Key identifier in packet data convergence protocol header
    1.
    发明授权
    Key identifier in packet data convergence protocol header 失效
    分组数据汇聚协议头中的密钥标识符

    公开(公告)号:US08320561B2

    公开(公告)日:2012-11-27

    申请号:US12186430

    申请日:2008-08-05

    IPC分类号: H04L9/00

    CPC分类号: H04L63/06 H04W12/04 H04W12/10

    摘要: Systems and methodologies are described that facilitate identifying a plurality of keysets utilized in a communications network. The keysets can include ciphering keys that provide data encryption and decryption and integrity keys that provide data integrity protection. A key identifier can be included in a packet data convergence protocol header that indicates a keyset employed in connection with data in a protocol data unit. In addition, a route indicator can be provided in a radio link control header that distinguishes a source cell and a target cell in networks configured without RLC reset.

    摘要翻译: 描述了便于识别在通信网络中使用的多个键组的系统和方法。 密钥组可以包括提供数据加密和解密的加密密钥以及提供数据完整性保护的完整性密钥。 密钥标识符可以被包括在指示与协议数据单元中的数据相关联地使用的密钥集的分组数据会聚协议报头中。 此外,可以在无RLC链路控制头中提供路由指示符,该无线链路控制头在区分不配置RLC复位的网络中的源小区和目标小区。

    Layer 2 tunneling of data during handover in a wireless communication system
    3.
    发明授权
    Layer 2 tunneling of data during handover in a wireless communication system 失效
    在无线通信系统中的切换期间的数据的二层隧道化

    公开(公告)号:US08437306B2

    公开(公告)日:2013-05-07

    申请号:US12187539

    申请日:2008-08-07

    IPC分类号: H04W4/00

    摘要: Techniques for sending data during handover with Layer 2 tunneling are described. In one design, a user equipment (UE) sends first Layer 2 packets to a source base station prior to handover to a target base station. The UE sends at least one second Layer 2 packet to the target base station, which identifies the second Layer 2 packet(s) as being intended for the source base station and thus forwards the second Layer 2 packet(s) to the source base station via a Layer 2 tunnel. The UE sends third Layer 2 packets to the target base station after the handover. The target base station processes the third Layer 2 packets to obtain IP packets and sends the IP packets to a serving gateway after a trigger condition, which may be defined to achieve in-order delivery of IP packets from the source and target base stations to the serving gateway.

    摘要翻译: 描述用于在第二层隧道切换期间发送数据的技术。 在一种设计中,用户设备(UE)在切换到目标基站之前将第一层2分组发送到源基站。 UE向目标基站发送至少一个第二层2分组,目标基站将第二层分组标识为源基站,从而将第二层分组转发到源基站 通过二层隧道。 移交后,UE向目标基站发送第三层报文。 目标基站处理第三层数据包以获得IP数据包,并在触发条件之后将IP数据包发送到服务网关,触发条件可以被定义为实现从源和目标基站到IP地址的IP分组的按顺序传送 服务网关。

    LAYER 2 TUNNELING OF DATA DURING HANDOVER IN A WIRELESS COMMUNICATION SYSTEM
    4.
    发明申请
    LAYER 2 TUNNELING OF DATA DURING HANDOVER IN A WIRELESS COMMUNICATION SYSTEM 失效
    无线通信系统中切换数据的层2隧道

    公开(公告)号:US20090124259A1

    公开(公告)日:2009-05-14

    申请号:US12187539

    申请日:2008-08-07

    IPC分类号: H04W36/00

    摘要: Techniques for sending data during handover with Layer 2 tunneling are described. In one design, a user equipment (UE) sends first Layer 2 packets to a source base station prior to handover to a target base station. The UE sends at least one second Layer 2 packet to the target base station, which identifies the second Layer 2 packet(s) as being intended for the source base station and thus forwards the second Layer 2 packet(s) to the source base station via a Layer 2 tunnel. The UE sends third Layer 2 packets to the target base station after the handover. The target base station processes the third Layer 2 packets to obtain IP packets and sends the IP packets to a serving gateway after a trigger condition, which may be defined to achieve in-order delivery of IP packets from the source and target base stations to the serving gateway.

    摘要翻译: 描述了在切换第二层隧道期间发送数据的技术。 在一种设计中,用户设备(UE)在切换到目标基站之前将第一层2分组发送到源基站。 UE向目标基站发送至少一个第二层2分组,目标基站将第二层分组标识为源基站,从而将第二层分组转发到源基站 通过二层隧道。 移交后,UE向目标基站发送第三层报文。 目标基站处理第三层数据包以获得IP数据包,并在触发条件之后将IP数据包发送到服务网关,触发条件可以被定义为实现从源和目标基站到IP地址的IP分组的按顺序传送 服务网关。

    METHOD AND APPARATUS FOR SECURITY ACTIVATION IN WIRELESS COMMUNICATIONS NETWORK
    5.
    发明申请
    METHOD AND APPARATUS FOR SECURITY ACTIVATION IN WIRELESS COMMUNICATIONS NETWORK 有权
    无线通信网络安全启动的方法与装置

    公开(公告)号:US20130064225A1

    公开(公告)日:2013-03-14

    申请号:US13674350

    申请日:2012-11-12

    IPC分类号: H04W36/08

    摘要: Systems and methodologies are provided that facilitate security activation for wireless communications. In an aspect, a method for wireless communication is provided which includes determining a first security key for communicating with a source access point and receiving, from the source access point, a handover command that includes an indication of whether to apply a second security key upon handover. The method also includes handing over communication from the source access point to a target access point, where the second security key is applied for communicating with the target access point upon the handover when the handover command indicates to apply the second security key.

    摘要翻译: 提供了有助于无线通信的安全激活的系统和方法。 一方面,提供了一种用于无线通信的方法,其包括确定用于与源接入点进行通信的第一安全密钥,并且从源接入点接收切换命令,该切换命令包括是否应用第二安全密钥的指示 交出。 所述方法还包括将来自源接入点的通信切换到目标接入点,其中当切换命令指示应用第二安全密钥时,第二安全密钥被应用于在切换时与目标接入点进行通信。

    SECURITY ACTIVATION IN WIRELESS COMMUNICATIONS NETWORKS
    6.
    发明申请
    SECURITY ACTIVATION IN WIRELESS COMMUNICATIONS NETWORKS 失效
    无线通信网络中的安全活动

    公开(公告)号:US20080318546A1

    公开(公告)日:2008-12-25

    申请号:US12142105

    申请日:2008-06-19

    IPC分类号: H04M3/16

    摘要: Systems and methodologies are described that facilitate security activation within a specified security activation time. Thus, where handover occurs or is initiated within the activation time, security keys can be activated in such a way as to not be substantially affected by the handover. In one example, a handover time can be set to occur beyond the security activation time to ensure the security activation happens first. Additionally, a handover command can comprise security keys that can be activated upon handover in another example. Moreover, in non-real-time contexts, dummy packets can be transmitted to allow timer operability with packet sequence numbering, or security activation times can be substantially ignored by utilizing a verification process.

    摘要翻译: 描述了在指定的安全激活时间内促进安全激活的系统和方法。 因此,在切换发生或在激活时间内启动的情况下,安全密钥可以以不受切换的显着影响的方式激活。 在一个示例中,可以将切换时间设置为超出安全激活时间,以确保首先发生安全激活。 此外,切换命令可以包括在另一示例中可以在切换时激活的安全密钥。 此外,在非实时上下文中,可以传输虚拟分组以允许具有分组序列编号的定时器可操作性,或者通过利用验证过程可以基本上忽略安全激活时间。

    Method and apparatus for security activation in wireless communications network
    7.
    发明授权
    Method and apparatus for security activation in wireless communications network 有权
    无线通信网络中安全激活的方法和装置

    公开(公告)号:US08923814B2

    公开(公告)日:2014-12-30

    申请号:US13674350

    申请日:2012-11-12

    摘要: Systems and methodologies are provided that facilitate security activation for wireless communications. In an aspect, a method for wireless communication is provided which includes determining a first security key for communicating with a source access point and receiving, from the source access point, a handover command that includes an indication of whether to apply a second security key upon handover. The method also includes handing over communication from the source access point to a target access point, where the second security key is applied for communicating with the target access point upon the handover when the handover command indicates to apply the second security key.

    摘要翻译: 提供了有助于无线通信的安全激活的系统和方法。 一方面,提供了一种用于无线通信的方法,其包括确定用于与源接入点进行通信的第一安全密钥,并且从源接入点接收切换命令,该切换命令包括是否应用第二安全密钥的指示 交出。 所述方法还包括将来自源接入点的通信切换到目标接入点,其中当切换命令指示应用第二安全密钥时,第二安全密钥被应用于在切换时与目标接入点进行通信。

    Security activation in wireless communications networks
    8.
    发明授权
    Security activation in wireless communications networks 失效
    无线通信网络中的安全激活

    公开(公告)号:US08311512B2

    公开(公告)日:2012-11-13

    申请号:US12142105

    申请日:2008-06-19

    IPC分类号: H04M1/66 H04M1/68 H04M3/16

    摘要: Systems and methodologies are described that facilitate security activation within a specified security activation time. Thus, where handover occurs or is initiated within the activation time, security keys can be activated in such a way as to not be substantially affected by the handover. In one example, a handover time can be set to occur beyond the security activation time to ensure the security activation happens first. Additionally, a handover command can comprise security keys that can be activated upon handover in another example. Moreover, in non-real-time contexts, dummy packets can be transmitted to allow timer operability with packet sequence numbering, or security activation times can be substantially ignored by utilizing a verification process.

    摘要翻译: 描述了在指定的安全激活时间内促进安全激活的系统和方法。 因此,在切换发生或在激活时间内启动的情况下,安全密钥可以以不受切换的显着影响的方式激活。 在一个示例中,可以将切换时间设置为超出安全激活时间,以确保首先发生安全激活。 此外,切换命令可以包括在另一示例中可以在切换时激活的安全密钥。 此外,在非实时上下文中,可以传输虚拟分组以允许具有分组序列编号的定时器可操作性,或者通过利用验证过程可以基本上忽略安全激活时间。

    DOWNLINK FLOW CONTROL
    9.
    发明申请
    DOWNLINK FLOW CONTROL 有权
    下行流量控制

    公开(公告)号:US20090161545A1

    公开(公告)日:2009-06-25

    申请号:US12338969

    申请日:2008-12-18

    IPC分类号: H04L12/24 H04J3/00 H04W72/08

    摘要: Systems and methodologies are described that facilitate providing flow control feedback for controlling downlink data transmission rates. Various schemes can be utilized to send the flow control feedback from an access terminal to a base station. For example, a control PDU (e.g., MAC control PDU, PDCP control PDU) can be generated based upon a level of resource utilization of the access terminal, and sent to the base station for controlling the downlink data transmission rate. Following this example, a type of control PDU, a value included within the control PDU, etc. can be selected as a function of the level of resource utilization. By way of another illustration, a CQI report that includes a value selected as a function of the level of resource utilization associated with the access terminal can be generated and transmitted to the base station for controlling the downlink data transmission rate.

    摘要翻译: 描述了有助于提供用于控制下行链路数据传输速率的流量控制反馈的系统和方法。 可以利用各种方案将流量控制反馈从接入终端发送到基站。 例如,可以基于接入终端的资源利用级别来生成控制PDU(例如,MAC控制PDU,PDCP控制PDU),并发送给基站以控制下行链路数据传输速率。 在该示例之后,可以选择控制PDU的类型,包括在控制PDU内的值等作为资源利用级别的函数。 作为另一示例,可以生成包括根据与接入终端相关联的资源利用级别选择的值的CQI报告,并将其发送到基站,以控制下行链路数据传输速率。

    Downlink flow control
    10.
    发明授权
    Downlink flow control 有权
    下行流量控制

    公开(公告)号:US08917598B2

    公开(公告)日:2014-12-23

    申请号:US12338969

    申请日:2008-12-18

    IPC分类号: H04L1/00

    摘要: Systems and methodologies are described that facilitate providing flow control feedback for controlling downlink data transmission rates. Various schemes can be utilized to send the flow control feedback from an access terminal to a base station. For example, a control PDU (e.g., MAC control PDU, PDCP control PDU) can be generated based upon a level of resource utilization of the access terminal, and sent to the base station for controlling the downlink data transmission rate. Following this example, a type of control PDU, a value included within the control PDU, etc. can be selected as a function of the level of resource utilization. By way of another illustration, a CQI report that includes a value selected as a function of the level of resource utilization associated with the access terminal can be generated and transmitted to the base station for controlling the downlink data transmission rate.

    摘要翻译: 描述了有助于提供用于控制下行链路数据传输速率的流量控制反馈的系统和方法。 可以利用各种方案将流量控制反馈从接入终端发送到基站。 例如,可以基于接入终端的资源利用级别来生成控制PDU(例如,MAC控制PDU,PDCP控制PDU),并发送给基站以控制下行链路数据传输速率。 在该示例之后,可以选择控制PDU的类型,包括在控制PDU内的值等作为资源利用级别的函数。 作为另一示例,可以生成包括根据与接入终端相关联的资源利用级别选择的值的CQI报告,并将其发送到基站,以控制下行链路数据传输速率。