METHOD AND APPARATUS FOR SECURITY ACTIVATION IN WIRELESS COMMUNICATIONS NETWORK
    1.
    发明申请
    METHOD AND APPARATUS FOR SECURITY ACTIVATION IN WIRELESS COMMUNICATIONS NETWORK 有权
    无线通信网络安全启动的方法与装置

    公开(公告)号:US20130064225A1

    公开(公告)日:2013-03-14

    申请号:US13674350

    申请日:2012-11-12

    IPC分类号: H04W36/08

    摘要: Systems and methodologies are provided that facilitate security activation for wireless communications. In an aspect, a method for wireless communication is provided which includes determining a first security key for communicating with a source access point and receiving, from the source access point, a handover command that includes an indication of whether to apply a second security key upon handover. The method also includes handing over communication from the source access point to a target access point, where the second security key is applied for communicating with the target access point upon the handover when the handover command indicates to apply the second security key.

    摘要翻译: 提供了有助于无线通信的安全激活的系统和方法。 一方面,提供了一种用于无线通信的方法,其包括确定用于与源接入点进行通信的第一安全密钥,并且从源接入点接收切换命令,该切换命令包括是否应用第二安全密钥的指示 交出。 所述方法还包括将来自源接入点的通信切换到目标接入点,其中当切换命令指示应用第二安全密钥时,第二安全密钥被应用于在切换时与目标接入点进行通信。

    SECURITY ACTIVATION IN WIRELESS COMMUNICATIONS NETWORKS
    2.
    发明申请
    SECURITY ACTIVATION IN WIRELESS COMMUNICATIONS NETWORKS 失效
    无线通信网络中的安全活动

    公开(公告)号:US20080318546A1

    公开(公告)日:2008-12-25

    申请号:US12142105

    申请日:2008-06-19

    IPC分类号: H04M3/16

    摘要: Systems and methodologies are described that facilitate security activation within a specified security activation time. Thus, where handover occurs or is initiated within the activation time, security keys can be activated in such a way as to not be substantially affected by the handover. In one example, a handover time can be set to occur beyond the security activation time to ensure the security activation happens first. Additionally, a handover command can comprise security keys that can be activated upon handover in another example. Moreover, in non-real-time contexts, dummy packets can be transmitted to allow timer operability with packet sequence numbering, or security activation times can be substantially ignored by utilizing a verification process.

    摘要翻译: 描述了在指定的安全激活时间内促进安全激活的系统和方法。 因此,在切换发生或在激活时间内启动的情况下,安全密钥可以以不受切换的显着影响的方式激活。 在一个示例中,可以将切换时间设置为超出安全激活时间,以确保首先发生安全激活。 此外,切换命令可以包括在另一示例中可以在切换时激活的安全密钥。 此外,在非实时上下文中,可以传输虚拟分组以允许具有分组序列编号的定时器可操作性,或者通过利用验证过程可以基本上忽略安全激活时间。

    Method and apparatus for security activation in wireless communications network
    3.
    发明授权
    Method and apparatus for security activation in wireless communications network 有权
    无线通信网络中安全激活的方法和装置

    公开(公告)号:US08923814B2

    公开(公告)日:2014-12-30

    申请号:US13674350

    申请日:2012-11-12

    摘要: Systems and methodologies are provided that facilitate security activation for wireless communications. In an aspect, a method for wireless communication is provided which includes determining a first security key for communicating with a source access point and receiving, from the source access point, a handover command that includes an indication of whether to apply a second security key upon handover. The method also includes handing over communication from the source access point to a target access point, where the second security key is applied for communicating with the target access point upon the handover when the handover command indicates to apply the second security key.

    摘要翻译: 提供了有助于无线通信的安全激活的系统和方法。 一方面,提供了一种用于无线通信的方法,其包括确定用于与源接入点进行通信的第一安全密钥,并且从源接入点接收切换命令,该切换命令包括是否应用第二安全密钥的指示 交出。 所述方法还包括将来自源接入点的通信切换到目标接入点,其中当切换命令指示应用第二安全密钥时,第二安全密钥被应用于在切换时与目标接入点进行通信。

    Security activation in wireless communications networks
    4.
    发明授权
    Security activation in wireless communications networks 失效
    无线通信网络中的安全激活

    公开(公告)号:US08311512B2

    公开(公告)日:2012-11-13

    申请号:US12142105

    申请日:2008-06-19

    IPC分类号: H04M1/66 H04M1/68 H04M3/16

    摘要: Systems and methodologies are described that facilitate security activation within a specified security activation time. Thus, where handover occurs or is initiated within the activation time, security keys can be activated in such a way as to not be substantially affected by the handover. In one example, a handover time can be set to occur beyond the security activation time to ensure the security activation happens first. Additionally, a handover command can comprise security keys that can be activated upon handover in another example. Moreover, in non-real-time contexts, dummy packets can be transmitted to allow timer operability with packet sequence numbering, or security activation times can be substantially ignored by utilizing a verification process.

    摘要翻译: 描述了在指定的安全激活时间内促进安全激活的系统和方法。 因此,在切换发生或在激活时间内启动的情况下,安全密钥可以以不受切换的显着影响的方式激活。 在一个示例中,可以将切换时间设置为超出安全激活时间,以确保首先发生安全激活。 此外,切换命令可以包括在另一示例中可以在切换时激活的安全密钥。 此外,在非实时上下文中,可以传输虚拟分组以允许具有分组序列编号的定时器可操作性,或者通过利用验证过程可以基本上忽略安全激活时间。

    Layer 2 tunneling of data during handover in a wireless communication system
    6.
    发明授权
    Layer 2 tunneling of data during handover in a wireless communication system 失效
    在无线通信系统中的切换期间的数据的二层隧道化

    公开(公告)号:US08437306B2

    公开(公告)日:2013-05-07

    申请号:US12187539

    申请日:2008-08-07

    IPC分类号: H04W4/00

    摘要: Techniques for sending data during handover with Layer 2 tunneling are described. In one design, a user equipment (UE) sends first Layer 2 packets to a source base station prior to handover to a target base station. The UE sends at least one second Layer 2 packet to the target base station, which identifies the second Layer 2 packet(s) as being intended for the source base station and thus forwards the second Layer 2 packet(s) to the source base station via a Layer 2 tunnel. The UE sends third Layer 2 packets to the target base station after the handover. The target base station processes the third Layer 2 packets to obtain IP packets and sends the IP packets to a serving gateway after a trigger condition, which may be defined to achieve in-order delivery of IP packets from the source and target base stations to the serving gateway.

    摘要翻译: 描述用于在第二层隧道切换期间发送数据的技术。 在一种设计中,用户设备(UE)在切换到目标基站之前将第一层2分组发送到源基站。 UE向目标基站发送至少一个第二层2分组,目标基站将第二层分组标识为源基站,从而将第二层分组转发到源基站 通过二层隧道。 移交后,UE向目标基站发送第三层报文。 目标基站处理第三层数据包以获得IP数据包,并在触发条件之后将IP数据包发送到服务网关,触发条件可以被定义为实现从源和目标基站到IP地址的IP分组的按顺序传送 服务网关。

    LAYER 2 TUNNELING OF DATA DURING HANDOVER IN A WIRELESS COMMUNICATION SYSTEM
    7.
    发明申请
    LAYER 2 TUNNELING OF DATA DURING HANDOVER IN A WIRELESS COMMUNICATION SYSTEM 失效
    无线通信系统中切换数据的层2隧道

    公开(公告)号:US20090124259A1

    公开(公告)日:2009-05-14

    申请号:US12187539

    申请日:2008-08-07

    IPC分类号: H04W36/00

    摘要: Techniques for sending data during handover with Layer 2 tunneling are described. In one design, a user equipment (UE) sends first Layer 2 packets to a source base station prior to handover to a target base station. The UE sends at least one second Layer 2 packet to the target base station, which identifies the second Layer 2 packet(s) as being intended for the source base station and thus forwards the second Layer 2 packet(s) to the source base station via a Layer 2 tunnel. The UE sends third Layer 2 packets to the target base station after the handover. The target base station processes the third Layer 2 packets to obtain IP packets and sends the IP packets to a serving gateway after a trigger condition, which may be defined to achieve in-order delivery of IP packets from the source and target base stations to the serving gateway.

    摘要翻译: 描述了在切换第二层隧道期间发送数据的技术。 在一种设计中,用户设备(UE)在切换到目标基站之前将第一层2分组发送到源基站。 UE向目标基站发送至少一个第二层2分组,目标基站将第二层分组标识为源基站,从而将第二层分组转发到源基站 通过二层隧道。 移交后,UE向目标基站发送第三层报文。 目标基站处理第三层数据包以获得IP数据包,并在触发条件之后将IP数据包发送到服务网关,触发条件可以被定义为实现从源和目标基站到IP地址的IP分组的按顺序传送 服务网关。

    Key identifier in packet data convergence protocol header
    8.
    发明授权
    Key identifier in packet data convergence protocol header 失效
    分组数据汇聚协议头中的密钥标识符

    公开(公告)号:US08320561B2

    公开(公告)日:2012-11-27

    申请号:US12186430

    申请日:2008-08-05

    IPC分类号: H04L9/00

    CPC分类号: H04L63/06 H04W12/04 H04W12/10

    摘要: Systems and methodologies are described that facilitate identifying a plurality of keysets utilized in a communications network. The keysets can include ciphering keys that provide data encryption and decryption and integrity keys that provide data integrity protection. A key identifier can be included in a packet data convergence protocol header that indicates a keyset employed in connection with data in a protocol data unit. In addition, a route indicator can be provided in a radio link control header that distinguishes a source cell and a target cell in networks configured without RLC reset.

    摘要翻译: 描述了便于识别在通信网络中使用的多个键组的系统和方法。 密钥组可以包括提供数据加密和解密的加密密钥以及提供数据完整性保护的完整性密钥。 密钥标识符可以被包括在指示与协议数据单元中的数据相关联地使用的密钥集的分组数据会聚协议报头中。 此外,可以在无RLC链路控制头中提供路由指示符,该无线链路控制头在区分不配置RLC复位的网络中的源小区和目标小区。

    Notification of modification of system information in a wireless communication system
    9.
    发明授权
    Notification of modification of system information in a wireless communication system 有权
    在无线通信系统中修改系统信息的通知

    公开(公告)号:US09008655B2

    公开(公告)日:2015-04-14

    申请号:US13467667

    申请日:2012-05-09

    摘要: Systems and methodologies are described that facilitate notifying and detecting modification of system information in a wireless communication system. A mobile device may receive a first system information block (SIB) in a first time period, obtain from the first SIB at least one parameter related to modification of at least one SIB, and determine whether to receive the at least one SIB based on the at least one parameter obtained from the first SIB. The mobile device may receive a paging message in a second time period and may determine whether to receive one or more SIBs based on information obtained from the paging message. The mobile device may receive the first SIB in the first time period after entering a cell in an idle mode. The mobile device may receive the paging message in the second time period after accessing the cell.

    摘要翻译: 描述了便于在无线通信系统中通知和检测系统信息的修改的系统和方法。 移动设备可以在第一时间段内接收第一系统信息块(SIB),从第一SIB获得与修改至少一个SIB有关的至少一个参数,并且基于所述至少一个SIB来确定是否接收所述至少一个SIB 从第一SIB获得的至少一个参数。 移动设备可以在第二时间段内接收寻呼消息,并且可以基于从寻呼消息获得的信息来确定是否接收一个或多个SIB。 移动设备可以在进入空闲模式的小区之后的第一时间段中接收第一SIB。 移动设备可以在访问小区之后的第二时间段中接收寻呼消息。

    Stored radio bearer configurations for UMTS networks
    10.
    发明授权
    Stored radio bearer configurations for UMTS networks 有权
    UMTS网络的存储无线承载配置

    公开(公告)号:US07542444B2

    公开(公告)日:2009-06-02

    申请号:US11388560

    申请日:2006-03-23

    IPC分类号: H04Q7/00

    CPC分类号: H04W72/042 H04W28/06

    摘要: A scheme is provided for indexing and storing radio bearer configurations for a UMTS wireless communication network, such as a UTRAN. A radio network controller maintains a list of radio bearer configurations and an identifier for each configuration. One or more of these configurations and their identifiers are sent to a mobile terminal in the network. The mobile terminal stores these configurations and identifiers for future reference. This enables an on-the-fly configuration scheme in which the network controller can reference a particular stored configuration by its identifier to cause the mobile terminal to use that configuration to setup wireless transmitter and/or receiver. The identifiers may have contiguous values so that the network controller can transmit a range (e.g., starting identifier and ending identifier) to the mobile terminal rather than each identifier. When a configuration is modified or removed, the network controller may reassign identifiers to maintain contiguous values.

    摘要翻译: 提供了一种用于为UMTS无线通信网络(例如UTRAN)索引和存储无线承载配置的方案。 无线电网络控制器维护每个配置的无线承载配置列表和标识符。 这些配置中的一个或多个及其标识符被发送到网络中的移动终端。 移动终端存储这些配置和标识符以供将来参考。 这使得能够实时配置方案,其中网络控制器可以通过其标识符来引用特定存储的配置,以使得移动终端使用该配置来建立无线发射机和/或接收机。 标识符可以具有连续值,使得网络控制器可以向移动终端而不是每个标识符发送范围(例如,起始标识符和结束标识符)。 当配置被修改或删除时,网络控制器可以重新分配标识符以维持连续的值。