摘要:
A method of authenticating a user device includes transmitting a request, the request including a query for information, and receiving an identifier, the identifier being associated with one or more authentication mechanisms for obtaining access to emergency services.
摘要:
Method, apparatus, and computer program product embodiments of the invention are disclosed to improve the discovery of wireless networks. In example embodiments of the invention, a method comprises: listening by an apparatus, to wireless discovery request messages transmitted by one or more wireless devices; listening by the apparatus, to wireless discovery response messages from one or more other wireless devices; and modifying transmission by the apparatus, of one or more of its own wireless discovery request messages based on at least one of the wireless discovery request messages listened to or the wireless discovery response messages listened to.
摘要:
Method, apparatus, and computer program product embodiments of the invention are disclosed to automatically advertise a change in service offering of a wireless first device in wireless networks. In an example embodiment of the invention, if there is a change in service offering of the first device that is connected to a wireless second device, the first device automatically generates a reassociation request frame and transmits it to the second device. In addition to the standard processing of the reassociation request frame, the second device considers the received reassociation request frame as a trigger to respond by transmitting a generic advertisement service request to the first device. The first device will then have an opportunity to transmit its updated and up-to-date service description to the second device in a generic advertisement service response frame. The second device buffers the first device's updated service description and makes it available to other wireless devices searching the network for services, to facilitate network selection.
摘要:
Method, apparatus, and computer program product embodiments of the invention are disclosed to improve the discovery of wireless networks. In example embodiments of the invention, a method comprises: listening by an apparatus, to wireless discovery request messages transmitted by one or more wireless devices; listening by the apparatus, to wireless discovery response messages from one or more other wireless devices; and modifying transmission by the apparatus, of one or more of its own wireless discovery request messages based on at least one of the wireless discovery request messages listened to or the wireless discovery response messages listened to.
摘要:
A method for determining access point service capabilities may include identifying, at a mobile terminal, an access point to which the mobile terminal is capable of establishing a connection, determining, prior to authentication between the mobile terminal and the access point, whether the access point supports a particular service or connection, and enabling a connection determination to be made at the mobile terminal regarding whether to connect to the access point based on whether the access point supports the particular service or connection. A corresponding computer program product and apparatuses are also provided.
摘要:
A security gateway/home agent controller HAC is used to assign one home agent HA from a plurality of HAs and to identify at least one security protocol that is common between a mobile node MN and the assigned HA. Establishment of a security association between the MN and the assigned HA is enabled according to the identified security protocol and utilizing bootstrapping parameters provided over a secure connection between the security gateway/HAC and the MN. The bootstrapping parameters include at least a home address for the MN, an address of the assigned HA and security credentials and security parameters for the identified at least one security protocol. In an exemplary embodiment the home address for the MN may be an IPv6 home address and the MN may have certain capabilities with respect to security protocols and ciphering suites which the MN sends to the security gateway.
摘要:
A method for handling user identity and privacy, wherein a first Session Initiation Protocol (SIP) proxy is about to forward a SIP request to a next SIP proxy includes the step of determining whether Transport Layer Security (TLS) is supported in a hop to a next SIP proxy. When TLS is supported, the method includes establishing a TLS connection to the hop to the next SIP proxy, requesting a certificate from the next SIP proxy, receiving the certificate, verifying the certificate and trustworthiness of a network of the next SIP proxy and retaining identity information when the certificate and the trustworthiness of the network is verified. When TLS is not supported, or when the certificate is not verified, or when the trustworthiness of the network is not verified, the identity information is removed. Thereafter, the SIP request is forwarded over the TLS connection.
摘要:
An apparatus for providing temporal information may include a processor. The processor may be configured to provide a request for receipt of temporal information associated with a wireless communication access point, and receive a response to the request prior to either or both of authentication of a device providing the request by the wireless communication access point or association of the device with the wireless communication access point in which the response includes the temporal information.
摘要:
A security server for use in a telecommunications network is arranged to receive a message; determine whether the message is from a known source or an unknown source and, depending on the result of the determination, modify the message; and forward the message within the telecommunications network. A network processing element for use in a telecommunications network is arranged to receive a message from another network element; determine whether the message has been modified and, depending on the result of the determination, perform one or more security checks in respect of the message.
摘要:
A method of authenticating a user device includes transmitting a request, the request including a query for information, and receiving an identifier, the identifier being associated with one or more authentication mechanisms for obtaining access to emergency services.