摘要:
Group communications methods and apparatus are described. In particular, methods for granting a mobile device access to a communications resource, e.g., the right to transmit data, associated with a group are described. User requests for the communications resource are suppressed by the corresponding mobile device, for periods during which the communications resource has been granted to another mobile device. A mobile device may store a suppressed user request so that a resource request signal may be transmitted after the communications resource has been released by the mobile device that was previously granted the resource. In this manner requests that cannot be granted are not transmitted, increasing communications efficiency as compared to systems where requests are not suppressed at the mobile devices. A priority scheme is used in some embodiments to determine whether or not a request should be suppressed while another device has been granted the communications resource.
摘要:
Group communications methods and apparatus are described. In particular, methods for granting a mobile device access to a communications resource, e.g., the right to transmit data, associated with a group are described. User requests for the communications resource are suppressed by the corresponding mobile device, for periods during which the communications resource has been granted to another mobile device. A mobile device may store a suppressed user request so that a resource request signal may be transmitted after the communications resource has been released by the mobile device that was previously granted the resource. In this manner requests that cannot be granted are not transmitted, increasing communications efficiency as compared to systems where requests are not suppressed at the mobile devices. A priority scheme is used in some embodiments to determine whether or not a request should be suppressed while another device has been granted the communications resource.
摘要:
This invention proposes an integrated process for AAA (Authentication, Authorisation, and Accounting) with the order reversed whereby L2 follows L3. The L3 process treats the wireless link as any normal IP access link, and the L3 authorisation provides L3 processing, but also includes the L2 terminal authentication identifiers so that the L2 security parameters can also be returned. This means that the wireless link and the IP layer are not secured until after the L3 authorisation has completed and therefore the first IP messages that trigger authorisation are sent insecurely. This invention also provides methods to avoid these insecure messages presenting any opportunities to an attacker. Finally, the inventions include methods to enable L3 before L2 authorisation when a user is roaming in a foreign network.
摘要:
The claimed subject matter relates to systems and methods for roaming in a wireless communications environment. A method for roaming between networks is provided in one aspect. This includes receiving a request for network access at a visited network and receiving a profile from a home network in response to the request. Upon receiving the profile, selectively offering services to one or more access terminals based at least in part on the profile.
摘要:
Group communications methods and apparatus are described. In particular, methods for granting a mobile device access to a communications resource, e.g., the right to transmit data, associated with a group are described. User requests for the communications resource are suppressed by the corresponding mobile device, for periods during which the communications resource has been granted to another mobile device. A mobile device may store a suppressed user request so that a resource request signal may be transmitted after the communications resource has been released by the mobile device that was previously granted the resource. In this manner requests that cannot be granted are not transmitted, increasing communications efficiency as compared to systems where requests are not suppressed at the mobile devices. A priority scheme is used in some embodiments to determine whether or not a request should be suppressed while another device has been granted the communications resource.
摘要:
The claimed subject matter relates to systems and methods for roaming in a wireless communications environment. A method for roaming between networks is provided in one aspect. This includes receiving a request for network access at a visited network and receiving a profile from a home network in response to the request. Upon receiving the profile, selectively offering services to one or more access terminals based at least in part on the profile.
摘要:
Methods and apparatus for storing, manipulating, retrieving, and forwarding state, e.g., context and other information, used to support communications sessions with one or more end nodes, e.g., mobile devices, are described. Various features are directed to a mobile node controlling the transfer of state from a first access node to a second access node during a handoff operation thereby eliminating any need for state transfer messages to be transmitted between the second access node and the first access node during handoff. Other features of the invention are directed to the use of a core network node to store state information. State information stored in the core node can be accessed and used by access nodes in cases where a mobile node does not send a state transfer message during a handoff, e.g., because communication with the first access node is lost or because such messages are not supported.
摘要:
Methods and apparatus for storing, manipulating, retrieving, and forwarding state, e.g., context and other information, used to support communications sessions with one or more end nodes, e.g., mobile devices, are described. Various features are directed to a mobile node controlling the transfer of state from a first access node to a second access node during a handoff operation thereby eliminating any need for state transfer messages to be transmitted between the second access node and the first access node during handoff. Other features of the invention are directed to the use of a core network node to store state information. State information stored in the core node can be accessed and used by access nodes in cases where a mobile node does not send a state transfer message during a handoff, e.g., because communication with the first access node is lost or because such messages are not supported.
摘要:
A mobile communications system that uses IP packets to transmit data between end nodes, such as mobile devices, is described. In order to facilitate session establishment, maintenance, security, and handoff operations, access nodes through which end nodes communicate with one another include a session signaling server module and a mobility agent module. The session signaling server module may be implemented as a SIP server while the mobility agent module may be implemented using Mobil IP signaling. The mobility agent and SIP server within an access node are identified using a single shared identifier, IP address. The same security method and common secret may be used to provide security with regard to both mobile IP messages and SIP messages. Sessions admission decisions and resource allocation for admitted sessions can also take place internally to the access node of this invention without need for signaling to external elements.
摘要:
Methods and apparatus for storing, manipulating, retrieving, and forwarding state, e.g., context and other information, used to support communications sessions with one or more end nodes, e.g., mobile devices, are described. Various features are directed to a mobile node controlling the transfer of state from a first access node to a second access node during a handoff operation thereby eliminating any need for state transfer messages to be transmitted between the second access node and the first access node during handoff. Other features of the invention are directed to the use of a core network node to store state information. State information stored in the core node can be accessed and used by access nodes in cases where a mobile node does not send a state transfer message during a handoff, e.g., because communication with the first access node is lost or because such messages are not supported.