology, etc.

    Home base station
    118.
    发明专利

    公开(公告)号:AU2008261886A1

    公开(公告)日:2008-12-18

    申请号:AU2008261886

    申请日:2008-06-06

    Applicant: QUALCOMM INC

    Abstract: Systems and methodologies are described that effectuate establishment of an IPSec tunnel for utilization in a wireless communication environment. IPSec establishment procedures on home base stations can be used to establish IPSec tunnels between home base stations situated on open access sectors of wireless communication environments and packet data interworking function components positioned at the contiguity of secured segments of the wireless communication environments. Moreover, high rate packet data point-to-point protocol challenge-handshake authentication protocols can be directed through the IPSec tunnels to facilitate authentication of access terminals associated with the home base stations in order to facilitate further communications with components dispersed within secure areas of wireless communication environments. Further, international mobile subscriber identities (IMSI) affiliated with access terminals associated with home base stations can be used to identify packet data serving nodes with which to establish communications between home base stations and packet data serving nodes.

    AUTOMATIC RESIGNATION FROM AD HOC NETWORK

    公开(公告)号:CA2662206A1

    公开(公告)日:2008-03-27

    申请号:CA2662206

    申请日:2007-09-21

    Applicant: QUALCOMM INC

    Abstract: A wireless device is configured to automatically resign from an ad hoc ne twork. In some aspects the resignation may be based on automatic detection o f inactivity associated with the ad hoc network. For example, resignation fr om the ad hoc network may be based on absence of uplink and downlink traffic at a wireless device, absence of open sockets at a wireless device, or a la ck of beacon transmissions by other wireless devices. In the latter case, a lack of beacon transmissions by other wireless devices in the ad hoc network may be indicated by the transmission of a relatively large number of beacon s in succession by a wireless device.

    QUALITY OF SERVICE CONFIGURATION FOR WIRELESS COMMUNICATION

    公开(公告)号:CA2645850A1

    公开(公告)日:2007-10-04

    申请号:CA2645850

    申请日:2007-03-26

    Applicant: QUALCOMM INC

    Abstract: Techniques to configure quality of service (QoS) for communication are described. An access terminal configures a first QoS profile prior to a call. This QoS profile is for a set of QoS parameters that provides certain QoS. The access terminal thereafter establishes (e.g., originates or terminates) a call with an access network. If the first QoS profile is appropriate for the call, then QoS is not reconfigured. However, the access terminal may determine that a second QoS profile is to be used for the call, e.g., based on a format or a rate set supported by a remote/other terminal for the call. The access terminal would then configure the second QoS profile during the call. The access terminal may exchange data in accordance with (a) the first QoS profile before the second QoS profile is configured and activated and (b) the second QoS profile after it is configured and activated.

Patent Agency Ranking