Patent application number | Description | Published |
20080247360 | Handoff of Data Attachment Point - In a communication system in which a gateway entity is linked to a plurality of infrastructure entities which in turn are operable to communicate with an access terminal, the access terminal needs first to establish a data attachment point (DAP) with one of the infrastructure entities. Handoff of the DAP from one infrastructure entity to another infrastructure entity is initiated by the access terminal. The access terminal weighs factors such as the link conditions with the various infrastructure entities, the time since the last DAP handoff, and time duration communicating with the current infrastructure entity before proceeding with the DAP handoff. | 10-09-2008 |
20080291868 | ROUTE PROTOCOL - A route protocol is established whereby a mobile device can communicate to a multitude of (receiving) base stations though a tunnel created through a serving base station. A message that includes a Route Creation Header can be transmitted by the mobile device to create the tunnel. The Route Creation Header is reviewed by the receiving base station while the mobile device is in a Waiting-To-Open State. Various errors might occur with respect to the Route Creation Header. These errors can be conveyed to the mobile device by base station by setting one or more error code fields. Once the errors are resolved, another attempt to create a tunnel with base station can be made, if desired. | 11-27-2008 |
20080294897 | METHOD AND APPARATUS FOR EFFICIENT SUPPORT FOR MULTIPLE AUTHENTICATIONS - Disclosed is a method for multiple EAP-based authentications in a wireless communication system. In the method, a first master session key (MSK) is generated in a first EAP-based authentication for a first-type access. A first temporal session key (TSK) is generated from the first master session key (MSK). A second EAP-based authentication is performed, using the first temporal session key (TSK), for a second-type access. First-type access and second-type access are provided after the first and second EAP-based authentications are successfully completed. | 11-27-2008 |
20080318575 | METHOD AND APPARATUS FOR HANDOFF BETWEEN SOURCE AND TARGET ACCESS SYSTEMS - Systems and methods for switching among heterogeneous networks and inter-working between a source access system and a target access system. An inter-system handoff control component can facilitate setting an IP tunneling by the mobile unit, wherein IP addresses for inter-working security gateway and Radio Access Network of the target access system can be identified. The inter-system handoff control component can then implement tunneling between the source system and the target system, wherein signaling/packeting associated with the target system can be transferred over the source system. | 12-25-2008 |
20090075628 | METHOD AND APPARATUS FOR GENERATING A CRYPTOSYNC - A method and apparatus for generating a cryptosync is disclosed that generates a cryptosync with the desired variability without the overhead in complexity and size of prior cryptosyncs. The cryptosync is generated from a combination of fields including fields relating to the segmentation and reassembly of the data packets at a transmitting terminal and a receiving terminal. The resultant cryptosync does not repeat during the use of a particular security key. | 03-19-2009 |
20090201948 | METHODS AND APPARATUS FOR FORMATTING HEADERS IN A COMMUNICATION FRAME - Methods and apparatus for formatting headers for data packets within a communication frame for use in a wireless communication system are presented. Formatting headers includes determining the size of a wireless communication frame, and formatting the payloads and associated headers within the communication frame according to the determined size. This formatting includes placing headers at the beginning of the frame before the data packets corresponding to the headers to optimize processing of the headers at a receiver. Formatting may also include formatting the headers according to a first format within the frame when the determined frame size is below a predetermined size to optimize the size of the headers, and formatting according to a second format within the frame size of the data packet is equal to or greater than the predetermined size to optimize processing for frames having large data packets. | 08-13-2009 |
20090245517 | SYSTEMS AND METHODS FOR GROUP KEY DISTRIBUTION AND MANAGEMENT FOR WIRELESS COMMUNICATIONS SYSTEMS - A novel group key distribution and management scheme for broadcast message security is provided that allows an access terminal to send a single copy of a broadcast message encrypted with a group key. Access nodes that are members of an active set of access nodes for the access terminal may decrypt and understand the message. The group key is generated and distributed by the access terminal to the access nodes in its active set using temporary unicast keys to secure the group key during distribution. A new group key is provided every time an access node is removed from the active set of access nodes for the access terminal. | 10-01-2009 |
20100165922 | DISCONTINUOUS TRANSMISSION IN A WIRELESS NETWORK - A communication system for use in a wireless network includes: an audio module configured to provide packets indicative of audio for a part of a communication between the communication system and another communication system, the communication spanning packet times, the packets including at least critical packets indicative of critical audio; and a transceiver coupled to the audio module and configured to cause: the critical packets to be conveyed for transmission; and first non-critical packets, indicative of non-critical audio, to be conveyed for transmission such that (1) the first non-critical packets represent less than all of a time between transmission of critical packets and (2) no more than a threshold number of packet times will pass without one of the critical packets or one of the first non-critical packets being conveyed by the transceiver for transmission. | 07-01-2010 |
20110263242 | UNIQUELY IDENTIFYING TARGET FEMTOCELL TO FACILITATE FEMTO-ASSISTED ACTIVE HAND-IN - Systems, methods, devices, and computer program products are described for supporting macrocell-to-femtocell hand-ins of active macro communications for mobile access terminals. An out-of-band (OOB) link is used to detect that an access terminal is in proximity of a femtocell (e.g., using an OOB radio integrated with the femtocell or in a common subnet with the femtocell). Having detected the access terminal in proximity to the femtocell, an OOB presence indication is communicated to a femto convergence system disposed in a core network in communication with the macro network to effectively pre-register the access terminal with the femto-convergence system. When the femto convergence system receives a handoff request from the macro network implicating the pre-registered access terminal, it is able to reliably determine the appropriate target femtocell to use for the hand-in according to the pre-registration, even where identification of the appropriate target femtocell would otherwise be unreliable. | 10-27-2011 |
20120026981 | MOBILE STATION MESSAGE HAVING A STATION CLASS MARK FIELD FOR INDICATING AN MEID CAPABLE MOBILE STATION - A mobile station for wireless communication includes a control processor configured to generate a message for transmission on a reverse signaling channel, the message including a Station Class Mark field having a plurality of bits, a portion of the Station Class Mark field indicating that the mobile station is uniquely identified by a Mobile Station Equipment Identifier. | 02-02-2012 |
20140092870 | METHOD AND APPARATUS FOR HANDOFF BETWEEN SOURCE AND TARGET ACCESS SYSTEMS - Systems and methods for switching among heterogeneous networks and inter-working between a source access system and a target access system. An inter-system handoff control component can facilitate setting an IP tunneling by the mobile unit, wherein IP addresses for inter-working security gateway and Radio Access Network of the target access system can be identified. The inter-system handoff control component can then implement tunneling between the source system and the target system, wherein signaling/packeting associated with the target system can be transferred over the source system. | 04-03-2014 |