Abstract:
Signal, e.g., message, security techniques are described for wireless systems. A first signal is received by an access node via a wireless link. The signal includes a first authenticator that was generated by the transmitting device, e.g., wireless terminal. The access node determines from an attribute of the signal at least some information known to both the access node and transmitting device but which was not transmitted as part of the message content. The determined information was used by the wireless terminal in generating the first authenticator. The access node sends at least a portion of the first signal including the first authenticator and the determined information to another entity. The entity compares the first authenticator to a second authenticator it generates from the determined information and a secure key which it shares with the transmitting device to determine if the first and second authenticators match.
Abstract:
Location update techniques are described. A dormant mobile node updates its location information by sending a first message over a wireless link to an access node. The access node generates a second update message in response to the first message. The second message includes a mobile node identifier and, in some embodiments is directed to the mobile node. The second message is received by a tracking agent, which updates location information corresponding to the mobile node. In the case where second message is an IP message and is routed to the mobile node using Mobile IP, a Mobile IP home agent routes the second message to the mobile node's last point of network attachment where the tracking agent is located and intercepts the message. The tracking agent may send a response message to the access node sending the second message.
Abstract:
Improved group communications methods which are well suited for a wireless environment are described. End nodes request that access nodes make changes in group membership information maintained at the access node. The access node responds to the requests by a response signal indicating a grant or denial of the request. Requests may be to add or remove the end node, e.g., a mobile wireless terminal, from a particular group membership list identified in the request signal. The access node maintains a detailed list of group members and uses the information to control how signals, e.g., packets, are transmitted to the group members. Group membership information may be updated at the access node at the time of handoff and/or an end node enters the cell or otherwise changes its point of network attachment.
Abstract:
Signal, e.g., message, security techniques are described for wireless systems. A first signal is received by an access node via a wireless link. The signal includes a first authenticator that was generated by the transmitting device, e.g., wireless terminal. The access node determines from an attribute of the signal at least some information known to both the access node and transmitting device but which was not transmitted as part of the message content. The determined information was used by the wireless terminal in generating the first authenticator. The access node sends at least a portion of the first signal including the first authenticator and the determined information to another entity. The entity compares the first authenticator to a second authenticator it generates from the determined information and a secure key which it shares with the transmitting device to determine if the first and second authenticators match.
Abstract:
Proporcionar tratamiento de QoS apropiado a uno o más flujos de tráfico asociados con un terminal, en donde el tratamiento de QoS está definido dentro de un perfil asignado al termina e implementado cuando el terminal solicita acceso a la red. Un nodo de acceso puede recibir indicios de identificacion asociados con el terminal y retransferir tales indicios a un servidor de autentificacion y autorizacion (AAS). El AAS puede luego proveer al nodo de acceso con un perfil que define el tratamiento de QoS para asociar con uno o más flujos de tráfico relacionados con el terminal.
Abstract:
Methods and apparatus for establishing communication links, used to support communications sessions with one or more end nodes, e.g., mobile devices, are described. Various features are directed to a mobile node controlling the establishment of initial links to a first access node and the establishment of new links from a first access node to a second access node during a handoff operation using highly efficient messages and signal.
Abstract:
Methods and apparatus for storing, manipulating, retrieving, and forwarding state, e.g., context and other information, used to support communications sessions with one or more end nodes, e.g., mobile devices, are described. Various features are directed to a mobile node controlling the transfer of state from a first access node to a second access node during a handoff operation thereby eliminating any need for state transfer messages to be transmitted between the second access node and the first access node during handoff. Other features of the invention are directed to the use of a core network node to store state information. State information stored in the core node can be accessed and used by access nodes in cases where a mobile node does not send a state transfer message during a handoff, e.g., because communication with the first access node is lost or because such messages are not supported.
Abstract:
Methods and apparatus for storing, manipulating, retrieving, and forwarding state, e.g., context and other information, used to support communications sessions with one or more end nodes, e.g., mobile devices, are described. Various features are directed to a mobile node controlling the transfer of state from a first access node to a second access node during a handoff operation thereby eliminating any need for state transfer messages to be transmitted between the second access node and the first access node during handoff. Other features of the invention are directed to the use of a core network node to store state information. State information stored in the core node can be accessed and used by access nodes in cases where a mobile node does not send a state transfer message during a handoff, e.g., because communication with the first access node is lost or because such messages are not supported.
Abstract:
Un procedimiento de comunicaciones, que comprende: iniciar, mediante un dispositivo móvil, una primera comunicación a través de una primera ruta entre el dispositivo móvil y un nodo del dominio de red; generar, mediante el dispositivo móvil, una primera información de secuencia; iniciar, mediante el dispositivo móvil, una segunda comunicación a través de una segunda ruta entre el dispositivo móvil y el nodo del dominio de red; generar, mediante el dispositivo móvil, una segunda información de secuencia, en la que la segunda información de secuencia es diferente de la primera información de secuencia; y emplear, mediante el dispositivo móvil, la primera información de secuencia para comunicaciones adicionales del dispositivo móvil con el nodo del dominio de red a través de la primera ruta y emplear la segunda información de secuencia para comunicaciones adicionales del dispositivo móvil con el nodo del dominio de red a través de la segunda ruta, para ordenar mensajes enviados en la primera ruta y la segunda ruta.