摘要:
A mobile terminal includes an Internet Protocol (IP) address module that requests and receives a first IP address from a home anchoring point within a home network. The first IP address is an address of the home anchoring point. The system also includes a packet module that exchanges packets with the home anchoring point via a first attachment point. The packets include the first IP address.
摘要:
A network device includes an Internet protocol (IP) connectivity generator that generates an IP connectivity indicator. The IP connectivity indicator indicates IP connectivity for a service request device (SRD). A transmit module transmits the IP connectivity indicator to a remote network device before at least one of detachment of the SRD and deactivation of a bearer corresponding to a first session and a tunnel between the SRD and the remote network device. A control module facilitates the detachment of the SRD and deactivation of the bearer while maintaining IP connectivity. The IP connectivity corresponding to at least one of attachment of the SRD and activation of a second session of the SRD based on the IP connectivity indicator.
摘要:
A technique for authenticating a user to a server using SIP messages includes forwarding an SIP request from the user agent to the server. The server then forwards a request for authentication to the user agent in response to the invite request, the request for authentication including information that the authentication will be performed using a UMTS AKA mechanism. The user agent then forwards and authentication response to the server in accordance with the UMTS AKA mechanism and the server then performs the appropriate actions to perform an invoked SIP procedure in response to the SIP request. The SIP request may include any standardized SIP request including an SIP INVITE request or an SIP REGISTER request.
摘要:
A system and method for provisioning emergency services in a wireless local area network is provided. A station may assert an emergency service in a network by generating an association request that includes an indication of a request for an emergency service. The association request is transmitted to a network access point, and the station may be associated with the access point without engaging in an authentication procedure. Additionally, a network access point is provided that facilitates provisioning of emergency services to authenticated or unauthenticated network stations. An access point receives an association request that includes an indication of a request for an emergency service, and transmits an association response to a station that originated the association request. The originator of the association request may be associated with the access point without the access point engaging in an authentication procedure with the requesting station. Additionally, the access point may segregate emergency service traffic from general-purpose traffic to prohibit exploitation of the emergency service to fraudulently access other network services.
摘要:
Various embodiments are described relating to encapsulation techniques or handling information services messages for wireless networks. One embodiment comprises generating at a first wireless node a request to transmit a message of a first communications specification to a second wireless node that is not authenticated nor associated with the first wireless node. This embodiment further comprises making a determination that the message is a type that may be transmitted to a node that is not authenticated nor associated with the first node, and encapsulating, based on the determination, at least a portion of the message of the first communications specification into a payload of a frame of a second communications specification. This embodiment further comprises transmitting the frame of the second communications specification from the first wireless node to the second wireless node.
摘要:
Unlicensed Mobile Access (UMA) authentication techniques are provided. These techniques may use existing authentication mechanisms, such as a Cellular Authentication and Voice Encryption (CAVE) algorithm-based or Message Digest 5 (MD5) algorithm-based authentication mechanism.
摘要:
A method and apparatus are set forth for providing a beacon in a network, including a Wireless Local Area Network (WLAN), such as that defined in IEEE 802.11 Standard Protocol, or one or more other networks, including a 3GPP, 3GPP2 or IEEE 802.16), featuring a technique for layering beacons so as to provide a first beacon having a set of information the access point (AP) needs to broadcast and a second beacon having a reduced set of information depending on the current system load. In one embodiment, the method includes layering the beacons as part of an interworking between the WLAN and the one or more of the other networks.
摘要:
A mechanism is provided to enable a station to discover link/network/service information about a potential wireless point of attachment by extending the set of information that is available before the station actually authenticates and associates to the wireless point of attachment. The mechanism includes a method for interworking between a Wireless Local Area Network (WLAN), including that defined in IEEE 802.11 Standard Protocol, and one or more other networks, including a 3GPP, 3GPP2 or IEEE 802.16), featuring extending a set of information that is available before a network node actually authenticates and associates to the wireless point of attachment. The network node may be a station (STA), and the beacon may contain the set of information, where the beacon is extended with information that allow a terminal to identify if mobility (handoff) to an access point (AP) implies an L3 handoff or only an L2 handoff, including information about a subnet prefix of a subnet a new AP belongs to. When a station (STA) listens to the beacon, the STA discovers that the AP can provide additional information. If the STA is interested, the STA sends a probe request indicating which information it requires, and the AP returns available information in a probe response based on the information.
摘要:
A technique for authenticating a user to a server using SIP messages includes forwarding an SIP request from the user agent to the server. The server then forwards a request for authentication to the user agent in response to the invite request, the request for authentication including information that the authentication will be performed using a UMTS AKA mechanism. The user agent then forwards and authentication response to the server in accordance with the UMTS AKA mechanism and the server then performs the appropriate actions to perform an invoked SIP procedure in response to the SIP request. The SIP request may include any standardized SIP request including an SIP INVITE request or an SIP REGISTER request.
摘要:
Apparatus, and associated method, for facilitating transition, or other communication hand-off, between access points of a wireless local area network. When an old access point is notified of selection to transition communications, the old access point generates a transition request message that is communicated by way of a network to the new access point. The transition request includes a temporary key. And, the old access point notifies the mobile station of the temporary key. The mobile station re-associates with the new access point, and the temporary key is used pursuant to initial communications between the mobile station and the new access point.