摘要:
The present invention provides a communication controller and a method for maintaining a communication connection during a cell reselection. The communication connection is maintained by changing between a first operating mode, such as a packet data mode, which does not support the maintenance of a communication connection throughout a cell reselection, and a second operating mode, such as a circuit switched mode, which does support maintenance of a communication connection during a handover. Use of a virtual mobile switching center in the base station subsystem facilitates the conversion and routing of circuit switched data, transmitted between the mobile subscriber and the base transceiver station, to the packet data network while in a circuit switched mode.
摘要:
Methods, systems, and computer programs for trusted communication among mobile devices are described. In some aspects, an authentication value is generated at a first mobile device based on a message and a shared secret value stored on the first mobile device. In response to detecting proximity of a second mobile device, the message and the authentication value are wirelessly transmitted from the first mobile device to the second mobile device. In some implementations, the message and the authentication value can be wirelessly transmitted by a proximity-activated wireless interface, such as, for example, a Near Field Communication (NFC) interface.
摘要:
A system and method are provided for using a mobile device to authenticate access to a private network. The mobile device may operate to receive a challenge from an authentication server, the challenge having being generated according to a request to access a private network; obtain a private value; use the private value, the challenge, and a private key to generate a response to the challenge; and send the response to the authentication server. An authentication server may operate to generate a challenge; send the challenge to a mobile device; receive a response from the mobile device, the response having been generated by the mobile device using a private value, the challenge, and a private key; verify the response; and confirm verification of the response with a VPN gateway to permit a computing device to access a private network.
摘要:
Methods, systems, and computer programs for trusted communication among mobile devices are described. In some aspects, information is wirelessly transmitted from a first mobile device to a second mobile device. The information permits the second mobile device to detect proximity of the first mobile device. In some implementations, the information can be wirelessly transmitted by a proximity-activated wireless interface, such as, for example, a Near Field Communication (NFC) interface. In response to the information, the first mobile device receives a message and a first authentication value wirelessly transmitted from the second mobile device to the first mobile device. A second authentication value is generated at the first mobile device based on the message and the shared secret value. Integrity of the message is verified based on comparing the first authentication value and the second authentication value.
摘要:
A method and apparatus method of filtering packet data for an anonymous user device in a packet data network communication system includes a first step of initiating a call from an anonymous user device on a home network. A next step includes assigning an interim identity and interim IP address to the user device. A next step includes determining a level of service access of the data packets from the user device. A next step includes mapping the level of service access of the user device to the IP address. A next step includes defining permissible routing identities per the level of service access. A next step includes routing the data packets of the call along with the associated IP address to only those location addresses from the defining step.
摘要:
A method and apparatus for communicating data between a mobile communication device and a communications node via an appropriate radio access technology. In one embodiment, the method comprises identifying at least one characteristic associated with data pending for communication, identifying a set of radio access technologies available for communication and at least one characteristic of each, evaluating the characteristics of the pending data relative to the characteristics of the available radio access technologies, selecting from the set of available radio access technologies a radio access technology relative to the pending data and effectuating communication of at least a portion of the pending data via a communication link employing the selected radio access technology.
摘要:
A wireless communication system (100) is configured to send signaling messages through a cell broadcast service (CBS). CBS message pages used to transport signaling messages are identified by assigned message identifiers. Mobile devices (114) within the communication system (100) recognize the CBS messages transporting signaling messages by the message identifiers and pass the signaling messages to an appropriate application or control program module. The message identifier may be used to specify the application or control program module to process the signaling message. The signaling messages transported by the CBS may be used in controlling a multicasting or broadcasting service. Duplicate copies of the CBS message pages may be transmitted and then buffered at the mobile device (114) as they are received until all parts of the signaling message have been received.
摘要:
A method for determining location technology supported by a wireless communications network including sending (505) a location request, for example a MO-LR request, from a mobile wireless subscriber device to the network, receiving a network response (515) in reply to the location request, determining the subscriber device location technology supported by the network from the network response (535, 550), and in some embodiments the location technology of the subscriber device is controlled based on the technology supported by the network.
摘要:
A system and method are provided for using a mobile device to authenticate access to a private network. The mobile device may operate to receive a challenge from an authentication server, the challenge having being generated according to a request to access a private network; obtain a private value; use the private value, the challenge, and a private key to generate a response to the challenge; and send the response to the authentication server. An authentication server may operate to generate a challenge; send the challenge to a mobile device; receive a response from the mobile device, the response having been generated by the mobile device using a private value, the challenge, and a private key; verify the response; and confirm verification of the response with a VPN gateway to permit a computing device to access a private network.
摘要:
Methods and apparatus for use by a mobile communication device in switching operation for communications from a wireless wide area network (WWAN) to a wireless local area network (WLAN) are disclosed. While providing operation for communications in the WWAN, the mobile device continually maintains visited cell site history information in its memory. The visited cell site history information is indicative of one or more visited cell sites of the WWAN that served the mobile device over a moving time period of its operation. The mobile device continually monitors the visited cell site history information to identify whether it has been contained within a local geographic region over the moving time period. When the mobile device is identified to have been contained within the local geographic region, it is permitted to operate for communications with the WLAN. In response to such permission, the mobile device may enable its WLAN radio transceiver and select the WLAN for communications. Advantageously, switching operation for communications from the WWAN to the WLAN is performed only when appropriate. The WLAN radio transceiver may be enabled only when needed, which reduces power consumption and saves battery life in mobile device.