Abstract:
Embodiments of a mobile device and method for secure on-line sign-up and provisioning of credential for Wi-Fi hotspots using SOAP-XML techniques are generally described herein. Techniques for subscription remediation using SOAP-XML techniques are also generally described herein. In some embodiments, the mobile device may be configured to establish a transport-layer security (TLS) session with a sign-up server through a Wi-Fi Hotspot to receive a certificate of the sign-up server. When the certificate is validated, the mobile device may be configured to exchange device management messages with the sign-up server to sign-up for a Wi-Fi subscription and provisioning of credentials, and retrieve a subscription management object (MO) that includes a reference to the provisioned credentials for storage in a device management tree.
Abstract:
Embodiments of computer-implemented methods, systems, computing devices, and computer-readable media are described herein for opportunistically transitioning service flows of mobile devices between being direct and indirect. In various embodiments, a proximity between first and second mobile devices that are in wireless communication with each other may be monitored. In various embodiments, a selective transition of a service flow between the first and second mobile devices from being indirect through the radio network access node using a first radio access technology (“RAT”) to being direct using a second RAT may be facilitated, e.g., responsive to a determination that a first criterion has been met. In various embodiments, a selective transition of the service flow from being direct using the second RAT to being indirect using the first RAT may be facilitated, e.g., responsive to a determination that a second criterion has been met.
Abstract:
Embodiments of the present disclosure describe techniques and configurations for handling a wait time in a wireless communication network when the network is determined to be congested. An apparatus may include computer-readable media having instructions and one or more processors coupled with the computer-readable media and configured to execute the instructions to send a radio resource control request message to a wireless network controller, receive a response message including an extended wait time value, determine upon receipt of the response message whether a back-off timer associated with the apparatus is running, and determine whether to start the backoff timer with the received extended wait time value based at least in part on the determination of whether the back-off timer is running and the received wait time value is integrity protected.
Abstract:
Embodiments describe methods, apparatuses and logic for a user equipment (UE) to connect to an access point (AP) in a wireless local area network (WLAN) based on credentials from a UE's home third generation partnership project (3GPP) network. In some embodiments, the UE may receive selection policy parameters from the WLAN including a network access identifier (NAI) realm. The UE may also receive selection policy parameters from the 3GPP network. The UE may compare the selection policy parameters of the WLAN with the selection policy parameters of the 3GPP network and discover roaming relationships between service providers and the relative priorities of different networks, and create a network list based on the comparison. The UE may then associate with an AP of the WLAN based on the prioritized network list.
Abstract:
Described herein are systems, methods, and apparatus for automatically establishing secure connections to wireless networks using a wireless local area network access point which calls for acceptance of terms and conditions of use. During an initial connection, the user is prompted to review and accept terms and conditions associated with use of that wireless network. Once accepted, future connections at that or other access points, which use those same terms and conditions, occur free from user intervention.
Abstract:
Systems and methods provide solutions for reliable data transfer in a mobile communication network. A user equipment (UE) may indicate to the mobile communication network a capability of the UE to support a reliable data service protocol. The UE may process non-access stratum (NAS) messages, for both mobile originated (MO) data transfer and mobile terminated (MT) data transfer, using the reliable data service protocol to determine whether protocol data units (PDUs) of the NAS messages require no acknowledgement, require acknowledgment, or include an acknowledgement, and to detect and eliminate duplicate PDUs received at the UE in the NAS messages.
Abstract:
Systems and methods provide solutions for reliable data transfer in a mobile communication network. A user equipment (UE) may indicate to the mobile communication network a capability of the UE to support a reliable data service protocol. The UE may process non-access stratum (NAS) messages, for both mobile originated (MO) data transfer and mobile terminated (MT) data transfer, using the reliable data service protocol to determine whether protocol data units (PDUs) of the NAS messages require no acknowledgement, require acknowledgment, or include an acknowledgement, and to detect and eliminate duplicate PDUs received at the UE in the NAS messages.
Abstract:
Systems and methods provide solutions for reliable data transfer in a mobile communication network. A user equipment (UE) may indicate to the mobile communication network a capability of the UE to support a reliable data service protocol. The UE may process non-access stratum (NAS) messages, for both mobile originated (MO) data transfer and mobile terminated (MT) data transfer, using the reliable data service protocol to determine whether protocol data units (PDUs) of the NAS messages require no acknowledgement, require acknowledgment, or include an acknowledgement, and to detect and eliminate duplicate PDUs received at the UE in the NAS messages.
Abstract:
Embodiments describe methods, apparatuses and logic for a user equipment (UE) to connect to an access point (AP) in a wireless local area network (WLAN) based on credentials from a UE's home third generation partnership project (3GPP) network. In some embodiments, the UE may receive selection policy parameters from the WLAN including a network access identifier (NAI) realm. The UE may also receive selection policy parameters from the 3GPP network. The UE may compare the selection policy parameters of the WLAN with the selection policy parameters of the 3GPP network and discover roaming relationships between service providers and the relative priorities of different networks, and create a network list based on the comparison. The UE may then associate with an AP of the WLAN based on the prioritized network list.
Abstract:
Embodiments of a mobile device and methods automatically connecting to a Wi-Fi Hotspot 2.0 are generally described herein. In some embodiments, subscription information for one or more service providers (SP) that operate Wi-Fi networks is stored in a subscription data object of the mobile device. The subscription information includes home service provider information, policy information and pre-provisioned credentials. The mobile device may be configured to determine, without user interaction, if the subscription information is applicable to an available Wi-Fi network and perform without user interaction, an extensible authentication protocol (EAP) based authentication using the pre-provisioned credentials with the available Wi-Fi network to establish a Wi-Fi connection with the available Wi-Fi network. This automatic connectivity may allow a mobile device to roam across Wi-Fi hotspots of Wi-Fi networks and offload traffic to Wi-Fi networks.