摘要:
Disclosed is a method for multiple EAP-based authentications in a wireless communication system. In the method, a first master session key (MSK) is generated in a first EAP-based authentication for a first-type access. A first temporal session key (TSK) is generated from the first master session key (MSK). A second EAP-based authentication is performed, using the first temporal session key (TSK), for a second-type access. First-type access and second-type access are provided after the first and second EAP-based authentications are successfully completed.
摘要:
Seamless communication handoff is achieved by establishing a protocol tunnel to route leftover packets between network access nodes during the handoff. For example, in a mobile IP-based system, a mobile node may perform a handoff from a first access node that is associated with a first routing node to a second access node that is associated with a second routing node. To prevent the loss of any packets that may be in route for delivery to or from the first routing node during the handoff, the mobile node establishes a protocol tunnel with the first access node via the second access node. On the forward-link, packets being delivered from the first routing node are routed over the protocol tunnel to the second access node and then to the mobile node. On the reverse-link, packets being sent to the first routing node are routed over the protocol tunnel from the mobile node to the second access node and then to the first routing node. In conjunction with these operations, the mobile node concurrently maintains separate IP interfaces for the routing nodes. In addition, steps are taken to ensure that packets are routed to the appropriate IP interface during the handoff.
摘要:
Seamless communication handoff is achieved by establishing a protocol tunnel to route leftover packets between network access nodes during the handoff. For example, in a mobile IP-based system, a mobile node may perform a handoff from a first access node that is associated with a first routing node to a second access node that is associated with a second routing node. To prevent the loss of any packets that may be in route for delivery to or from the first routing node during the handoff, the mobile node establishes a protocol tunnel with the first access node via the second access node. On the forward-link, packets being delivered from the first routing node are routed over the protocol tunnel to the second access node and then to the mobile node. On the reverse-link, packets being sent to the first routing node are routed over the protocol tunnel from the mobile node to the second access node and then to the first routing node. In conjunction with these operations, the mobile node concurrently maintains separate IP interfaces for the routing nodes. In addition, steps are taken to ensure that packets are routed to the appropriate IP interface during the handoff.
摘要:
Disclosed is a method for multiple EAP-based authentications in a wireless communication system. In the method, a first master session key (MSK) is generated in a first EAP-based authentication for a first-type access. A first temporal session key (TSK) is generated from the first master session key (MSK). A second EAP-based authentication is performed, using the first temporal session key (TSK), for a second-type access. First-type access and second-type access are provided after the first and second EAP-based authentications are successfully completed.
摘要:
A novel group key distribution and management scheme for broadcast message security is provided that allows an access terminal to send a single copy of a broadcast message encrypted with a group key. Access nodes that are members of an active set of access nodes for the access terminal may decrypt and understand the message. The group key is generated and distributed by the access terminal to the access nodes in its active set using temporary unicast keys to secure the group key during distribution. A new group key is provided every time an access node is removed from the active set of access nodes for the access terminal.
摘要:
Described herein is methodologies for efficient utilization of backhaul resources of a network for delivering paging data to an access terminal (AT) without sacrificing delay performance. A location that buffers data for an AT can be adaptively changed based on factors such as the location of the AT, applications utilized by the AT, and a recent activity level of the AT. To facilitate this determination, an AT can be configured with one or more registration boundaries. An AT can be configured with a small registration radius such that if the AT does not move outside of the small registration radius, data can be delivered directly to a data attachment point for the AT. If the AT moves outside of the small registration radius, the registration radius can be switched to a large registration radius and the access gateway can instead locally buffer data for the AT.
摘要:
Systems and methods for switching among heterogeneous networks and inter-working between a source access system and a target access system. An inter-system handoff control component can facilitate setting an IP tunneling by the mobile unit, wherein IP addresses for inter-working security gateway and Radio Access Network of the target access system can be identified. The inter-system handoff control component can then implement tunneling between the source system and the target system, wherein signaling/packeting associated with the target system can be transferred over the source system.
摘要:
Systems and methods for switching among heterogeneous networks and inter-working between a source access system and a target access system. An inter-system handoff control component can facilitate setting an IP tunneling by the mobile unit, wherein IP addresses for inter-working security gateway and Radio Access Network of the target access system can be identified. The inter-system handoff control component can then implement tunneling between the source system and the target system, wherein signaling/packeting associated with the target system can be transferred over the source system.
摘要:
In a communication system in which a mobile station accessing the main network via a plurality of base stations, the mobile station can freely select any of the base stations as a forward link (FL) serving station. In addition, the mobile station can also freely select another or the same base station as a reverse link (RL) serving station. The mobile station has stored in its memory a plurality of routes corresponding to the plurality of base stations, with each route dedicatedly assigned to a particular base station. During handoff of one base station to another as either the FL or the RL serving station, exchanged data packets are processed in the respective routes of the base stations involved.
摘要:
Methods, apparatus, systems and computer program products are defined that provide for in-order deliver of data packets during hand-off. The aspects provide for in-order delivery at Forward Link Serving eBS/Data Attachment Point (FLSE/DAP) switch and Reverse Link Serving eBS/Data Attachment Point (RLSE/DAP) switch. As such, present aspects provide for significant improvement in the throughput of applications, such as applications relying on Transmission Control Protocol (TCP), during handoff, in such networks as Ultra Mobile Broadband (UMB) and the like.