Abstract:
A method and system is disclosed to provide a personalized, location related service to a user of a mobile terminal. The method includes: (A) generating a service specification object (22) that comprises a user-specified location and a message to be generated when the user arrives at the location with the MT; and (B) storing the service specification object for later use. The method further entails: (C) tracking the location of the mobile terminal; and when the location of the mobile terminal matches the location in the stored service creation object, (D) generating the message for activating a user-specified action.
Abstract:
A system is provided that includes a network entity, such as a packet data switching node (PDSN), and a terminal capable of establishing a data-link connection with the network entity, such as after setting up a physical-layer connection with the network entity. After the data-link connection is established, the network entity and the terminal can configure a network-layer protocol such that data formatted in accordance with the network-layer protocol can thereafter be sent between the terminal and the network entity over the data-link connection. Then, during configuration of the network-layer protocol, the terminal can discover at least one service available to the terminal by receiving, from the network entity, a listing of the at least one available service. The listing of each available service includes an address of a provider of the available service and a port number and/or pathname for accessing the service at the provider.
Abstract:
The present invention relates to a method for ensuring continuity of a communication session when a user equipment hands over from a first communication network to a second cellular communication network comprising the steps of performing an authentication procedure for a packet data session with the second network whilst still being attached to the first network and simultaneously performing a packet data session establishment procedure with the second network whilst still being attached to the first network.
Abstract:
A system and method are provided for access controlled delivery of location information. The system includes a mobile station, a location services client, and a location server. The mobile station is capable of receiving consent to deliver location information regarding the mobile station and, if consent is granted, automatically creating an authorization. After creating the authorization, the location services client is capable of receiving the authorization. The location services client can then transmit a request for the location information, where the request includes the authorization. The location server, in turn, can verify the authorization. After the authorization has been verified, the location server can deliver the location information to the location services client if the authorization is verified.
Abstract:
A method and system for routing messages between hosts while maintaining end-to-end location privacy are disclosed. In order to make routing more efficient, while maintaining location privacy, an encapsulation cache may be created in access routers that have a trust relationship with the respective home networks of the hosts. The encapsulation cache can be used to store home-address to care-of-address correspondences so that the access router, when a host is roaming, can route a message directly to the message's intended recipient, yet still maintain location privacy for the sending host by replacing the host's care-of address at the roaming network with the host's home address.
Abstract:
A system, method and computer program product are provided for delivering media content. The system includes at least one recipient that may be associated with at least one recipient rule. The system also includes a sending entity capable of transmitting a multimedia message addressed to the recipients. The sending entity can also specify delivery rules in the message. In this regard, the multimedia message includes media content. The system further includes a network entity capable of receiving the multimedia message and identifying any recipient rules, sending entity rules and/or network rules associated with the multimedia message. The network entity can then deliver the media content to the recipients based upon respective rules. The network entity can also be capable of processing the media content based upon the rules before delivering the media content, such as by transcoding or truncating at least a portion of the media content prior to delivery.
Abstract:
A method, system and computer program (FIG. 4) are disclosed to perform a low latency inter-technology handoff of a MN (3) from a WLAN to a cellular network (PDSN). The method includes transmitting a Bearer Context (ProxyRtSol) from the MN (3) for use by the cellular network (PDSN), the Bearer Context (ProxyRtSol) containing information required to established access network bearers in the cellular network (PDSN) for an ongoing Internet session of the MN; and responding to the Bearer Context (ProxyRtSol) with a Router Advertisement that is forwarded to the MN. The Bearer Context may be piggybacked on another message, or it may be sent as a separate message. The Bearer Context includes information expressive of: (a) a QoS required by application[s] of the MN; (b) a MN's unique identity; (c) parameters to facilitate the creation of a Point-to-Point Protocol state in the cellular network; and (d) parameters to enable establishment of packet filters in the cellular network
Abstract:
According to an embodiment of the present invention, security exposure analysis of wireless network within a selected local geographic area is provided. A computer model (320) of the selected local geographic region comprising a layout (324) is generated. Information regarding wireless network components is provided to the computer model. Using the computer model, signal intensity characteristics of at least one of the wireless network components are determined over at least a portion of the selected geographic region. Based at least on the signal intensity characteristics, security exposure information associated with the wireless network is determined. The security exposure information is graphically displayed on the computer screen in relation to the layout of the selected geographic region. The security exposure information includes sniffer detection and prevention coverage, access point vulnerability regions, and signal uncertainty and variability views.
Abstract:
A method for monitoring a selected region of an airspace associated with local area networks of computing devices is provided. The method includes providing one or more segments of a legacy local area network to be protected in a selected geographic region. The legacy local area network is characterized by an unsecured airspace within the selected geographic region. The method includes determining a security policy associated with the one or more segments of the legacy local area network. The security policy at least characterizes a type of wireless activity in the unsecured airspace to be permitted, denied, or ignored. Additionally, the method includes connecting one or more sniffer devices into the legacy local area network. The one or more sniffer devices are spatially disposed within the selected geographic region to cause at least a portion of the unsecured airspace to be secured according to the security policy. Moreover, the method includes coupling a security appliance to the legacy local area network. The method also includes determining if the one or more sniffer devices substantially covers the portion of the unsecured airspace to be secured. The method additionally includes monitoring wireless activity in the airspace using the one or more sniffer devices, and automatically classifying, using a classification process, a portion of information associated with the monitoring of the wireless activity to at least determine if the wireless activity communicates to at least one of the one or more segments to be protected. Further, the method includes detecting a violation of the security policy based upon at least the classifying of the portion of the information from the monitoring of the wireless activity, and automatically processing an action associated with the violation in accordance to the security policy for the one or more segments in the legacy local area network to be protected.
Abstract:
A system, method and computer program product are provided for delivering media content. The system includes at least one recipient that may be associated with at least one recipient rule. The system also includes a sending entity capable of transmitting a multimedia message addressed to the recipients. The sending entity can also specify delivery rules in the message. In this regard, the multimedia message includes media content. The system further includes a network entity capable of receiving the multimedia message and identifying any recipient rules, sending entity rules and/or network rules associated with the multimedia message. The network entity can then deliver the media content to the recipients based upon respective rules. The network entity can also be capable of processing the media content based upon the rules before delivering the media content, such as by transcoding or truncating at least a portion of the media content prior to delivery.