Abstract:
A system and method of allowing a new device to join an existing network are disclosed. A configuration tool is used to communicate relevant information from the new network device to the gateway in the existing network using a secondary network protocol different from that used by the primary network. For example, in one embodiment, messages are exchanged between the configuration tool and the new device and between the configuration tool and the gateway using BLUETOOTH®. Once all of the pertinent information has been exchanged, the new device is able to securely join the primary network, which may be based on the IEEE802.15.4 standard.
Abstract:
Embodiments herein relate e.g. to a method performed by a network node (15,13) for handling data of a wireless device (10) in a communication network (1). The network node (15,13) receives an indication from the wireless device (10), which indication indicates a presence of the wireless device at a second radio access network node (13) holding no context for the wireless device (10). The network node (15,13) identifies a first radio access network node (12) holding context for the wireless device (10) and any buffered data destined for the wireless device (10). The network node (15,13) retrieves from the identified first radio access network node (12), data buffered for the wireless device (10), and forwards the retrieved data to the wireless device (10).
Abstract:
A conversation is handed over between an unlicensed data network and a cellular network. Voice conversations and/or video conversations may be seamlessly transitioned between cellular networks and unlicensed data networks (e.g., Wi-Fi), with a small transition time (e.g., less than a couple of seconds). The handover may occur from the unlicensed data network to the cellular network or from the cellular network to the unlicensed data network. During the transition between networks, cached registration data is accessed to speed up the authentication of the computing device switching networks. In some configurations, a user may specify preferences for switching between the unlicensed data and cellular networks. For instance, a user may specify a preference to use Wi-Fi networks before cellular networks or to use cellular networks before using Wi-Fi networks.
Abstract:
In an aspect, a network supporting a number of client devices includes a network device that generates a context for a client device. The client device context may include network state information for the client device that enables the network to communicate with the client device. The client device may obtain, from a network device that serves a first service area of the network, information that includes a first client device context. The client device may enter a second service area of the network served by a second network device. Instead of performing a service area update procedure with the network, the client device may transmit a packet in the different service area with the information that includes the client device context. The client device may receive a service relocation message including information associated with the different network device in response to the transmission.
Abstract:
A facility for interacting with data networks using a permanent network identifier persistently stored within a computing system is described. In one example facility, in response to each opportunity to connect to a data network, the facility identifies information for the data network, and determines whether the determined identifying matches any of a set of approved data networks. In response to determining that it does, the facility establishes a connection with the first data network using the computing system's permanent network identifier, and conducts the established connection with the first data network using the computing system's permanent network identifier. In response to determining that it does not, the facility establishes a connection with the data network using a temporary network identifier that is different from the computing system's permanent network identifier, and conducts the established connection with the data network using the temporary network identifier.
Abstract:
A method and apparatus for authenticating a mobile device in a second network when the mobile device is already authenticated in a first network. An authentication device in the first network generates an authentication master key associated with the mobile device using a first nonce generated by the authentication device and a second nonce generated by the mobile device. The generated authentication master key is sent to a second authentication device in the second network, where is usable by the second authentication device to authenticate the mobile device in the second network.
Abstract:
M&C PX212853WO 27 32525144-3-SBLAKE ABSTRACT: Methods and apparatus for establishing at least one connection with at least one user equipment, UE, (600) at a handover from a source TWAG (614a) to a target TWAG (614b) in a telecommunications system. A receiver (1204) of the target TWAG is configured to receive an association request from the at least one UE. A UE location requestor (1214) of the target TWAG is configured to obtain an address of the source TWAG. A UE context requester (1216) of the target TWAG is configured, based on the obtained address of the source TWAG, to control a transmitter (1202) to transmit to the source TWAG a UE context request, the receiver being further configured to receive a response comprising the UE context for the at least one UE. A handover controller (1218) of the target TWAG is configured to control the transmitter to transmit a request to modify a bearer or bearers associated with the at least one UE and to establish at least one connection with the at least one UE, based on the received UE context. [FIGURE 7]
Abstract:
A method comprises causing a first key to be used for communications between a first base station and a user device, said user device also being in communication with a second base station, causing first information, which indicates that an updated key is to be used, to be sent from the first base station to said user equipment, and causing said updated key to be used for communications between said first base station and said user device after said information has been sent.
Abstract:
Fast mobile device authentication can be achieved during inter-domain handovers between administrative domains operating under a federated service agreement using pseudonym identifications (PID). Specifically, the mobile device may derive a PID when obtaining authentication in a first wireless network, and then use the PID to obtain fast authentication in a second wireless network. The PID may be generated during an Elliptic curve Diffie–Hellman (ECDH) authentication procedure using public keys associated with the mobile device and the first wireless network. The PID (or a derivative thereof) may then be provided to an authentication server in a second wireless network for validation. The PID may be validated by the second authentication server via online or offline validation procedures. The PID can also be used as an electronic coupon for accessing the second network.