摘要:
In one illustrative example, a mobile communication device has a wireless transceiver; an antenna coupled to the wireless transceiver; one or more processors coupled to the wireless transceiver; and a power source interface which is adapted to connect with a power source for supplying electrical power to the mobile device. The one or more processors are operative to monitor a quick paging channel of a wireless communication network with use of the wireless transceiver; identify whether a predetermined power source is connected to the power source interface; cause an indication to terminate use of the quick paging channel to be transmitted with the wireless transceiver to the wireless network based on identifying that the predetermined power source is connected to the power source interface; and refrain from monitoring the quick paging channel with the wireless transceiver after sending the indication to the wireless network. In one specific implementation, the mobile device delays for a time period until a message used for registration is sent to the wireless network and provides the indication within this message.
摘要:
A system and method of packet zone hysteresis for a mobile station is presented. When a short data burst is to be sent on the control channel, a check is made to see if packet zone hysteresis might have caused the PCF-PSDN interface to be torn down, and if necessary, this interface is re-established by performing a packet data service reconnect to thereby enable transmission of the short data burst.
摘要:
A method of providing certificate issuance and revocation checks involving mobile devices in a mobile ad hoc network (MANET). The wireless devices communicate with each other via Bluetooth wireless technology in the MANET with an access point (AP) to provide connectivity to the Internet. A Certificate authority (CA) distributes certificates and certification revocation lists (CRLs) to the devices via the access point (AP). Each group of devices has the name of the group associated with the certificate and signed by the CA. A device that is out of the radio range of the access point may still connect to the CA to validate a certificate or download the appropriate CRL by having all the devices participate in the MANET.
摘要:
Methods and apparatus for providing slot reservations for slotted messages in a wireless communication network are disclosed. In one illustrative example, a mobile communication device transmits a slot reservation indication to the wireless network for reserving each nth paging slot assigned to the mobile device. At some point in time, a page message request for paging the mobile device is received within the wireless network. A page message for paging the mobile device is refrained from being transmitted within a reserved paging slot, but rather within a subsequent paging slot assigned to the mobile device after a lapse of time associated with the reserved paging slot. During the slot reservation, the mobile device may perform a function such as a GPS location fix or network scanning operation. In an alternative approach, the wireless network may infer a reservation for the mobile device through use of a neighbor list message associated with it. For example, the wireless network may examine a neighbor list message referred to as a General Neighbor List Message sent on a control channel such as the Paging Channel or the Broadcast Common Control Channel. Here, the wireless network may identify within the message the presence of a frequency different from the current network frequency, or the presence of-a wireless technology different from that of the current network, and set the reservation for the mobile device in response.
摘要:
An apparatus and method of controlling unsolicited traffic are disclosed herein. The apparatus and method can be applied to wireless communication networks such as CDMA2000, UMTS, GPRS and the like so that traffic which is not solicited by wireless communication devices operating on those networks is not sent over the air needlessly. The present application provides techniques to block unsolicited traffic based on the identity of a user (for example based on International Mobile Station Identity (IMSI), Network Access Identifier (NAI), Mobile Station Internet Services Digital Network Number (MSISDN), Session Initiation Protocol (SIP) Universal Resource Locator (url)) as opposed to techniques that are based on a session or IP address, such as a traditional firewall. In accordance to this application, user identity based techniques are applied to block unsolicited traffic whenever a user has established a data session. Further in accordance with this application, user identity based techniques are persisted across changes in IP address and/or session.