摘要:
A Session Initiation Protocol (SIP)-compliant proxy (106) receives a first INVITE message destined for a mobile station (102). The first INVITE message is associated with an initial Internet Protocol (IP) contact address for the mobile station (102). Subsequently, it is determined whether an IP address update for the mobile station (102) may have occurred and a new IP contact address is obtained for the mobile station (102). A second INVITE message is sent to the mobile station (102) at the new contact address so as to continue a session initiation.
摘要:
Various embodiments are described for facilitating network mobility in communication networks with an aim toward enhancing the scalability of MIP. Generally, in most of these embodiments, a network node (121) sends a message to a network device (131) to establish a data path for a remote unit (101) served by the network node. This message comprises a source link layer address which is associated with the remote unit. The message may or may not be sent in response to receiving signaling to facilitate wireless connectivity of a remote unit via the network node. In addition, the network device to which the message is sent may be an access router (AR) or a foreign agent (FA) of the remote unit.
摘要:
A method (600,700) and apparatus (800) are arranged and operate for facilitating call routing between sites in an enterprise connected by a private IP network (130). A range of identifiers (220-223) served by IP PBXs (120-123) in the enterprise may be registered with a SIP registrar (212) of an inter-site router (210). Call requests to a communication unit (350) outside the home site are routed to the SIP registrar. A site identifier associated with the destination IP PBX allows the call to be completed by the SIP Proxy or the IP PBX where the call was received. When no private IP network is available, a roaming CU registers with a cellular proxy in the visited network. Calls are routed by when an HLR (340) associated with the CU obtains the roaming number from the cellular proxy (330) in the visited site. The MSC completes the call to the visited IP PBX using the roaming number and a local SIP registrar 440 forwards the call to the CU.
摘要:
Various embodiments are described for facilitating hotlining in communication systems. A device (101) is informed by a device manager (131) that it is being hotlined and is provided certain hotlining state information. This information may enable devices with different types of user interfaces (browsers, automated clients, handsets, etc.) to trigger an appropriate application and begin communicating with an appropriate network location (in a secure and controlled fashion) to resolve the hotlining issue. The hotlining state information may also enable the device to access network services, while hotlined, such as emergency services. Assuming that a resolution to the hotlining is attained, the device may then be notified that hotlining has terminated. The device may then resume its access to regular network services, perhaps as gracefully as re-entering one or more data sessions interrupted by the hotlining.
摘要:
Various embodiments are described for facilitating network mobility in communication networks with an aim toward enhancing the scalability of MIP. Generally, in most of these embodiments, a network node (121) sends a message to a network device (131) to establish a data path for a remote unit (101) served by the network node. This message comprises a source link layer address which is associated with the remote unit. The message may or may not be sent in response to receiving signaling to facilitate wireless connectivity of a remote unit via the network node. In addition, the network device to which the message is sent may be an access router (AR) or a foreign agent (FA) of the remote unit.
摘要:
An apparatus and method for locking carrier access in a communication network, including a first step (102) of installing a pattern matching string in a mobile subscriber station. A next step (104) includes embedding a service provider identity within a subject of a digital certificate. A next step (106) includes receiving the digital certificate of the embedding step. A next step (108) includes performing network entry with the communication network. A next step (110) includes extracting the service provider identity from the digital certificate. A next step (112) includes utilizing the pattern matching string to match against the service provider identity
摘要:
Various embodiments are described for authenticating a wireless device (101) and/or an associated user subscription. By using a single authentication exchange with the wireless device to obtain a device credential, a connectivity service network (CSN) (231) authenticates and validates the device credential to establish a device identity. For device-identity-based subscription, the device identity may be used to validate a subscription. For user subscription authentication, a second authentication exchange is performed using the encrypted connection established by the first authentication exchange (a.k.a, the outer exchange). By utilizing only one outer authentication exchange, embodiments are made possible that exhibit reduced messaging and lower complexity when compared to known techniques.
摘要:
A method, a network element, and a client device for creating a trusted connection with a network are disclosed. A client device 104 may attempt to access a sub-network 106. The client device 104 may determine that a certificate of the sub-network 106 is issued by a certification authority absent from a device certificate trust list. The client device 104 may receive via the sub-network 106 a certificate trust list update 400 from a certificate trust list provider 108.
摘要:
An apparatus and method for efficient transitions between operating states in a communication network, includes a preliminary step of having a mobile station in a Dormant or Idle state. A next step includes requiring a data transfer, either to or from the mobile station. A next step includes transitioning the mobile station from the Dormant or Idle to an Active state. A next step includes transferring a bearer path context for the data from a Paging Control Function (PCF) to an RF Bearer Function. This can include creating a tunnel using an Inter-PCF handoff procedure. The result is a direct connection between an RF Bearer Function and an IP Router, without the PCF being in the data path.
摘要:
A method, information processing system, and wireless device provide authentication information to a network. The method includes determining that at least one authentication context (120) resides in memory (412). The at least one authentication context (120) is analyzed to determine if at least one realm identifier associated with a home service provider is included in the at least one authentication context (120). A user is prompted to update the at least one authentication context (120) with at least one realm identifier associated with a home service provider in response to determining that at least one realm identifier fails to be included in the at least one authentication context (120). At least one realm identifier is received (612) from a user that is associated with a home service provider. The at least one authentication context (120) is updated with the at least one realm identifier received from the user.