Abstract:
The invention provides a method and system for proving ownership of an IPv6 address of a node in an IP based communication system. The node generates or has a private key corresponding to a public key, computes an address using the public key. The node verifies owning the address by generating answer to at least one question presented by another node, the answer being generated using the private key corresponding to the public key. According to another embodiment, for proving ownership of the IP address, the node generates the IP address based on passwords used only once, and the another node receiving the IP address verifies that the node owns the IP address by checking the password.
Abstract translation:本发明提供了一种证明基于IP的通信系统中节点的IPv6地址的所有权的方法和系统。 节点生成或具有与公钥对应的私钥,使用公钥计算地址。 该节点通过生成对由另一个节点呈现的至少一个问题的答案来验证拥有该地址,该答案是使用与该公钥对应的私钥生成的。 根据另一个实施例,为了证明IP地址的所有权,节点基于仅使用一次的密码生成IP地址,并且接收IP地址的另一节点通过检查密码来验证该节点拥有IP地址。 p >
Abstract:
This disclosure is directed to techniques for supporting transition between network communication protocols in a communication network e.g. IP network (18). The techniques may be applicable to different network communication protocols, but are especially useful in the transition from the IPv4 communication protocol to the IPv6 communication protocol in a wireless communication network (14,16,18). In general, to reduce consumption of scarce IPv4 address during the transition period, a network communication device e.g. mobiles WDC1-WDCn (12A-12N) implementing a dual IPv4/IPv6 stack acquires an IPv4 address only when necessary to communicate with IPv4 resources e.g. Ipv4 nodes (20A-20N) on the network. The network communication device uses an IPv6 address at the start of a communication session, and does not acquire an IPv4 address unless a need arises later in the session for communication with an IPv4 resource. The IPv4 address may be acquired for a limited period of time, such as fixed period of time or a period of actual usage, to further promote availability of IPv4 addresses.
Abstract:
A method for discovery and change of a PMTU between a source node and a destination node on a dynamic IP network comprises generating a PMTU discovery packet having a MTU information storage space in which an MTU value on a routing path between the source node and the destination node is stored; transmitting the generated PMTU discovery packet to the destination node; and if a response packet to the PMTU discovery packet from the destination node is received, changing the PMTU according to MTU information contained in the response packet, wherein the MTU value stored in the MTU information storage space is compared with a link MTU value on a path which the PMTU discovery packet traverses, and the smaller one of the stored MTU value and the link MTU value on the path which the packet traverses is stored in the MTU information storage space.
Abstract:
A method for more efficiently operating a network, and more particularly, for discovery of a path maximum transmission unit (PMTU) between nodes on an IP network, is provided. The method comprises (a) comparing the size of a received packet with a maximum transmission unit (MTU) of a next link; and (b) if the size of the received packet is greater than the MTU of the next link, generating an error message, transmitting the generated error message to a source node, generating a test message of the size of the MTU of the next link, and transmitting the generated test message to a destination node. According to the PMTU discovery method, a PMTU can be determined in a shorter time, and it is possible to minimize the use of network resources.
Abstract:
A system and method for three-party authentication and authorization. The system includes an authorizer (815) that authorizes requestors, a client (805) that makes a request, and a local attendant (910) that provides a conduit through which messages between the client (805) and the authorizer (815) pass. The authorizer (815), the client (805), and a peer (135) on which the requested resource may be accessed are each in separate domains. A domain is defined as a set of one or more entities such that if the set includes more than one entity, a connection between any two of the entities in the set can be secured by static credentials that are known by each of the two entities A subscriber identity module (SIM) may be used to generate a copy of a key for the client (805) to be used in accessing a requested resource (1040).
Abstract:
A system and method for the reception of content items, including the ability to handle (107) a plurality of service announcement formats and the ability to select (113), for a plurality of network access points, the best access point for receiving items.
Abstract:
Mobile devices such as Personal Digital Assistants or mobile phones can connect to the Internet or another IP based network using WPAN and WLAN infrastructures or cellular systems like GPRS or 3G. Multi-mode hardware such as combination chipsets that support these standards are becoming available as well. According to the present invention, wireless network driver software architecture is proposed, named Multi-standard Wireless Adaptation Layer (MWAL) and is for client devices MT that may be portable, need to efficiently switch from one wireless standard to another and that must be able to stay connected and reachable in the Internet or other IP based network even when switching between wireless communication standards. The technique of the invention is a layer 2 technique suitable for vertical markets and proprietary solutions, in which the MWAL enables the client device MT to perform vertical handovers between wireless communications standards.
Abstract:
For data flow between a subnet (16) of a data network (4) and a mobile node (6), re-routing such that the data flow goes through a different access network via a different network access point (40) is described. The method comprises the steps of ending provision of a first address binding currently being provided between the mobile node (6) and a first access network (20) where the address is dependent upon a type of the first network access point (24). The method includes the step of starting provision of a second address binding between the mobile node (6) and a second access network (36) dependent upon a type of the second network access point (40). Alternatively, or in addition, steps of removing and adding address entries on a routing table are described. The data network (4) may for example be the Internet, the subnet (16) may be an Internet protocol (IP) subnet, and the access networks (20,36) may be a UMTS network, HiperLAN, Bluetooth, IEEE 802.11b, Ethernet etc.
Abstract:
The present invention relates to a transmission system for transmitting source application data units to a destination application via a network comprising a plurality of network protocol stacks. Such a transmission system provides a solution for transmitting additional information from a layer of a first network protocol stack to a layer of a second network protocol stack, without disturbing the way in which ordinary streams are processed. To this end, it further comprises: generating means for generating additional information at a layer of a first network protocol stack to be sent to a layer of a second network protocol stack via at least said first and second network protocol stacks, adapting means for converting said additional information into at least one additional data unit compliant with network protocol rules, marking means for marking said additional data units, retrieving means for retrieving said additional information within said additional data units when said additional data units arrive at said layer of said second network protocol stack. More generally, the invention deals with all the possible exchanges of additional information between layers of network protocol stacks within a transmission system. Said transmission system may also include some routers.
Abstract:
A method and system for supporting a network layer protocol in a wireless communication network are presented. A network element, such as a packet data serving node (PDSN), receives, from a mobile device, a first packet of a receive packet stream. If the first packet conforms to a first predetermined protocol, then at least a portion of the first packet is forwarded to a router that supports the first predetermined protocol. The network element receives a second packet forwarded by the router. If the second packet conforms to the first predetermined network layer protocol, then at least a portion of the second packet is transmitted in a transmit packet stream. As such, the network element need not natively support the first predetermined protocol.