摘要:
Embodiments describe mobility management utilizing neighbor discovery and at least two pseudo wires. When a wireless device desires to handoff to a detected access router, such handoff may not be configured until such time as a current access router receives routing information of the target access router. In order to minimize handoff time, communication between the target access router and the wireless device can be through the current access router utilizing least two pseudo wires. Bidirectional neighbor discovery and create is conducted by the access routers allow subsequent wireless devices to automatically handoff between the access routers.
摘要:
Embodiments describe mobility management utilizing neighbor discovery and at least two pseudo wires. When a wireless device desires to handoff to a detected access router, such handoff may not be configured until such time as a current access router receives routing information of the target access router. In order to minimize handoff time, communication between the target access router and the wireless device can be through the current access router utilizing least two pseudo wires. Bidirectional neighbor discovery and create is conducted by the access routers allow subsequent wireless devices to automatically handoff between the access routers.
摘要:
The claimed subject matter relates to systems and methods for authorizing services. A method includes receiving a set of data relating to Quality of Service (QoS) pre-authorization, and conditionally processing subsequent QoS configuration requests based at least in part on the pre-authorization information. Depending on the pre-authorization information corresponding to a QoS configuration request, the request may be granted, denied, or result in sending of a request for authorization.
摘要:
An apparatus and associated method is provided for facilitating policy decision in a communication system, wherein the apparatus receiving a message, the message comprising a first destination device identification of a first destination device, determining a second destination device identification of a second destination device by accessing a location information of a wireless terminal, and replacing the first destination device identification with second destination device identification.
摘要:
Systems and methods of providing telemedicine services are provided. A system can include a medical device that obtains diagnostic information, a gateway device coupled to the medical device, an application server coupled to the gateway device via wired and wireless networks, a database coupled to the application server, the database storing the diagnostic information, and an analyzing device coupled to the database, the analyzing device analyzes records in the database to identify diagnostic information that exceeds predefined thresholds.
摘要:
In various embodiments, communication apparatuses and methods for providing robust communications are disclosed. For example, an apparatus may establish an air interface in accordance with an orthogonal frequency division multiplex (OFDM) protocol. According to another particular aspect, the apparatus establishes an air interface in accordance with a Fast Low-Latency Access with Seamless Handoff Orthogonal Frequency Division Multiplex (FLASH-OFDM) protocol.
摘要:
A service delivery platform that can support a number of different services is provided. A context regarding an application device is received by the service delivery platform. Applications executed on the service delivery platform use the context to optimize the delivery of information to application devices.
摘要:
A service delivery platform that can support a number of different services is provided. A context regarding an application device is received by the service delivery platform. Applications executed on the service delivery platform use the context to optimize the delivery of information to application devices.
摘要:
Systems and methods of providing strong authentication for a client device to sign-up with an online service. Authentication can involve verifying user's identity, message authentication, message integrity and nonrepudiation. The security procedures may, in some cases, be sufficient to verify all of these parameters. In other cases, the sign-up procedure needs to be combined with other information in order to verify the user's real identity.
摘要:
Methods and apparatus related to message compression/decompression are described. A compressed message is generated by indicating what changes are to be made to a previous message to produce the message sought to be transmitted. The required change, in the form of at least one command and corresponding parameter, is transmitted as a compressed version of the message being communicated. This approach takes advantage of the fact that messages sent over time often include much of the same message content and only one or a few fields may have changed. The techniques are general and involve including a command in the compressed message along with at least one parameter. The command indicates processing to be performed on a previous message to generate the uncompressed message. The parameter may be, e.g., data to be inserted into the previous message or specify a location in the previous message where the change is to be made.