Patent application number | Description | Published |
20080316979 | Configuring a host device by way of MMP - The claimed subject matter relates to configuring a host device through utilization of MMP, which is a protocol that is based upon MIP but not associated with several deficiencies associated therewith. In particular, a wireless terminal can be configured to run MMP and send messages that conform to MMP over a wireless link. A base station can be configured to act as a DHCP server. The base station can provide configuration information to host device by way of DHCP. | 12-25-2008 |
20090046663 | METHODS AND APPARATUS FOR WIRELESS NETWORK CONNECTIVITY - Methods and apparatus which allow a wireless terminal ( | 02-19-2009 |
20090092075 | Methods and apparatus for establishing communications between devices with differing capabilities - Methods and apparatus for establishing communications between devices, e.g., mobile communications devices in an ad hoc network, with differing capabilities are described. A device which is capable of supporting multiple protocols in addition to a protocol used to communicate device capability information forms communications links with first and second devices which do not have the ability to form communications links directly between one another, e.g., because of they do not support the same protocols. Once the links are established the first and second devices can communicate via the third communications device. In some embodiments, each of the first, second and third devices support a first communications protocol which is suitable for communicating device capability information but is unsuitable for exchanging user data. The ability to discover other devices and there capabilities facilitates the creation of an ad hoc network. | 04-09-2009 |
20090327391 | METHODS AND APPARATUS FOR SECURELY ADVERTISING IDENTIFICATION AND/OR DISCOVERY INFORMATION - Methods and apparatus related to a peer to peer wireless communications system supporting secure advertisement of identification and/or discovery information e.g., upper layer discovery information, are described. Air interface timing and/or other information received from a third device, e.g., a beacon or GPS transmitter is incorporated in the computation of identification/discovery information which is communicated from a first device to a second device. The second device stores some identification/discovery credentials corresponding to the first device, which have been communicated out of band from the first device to the second device. Upon receipt of a identifier from a first device, the second device determines if the stored information corresponds to the device that transmitted the identifier. Various embodiments facilitate secure advertisement of identification and/or discovery information and discovery, e.g., selective discovery by trusted peers. | 12-31-2009 |
20100069067 | TICKET-BASED CONFIGURATION PARAMETERS VALIDATION - Aspects describe spectrum authorization, access control, and configuration parameters validation. Devices in an ad-hoc or peer-to-peer configuration can utilize a licensed spectrum if the devices are authorized to use the spectrum, which can be determined automatically. Aspects relate to distribution of authorization tickets by an authorization server as a result of validating a device's credentials and services to which the device is entitled. An exchange and verification of authorization tickets can be performed by devices as a condition for enabling a validated wireless link using the spectrum. | 03-18-2010 |
20100124331 | SPECTRUM AUTHORIZATION AND RELATED COMMUNICATIONS METHODS AND APPARATUS - Various embodiments relate to wireless communications, and more particularly, to methods and apparatus for authorizing use of spectrum, e.g., through the issuance of spectrum access keys, and/or preventing or discouraging the unauthorized use of licensed spectrum. Peer to peer wireless communications between authorized users of licensed spectrum may involve scrambling/descrambling of information communicated between authorized devices. In some embodiments air interface timing and/or other information received from a second device, e.g., a beacon or GPS transmitter, is incorporated into a computation of a pseudo-random bit sequence which is also computed based on a spectrum access key communicated to authorized spectrum users. In some embodiments authorized peer to peer devices scramble communicated information based on the generated pseudo random bit sequence thereby preventing or discouraging communication with devices which are not authorized to use the spectrum and lack a spectrum access key used to generate the pseudo random bit sequence. | 05-20-2010 |
20100189107 | METHODS AND APPARATUS FOR FORMING, MAINTAINING AND/OR USING OVERLAPPING NETWORKS - Methods and apparatus related to routing in communications networks are described. Various embodiments are well suited to wireless communications systems lacking centralized control, e.g., a mobile wireless communications system supporting the dynamic formation and/or maintenance of overlapping peer-to-peer ad hoc networks. A node can establish multiple links, e.g., with different links corresponding to different overlapping networks. Next hop packet routing information, e.g., forwarding tables, are maintained on a per network basis. A node determines the next hop routing for a received packet to be forwarded based on the link upon which the packet was received, which is associated with a particular network, and the included packet destination address. The same destination address may, and sometimes does, correspond to different next hop nodes for different networks. | 07-29-2010 |
20100191964 | COMMUNICATIONS METHODS AND APPARATUS FOR USE IN COMMUNICATING WITH COMMUNICATIONS PEERS - Methods and apparatus related to the determination of the trustworthiness of information communicated in a message and/or the exchange of trust information are described. Various described methods and apparatus are well suited to peer to peer wireless communications in an ad-hoc network. At a given time, a communications device may have a trust relationship with a first set of devices. A first communications device determines trustworthiness of a received message from a second device, which is not a member of the first set of devices, based on information received from a third device which is a member of the first set of devices. The first communications device makes an informed decision as to whether or not to act upon the first message based upon its trustworthiness determination. | 07-29-2010 |