摘要:
A method and apparatus for time-based charging for viewing content from a broadcast-multicast service (BCMCS) at a mobile station of a wireless communication system is disclosed. A count value (SKCount) is determined based upon the number of generated short-term keys (SK) that are used to decrypt particular content from the BCMCS. The amount of time the particular content is viewed at the mobile station may be determined as a function of the count value (SKCount) and the period (SKPeriod) between the generation of the short-term keys. This provides information about a user's actual content view time since the short-term key is needed to view the particular content broadcast to the mobile station.
摘要:
A method and apparatus are disclosed for negotiating and managing one or more personalities in a wireless communications system. The method comprises advertising one or more supported initial protocol set identifiers. Furthermore, the method comprises selecting a starting initial protocol set identifier from the advertised initial protocol set identifiers. In addition, the method comprises establishing a session based on the selected starting initial protocol set identifier. The method also comprises establishing a connection between an access terminal and an access network based on the selected initial protocol set identifier.
摘要:
A novel key management approach is provided for securing communication handoffs between and access terminal and two access points. This approach provides for securely handing off communications between an access terminal and access point without risking exposure a master key for the access terminal. Temporary master keys are derived for low latency handoffs and secure authentication between a new access point and the access terminal. In one aspect, a distributive key management scheme is provided in which a current access point generates a new security key (based on its own security key) that is used by the next access point with which an access terminal communicates. In another aspect, a centralized key management scheme is provided in which a central authenticator maintains, generates, and distributes new security keys (based on a master security key associated with the access terminal) to access points.
摘要:
Embodiments described herein relate to connected-state radio session transfer in wireless communications. A source access network controller may lock a source radio session associated with an access terminal (e.g., in response to detecting a handoff condition associated with the access terminal), where the source access network controller may be in communication with a data network. The source access network controller may also instruct a target access network controller to create a target radio session corresponding with the source radio session, and to establish a communication route between the data network and the access network via the target ANC. The source access network controller may then freeze a state associated with the source radio session and transmits the frozen state to the target access network controller. The target access network controller may subsequently unfreeze the received state and further unlock the radio session, hence resuming control of the access terminal.
摘要:
Methods and apparatus for partitioning resources for enhanced inter-cell interference coordination (eICIC) are provided. Certain aspects involve broadcasting a message indicating time-domain resource partitioning information (RPI), where a user equipment (UE) may be operating in idle mode. With the RPI, the UE may be able to identify protected resources with reduced/eliminated interference from neighboring cells. The RPI in this broadcasted message may be encoded as a bitmap as an alternative or in addition to enumeration of the U/N/X subframes. Other aspects entail transmitting a dedicated or unicast message indicating the time-domain RPI, where a UE may be operating in connected mode. With the RPI, the UE may be able to determine channel state information (CSI), make radio resource management (RRM) measurements, or perform radio link monitoring (RLM), based on one or more signals from a serving base station during the protected time-domain resources.
摘要:
A method, an apparatus, and a computer program product for wireless communication are provided in which an apparatus may determine broadcast channel scheduling information for one or more broadcasts of a payload by a broadcast channel associated with a first base station based on one or more broadcast channel interference coordination schemes, wherein reception of the broadcast channel associated with the first base station is interfered at least in part based on one or more transmissions from a second base station, and receive the payload based on the determined broadcast channel scheduling information.
摘要:
Systems and methodologies are described that facilitate providing hybrid cell access points that can support closed subscriber groups (CSG) while providing at least a minimum level of service to wireless devices excluded from the CSG. Hybrid cell access points can allow non-member wireless devices to camp and receive paging signals. Upon receiving a request for resources from non-member wireless devices, hybrid cell access points can handover the non-member wireless devices to an access point that can serve the non-member wireless devices, provide a portion of resources compared to a disparate portion provided to member wireless devices, and/or the like. In addition, hybrid cell access points can vary levels of service and downlink transmission power to provide load balancing for access points. Varying levels of service and downlink transmission power can facilitate additional functionality, such as reducing transmission power to serve member devices while mitigating interference to non-member devices.
摘要:
A novel group key distribution and management scheme for broadcast message security is provided that allows an access terminal to send a single copy of a broadcast message encrypted with a group key. Access nodes that are members of an active set of access nodes for the access terminal may decrypt and understand the message. The group key is generated and distributed by the access terminal to the access nodes in its active set using temporary unicast keys to secure the group key during distribution. A new group key is provided every time an access node is removed from the active set of access nodes for the access terminal.
摘要:
A method of wireless communication includes identifying at least one current resource for which a coexistence issue is present. The method also includes submitting a message to a base station that includes information indicative of the coexistence issue for the current resource(s). The handover request may include information indicative of the resource for which the coexistence issue is present and/or a desired future resource.