Patent application number | Description | Published |
20100097986 | Loop-Detection in Moving Networks - A method of generating network identifiers for use by mobile routers of a moving network is provided which enables fast and efficient routing loop avoidance and detection. The method comprises receiving at a mobile router of a sub-network chain, a beacon from a preceding mobile router in the chain, the beacon containing a network identifier of the preceding mobile router, generating a new network identifier by applying a pre-defined function to the received network identifier, and including the new network identifier in beacons broadcast by the receiving mobile router. When preparing for a handover, a mobile router compares the network identifier contained in a received beacon with values generated by applying said function against its own network identifier. This allows the mobile router to identify beacons originating from mobile routers that are downstream in the same chain. | 04-22-2010 |
20100177698 | Network Based Local Mobility Management - A network comprises a NetLMM domain having at least one Host Identity Protocol proxy coupled to one or more Access Points for communicating with a Mobile Node and acting, in use, as an Access Router for the NetLMM domain. Use of an HIP proxy as an Access Router allows the Access Router itself to be mobile. Furthermore, the Access Router can reside in IPv4 networks, and can even be behind NAT boxes located between the Access Router and a Local Mobility Anchor to which the Access Router is registered. The invention may be applied using a hierarchical architecture in which each domain comprises a respective Local Mobility Anchor coupled to each HIP proxy acting as an Access Router in the domain. The Local Mobility Anchor of a domain may itself be an HIP Local Mobility Anchor. Alternatively, the HIP proxies in a domain may be arranged in a distributed manner. | 07-15-2010 |
20100250929 | METHOD AND APPARATUS FOR EMAIL COMMUNICATION - According to a first aspect of the present invention there is provided a method of verifying to a recipient of an email that a sender of the email possesses a mobile telecommunications device associated with a specific telephone number. The method comprises at the sender, sending an identifier of the email content and the telephone number to a server via the Internet (A | 09-30-2010 |
20100284400 | PROVISIONING MOBILITY SERVICES TO LEGACY TERMINALS - A method of facilitating access to a Host Identity Protocol security procedure by a legacy host ( | 11-11-2010 |
20100306350 | HIP Node Reachability - A method of configuring a plurality of rendezvous servers to provide a Host Identity Protocol, HIP, based mobility service to HIP nodes, where the servers are arranged in a hierarchical branching structure. For each HIP node, a Host Identity Tag, HIT, and contact address mapping is registered with a rendezvous server. That server then identifies itself and the HIT to each higher level server within the same branch, without explicitly identifying the contact address to those higher level servers wherein, in use, when a first rendezvous server receives a HIP contact message addressed to a given HIT, if that first server is unaware of the destination HIT, it forwards the message to a higher level server within the same branch and if the first server is not the server at which the HIT is registered but is aware of the HIT, it forwards the contact message to the neighbouring rendezvous server corresponding to the HIT. | 12-02-2010 |
20110055566 | Verifying a Message in a Communication Network - A method and apparatus for verifying a request for service in a communication network. An authentication node generates a secret and transmits the secret to a node providing a service. The authentication node then receives a request for authentication from a requesting node, and once the requesting node is authenticated, the authorisation node sends an identifier for the requesting node and a first token, which is derived using the secret and the identifier. A service providing node subsequently receives a request for service from the requesting node, the request including the identifier for the requesting node and the first token. The service providing node derives a second token using the identifier and the secret. If the first token and the second token match, then the service providing node allows the request, and if the first token and the second token do not match, then the request is refused. | 03-03-2011 |
20110055570 | LOCATION UPDATE OF A MOBILE NODE - A method of facilitating location update signalling within a communication network between a mobile node and an end host includes establishing a trust relationship between one or more end hosts ( | 03-03-2011 |
20110296027 | HOST IDENTITY PROTOCOL SERVER ADDRESS CONFIGURATION - A method of facilitating access to a Host Identity Protocol security procedure by a host connected to a moving network, where the moving network comprises a Host Identity Protocol server responsible for allocating local IP addresses to attached hosts. The method comprises registering at a rendezvous server an IP address prefix for use by said Host Identity Protocol server in allocating said local addresses, together with an externally reachable IP address of the Host Identity Protocol server. The registered IP address prefix is used at the rendezvous server to forward received I | 12-01-2011 |
20120271965 | PROVISIONING MOBILITY SERVICES TO LEGACY TERMINALS - Facilitating access to a Host Identity Protocol security procedure by a legacy host | 10-25-2012 |
20140330984 | HIP Node Reachability - A method of configuring a plurality of rendezvous servers to provide a Host Identity Protocol, HIP, based mobility service to HIP nodes, where the servers are arranged in a hierarchical branching structure. For each HIP node, a Host Identity Tag, HIT,-and contact address mapping is registered with a rendezvous server ( | 11-06-2014 |
20140337940 | Remote Provisioning of 3GPP Downloadable Subscriber Identity Module for Virtual Machine Applications - A method is presented of providing a subscriber identity for the provision of services on behalf of the subscriber in a virtual computing environment. The method includes receiving a request to establish an execution environment for a virtual machine-to-machine equipment, vM2 M E. The vM2ME is provided, comprising software for execution in the virtual computing environment and a downloadable Subscriber Identity Module. A Communications Module, CM, is set up for execution in a domain of a virtualisation platform. The CM provides an end-point for communications between the vM2ME and a 3GPP network. The Subscriber Identity Module is installed for execution together with the CM, the Subscriber Identity Module including a 3GPP identity of the subscriber, security data and functions for enabling access to the vM2ME via the 3GPP network. | 11-13-2014 |