摘要:
The claimed subject matter relates to systems and methods for roaming in a wireless communications environment. A method for roaming between networks is provided in one aspect. This includes receiving a request for network access at a visited network and receiving a profile from a home network in response to the request. Upon receiving the profile, selectively offering services to one or more access terminals based at least in part on the profile.
摘要:
An apparatus, a method, and a computer program product of a wireless device are provided in which a first device identifier of a wireless device is provided. An allocation record is received that includes an expression used for discovery, a second device identifier, and at least one of a digital signature of a first server that delegates the expression or a digital signature of a second server that manages the expression. The allocation record is verified. An apparatus, a method, and a computer program product of a first server are provided in which a device identifier is received from a wireless device. An allocation record is generated that includes an expression used for discovery, the device identifier, and at least one of a digital signature of the first server or a digital signature of a second server that manages the expression. The allocation record is sent.
摘要:
Various embodiments are directed to methods and apparatus which can be used to implement a system for collecting demographic information of users and/or devices in real-time or near real-time. Methods and apparatus directed to communicating and collecting demographic information via wireless signals, e.g., discovery signals, transmitted by one or more wireless devices, e.g., wireless communications devices supporting a peer to peer signaling protocol, are described. In various embodiments, at least some of the demographic information is transmitted in a secure manner.An information collection device receives demographic information transmitted by wireless communications devices, at least some of said demographic information being transmitted in a secure manner, and forwards collected demographic information to a demographic information processing system. Forwarded demographic information may include decrypted information which has been decrypted by the information collection device and/or received encrypted information which could not be decrypted by the information collection device.
摘要:
Methods and apparatus relating to ad cache maintenance, e.g., determining when ad cache replenishment should occur, replenishing ad cache content and/or updating the content of an ad cache, on a device which supports the presentation of advertisements (ads) are described. Signals are received by a first device including an ad cache. The signals are received from other devices, e.g., devices in the direct wireless communications range of the first device. Received signals are processed and provide context information, e.g., information about the surrounding, services available, stores in the region, etc., in which the first device receiving the signals is at a given point in time. Context information is stored. As new context information is generated from received signals the newly generated set of context information is compared to a previously generated set of context information. Changes in context information are detected and used in performing ad cache maintenance operations.
摘要:
An apparatus, a method, and a computer program product of a wireless device are provided in which a first device identifier of a wireless device is provided. An allocation record is received that includes an expression used for discovery, a second device identifier, and at least one of a digital signature of a first server that delegates the expression or a digital signature of a second server that manages the expression. The allocation record is verified. An apparatus, a method, and a computer program product of a first server are provided in which a device identifier is received from a wireless device. An allocation record is generated that includes an expression used for discovery, the device identifier, and at least one of a digital signature of the first server or a digital signature of a second server that manages the expression. The allocation record is sent.
摘要:
Aspects relate to allowing peer nodes that establish a communication through a home agent to move that session to a directly connected link. Thus, the directly connected nodes can exchange packets natively without encapsulation. Further aspects allow a node that does not have any home agent entity to switch from a local network to a global network without losing ongoing sessions.
摘要:
Aspects describe spectrum authorization, access control, and configuration parameters validation. Devices in an ad-hoc or peer-to-peer configuration can utilize a licensed spectrum if the devices are authorized to use the spectrum, which can be determined automatically. Aspects relate to distribution of authorization tickets by an authorization server as a result of validating a device's credentials and services to which the device is entitled. An exchange and verification of authorization tickets can be performed by devices as a condition for enabling a validated wireless link using the spectrum.
摘要:
Aspects describe spectrum authorization, access control, and configuration parameters validation. Devices in an ad-hoc or peer-to-peer configuration can utilize a licensed spectrum if the devices are authorized to use the spectrum, which can be determined automatically. Aspects relate to distribution of authorization tickets by an authorization server as a result of validating a device's credentials and services to which the device is entitled. An exchange and verification of authorization tickets can be performed by devices as a condition for enabling a validated wireless link using the spectrum.
摘要:
Group communications methods and apparatus are described. In particular, methods for granting a mobile device access to a communications resource, e.g., the right to transmit data, associated with a group are described. User requests for the communications resource are suppressed by the corresponding mobile device, for periods during which the communications resource has been granted to another mobile device. A mobile device may store a suppressed user request so that a resource request signal may be transmitted after the communications resource has been released by the mobile device that was previously granted the resource. In this manner requests that cannot be granted are not transmitted, increasing communications efficiency as compared to systems where requests are not suppressed at the mobile devices. A priority scheme is used in some embodiments to determine whether or not a request should be suppressed while another device has been granted the communications resource.
摘要:
This invention proposes an integrated process for AAA (Authentication, Authorisation, and Accounting) with the order reversed whereby L2 follows L3. The L3 process treats the wireless link as any normal IP access link, and the L3 authorisation provides L3 processing, but also includes the L2 terminal authentication identifiers so that the L2 security parameters can also be returned. This means that the wireless link and the IP layer are not secured until after the L3 authorisation has completed and therefore the first IP messages that trigger authorisation are sent insecurely. This invention also provides methods to avoid these insecure messages presenting any opportunities to an attacker. Finally, the inventions include methods to enable L3 before L2 authorisation when a user is roaming in a foreign network.