Abstract:
Systems and methodologies are described that facilitate fetching a native security context between network nodes in a core network after an inter-system handover of a mobile device. For instance, a mobility message that is integrity protected by a security context (e.g., the native security context, a mapped security context,..) can be obtained at a network node from the mobile device. Further, the network node can send a request to a disparate network node within a core network. The request can include information that can be used by the disparate network node to establish that the mobile device is authenticated. Moreover, the native security context can be received from the disparate network node in response to the request. Accordingly, the native security context need not be recreated between the network node and the mobile device.
Abstract:
A multi-party commitment method is provided whereby a joining node uses contributions provided by contributor nodes in a peer-to-peer overlay network to generate a node identifier. The joining node generates a first contribution and sends a join request to an introducer node (or a plurality of contributor nodes), where the join request seeks to obtain one or more contributions for generating the node identifier within an identifier space of the overlay network. A hash of the first contribution may be included as part of the join request. In response, the joining node may receive a plurality of contributions, wherein the contributions are bound to each other and the first contribution by a prior external multi-node commitment operation. The joining node can then generate its node identifier as a function of the first contribution and the received contributions. Consequently, collusion between nodes and malicious manipulation during ID generation can be frustrated.
Abstract:
An access terminal may switch to a different mode of wireless network selection as a result of manual selection of a wireless cell set (e.g., a closed subscriber group) associated with one or more wireless cells. For example, if the user of an access terminal selects a closed subscriber group in a wireless network that is different than the current wireless network, the access terminal may enter a manual mode of wireless network selection, select the wireless network corresponding to the closed subscriber group, and register on a closed subscriber group cell in the selected wireless network. In addition, an access terminal may automatically switch to a different mode of wireless network selection (e.g., the prior mode) upon losing coverage of a wireless cell set. An access terminal may also automatically select a cell of a wireless cell set if the access terminal returns to a cell of the cell set within a defined period of time after losing coverage of the cell set. Furthermore, an access terminal may return to a prior wireless network upon losing coverage of a wireless cell set.
Abstract:
Techniques for supporting eCalls are described. In an aspect, an eCall indicator may be used to indicate an eCall being established. In one design, a terminal may generate a message including an eCall indicator and may send the message to originate an eCall. The eCall indicator may indicate (i) whether or not a call is an eCall or (ii) whether an eCall is initiated automatically by the terminal or manually by a user. In another aspect, a terminal may avoid sending signaling for mobility management and connection management to wireless networks except for eCalls and designated calls. The terminal may avoid performing location updating, performing registration, responding to paging requests, etc. The terminal may exchange signaling with a wireless network for an eCall initiated by the terminal. After the eCall is initiated, the terminal may perform location updating with the wireless network and call establishment for the eCall.
Abstract:
Systems and methods for implementing explicit congestion notification (ECN) across disparate networks, configurations, and protocols are disclosed. Local rate adaptation using ECN may be provided without relying on other operators to upgrade or ensure their networks are ECN transparent or ECN capable.
Abstract:
A method and apparatus for over-the-air provisioning of authentication credentials at an access device via a first access system, wherein the authentication credentials are for a second access system lacking an over-the-air provisioning procedure. For example, the second access system may be a 3GPP system using AKA authentication methods. The first access system may be CDMA, using an OTASP or IOTA procedure. Provisioning the authentication credentials may include provisioning any of a 3GPP AKA authentication root key (K), AKA authentication related parameters, an AKA authentication algorithm to be used in the 3GPP authentication, or authentication algorithm customization parameters.
Abstract:
Techniques for transporting messages for location services (LCS) are described. A Mobility Management Entity (MME) may have a location session with an Evolved Serving Mobile Location Center (E-SMLC) to provide location services for a User Equipment (UE). The UE may exchange LCS-related messages with the E-SMLC to obtain location services. In an aspect, LCS-related messages exchanged between the UE and the E-SMLC may be encapsulated in Non-Access Stratum (NAS) messages and transported via the MME and a base station. In another aspect, a routing identifier (ID) may be used to associate messages exchanged between the UE and the MME with the location session between the MME and the E-SMLC for the UE. Each NAS message exchanged between the MME and the UE may include the routing ID, which may enable the MME to associate each NAS message from the UE with the location session between the MME and the E-SMLC.
Abstract:
Fall back using mobile device assisted terminating access domain selection is provided. A network entity forwards an invitation to a session to a mobile device. Session has packet switched bearers for media. Mobile device replies with a rejection of the invitation and a request for network entity to hold the session. Rejection is based on mobile device determining circuit switched bearers should be utilized. Mobile device sends a circuit switched call and network entity correlates the circuit switched call with the session. A dialog is set up over circuit switched domain bearers and Internet Protocol Multimedia Subsystem bearers.
Abstract:
An access terminal may switch to a different mode of wireless network selection as a result of manual selection of a wireless cell set (e.g., a closed subscriber group) associated with one or more wireless cells. For example, if the user of an access terminal selects a closed subscriber group in a wireless network that is different than the current wireless network, the access terminal may enter a manual mode of wireless network selection, select the wireless network corresponding to the closed subscriber group, and register on a closed subscriber group cell in the selected wireless network. In addition, an access terminal may automatically switch to a different mode of wireless network selection (e.g., the prior mode) upon losing coverage of a wireless cell set. An access terminal may also automatically select a cell of a wireless cell set if the access terminal returns to a cell of the cell set within a defined period of time after losing coverage of the cell set. Furthermore, an access terminal may return to a prior wireless network upon losing coverage of a wireless cell set.
Abstract:
Devices and methods are provided for system selection from a plurality of wireless system access technologies, such as a first group (e.g., 3GPP2 technologies) and a second group (e.g., 3GPP technologies). In one embodiment, the method may involve storing identification information pertaining to the first group in a database, wherein the database may concern the priority of ones of the access technologies pertaining to the second group. The method may also involve selecting a preferred access technology from one of the first and second groups based at least in part on the identification information stored in the database.