Abstract:
The present invention provides improved security in a virtual machine. By extending the capabilities of modern secure processors, privacy of computation is provided from both the owner of the equipment and other users executing on the processor, which is an advantageous feature for rentable, secure computers. In addition to the hardware extensions required to secure a virtualizable computer, an infrastructure for the deployment of such processors is also provided. Furthermore, a signaling flow to establish the various relationships between the owner, user and manufacturer of the equipment is disclosed.
Abstract:
The present invention provides a method involving at least one base station and at least one mobile unit is provided. The method includes receiving rate control information associated with at least one wireless communication channel between the at least one base station and the at least one mobile unit. The method also includes determining at least one outflow rate to the at least one base station based on the rate control information.
Abstract:
The present invention provides a method of wireless communication with a mobile unit and a base station router. The method may include providing, over a first channel, configuration information indicative of a second channel associated with the base station router and the mobile unit. The method may also include providing state information associated with the mobile unit to the base station router.
Abstract:
The present invention provides a method of operating a first base station router. The method may include transmitting state information associated with at least one inactive mobile unit to at least one second base station router. The state information is usable to initiate an active session with the at least one inactive mobile unit. The first base station router retains the state information for initiating an active session with the at least one inactive mobile unit and the least one second base station router is capable of initiating an active session with the at least one inactive mobile unit based on the state information when the state information is unavailable to the first base station router.
Abstract:
Example embodiments provide methods of transparently migrating a reliable transport layer connection between a user and a first base station and a second base station in a wireless network. The method includes receiving at least one transport layer connection state information parameter from the first base station at the second base station. The second base station then determines at least one new transport layer connection parameter based on the at least one transferred transport layer connection state information parameter and at least one network condition at the second base station.
Abstract:
The present invention provides a method involving a tamper-resistant module and an authentication server. The method includes receiving, at the tamper-resistant module, information encrypted using a first secret key stored in the authentication server. The method also includes authenticating the authentication server in response to decrypting the information using a second secret key stored in the tamper-resistant module.
Abstract:
The present invention provides a method of route optimization for a proxy mobile Internet protocol. The method may include providing information indicative of a first proxy address based on a first address associated with a first access terminal and receiving information indicative of a second proxy address associated with a second access terminal. The method may also include establishing a communication link between the first access terminal and the second access terminal based on the first and second proxy addresses such that the communication link does not include a home agent.
Abstract:
A method of synchronizing with an uplink channel and a method of determining a propagation delay in a wireless communications system are provided. In the example method of synchronizing, a propagation delay between a target base station and a mobile station is calculated. Then, the calculated propagation delay is sent to the target base station. In the example method of determining a propagation delay, a first signal is received indicating a first measured chip offset between a downlink channel of a serving base station and a pilot signal of the target base station. A second signal indicating a second measured chip offset between an uplink channel of the mobile station and a pilot signal of the target base station is then received. A propagation delay between the target base station and the mobile station is calculated based at least in part on the first and second measured chip offsets.
Abstract:
The present invention provides a method involving at least one base station and at least one mobile unit is provided. The method includes receiving rate control information associated with at least one wireless communication channel between the at least one base station and the at least one mobile unit. The method also includes determining at least one outflow rate to the at least one base station based on the rate control information.
Abstract:
An active set of base stations may be controlled based on whether data is unavailable at base stations within the active set. The base station may transmit an indicator indicating whether data is unavailable at the base station and/or a mobile station may monitor a channel characteristic of at least a portion of a channel between the base station and the mobile station.