摘要:
A method and apparatus method of filtering packet data for an anonymous user device in a packet data network communication system includes a first step of defining a special context information element containing special context information. A next step includes sending the special context information element in an activate packet data protocol (PDP) context request to a network to initiate a call from an anonymous user device. A next step includes receiving the activate PDP context request and the special context information element. A next step includes configuring the data packets so that only the special context is allowed. A next step includes assigning an interim identity and interim IP address to the user device. A next step includes mapping the data packets of the configuring step to the interim IP address of the user device. A next step includes defining permissible routing identities per the special context. A next step includes routing the data packets between only those permissible routing identities from the defining step.
摘要:
A method and apparatus method of filtering packet data for an anonymous user device in a packet data network communication system includes a first step of initiating a call from an anonymous user device on a home network. A next step includes assigning an interim identity and interim IP address to the user device. A next step includes determining a level of service access of the data packets from the user device. A next step includes mapping the level of service access of the user device to the IP address. A next step includes defining permissible routing identities per the level of service access. A next step includes routing the data packets of the call along with the associated IP address to only those location addresses from the defining step.
摘要:
A method in a wireless communications network including receiving (310) a network connection request from a subscriber device having an invalid subscriber identity, connecting (340) the subscriber device, from which the network connection request was received, to the wireless communications network for limited purposes only upon determining (320) that the subscriber device has in invalid subscriber identity in the absence of a limited network connection indicator in the network connection request. In some embodiments, a limited attach message indicates that the attach request is for limited purposes.
摘要:
Methods, systems, and computer programs for trusted communication among mobile devices are described. In some aspects, an authentication value is generated at a first mobile device based on a message and a shared secret value stored on the first mobile device. In response to detecting proximity of a second mobile device, the message and the authentication value are wirelessly transmitted from the first mobile device to the second mobile device. In some implementations, the message and the authentication value can be wirelessly transmitted by a proximity-activated wireless interface, such as, for example, a Near Field Communication (NFC) interface.
摘要:
A system and method are provided for using a mobile device to authenticate access to a private network. The mobile device may operate to receive a challenge from an authentication server, the challenge having being generated according to a request to access a private network; obtain a private value; use the private value, the challenge, and a private key to generate a response to the challenge; and send the response to the authentication server. An authentication server may operate to generate a challenge; send the challenge to a mobile device; receive a response from the mobile device, the response having been generated by the mobile device using a private value, the challenge, and a private key; verify the response; and confirm verification of the response with a VPN gateway to permit a computing device to access a private network.
摘要:
Methods, systems, and computer programs for trusted communication among mobile devices are described. In some aspects, information is wirelessly transmitted from a first mobile device to a second mobile device. The information permits the second mobile device to detect proximity of the first mobile device. In some implementations, the information can be wirelessly transmitted by a proximity-activated wireless interface, such as, for example, a Near Field Communication (NFC) interface. In response to the information, the first mobile device receives a message and a first authentication value wirelessly transmitted from the second mobile device to the first mobile device. A second authentication value is generated at the first mobile device based on the message and the shared secret value. Integrity of the message is verified based on comparing the first authentication value and the second authentication value.
摘要:
A method and apparatus for communicating data between a mobile communication device and a communications node via an appropriate radio access technology. In one embodiment, the method comprises identifying at least one characteristic associated with data pending for communication, identifying a set of radio access technologies available for communication and at least one characteristic of each, evaluating the characteristics of the pending data relative to the characteristics of the available radio access technologies, selecting from the set of available radio access technologies a radio access technology relative to the pending data and effectuating communication of at least a portion of the pending data via a communication link employing the selected radio access technology.
摘要:
A wireless communication system (100) is configured to send signaling messages through a cell broadcast service (CBS). CBS message pages used to transport signaling messages are identified by assigned message identifiers. Mobile devices (114) within the communication system (100) recognize the CBS messages transporting signaling messages by the message identifiers and pass the signaling messages to an appropriate application or control program module. The message identifier may be used to specify the application or control program module to process the signaling message. The signaling messages transported by the CBS may be used in controlling a multicasting or broadcasting service. Duplicate copies of the CBS message pages may be transmitted and then buffered at the mobile device (114) as they are received until all parts of the signaling message have been received.
摘要:
A method for determining location technology supported by a wireless communications network including sending (505) a location request, for example a MO-LR request, from a mobile wireless subscriber device to the network, receiving a network response (515) in reply to the location request, determining the subscriber device location technology supported by the network from the network response (535, 550), and in some embodiments the location technology of the subscriber device is controlled based on the technology supported by the network.
摘要:
A system and method are provided for using a mobile device to authenticate access to a private network. The mobile device may operate to receive a challenge from an authentication server, the challenge having being generated according to a request to access a private network; obtain a private value; use the private value, the challenge, and a private key to generate a response to the challenge; and send the response to the authentication server. An authentication server may operate to generate a challenge; send the challenge to a mobile device; receive a response from the mobile device, the response having been generated by the mobile device using a private value, the challenge, and a private key; verify the response; and confirm verification of the response with a VPN gateway to permit a computing device to access a private network.