摘要:
Various embodiments relate to wireless communications devices which support multiple modes of peer discovery operation. In some embodiments, the multiple modes of peer discovery operation include different modes which are associated with different rates of transmitting peer discovery information. In some embodiments, the multiple modes of peer discovery operation include different modes which are associated with different rates of monitoring peer discovery information. In various embodiments, a communications device determines whether or not to switch between different peer discovery modes of operation as a function of proximity to a location of interest. Proximity determinations may be, and sometimes are, based upon geographic position comparisons. Alternatively or in addition, proximity determinations may be, and sometimes are, based upon received signal strength measurements.
摘要:
Methods and apparatus for storing, manipulating, retrieving, and forwarding state, e.g., context and other information, used to support communications sessions with one or more end nodes, e.g., mobile devices, are described. Various features are directed to a mobile node controlling the transfer of state from a first access node to a second access node during a handoff operation thereby eliminating any need for state transfer messages to be transmitted between the second access node and the first access node during handoff. Other features of the invention are directed to the use of a core network node to store state information. State information stored in the core node can be accessed and used by access nodes in cases where a mobile node does not send a state transfer message during a handoff, e.g., because communication with the first access node is lost or because such messages are not supported.
摘要:
A method, an apparatus, and a computer program product are provided in which information is exchanged through peer-to-peer communication with a second wireless device using a first radio technology. The information regards at least one additional radio technology. In addition, whether to utilize a second radio technology of the at least one additional radio technology for peer-to-peer communication with the second wireless device rather than the first radio technology is determined. Furthermore, the first radio technology is utilized to exchange control information for the second radio technology.
摘要:
A method, a computer program product, and an apparatus are provided. The apparatus may be equipped to obtain one or more application identifiers from one or more applications on a wireless device, generate a super identifier (SID) having elements corresponding to the one or more applications and a base that identifies one or more common properties of the one or more applications, and broadcast the SID during one or more peer discovery slots allocated for the wireless device. In another example, a UE may be equipped to receive the SID broadcast by another UE, determine a match between at least one of the one or more common properties in the base, and determine whether an element associated with one or more applications is present in the SID.
摘要:
Aspects describe spectrum authorization, access control, and configuration parameters validation. Devices in an ad-hoc or peer-to-peer configuration can utilize a licensed spectrum if the devices are authorized to use the spectrum, which can be determined automatically. Aspects relate to distribution of authorization tickets by an authorization server as a result of validating a device's credentials and services to which the device is entitled. An exchange and verification of authorization tickets can be performed by devices as a condition for enabling a validated wireless link using the spectrum.
摘要:
A method, an apparatus, and a computer program product are provided in which information is exchanged through peer-to-peer communication with a second wireless device using a first radio technology. The information regards at least one additional radio technology. In addition, whether to utilize a second radio technology of the at least one additional radio technology for peer-to-peer communication with the second wireless device rather than the first radio technology is determined. Furthermore, the first radio technology is utilized to exchange control information for the second radio technology.
摘要:
Aspects describe enabling two peers that have already paired together under some circumstances to re-identify themselves under different circumstances so that the peers can bypass performing another pairing only to discover that they are already paired. A Bloom filter is constructed from an available pool of locally selected identifiers and is sent to a peer node in a first message. Upon receiving the message with the Bloom filter, peer node checks all its known identifiers. If peer node finds that one of its identifiers is a member of the Bloom filter, peer node sends a reply in order to achieve a mutual identification.
摘要:
Methods for communicating discovery information are described. A module intercepts messages within a device which include a first identifier, e.g., a service, application, device or other identifier which is to be communicated or which is to be monitored for in the case of a device seeking something. A second identifier corresponding to the information to be communicated or item or service being sought is generated. The second identifier is transmitted in the case of an advertisement or monitored for in the case of the device seeking something. Following a second device establishing a communications connection in response to an advertisement, stored information such as all or a portion of the first identifier is transmitted over the established connection. A device seeking an item or service, in response to detecting the second identifier, establishes a connection with the second device. The second identifier maybe shorter than the first identifier.
摘要:
Providing for secure tracking and reporting of wireless resources utilized by a mobile device is described herein. By way of example, resources utilized in conjunction with network-facilitated or peer-to-peer wireless data exchange can be tracked in secure, tamper-resistant components of the mobile device. Further, a report can be compiled from the tracked information and digitally signed with a secret data/material specific to the mobile device. The signed report can be submitted to a network server in conjunction with accounting, billing or like functions. By validating the signature of a mobile device, the network server can trust that information collected and submitted by user devices has not been tampered with or spoofed with an ID of another such device.
摘要:
Aspects describe spectrum authorization, access control, and configuration parameters validation. Devices in an ad-hoc or peer-to-peer configuration can utilize a licensed spectrum if the devices are authorized to use the spectrum, which can be determined automatically. Aspects relate to distribution of authorization tickets by an authorization server as a result of validating a device's credentials and services to which the device is entitled. An exchange and verification of authorization tickets can be performed by devices as a condition for enabling a validated wireless link using the spectrum.