摘要:
In an ad hoc peer-to-peer type network during peer discovery, information relating to users of various devices is broadcast to other devices in the network, which can compromise privacy of the users. Instead of announcing a public identifier that might be known by a multitude of individuals, the user device announces a private identifier that might be known to, or determined by, a select few individuals. The individuals selected can be given a key to determine the private identifier associated with a public identifier, or vice versa, wherein that key can have a validity range or a period of time, after which the key expires. Prior to the expiration of the key, the selected individuals, through their respective devices, can detect a corresponding user and/or device by the current private identifier being announced, thus mitigating the number of people that are aware of the user's presence.
摘要:
Methods and apparatus for wireless communications in regional networks, e.g., ad hoc peer to peer networks, are described. Wireless communications devices transmit and monitor for presence indicator signals broadcast from other peer communications devices in its local vicinity. A wireless communications device maintains a list of discovered devices in its vicinity. A first wireless communications device transmits a paging signal directly over an airlink to a second communications device, which is on its list and to which it desires to send data units, e.g., user data in a peer to peer traffic segment. In response to a received paging response signal from the second device, the first device transmits data units, intended for the second device, to a third device, which acts as an intermediary node. The power level for the data unit signal is controlled to be lower than the power level used for the paging signal. FIG. 4
摘要:
Methods and apparatus for storing, manipulating, retrieving, and forwarding state, e.g., context and other information, used to support communications sessions with one or more end nodes, e.g., mobile devices, are described. Various features are directed to a mobile node controlling the transfer of state from a first access node to a second access node during a handoff operation thereby eliminating any need for state transfer messages to be transmitted between the second access node and the first access node during handoff. Other features of the invention are directed to the use of a core network node to store state information. State information stored in the core node can be accessed and used by access nodes in cases where a mobile node does not send a state transfer message during a handoff, e.g., because communication with the first access node is lost or because such messages are not supported.
摘要:
A method, an apparatus, and a computer program product are provided in which information is exchanged through peer-to-peer communication with a second wireless device using a first radio technology. The information regards at least one additional radio technology. In addition, whether to utilize a second radio technology of the at least one additional radio technology for peer-to-peer communication with the second wireless device rather than the first radio technology is determined. Furthermore, the first radio technology is utilized to exchange control information for the second radio technology.
摘要:
Methods and apparatus related to a peer to peer wireless communications system supporting secure advertisement of identification and/or discovery information e.g., upper layer discovery information, are described. Air interface timing and/or other information received from a third device, e.g., a beacon or GPS transmitter is incorporated in the computation of identification/discovery information which is communicated from a first device to a second device. The second device stores some identification/discovery credentials corresponding to the first device, which have been communicated out of band from the first device to the second device. Upon receipt of a identifier from a first device, the second device determines if the stored information corresponds to the device that transmitted the identifier. Various embodiments facilitate secure advertisement of identification and/or discovery information and discovery, e.g., selective discovery by trusted peers.
摘要:
Methods and apparatus supporting enhanced discovery operations in peer to peer networks are described. Peer discovery, based on direct peer to peer discovery between two mobile nodes can be somewhat limited, e.g., due to power limitations, processing power, and/or channel conditions. An access point, e.g., base station, monitors for and receives peer discovery signals conveying a set of identifiers from a wireless communications device. The access point retransmits at least one identifier in the set in a wireless peer to peer communications channel. Thus the access point effectively extends the peer discovery range for wireless communications devices utilizing the peer to peer network. Wireless communications devices can monitor for and recover the rebroadcast peer discovery signals from access points. Thus, via access point signaling a wireless communications device can be made situationally aware of other devices of interest which would be otherwise outside its discovery detection range.
摘要:
A method, a computer program product, and an apparatus are provided. The apparatus may be equipped to obtain one or more application identifiers from one or more applications on a wireless device, generate a super identifier (SID) having elements corresponding to the one or more applications and a base that identifies one or more common properties of the one or more applications, and broadcast the SID during one or more peer discovery slots allocated for the wireless device. In another example, a UE may be equipped to receive the SID broadcast by another UE, determine a match between at least one of the one or more common properties in the base, and determine whether an element associated with one or more applications is present in the SID.
摘要:
Aspects describe spectrum authorization, access control, and configuration parameters validation. Devices in an ad-hoc or peer-to-peer configuration can utilize a licensed spectrum if the devices are authorized to use the spectrum, which can be determined automatically. Aspects relate to distribution of authorization tickets by an authorization server as a result of validating a device's credentials and services to which the device is entitled. An exchange and verification of authorization tickets can be performed by devices as a condition for enabling a validated wireless link using the spectrum.
摘要:
Methods and apparatus related to packet fragmentation and reconstruction are described. A sequence of bits is generated including at least one header and at least partial packet payload prior to a determination of the actual data rate to be used in a communications segment. In some embodiments, the generated sequence of bits corresponds to a prepared information bit stream for a best case scenario in which the highest data rate is selected for segment. Various embodiments allow for the selection of the data rate to be used for the communications segment to be delayed until just prior to the transmission. Thus the selection of the data rate for the communications segment, and thus the segment capacity, can be based on more current channel condition information than would otherwise be possible if the communications device needed to know the data rate for the segment before performing header and packet fragmentation operations.
摘要:
A method, an apparatus, and a computer program product are provided in which information is exchanged through peer-to-peer communication with a second wireless device using a first radio technology. The information regards at least one additional radio technology. In addition, whether to utilize a second radio technology of the at least one additional radio technology for peer-to-peer communication with the second wireless device rather than the first radio technology is determined. Furthermore, the first radio technology is utilized to exchange control information for the second radio technology.