摘要:
Method, apparatus, and computer program product embodiments are disclosed for managing coexistence of secondary users in RF spectrum. An example embodiment includes selecting by an apparatus, a candidate network controller to which to transfer from a serving network controller, responsibility for resource allocation for a wireless network served by the serving network controller, based on one or more criteria for selection including characteristics of one or more wireless networks served by the candidate network controller; transmitting by the apparatus, to a selected candidate network controller, a request to transfer the responsibility for resource allocation for the wireless network, based on the one or more criteria for selection; and causing by the apparatus, the serving network controller to relinquish the responsibility for resource allocation for the wireless network, if the selected candidate network controller indicates that it will assume the responsibility.
摘要:
Method, apparatus, and computer program product embodiments are disclosed for managing coexistence of secondary users in RF spectrum. An example embodiment includes selecting by an apparatus, a candidate network controller to which to transfer from a serving network controller, responsibility for resource allocation for a wireless network served by the serving network controller, based on one or more criteria for selection including characteristics of one or more wireless networks served by the candidate network controller; transmitting by the apparatus, to a selected candidate network controller, a request to transfer the responsibility for resource allocation for the wireless network, based on the one or more criteria for selection; and causing by the apparatus, the serving network controller to relinquish the responsibility for resource allocation for the wireless network, if the selected candidate network controller indicates that it will assume the responsibility.
摘要:
There is disclosed a method for verifying a first identity and a second identity of an entity, said method comprising: receiving a first and second identity of said entity at a checking entity; sending information relating to at least one of the first and second identities to a home subscriber entity; and verifying that said first and second identities both belong to the entity from which said first and second identities have been received.
摘要:
A method in a communication network wherein users are authenticated based on network originated user identities is disclosed. The authentication method comprising the steps of receiving a network originated identity from a user and associating the network originated identity with at least one non-network originated identity stored in a data storage. When a non-network originated identity is received from the user, the non-network originated identity from the user is compared with the at least one non-network originated identity from the data storage. The user is authenticated if the comparison is valid.
摘要:
The present invention describes a susceptibility locus which is functionally related to asthma. The locus maps within human chromosome 7p15-p14. The invention also describes a novel human gene, GPRA. The invention provides diagnostic methods and materials for analysing allelic variation in said locus and the GPRA gene. The invention also provides polypeptides encoded by GPRA gene and antibodies binding to said polypeptides. The invention further provides pharmaceutical compositions for the treatment of asthma, other IgE-mediated disease, chronic obstructive pulmonary disease or cancer.
摘要:
A method in a mobile station for a communication system includes determining if a security module installed in a mobile station is able to produce authentication information for use in a predetermined authentication procedure with a communication system. If not, the method includes generating key material using the security module, and generating the authentication information based on at least the key material for use in the predetermined authentication procedure with the communication system.
摘要:
A method and system are disclosed for controlling radio communications between a terminal (MS, TE) and a communications system (CN, GRAN). A communications connection between the system and the terminal is established by an active radio network controller (RNC) and an active base station (BS). In one embodiment, data communications within the communications connection is directed to the active radio controller by a second radio network controller.
摘要:
A method in a mobile station for a communication system includes determining if a security module installed in a mobile station is able to produce authentication information for use in a predetermined authentication procedure with a communication system. If not, the method includes generating key material using the security module, and generating the authentication information based on at least the key material for use in the predetermined authentication procedure with the communication system.
摘要:
A method in a communication network wherein users are authenticated based on network originated user identities is disclosed. The authentication method comprising the steps of receiving a network originated identity from a user and associating the network originated identity with at least one non-network originated identity stored in a data storage. When a non-network originated identity is received from the user, the non-network originated identity from the user is compared with the at least one non-network originated identity from the data storage. The user is authenticated if the comparison is valid.
摘要:
A method and system are disclosed for controlling radio communications between a terminal (MS, TE) and a communications system (CN, GRAN). A communications connection between the system and the terminal is established by an active radio network controller (RNC) and an active base station (BS). In one embodiment, data communications within the communications connection is directed to the active radio controller by a second radio network controller.