Patent application number | Description | Published |
20090323570 | Techniques for management of shared resources in wireless multi-communication devices - An embodiment of the present invention provides an apparatus, comprising a network adapter configured for wireless communication using more than one technology, and wherein the network adapter is configured to share a plurality of shared hardware components by limiting access to the air to one comm only at given time by designating one comm that owns the shared hardware components as a primary comm and all other comms are secondary comms, wherein the primary comm allows the secondary comms to use the shared hardware components when it is in an idle-state but when the primary comm returns from the idle state, it claims ownership of the shared resources and the secondary comms release the shared resources. | 12-31-2009 |
20090323651 | Techniques for management of shared resources in wireless multi-communication devices - An embodiment of the present invention provides an apparatus, comprising a network adapter configured for wireless communication using more than one technology, wherein the network adapter is configured to share a plurality of shared hardware (HW) components by generating a notification when a shared HW resource becomes available to a requesting device that needs the HW resource, and registering the requesting device so that it will receive the notifications when generated; and wherein upon receiving the notifications, the requesting device will wake up and perform a pending action. | 12-31-2009 |
20090327767 | Techniques for distributed management of wireless devices with shared resources between wireless components - An embodiment of the present invention provides an apparatus, comprising a network adapter configured for wireless communication using more than one technology using distributed management and wherein the network adapter is configured to share a plurality of shared hardware components by automatically turning all other comms to OFF when one comm is turned to ON. | 12-31-2009 |
20100111053 | Techniques for enhanced network discovery - An embodiment of the present invention provides a method, comprising retrieving a first network scan while connected to a second network access point (AP), without actually accessing the air, by the AP sending a message to “Get first network base station (BS) list” to devices in communication with the AP and operable to communicate in the first and the second networks, merging by the AP all answers from the devices to provide a list of all base stations (BS's) in the AP's vicinity, and querying the AP by other devices for the network BS list. | 05-06-2010 |
20110004760 | METHOD AND APPARATUS OF DERIVING SECURITY KEY(S) - A method, apparatus and a wireless communication system to derive security key(s) over an air link in a secure manner by sending by a mobile station over the air a single direction permutation of a mobile station ID, establishing keys with the base station and sending the mobile station real ID in a secure manner. | 01-06-2011 |
20110032869 | METHOD AND APPARATUS FOR ACTIVATING A WIRELESS COMMUNICATION DEVICE - A method and apparatus to activate over the air a wireless communication device by using a client-initiated bootstrap server and without the use of a provisioning server, a provisioning session and a provisioning protocol implementation at one or more servers of the wireless network. The client-initiated bootstrap server sends a bootstrap script and/or document to the wireless communication device to set an activation flag with commands included in the bootstrap scrip. | 02-10-2011 |
20110110329 | SECURITY UPDATE PROCEDURE FOR ZONE SWITCHING IN MIXED-MODE WIMAX NETWORK - A zone switching method is disclosed for use in a mixed-mode WiMAX environment. The zone switching method is useful in a WiMAX network having both 802.16e (legacy) and 802.16e/802.16m (mixed-mode, or advanced) entities, including mobile stations, base stations, and access service network entities. The zone switching method includes anchor authenticator relocation, dual security context maintenance, and security updates for both entry-before-break-capable mobile stations and for those mobile stations with slower switching speeds. The zone switching method enables an advanced mobile station to seamlessly switch from legacy to mixed-mode operation once the mixed-mode entities are available to service the 802.16m operations. | 05-12-2011 |
20110199967 | TECHNIQUES TO ASSIGN MULTIPLE IDENTIFIERS IN A WIRELESS NETWORK - Techniques are described that can be used to assign identifiers to mobile stations in a Network Access Provider (NAP) domain and a paging identifier. In some cases, the NAP identifier and paging identifier can be unique in the NAP domain and the paging group domain. The paging identifier can be derived from a NAP identifier. | 08-18-2011 |
20120057552 | TECHNIQUES FOR MANAGEMENT OF SHARED RESOURCES IN WIRELESS MULTI-COMMUNICATION DEVICES - An embodiment of the present invention provides an apparatus, comprising a network adapter configured for wireless communication using more than one technology, and wherein the network adapter is configured to share a plurality of shared hardware components by limiting access to the air to one comm only at given time by designating one comm that owns the shared hardware components as a primary comm and all other comms are secondary comms, wherein the primary comm allows the secondary comms to use the shared hardware components when it is in an idle-state but when the primary comm returns from the idle state, it claims ownership of the shared resources and the secondary comms release the shared resources. | 03-08-2012 |
Patent application number | Description | Published |
20100128704 | Mulitcasting, location services, payment methods and performance management in broadband wireless access networks - Methods, apparatuses and systems for location discovery, electronic payment and multicast broadcast in a wireless broadband network disclosed. | 05-27-2010 |
20110026501 | VIRTUAL NETWORK SERVICE PROVIDER FOR MOBILE VIRTUAL NETWORK OPERATOR ACTIVATION - Embodiments of the present disclosure describe methods and system configurations to activate a mobile virtual network operator (MVNO). A method includes wirelessly broadcasting a virtual Network Service Provider (NSP) to provide wireless activation of one or more Mobile Virtual Network Operators (MVNOs) associated with a NSP, directing a mobile station (MS) connected to the virtual NSP to a subscription portal that presents to a user of the MS the one or more MVNOs for selection, and provisioning the MS with configuration parameters for a selected MVNO to allow connection of the MS with the selected MVNO. Other embodiments may be described and/or claimed. | 02-03-2011 |
20110110289 | DISTRIBUTED CONTROL ARCHITECTURE FOR RELAYS IN BROADBAND WIRELESS NETWORKS - Embodiments of systems and methods for distributed control relay architecture are described herein. Other embodiments may be described and claimed. | 05-12-2011 |
20110111754 | Neighbor List Broadcasting Techniques - Techniques are disclosed that involve the indication of neighbor base stations. For instance, a base station may generate and wirelessly transmit a message that indicates a plurality of neighboring base stations. This message may include an indicator having one or more wildcard values. Through the employment of such wildcard values, the indicator may provide information corresponding to the plurality of neighboring base stations. For instance, the indicator may indicate a plurality of base station identifiers (BSIDs). Alternatively, the indicator may indicate a plurality of preamble indices. As a further alternative, the indicator may indicate a plurality of carrier frequencies. Through the employment of such techniques, overhead can be saved without causing ambiguity in mobility management. | 05-12-2011 |
20110138380 | DEVICE MANAGEMENT IN A WIRELESS NETWORK - Embodiments of the present disclosure describe methods, apparatus, and system configurations for device management in a wireless communication network. A method includes determining, by a server of a communication network, that one or more updates are designated for a mobile station, initiating a re-authentication of the mobile station based on the determining to trigger the mobile station to establish communication with the server of the communication network to receive the one or more updates, and sending the one or more updates to the mobile station. Other embodiments may be described and/or claimed. | 06-09-2011 |
20120106440 | GENERATING PLATFORM IDENTIFICATION FOR CERTIFICATION VERSION SIGNALING - A method for generating platform identification is presented. In one embodiment, the method includes determining whether a hash value collision indication presents in a table based on one or more platform attributes. The method includes generating a hash value based at least on the one or more platform attributes if there is no hash value collision indication and setting a platform identifier to a string generated based on the hash value. The method further includes sending a message including at least the platform identifier during network entry. | 05-03-2012 |
20130137398 | LOCAL SECURITY KEY UPDATE AT A WIRELESS COMMUNICATION DEVICE - A system and method for updating a security key at a base station (BS) is disclosed. The method comprises the operation of transmitting a handover command from the base station to a mobile station. The operation of incrementing a base station instance of an authentication key counter at the base station follows. The next operation of the method can be calculating a new local authentication key (AK*) at the base station using the base station instance of the authentication key counter and an authentication key (AK). The AK may be previously obtained from an authenticator. The method further includes communicating by the base station with the mobile station using the new local authentication key after a predetermined action time. | 05-30-2013 |
20130276085 | MULTI-HOP SINGLE SIGN-ON (SSO) FOR IDENTITY PROVIDER (IdP) ROAMING/PROXY - Embodiments of the present disclosure describe methods, apparatuses, and systems related to using an identity provider (IdP) as a proxy for another IdP. Other embodiments may be described and/or claimed. | 10-17-2013 |
20130288670 | SIGNALING OF PREFERRED VISITED NSP FOR ROAMING SERVICES - A wireless communication receives a message from a Home Network (HN) of the device containing information relating to one or more preferred Visited Networks (VNs) for a wireless roaming service connection, and determines a Visited Network (VN) from the information relating to one or more preferred VNs for a wireless roaming service connection. The one or more preferred VNs are preferred based on a geographic location of the device. Exemplary embodiments of the wireless communication device include a notebook-type computer, a tablet-type computer device, a portable or a handheld communication-type device, a reader-type device, a cellular telephone, or a personal digital assistant. | 10-31-2013 |
20130291075 | METHOD AND SYSTEM FOR NETWORK ACCESS CONTROL - An apparatus may include a transceiver and a processor circuit coupled to the transceiver. The apparatus may also include a local packet data network access module operable on the processor circuit to schedule for transmission from the transceiver to a mobility management entity (MME) a request from a user equipment (UE) for access to a local network, to generate a request for authentication to be sent to the UE, and to receive authentication information sent in response to the request for authentication. Other embodiments are disclosed and claimed. | 10-31-2013 |
20140310428 | INTRA-PLATFORM NETWORKING - Technologies for communicating with local components of a computing device include intercepting a name resolution request from a host application, resolving a hostname included in the name resolution request to obtain a network address assigned to a target destination of the network packet, and transmitting the network address to the host application in response to the name resolution request. Such technologies may also include receiving the network packet from the host application destined for the network address, determining, whether the target destination of the network packet includes a local component of the computing device based on the network address, and transmitting the network packet to the local component of the computing device via a platform network in response to the network packet being destined for the local component of the computing device. | 10-16-2014 |
20140313520 | LOCATION DETERMINATION USING LIGHT SOURCES - The present disclosure relates to computer-implemented systems and methods for location determination using light sources. An example method may include receiving, by a computer including one or more processors, a location request for a device within an indoor environment. The method may also include receiving respective light source identifiers associated with one or more light sources in the indoor environment. The one or more light sources may be in communication with the device. Additionally, the method may include accessing, by the computer, a virtual map associated with the indoor environment, and the virtual map may include one or more associations between the respective light source identifiers and respective positions, within the indoor environment, of the one or more light sources. Furthermore, the method may include determining, based at least in part on the virtual map and the respective light source identifiers, a location of the device within the indoor environment. | 10-23-2014 |
20140331045 | APPARATUS, SYSTEM AND METHOD OF COMMUNICATING LOCATION-ENABLING INFORMATION FOR LOCATION ESTIMATION - Some demonstrative embodiments include apparatuses, systems and/or methods of communicating location-enabling information for location estimation. For example, an apparatus may include a location-enabling information (LEI) processor to process a location-enabling message, which is transmitted between first and second location-enabling sources and receivable by a mobile device, the location-enabling message including encrypted LEI configured for enabling estimation of a location of the mobile device at a predefined accuracy based on a cryptographic key corresponding to the first location-enabling source. | 11-06-2014 |