摘要:
Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.
摘要:
Embodiments disclosed herein relate to a new set of radio link protocols (RLPs) configured to provide for efficient data transmission in a multi-link communication system. In an embodiment, an upper-layer packet is segmented into link-layer packets to be transmitted over a plurality of communication links, each including a first sequence number in accordance with a predetermined order. A second sequence number is further added to each link-layer packet to be transmitted for the first time. The second sequence number is configured to be in a sequence space associated with a particular communication link, and may be used for detection of missing packets.
摘要:
Embodiments described herein relate to connected-state radio session transfer in wireless communications. A source access network controller may lock a source radio session associated with an access terminal (e.g., in response to detecting a handoff condition associated with the access terminal), where the source access network controller may be in communication with a data network. The source access network controller may also instruct a target access network controller to create a target radio session corresponding with the source radio session, and to establish a communication route between the data network and the access network via the target ANC. The source access network controller may then freeze a state associated with the source radio session and transmits the frozen state to the target access network controller. The target access network controller may subsequently unfreeze the received state and further unlock the radio session, hence resuming control of the access terminal.
摘要:
Operating a communication device in a half-duplex mode using only overhead channels; and substantially free running a timing reference obtained during reception to allow a timing reference value to drift during transmission.
摘要:
Embodiments disclosed herein relate to providing dynamic assignment of home agent and home address in wireless communications, such that a mobile node away from home may receive local access services from a visited network. In an embodiment, a mobile node accesses a visited network. The visited network authenticates the mobile node with its home network. The visited network then assigns a visited home agent and a home address for the mobile node. The mobile node subsequently performs secure binding with the visitor home agent. The mobile node proceeds with communications using the visitor home agent and home address.
摘要:
Access terminal identification management providing a minimum distance between subnets before reusing subnet identifiers. Mobility criteria evaluation determines when to reassign an access terminal identifier. In one embodiment, the mobility criteria is whether any member of the active set for the access terminal belongs to an originating subnet. In an alternate embodiment, the criteria is whether the access terminal has traveled more than a minimum distance from the originating subnet. When a mobility criteria is violated, the access network assigns a new identifier. In one embodiment, the access terminal identifier is a long code mask based on a subnet identifier. Identifier management applies when crossing sector boundaries in a cellular system, and serves to reduce the ambiguity of mapping CC values to full UATI values, and to avoid overlapping assignments.
摘要:
Techniques for efficient storage and retrieval of Preferred Roaming Lists are disclosed. In one aspect, PRL entries are stored in two tables. One table contains records that are common to two or more PRL entries. Another table stores any information that is unique to a PRL entry, as well as an indicator of which common record is associated with it. The common record is concatenated with the unique information to generate the uncompressed PRL entry. Various other aspects of the invention are also presented. These aspects have the benefit of reducing the memory requirements for storing a PRL. In addition, time required to download the compressed PRL is reduced.
摘要:
Embodiments disclosed herein relate to methods and systems for reporting and compiling connection failures in wireless communication systems. In an embodiment, when an access terminal experiences a connection failure (e.g., an unintended one), the access terminal may generate a connection failure record associated with the event, and send a message containing the connection failure record to an access network it has since established the connection. The access network may send a message containing a connection failure report acknowledgement (ACK) message to the access terminal, upon reception of the connection failure report message. The network operators may use the connection failure records thus compiled to identify problematic spots in the system and improve the quality of service.
摘要:
Techniques to forward unsolicited messages from an (IS-2000) CDMA radio network via an HDR radio network to an access terminal. A session is first established between the access terminal and the HDR radio network. During session establishment or thereafter, the access terminal indicates to the HDR radio network an interest in receiving unsolicited messages from the CDMA radio network. The access terminal typically also registers with the CDMA radio network. Thereafter, unsolicited messages can be sent from a mobile station controller (MSC) to the HDR and CDMA radio networks, or sent from the MSC to the CDMA radio network, which then forwards the messages to the HDR radio network. The HDR radio network encapsulates the unsolicited messages and sends the encapsulated messages to the access terminal. The forwarding of unsolicited messages allows the CDMA radio network to communicate with an access terminal.