Abstract:
PROBLEM TO BE SOLVED: To provide an improved method and an apparatus for location tracking and paging. SOLUTION: An inactive-state mobile node updates its location information by transmitting a first message via a radio link to an access node. In response to the first message, the access node generates a second update message. The second message includes a mobile node identifier. The second message is received by a tracking agent. The tracking agent updates location information corresponding to the mobile node. When a route of the second message is specified by the mobile node as a form of an IP message using a mobile IP, the route of the second message is specified for a last network attachment point of the mobile node by a mobile IP home agent. Then, the tracking agent is stationed at the last point and interception of the message is performed. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
Location update techniques are described. A dormant mobile node updates its location information by sending a first message over a wireless link to an access node. The access node generates a second update message in response to the first message. The second message includes a mobile node identifier and, in some embodiments is directed to the mobile node. The second message is received by a tracking agent, which updates location information corresponding to the mobile node. In the case where second message is an IP message and is routed to the mobile node using Mobile IP, a Mobile IP home agent routes the second message to the mobile node's last point of network attachment where the tracking agent is located and intercepts the message. The tracking agent may send a response message to the access node sending the second message.
Abstract:
Signal, e.g., message, security techniques are described for wireless systems. A first signal is received by an access node via a wireless link. The signal includes a first authenticator that was generated by the transmitting device, e.g., wireless terminal. The access node determines from an attribute of the signal at least some information known to both the access node and transmitting device but which was not transmitted as part of the message content. The determined information was used by the wireless terminal in generating the first authenticator. The access node sends at least a portion of the first signal including the first authenticator and the determined information to another entity. The entity compares the first authenticator to a second authenticator it generates from the determined information and a secure key which it shares with the transmitting device to determine if the first and second authenticators match.
Abstract:
Location update techniques are described. A dormant mobile node updates its location information by sending a first message over a wireless link to an access node. The access node generates a second update message in response to the first message. The second message includes a mobile node identifier and, in some embodiments is directed to the mobile node. The second message is received by a tracking agent, which updates location information corresponding to the mobile node. In the case where second message is an IP message and is routed to the mobile node using Mobile IP, a Mobile IP home agent routes the second message to the mobile node's last point of network attachment where the tracking agent is located and intercepts the message. The tracking agent may send a response message to the access node sending the second message.
Abstract:
Signal, e.g., message, security techniques are described for wireless systems. A first signal is received by an access node via a wireless link. The signal includes a first authenticator that was generated by the transmitting device, e.g., wireless terminal. The access node determines from an attribute of the signal at least some information known to both the access node and transmitting device but which was not transmitted as part of the message content. The determined information was used by the wireless terminal in generating the first authenticator. The access node sends at least a portion of the first signal including the first authenticator and the determined information to another entity. The entity compares the first authenticator to a second authenticator it generates from the determined information and a secure key which it shares with the transmitting device to determine if the first and second authenticators match.