摘要:
In one embodiment, a scheme is provided for securing a personalized indicium assigned to a mobile communications device. Upon detecting at a network node that an address associated with the mobile communications device has changed, a challenge-and-response procedure is negotiated between the mobile communications device and the network node for authenticating the personalized indicium using a shared authentication key.
摘要:
A communications system includes a mobile wireless communications device, a trusted server, and a plurality of host servers. A given one of the host servers is in communication with the mobile wireless communications device. The given host server is configured to generate and send a redirection request to the mobile wireless communications device, the redirection request requesting the mobile wireless communications device to communicate with an other one of the host servers. The mobile wireless communications device is configured to send the redirection request to the trusted server, and the trusted server configured to send the redirection request to the mobile wireless communications device based upon verification of the redirection request.
摘要:
In one embodiment, a method operable on a mobile communications device is disclosed, the method comprising generating an authentication key for securing a personalized indicium assigned to the mobile communications device, wherein the personalized indicium comprises a Personal Information Number (PIN) that is mapped to at least one identifier associated with the mobile communications device; transmitting a registration request to a network node operable with a wireless network, the registration request having a registration request payload including the authentication key; receiving a challenge message from the network node, the challenge message generated when the network node detects a change of the IP address associated with the mobile communications device, and responsive to receiving the challenge message, executing a challenge response including an authentication value of a challenge string transmitted in the challenge message, wherein the authentication value is created using the authentication key.
摘要:
In one embodiment, a scheme is provided for securing a personalized indicium assigned to a mobile communications device. Upon detecting at a network node that an address associated with the mobile communications device has changed, a challenge-and-response procedure is negotiated between the mobile communications device and the network node for authenticating the personalized indicium using a shared authentication key.
摘要:
In a wireless device, active scanning for a particular wireless network name is initiated during passive scanning for a wireless network that matches a profile stored in a wireless local area network controller, the profile including the particular wireless network name. Active scanning for the particular wireless network name includes transmitting one or more probe requests, each transmitted on a different communication channel.
摘要:
In one embodiment, a mobile communication device is configured to selectively enable user data communications after registration in a wireless communication network. The mobile device sends, via its radio, feature compliance information to the network. In response to the feature compliance information being sent, the mobile device receives, via the radio, configuration information which is derived based on the feature compliance information and location information of the mobile device. The mobile device then selectively enables the user data communications based on the received configuration information. In particular, the mobile device enables the user data communications when the location information indicates that the mobile device is operating in a particular country and the feature compliance information indicates feature compliance for the particular country. On the other hand, the mobile device disables the user data communications when the location information indicates that the mobile device is operating in the particular country and the feature compliance information indicates a lack of feature compliance for the particular country.
摘要:
In one embodiment, a scheme is provided for securing a personalized indicium assigned to a mobile communications device. Upon detecting at a mobile communications device that one of a list of criteria have been met, a challenge-and-response procedure is initiated by the mobile communications device. During the challenge-and-response procedure, the mobile communications device and a network node will authenticate the personalized indicium using a shared authentication key.
摘要:
In one embodiment, a scheme is provided for securing a personalized indicium assigned to a mobile communications device. Upon detecting at a mobile communications device that one of a list of criteria have been met, a challenge-and-response procedure is initiated by the mobile communications device. During the challenge-and-response procedure, the mobile communications device and a network node will authenticate the personalized indicium using a shared authentication key.
摘要:
Apparatus, and an associated method, for facilitating routing of data in a packet radio communication system. A clone list is downloaded to the mobile node and stored at a clone list depository thereat. The clone list includes a plurality of entries, each of which provides routing information needed to route data when the mobile node is positioned within coverage areas encompassed by differing networks. A determination is made whether the clone list includes appropriate routing information to route a data packet sent by the mobile node positioned in a particular area encompassed by a particular network portion. If the clone list includes an entry containing such information, the need separately to request such information is obviated.
摘要:
A communications system includes a mobile wireless communications device, a trusted server, and a plurality of host servers. A given one of the host servers is in communication with the mobile wireless communications device. The given host server is configured to generate and send a redirection request to the mobile wireless communications device, the redirection request requesting the mobile wireless communications device to communicate with an other one of the host servers. The mobile wireless communications device is configured to send the redirection request to the trusted server, and the trusted server configured to send the redirection request to the mobile wireless communications device based upon verification of the redirection request.