摘要:
A route protocol is established whereby a mobile device can communicate to a multitude of (receiving) base stations though a tunnel created through a serving base station. A message that includes a Route Creation Header can be transmitted by the mobile device to create the tunnel. The Route Creation Header is reviewed by the receiving base station while the mobile device is in a Waiting-To-Open State. Various errors might occur with respect to the Route Creation Header. These errors can be conveyed to the mobile device by base station by setting one or more error code fields. Once the errors are resolved, another attempt to create a tunnel with base station can be made, if desired.
摘要:
A route protocol is established whereby a mobile device can communicate to a multitude of (receiving) base stations though a tunnel created through a serving base station. A message that includes a Route Creation Header can be transmitted by the mobile device to create the tunnel. The Route Creation Header is reviewed by the receiving base station while the mobile device is in a Waiting-To-Open State. Various errors might occur with respect to the Route Creation Header. These errors can be conveyed to the mobile device by base station by setting one or more error code fields. Once the errors are resolved, another attempt to create a tunnel with base station can be made, if desired.
摘要:
A method and apparatus are disclosed for negotiating and managing one or more personalities in a wireless communications system. The method comprises advertising one or more supported initial protocol set identifiers. Furthermore, the method comprises selecting a starting initial protocol set identifier from the advertised initial protocol set identifiers. In addition, the method comprises establishing a session based on the selected starting initial protocol set identifier. The method also comprises establishing a connection between an access terminal and an access network based on the selected initial protocol set identifier.
摘要:
Systems and methods of decoupling session management from connection management of a wireless network by enabling transfer of a session between session controllers. A session transfer component transfers ownership of a session from a source session controller to a target session controller, wherein the session transfer does not necessarily require moving the associated connections therewith. Such transfer employs a Unicast Access Terminal Identifier (UATI) that is updated to inform the related base stations regarding transfer of the session.
摘要:
Systems and methods of decoupling session management from connection management of a wireless network by enabling transfer of a session between session controllers. A session transfer component transfers ownership of a session from a source session controller to a target session controller, wherein the session transfer does not necessarily require moving the associated connections therewith. Such transfer employs a Unicast Access Terminal Identifier (UATI) that is updated to inform the related base stations regarding transfer of the session.
摘要:
A novel group key distribution and management scheme for broadcast message security is provided that allows an access terminal to send a single copy of a broadcast message encrypted with a group key. Access nodes that are members of an active set of access nodes for the access terminal may decrypt and understand the message. The group key is generated and distributed by the access terminal to the access nodes in its active set using temporary unicast keys to secure the group key during distribution. A new group key is provided every time an access node is removed from the active set of access nodes for the access terminal.
摘要:
A method and apparatus for generating a cryptosync is disclosed that generates a cryptosync with the desired variability without the overhead in complexity and size of prior cryptosyncs. The cryptosync is generated from a combination of fields including fields relating to the segmentation and reassembly of the data packets at a transmitting terminal and a receiving terminal. The resultant cryptosync does not repeat during the use of a particular security key.
摘要:
A method and apparatus for generating a cryptosync is disclosed that generates a cryptosync with the desired variability without the overhead in complexity and size of prior cryptosyncs. The cryptosync is generated from a combination of fields including fields relating to the segmentation and reassembly of the data packets at a transmitting terminal and a receiving terminal. The resultant cryptosync does not repeat during the use of a particular security key.
摘要:
A novel group key distribution and management scheme for broadcast message security is provided that allows an access terminal to send a single copy of a broadcast message encrypted with a group key. Access nodes that are members of an active set of access nodes for the access terminal may decrypt and understand the message. The group key is generated and distributed by the access terminal to the access nodes in its active set using temporary unicast keys to secure the group key during distribution. A new group key is provided every time an access node is removed from the active set of access nodes for the access terminal.
摘要:
Disclosed is a method for multiple EAP-based authentications in a wireless communication system. In the method, a first master session key (MSK) is generated in a first EAP-based authentication for a first-type access. A first temporal session key (TSK) is generated from the first master session key (MSK). A second EAP-based authentication is performed, using the first temporal session key (TSK), for a second-type access. First-type access and second-type access are provided after the first and second EAP-based authentications are successfully completed.