摘要:
Multiple protocol tunnels (e.g., IPsec tunnels) are deployed to enable an access terminal that is connected to a network to access a local network associated with a femto access point. A first protocol tunnel is established between a security gateway and the femto access point. A second protocol tunnel is then established in either of two ways. In some implementations the second protocol tunnel is established between the access terminal and the security gateway. In other implementations the second protocol tunnel is established between the access terminal and the femto access point, whereby a portion of the tunnel is routed through the first tunnel.
摘要:
Systems, methods and apparatus for non-optimized handoffs for wireless communication are provided. For example, the disclosure may be applied to enhance non-optimized handoff from a long-term evolution (LTE) network to an evolved high rate packet data (eHRPD) network. Systems, methods, and apparatus for reducing the interruption gap during handoffs from an LTE radio access network to an eHRPD network are also discussed. In one aspect, a method is provided for communicating information associated with a handoff of a wireless device from a source network to a target network. The method includes, during a period of data inactivity, attaching to a first network and creating a context therewith, the first network being a non-preferred network as compared to a second network. The method also include connecting to the second network based on the context created with the first network and while maintaining at least a partial context with the first network.
摘要:
Methods and apparatuses are provided for deploying relay nodes in a communication network. A relay node can initially be wirelessly authenticated to a network entity using initial security credentials. In response to a successful authentication, the relay node is authorized to wirelessly communicate with the communication network for a limited purpose of configuring the relay node for relay device operations. The relay node can receive new security credentials from the communication network, and is subsequently re-authenticated to the network entity using the new security credentials. In response to a successful re-authentication, the relay node is authorized by the network to operate as a relay device for conveying traffic between one or more access terminals and the communication network.
摘要:
Methods, devices, and systems for detecting return-oriented programming (ROP) exploits are disclosed. A system includes a processor, a main memory, and a cache memory. A cache monitor develops an instruction loading profile by monitoring accesses to cached instructions found in the cache memory and misses to instructions not currently in the cache memory. A remedial action unit terminates execution of one or more of the valid code sequences if the instruction loading profile is indicative of execution of an ROP exploit involving one or more valid code sequences. The instruction loading profile may be a hit/miss ratio derived from monitoring cache hits relative to cache misses. The ROP exploits may include code snippets that each include an executable instruction and a return instruction from valid code sequences.
摘要:
Systems, methods and apparatus for non-optimized handoffs for wireless communication are provided. For example, the disclosure may be applied to enhance non-optimized handoff from a long-term evolution (LTE) network to an evolved high rate packet data (eHRPD) network. Systems, methods, and apparatus for reducing the interruption gap during handoffs from an LTE radio access network to an eHRPD network are also discussed. In one aspect, a method is provided for communicating information associated with a handoff of a wireless device from a source network to a target network. The method includes, during a period of data inactivity, attaching to a first network and creating a context therewith, the first network being a non-preferred network as compared to a second network. The method also include connecting to the second network based on the context created with the first network and while maintaining at least a partial context with the first network.
摘要:
This disclosure provides systems, methods and apparatus for non-optimized handoffs for wireless communication. For example, the disclosure may be applied to enhance non-optimized handoff from a long-term evolution (LTE) network to an evolved high rate packet data (eHRPD) network. Systems, methods, and apparatus for reducing the interruption gap during handoffs from an LTE radio access network to an eHRPD network are also discussed. In one aspect, a method is provided for communicating information associated with a handoff of a wireless device from a source network to a target network. The method includes fetching a context for a device communicating via a first radio access system of a first network based in part on a unique identifier from a second radio access system of a second network.
摘要:
The invention is a new protocol for securing the communication link between the Home Agent and the Mobile Node. A cipher key and an integrity key are generated at a home AAA server and are also generated independently at the Mobile Node. The two keys generated at the home AAA server are transmitted to the Home Agent to secure information packets transmitted between the Mobile Node and the Home Agent. The cipher key and integrity key are used to establish a security association used for information packet transmissions. The cipher key is used to encrypt the information packets, and the integrity key is used to ensure that the contents of the encrypted message are not altered.
摘要:
Multiple protocol tunnels (e.g., IPsec tunnels) are deployed to enable an access terminal that is connected to a network to access a local network associated with a femto access point. A first protocol tunnel is established between a security gateway and the femto access point. A second protocol tunnel is then established in either of two ways. In some implementations the second protocol tunnel is established between the access terminal and the security gateway. In other implementations the second protocol tunnel is established between the access terminal and the femto access point, whereby a portion of the tunnel is routed through the first tunnel.