摘要:
A smart antenna steering algorithm performs a periodic re-scan at an end of a sustained use period and before a next sustained use period. During a sustained use period, a re-scan of the other antenna beams is not performed. The periodic re-scan is performed on alternate antenna beams that were selected when the preferred antenna beam was selected. The steering algorithm monitors a quality metric of the alternate antenna beams as well as a quality metric for the preferred antenna beam. If the quality metric of the preferred antenna beam is less than the quality metrics of anyone of the alternate antenna beams, then the alternate antenna beam corresponding to the quality metric having a higher value is selected for the next sustained use period.
摘要:
A smart antenna steering algorithm performs a self-monitored re-scan during a sustained use period after having selected a preferred antenna beam. During a sustained use period, a re-scan of the other antenna beams is not performed. The steering algorithm periodically monitors a quality metric of the ongoing radio link provided by the preferred antenna beam. The quality metric is based upon a signal quality metric and a link quality metric. If the quality metric drops below certain thresholds during the sustained use period, the steering algorithm either swaps the preferred antenna beam with an alternate antenna beam or initiates a re-scan of the available antenna beams for selecting a new preferred antenna beam.
摘要:
Disclosed herein are methods and devices for sharing a packet data protocol (PDP) context among a plurality of devices. For example, a method or sharing a PDP context among a plurality of devices may include a wireless transmit/receive unit (WTRU) sending a request to establish or modify a PDP context. The request to establish or modify the PDP context may include an indication that the WTRU is a member of shared context group. The method may also include the WTRU receiving a response indicating that the request to establish or modify the PDP context was accepted. The method may also include the WTRU acting as a gateway for at least one other device in the shared context group. The request to establish or modify the PDP context may be an attach request. The indication that the WTRU is a member of shared context group may be a group identifier (ID).
摘要:
A constrained network entity may determine, via an authentication procedure with a core network entity, the trustworthiness of an endpoint attempting to establish a secure channel with the constrained network entity. The constrained network entity may receive a certificate from the endpoint attempting to establish the secure channel and the constrained network entity may send the certificate asserted by the endpoint to a core network entity for validation. The core network entity may receive the certificate during a key exchange with the constrained network entity and the core network entity may indicate to the constrained network entity the validity of the certificate. The constrained network entity may determine whether to establish the secure channel with the endpoint based on the validity of the certificate.
摘要:
An apparatus and method for providing home evolved node-B (H(e)NB) integrity verification and validation using autonomous validation and semi-autonomous validation is disclosed herein.
摘要:
Systems, methods, and apparatus are provided for generating verification data that may be used for validation of a wireless transmit-receive unit (WTRU). The verification data may be generated using a tree structure having protected registers, represented as root nodes, and component measurements, represented as leaf nodes. The verification data may be used to validate the WTRU. The validation may be performed using split-validation, which is a form of validation described that distributes validation tasks between two or more network entities. Subtree certification is also described, wherein a subtree of the tree structure may be certified by a third party.
摘要:
Wireless telecommunications networks may implement various forms of authentication. There are a variety of different user and device authentication protocols that follow a similar network architecture, involving various network entities such as a user equipment (UE), a service provider (SP), and an authentication endpoint (AEP). To select an acceptable authentication protocol or credential for authenticating a user or UE, authentication protocol negotiations may take place between various network entities. For example, negotiations may take place in networks implementing a single-sign on (SSO) architecture and/or networks implementing a Generic Bootstrapping Architecture (GBA).
摘要:
Integrity validation of a network device may be performed. A network device comprising a secure hardware module, may receive a root key. The secure hardware module may also receive a first code measurement. The secure hardware module may provide a first key based on the root key and the first code measurement. The secure hardware module may receive a second code measurement and provide a second key based on the first key and the second code measurement. The release of keys based on code measurements may provide authentication in stages.
摘要:
Secure communications may be established amongst network entities for performing authentication and/or verification of the network entities. For example, a user equipment (UE) may establish a secure channel with an identity provider, capable of issuing user identities for authentication of the user/UE. The UE may also establish a secure channel with a service provider, capable of providing services to the UE via a network. The identity provider may even establish a secure channel with the service provider for performing secure communications. The establishment of each of these secure channels may enable each network entity to authenticate to the other network entities. The secure channels may also enable the UE to verify that the service provider with which it has established the secure channel is an intended service provider for accessing services.
摘要:
A mobile trusted platform (MTP) configured to provide virtual subscriber identify module (vSIM) services is disclosed. In one embodiment, the MTP includes: a device manufacturer-trusted subsystem (TSS-DM) configured to store and provide credentials related to a manufacturer of the MTP; a mobile network operator-trusted subsystem (MNO-TSS) configured to store and provide credentials related to a mobile network operator (MNO); and a device user/owner-trusted subsystem (TSS-DO/TSS-U) configured to store and provide credentials related to user of the MTP. The TSS-MNO includes a vSIM core services unit, configured to store, provide and process credential information relating to the MNO. The TSS-DO/TSS-U includes a vSIM management unit, configured to store, provide and process credential information relating to the user/owner of the MTP. The TSS-DO/TSS-U and the TSS-MNO communicate through a trusted vSIM service.