Patent application number | Description | Published |
20080205356 | WIRELESS WIDE AREA BROADBAND COVERAGE IN A VEHICULAR AREA NETWORK (VAN) - The disclosure relates to techniques and technologies for providing mobile wireless broadband coverage. In one implementation, Wireless Wide Area Broadband (WWAB) network elements are provided in a Vehicular Area Network (VAN) that also includes a Mobile Network Controller (MNC). The WWAB network elements in the VAN include at least one WWAB base station (BS). A mobility protocol tunnel is provided between a Mobility Management Server (MMS) and the MNC to make mobility of the WWAB network elements in the VAN transparent to the WWAB network elements in the fixed infrastructure. The WWAB BS and the MNC can allow a WWAB-enabled mobile station (MS) to connect to WWAB network elements in the fixed infrastructure. | 08-28-2008 |
20080205357 | WIRELESS WIDE AREA BROADBAND COVERAGE IN A VEHICULAR AREA NETWORK (VAN) - The disclosure relates to techniques and technologies for providing mobile wireless broadband coverage. In one implementation, Wireless Wide Area Broadband (WWAB) network elements are provided in a Vehicular Area Network (VAN) that also includes a Mobile Network Controller (MNC). The WWAB network elements in the VAN include at least one WWAB base station (BS). A mobility protocol tunnel is provided between a Mobility Management Server (MMS) and the MNC to make mobility of the WWAB network elements in the VAN transparent to the WWAB network elements in the fixed infrastructure. The WWAB BS and the MNC can allow a WWAB-enabled mobile station (MS) to connect to WWAB network elements in the fixed infrastructure. | 08-28-2008 |
20090016253 | COMBINING MOBILE VPN AND INTERNET PROTOCOL | 01-15-2009 |
20090036152 | METHOD FOR ENABLING MULTICAST TRAFFIC FLOWS OVER HYBRID MULTICAST CAPABLE AND NON-MULTICAST CAPABLE RADIO ACCESS NETWORKS (RANS) - A method for multicast packet communication by mobile entities ( | 02-05-2009 |
20090059788 | Method and Apparatus for Dynamic Adaptation of Network Transport - An intermediate device of a network includes network and transport layers, a dispatcher, a splitter and a connections database. The splitter intercepts a message packet in the network layer and modifies the network routing header and transport header of the message packet to form a modified message packet. The dispatcher receives modified message packets from the transport layer, recovers information from the message packets, passes the modified message packets back to the transport layer and adapts the transport layer to adapt communication dependent upon the information recovered from the message packets. The connections database stores the original source address, the original destination address, the original source port identifier and the original destination port identifier of an incoming message packet. A message packet is modified, with reference to the connections database, so that message packets from the first and second nodes are routed through the dispatcher. | 03-05-2009 |
20090161590 | MULTICAST DATA STREAM SELECTION IN A COMMUNICATION SYSTEM - An apparatus and method for multicast data stream selection in a communication system includes a first step | 06-25-2009 |
20090217043 | METHOD AND SYSTEM FOR MUTUAL AUTHENTICATION OF NODES IN A WIRELESS COMMUNICATION NETWORK - A method as provided enables mutual authentication of nodes in a wireless communication network. The method includes processing at a first node a beacon message received from a second node, wherein the beacon message comprises a first nonce value (step | 08-27-2009 |
20090275286 | UTILIZATION OF COGNITIVE RADIOS WITH MOBILE VIRTUAL PRIVATE NETWORK (MVPN) SOLUTIONS | 11-05-2009 |
20100091707 | METHOD FOR ROUTE OPTIMIZATION BETWEEN MOBILE ENTITIES - A communication network ( | 04-15-2010 |
20120170743 | METHODS FOR ESTABLISHING A SECURE POINT-TO-POINT CALL ON A TRUNKED NETWORK - Methods for establishing secure point-to-point communications in a trunked radio system include receiving, at a trunking controller, a request from a source endpoint for a traffic channel for confidential communications between the source endpoint and a destination endpoint using a shared unique first symmetric key. The trunking controller provides keying material related to the symmetric key over the secured control channel to at least one of the source or destination endpoints and assigns a traffic channel. Moreover, in response to the request, the controller assigns a traffic channel. The keying material enables the unique first symmetric key to be securely established between the source and destination endpoints. | 07-05-2012 |
20130012165 | METHOD AND APPARATUS FOR ATTACHING A WIRELESS DEVICE TO A FOREIGN 3GPP WIRELESS DOMAIN USING ALTERNATIVE AUTHENTICATION MECHANISMS - A method and apparatus for attaching a wireless device to a foreign wireless domain of a 3GPP communication system using an alternative authentication mechanism, wherein wireless device performs the method, which includes: sending a first attach request message to an infrastructure device in the foreign wireless domain; receiving an attach reject message from the infrastructure device upon an unsuccessful attempt to obtain authentication credentials for the wireless device from a home wireless domain of the wireless device using a standard 3GPP authentication mechanism; responsive to the attach reject message sending a second attach request message to the infrastructure device, wherein the second attach request message indicates an alternative authentication mechanism to the standard 3GPP authentication mechanism; and receiving an attach accept message from the infrastructure device when the wireless device is successfully authenticated using the alternative authentication mechanism. | 01-10-2013 |
20130013923 | METHODS FOR OBTAINING AUTHENTICATION CREDENTIALS FOR ATTACHING A WIRELESS DEVICE TO A FOREIGN 3GPP WIRELESS DOMAIN - A method for obtaining authentication credentials for attaching a wireless device to a foreign wireless domain in a 3rd Generation Partnership Project (3GPP) communication system, which includes: receiving an attach request message from the wireless device; and responsive to the attach request message, authenticating the wireless device and retrieving a set of authentication vectors, wherein the authentication vectors are for authenticating the wireless device to the foreign wireless domain. The method further includes encrypting the set of authentication vectors using a first security key of a home wireless domain of the wireless device. In addition, the method includes encrypting the first security key using a second security key of the foreign wireless domain and sending the encrypted set of authentication vectors and the encrypted first security key to the wireless device. | 01-10-2013 |
20140189834 | METHOD AND APPARATUS FOR SINGLE SIGN-ON COLLABORATON AMONG MOBILE DEVICES - An apparatus for, and method of, single sign-on collaboration among a plurality of mobile devices, includes a server for issuing a first identity token to subsequently authenticate a user of a first of the mobile devices to a service provider, and for generating and sending a collaboration key to the first device based on the first identity token or user authentication. The first device generates and sends a collaboration credential based on the collaboration key to a second device paired with the first device. The server also issues a second identity token to subsequently authenticate to the service provider the user of the second device based on the collaboration credential received from the first device, to support single sign-on collaboration for the user across the plurality of mobile devices. | 07-03-2014 |
20140189840 | METHOD AND APPARATUS FOR SINGLE SIGN-ON COLLABORATION AMONG MOBILE DEVICES - A system for, and method of, single sign-on collaboration among a plurality of mobile devices, includes a server for issuing a first identity token to subsequently authenticate a user of a first of the mobile devices to a service provider, and for generating and sending a collaboration credential to the first device based on the first identity token or user authentication. The first device sends the collaboration credential generated by the server to a second device paired with the first device. The server also issues a second identity token to subsequently authenticate to the service provider the user of the second device based on the collaboration credential received from the first device, to support single sign-on collaboration for the user across the plurality of mobile devices. | 07-03-2014 |