Abstract:
A method and apparatus are provided that select an instance of a service for use by a mobile device. A list of multiple instances of the service is assembled, wherein each instance of the service of the multiple instances of the service is hosted by a different mobile device of multiple mobile devices. For each of the multiple instances of the service, situational information and environmental information is determined in association with the mobile device hosting the instance, wherein the situational information comprises information associated with an operating condition of a user of the hosting mobile device and wherein the environmental information comprises information associated with environmental conditions in which the hosting mobile device is operating. An instance of the service then is selected from among the multiple instances based on the environmental information and the situational information determined for each of the multiple instances.
Abstract:
A method of transitioning a wireless networking device from a non-access point mode to an access point mode includes receiving a find network request from another wireless networking device and sending a find network response including beacon data and an identifier. The method includes receiving a join network request from the other wireless networking device and associating with the other networking device by transitioning from a default mode to an access point mode. The other wireless networking device then operates as a client device. Each wireless networking device in the default mode listens for other wireless networking devices seeking an access point for the wireless network. In the access point mode the wireless networking device periodically broadcasts beacons. Each wireless networking device transitions to a client-only mode, when limiting conditions are present.
Abstract:
Multi-factor authentication is enabled across a plurality of communication devices. A user performs authentication by using a first authentication factor on a first of the communication devices, and by using a second authentication factor on a second of the communication devices. A collaboration credential is shared among the devices to enable the devices to collaborate with each other. Both of the authentication factors are bound together. A multi-factor identification token is issued to each device, to support multi-factor authentication for the user across the devices.
Abstract:
A deployable wireless communications system includes memory, an antenna, and a processor connected to the memory and the antenna. The processor is configured to execute instructions to control the antenna to provide a deployable wireless network to wireless communications devices and to provide access for the wireless communications devices to the deployable wireless network according to profiles of each of the plurality of wireless communications devices stored in the memory. The system further includes an import service executable by the processor to import into the memory a profile carried by a wireless communications device. The profile is to provide access for the wireless communications device to the deployable wireless network.
Abstract:
A method and apparatus for bootstrapping secure connections between wireless devices and deployable wireless communications networks. Using the method, a wireless device establishes a connection to an auxiliary network, and then establishes a connection with a deployable subscription bootstrapping service. The deployable subscription bootstrapping service generates a temporary subscription profile, including a temporary shared symmetric key, for the wireless device, writes the temporary profile to a deployable home subscriber server, and communicates the temporary profile to the wireless device, which stores the temporary profile. The wireless device then terminates the connection to the auxiliary network, and initiates a connection with the deployable wireless communications network using the temporary subscription profile.
Abstract:
Disclosed herein are methods and systems for maintaining routing tables in an ad-hoc wireless network. In an embodiment, a first node receives, from a second node having a second network address, a first data packet having a third network address as the source address and a fourth network address as the destination address. The first node determines that its server routing table (i) contains a stored server route to the fourth network address and (ii) does not contain a server route to the third network address, and responsively adds, to its server-to-client routing table, a server-to-client route to the third network address with the second network address as the associated next hop. The first node transmits, to the second node at the second network address, a second data packet that has the third network address as the destination address.
Abstract:
An apparatus for, and method of, single sign-on collaboration among a plurality of mobile devices, includes a server for issuing a first identity token to subsequently authenticate a user of a first of the mobile devices to a service provider, and for generating and sending a collaboration key to the first device based on the first identity token or user authentication. The first device generates and sends a collaboration credential based on the collaboration key to a second device paired with the first device. The server also issues a second identity token to subsequently authenticate to the service provider the user of the second device based on the collaboration credential received from the first device, to support single sign-on collaboration for the user across the plurality of mobile devices.
Abstract:
A system and method for enabling a primary and a secondary communication device to share a user identity assertion is presented. The user identity assertion enables the devices to access an application system. The primary and secondary devices are paired to place them in collaboration with each other. The primary device requests an identity provider system to issue a user identity assertion scoped to the primary and secondary communication device. The identity provider system authenticates the primary device and generates the user identity assertion scoped to the primary device and the secondary device identified in the request. The primary communication device receives the user identity assertion and communicates the user identity assertion to the secondary device. The primary device may request the user identity assertion by communicating a user identity assertion scoped to the primary device and a single sign on session cookie or a request for an extension assertion.