摘要:
Systems and methods for switching among networks (e.g., heterogeneous) and inter-working between a source access system and a target access system, by implementing tunneling from the AT to the target access system via the source access system. An inter-system handoff control component can facilitate setting tunneling by the mobile unit to the target access and/or between the source access system and the target access system—wherein signaling/packeting associated with the target system can be transferred over the source system.
摘要:
Systems and methods for switching among networks (e.g., heterogeneous) and inter-working between a source access system and a target access system, by implementing tunneling from the AT to the target access system via the source access system. An inter-system handoff control component can facilitate setting tunneling by the mobile unit to the target access and/or between the source access system and the target access system—wherein signaling/packeting associated with the target system can be transferred over the source system.
摘要:
Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point.
摘要:
Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point.
摘要:
Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point.
摘要:
Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point.
摘要:
Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point.
摘要:
Systems and methods for establishing secure communications between two network elements through a trusted intermediary when no direct communication path is available. Separate secure communication links are established between the network elements and the trusted intermediary to facilitate secure end to end communication.
摘要:
Methods, apparatus, systems and computer program products are defined that provide multiple bindings in a Mobile Internet Protocol (MIP) network environment. The multiple bindings that are established are independent of one another, such that a forward link binding is decoupled from, or otherwise does not affect, a reverse link binding and vice versa. Multiple reverse link-only bindings may be established within an active route set for an access terminal. Additionally a single primary binding may be established that provides a forward link binding and reverse link binding. At any point in time, the access terminal may maintain only one primary binding.
摘要:
Access by a mobile station to a femto access point (FAP) of a wireless communication system is controlled by an enforcement point in response to mobile station authorization data provided from a storage point that is remote from the FAP. The authorization data is provided in response to FAP authentication data. The authentication data may include a FAP identifier and a message authenticator that the FAP generates by hashing shared secret information. The storage point may provide the authorization data in response to determining that the message authenticator is a hash of the shared secret information.