摘要:
A plurality of encryption keys is generated, and each encryption key is associated with one geographical area of a plurality of geographical areas. Each encryption key is forwarded to one or more base stations in the geographical area associated with the encryption key. At least one of the plurality of geographical areas that is adjacent to a first geographical area is determined, yielding one or more adjacent geographical areas, and an encryption key for at least one of the one or more adjacent geographical areas is forwarded to at least one base station covering the first geographical area.
摘要:
A first communication unit receives an encrypted transmission from a second communication unit. The encrypted transmission was encrypted by the second communication unit using a first encryption key. The first communication unit compares the first encryption key to an encryption key associated with the first communication unit. If the first encryption key matches the encryption key associated with the first communication unit, the first communication unit processes the encrypted transmission further. If the first encryption key does not match the encryption key associated with the first communication unit, the first communication unit compares the first encryption key to an encryption key associated with the second communication unit. If the first encryption key matches the encryption key associated with the second communication unit, the first communication unit processes the encrypted transmission further; otherwise, the first communication unit does not process the encrypted transmission further.
摘要:
A method of controlling location information of subscribers (210, 212, 222) in a wireless, ad-hoc communications network (200). The network (200) comprises a plurality of nodes (204, 216, 226), wherein at least portion of said nodes are provided with Home Location Registers (HLRs) (206, 218, 228) and each of said nodes (204, 216, 226) has a Visitor Location Register (VLR) (208, 220, 230). When an operation of a first node (216) is to be reconfigured at least a part of records from a first HLR (218) assigned to said first node (216) are transferred to at least one of the other nodes (226) of the network (200).
摘要:
A first infrastructure system device other than a mobile station generates an encryption key and encrypts the encryption key with a first intrakey associated with a first zone that includes a second infrastructure system device other than a mobile station, yielding a first encrypted encryption key. The first intrakey is used only by infrastructure system devices other than a mobile station for encrypting at least the encryption key prior to transport within the first zone. The first infrastructure system device forwards the first encrypted encryption key to the second infrastructure system device.
摘要:
A mobile communication system includes an infrastructure which includes a plurality of base stations, a plurality of mobile stations each of which is operable to communicate with a selected one of the base stations, a mobile terminal operably coupled to at least a first one of the mobile stations and a second one of the mobile stations to provide a communication link to at least one of the base stations, and a mobile controller which is operable to send instruction messages to the mobile stations regarding connectivity with the base stations. The mobile terminal, the mobile controller and the first and second mobile stations may be carried on a moving object such as a person or a vehicle, e.g. a train or aeroplane. The mobile controller may make decisions and issue instructions to the mobile stations relating to the base station by which they should each be served with the objective of maintaining a communication link between the mobile terminal and a serving base station via at least one of the mobile stations.Also disclosed are a mobile controller, a mobile station and a method of operation for use in the system.
摘要:
A home location register stores key material related to mobile stations associated with the home location register. A first visited location register associated with a first site in a first zone stores key material related to a first mobile station of the mobile stations associated with the home location register. When the first mobile station roams to a second site in a second zone associated with a second visited location register, the key material related to the first mobile station is encrypted with an interkey, yielding encrypted key material, wherein the interkey is used only by infrastructure system devices other than a mobile station for encrypting at least the key material for transport between at least the first and second zones. The encrypted key material is forwarded to the second visited location register.
摘要:
A mobile station (101) for use in a wireless communication system includes a steerable antenna, means for obtaining location information relating to a current location of the mobile station and a steering controller for controlling a pointing direction of the steerable antenna using the location information and characterized in that the mobile station includes a memory holding a database of optimal pointing directions of the steerable antenna for given locations and the steering controller is operable to steer the antenna to the optimal pointing direction indicated in the database for the current location. Also described is a system and a method in which the mobile station operates.
摘要:
A wireless, ad-hoc or private communications network comprising nodes, forming with other elements of the network a switching and management infrastructure (SwMI), and subscribers, wherein each of said nodes has a Visitor Location Register (VLR), and at least a part of said nodes are provided with Home Location Registers (HLRs) and at least a part of said nodes with said HLRs are provided with gateways, wherein in said network every node with an HLR is assigned to a node having a gateway and said SwMI directs calls to and from a subscriber of said network to an external network.
摘要:
A method includes receiving an authentication request from a mobile station (401) and determining whether to forward the request to an authentication agent. When it is determined to forward the request, the request is forwarded to the authentication agent (107). A random number and a random seed are received from the authentication agent (107). The random number and the random seed are forwarded to the mobile station (401). A response to the random number and the random seed from the mobile station (401) is received and forwarded to the authentication agent (107). The authentication agent (107) compares the response with an expected response. When the authentication agent (107) authenticates the mobile station (401), a derived cipher key is received from the authentication agent (107).
摘要:
A method includes receiving an authentication request from a mobile station (401) and determining whether to forward the request to an authentication agent. When it is determined to forward the request, the request is forwarded to the authentication agent (107). A random number and a random seed are received from the authentication agent (107). The random number and the random seed are forwarded to the mobile station (401). A response to the random number and the random seed from the mobile station (401) is received and forwarded to the authentication agent (107). The authentication agent (107) compares the response with an expected response. When the authentication agent (107) authenticates the mobile station (401), a derived cipher key is received from the authentication agent (107).