摘要:
The present invention provides a method of route optimization for a proxy mobile Internet protocol. The method may include providing information indicative of a first proxy address based on a first address associated with a first access terminal and receiving information indicative of a second proxy address associated with a second access terminal. The method may also include establishing a communication link between the first access terminal and the second access terminal based on the first and second proxy addresses such that the communication link does not include a home agent.
摘要:
The present invention provides a method involving a tamper-resistant module and an authentication server. The method includes receiving, at the tamper-resistant module, information encrypted using a first secret key stored in the authentication server. The method also includes authenticating the authentication server in response to decrypting the information using a second secret key stored in the tamper-resistant module.
摘要:
The present invention provides a method of route optimization. The method may include obtaining a packet associated with a first address associated, by a home agent, with a first mobile unit and routing the packet to a second address associated with a second mobile unit along a forward link of a communication path that bypasses the home agent.
摘要:
A method is disclosed for routing packets in an intermediate node between a mobile node and a correspondent node in a packet-switched network, only one of said nodes being macro-mobility enabled, comprising at the intermediate node: -exchanging lower-layer-address-update-related messages with said macro-mobility enabled node; -mapping source address, destination address and potentially protocol parameters of lower-layer packets exchanged between the mobile node and the correspondent node in such a way that the macro-mobility enabled node can communicate with the other node as if the other node is also macro-mobility enabled, and such that the other node can communicate with the intermediate node as if the intermediate node is a non-macro-mobility-enabled node. Also associated devices, update methods for devices, and servers are disclosed.
摘要:
A method is disclosed for routing packets in an intermediate node between a mobile node and a correspondent node in a packet-switched network, only one of said nodes being macro-mobility enabled, comprising at the intermediate node: —exchanging lower-layer-address-update-related messages with said macro-mobility enabled node; —mapping source address, destination address and potentially protocol parameters of lower-layer packets exchanged between the mobile node and the correspondent node in such a way that the macro-mobility enabled node can communicate with the other node as if the other node is also macro-mobility enabled, and such that the other node can communicate with the intermediate node as if the intermediate node is a non-macro-mobility-enabled node. Also associated devices, update methods for devices, and servers are disclosed.
摘要:
Femto base stations and methods described herein suppress the need for an external GPS antenna and cable, while still providing a network service provider with the ability to obtain the desired GPS location coordinates and the user with the flexibility of placing the femto cell at the location of their choice within a home regardless of GPS signal strength.
摘要:
Femto base stations and methods described herein suppress the need for an external GPS antenna and cable, while still providing a network service provider with the ability to obtain the desired GPS location coordinates and the user with the flexibility of placing the femto cell at the location of their choice within a home regardless of GPS signal strength.
摘要:
Femto base stations and methods described herein suppress the need for an external GPS antenna and cable, while still providing a network service provider with the ability to obtain the desired GPS location coordinates and the user with the flexibility of placing the femto cell at the location of their choice within a home regardless of GPS signal strength.
摘要:
In one embodiment of the method, a base station is configured to divide a coverage area of the base station into sub-coverage areas. Each sub-coverage area has a smaller range of round trip propagation delays than a range of round trip propagation delays for the coverage area of the base station. Each sub-coverage area may have a different range of round trip propagation delays.
摘要:
The present invention provides a method for authenticating a mobile unit in a wireless communication system. The method includes accessing information indicative of a random number and of a first key formed using a first cryptographic function. The method also includes forming second and third keys based on the random number, on the first key, and on second and third cryptographic functions that are different than the first cryptographic function. The method further includes transmitting data encrypted using the second and third keys over an air interface.