摘要:
The present invention provides improved security in a virtual machine. By extending the capabilities of modern secure processors, privacy of computation is provided from both the owner of the equipment and other users executing on the processor, which is an advantageous feature for rentable, secure computers. In addition to the hardware extensions required to secure a virtualizable computer, an infrastructure for the deployment of such processors is also provided. Furthermore, a signaling flow to establish the various relationships between the owner, user and manufacturer of the equipment is disclosed.
摘要:
A method is disclosed for routing packets in an intermediate node between a mobile node and a correspondent node in a packet-switched network, only one of said nodes being macro-mobility enabled, comprising at the intermediate node: -exchanging lower-layer-address-update-related messages with said macro-mobility enabled node; -mapping source address, destination address and potentially protocol parameters of lower-layer packets exchanged between the mobile node and the correspondent node in such a way that the macro-mobility enabled node can communicate with the other node as if the other node is also macro-mobility enabled, and such that the other node can communicate with the intermediate node as if the intermediate node is a non-macro-mobility-enabled node. Also associated devices, update methods for devices, and servers are disclosed.
摘要:
Example embodiments provide methods for handling the transition of a mobile device from a first network to a second network, the second network operating according to a different communications protocol from the first network. One example embodiment includes terminating forwarding of the data packets from the first network to the mobile device; rebuilding headers of unforwarded data packets at the first network; and sending the rebuilt data packets from the first network to the second network. Another example embodiment includes resetting a header compression state at the second network; receiving unforwarded data packets from the first network at the second network, the unforwarded data packets being data packets the first network had not yet forwarded to the mobile device; and sending the unforwarded data packets from the second network to the mobile device.
摘要:
The invention includes methods and apparatuses for supporting mobility management and packet routing in ad hoc wireless networks. A method for mobility management includes detecting, at a first base station, a request by a wireless device to establish an association with the first base station where the first base station comprises a mobile base station, updating an association table of the first base station to include an association of the wireless device to the first base station, and propagating, toward a second base station, a message adapted to update an association table of the second base station, wherein the second base station is a mobile base station, wherein the message is propagated toward the second base station wirelessly. The packet routing functions of the present invention may be used independent of, or in conjunction with, the mobility management functions of the present invention.
摘要:
Methods and systems are provided for securing integrated base stations, such as base station routers (BSRs), in which a SIM card is operatively coupled with a secured portion of a base station and a secure association is established therebetween to facilitate encryption key exchange between the secured portion of the base station and a core network.
摘要:
The present invention provides a method of operating a paging controller in a wireless communication system including a first network that operates according to a first radio access technology and a second network that operates according to a second radio access technology. The first network includes a first control plane entity and the second network includes a second control plane entity. The method includes providing, to at least one first base station in the first network, a request to transmit a page to a first tracking area associated with the mobile unit. The first tracking area is defined in the first network. The method also includes providing, via an interface between the first control plane entity and the second control plane entity, a request to transmit the page to a second tracking area associated with the mobile unit. The second tracking area is defined in the second network.
摘要:
The present invention relates to a method and apparatus for distributing paging messages in a wireless communication system. The wireless communication system may include a paging controller configured to distribute the paging messages in a paging area, a paging group including a plurality of base stations within the paging area configured to receive the paging message, and a paging interface between the paging controller and the paging group configured to support transmission of only the paging messages to all the plurality of base stations through a single transmission of the paging message from the paging controller. The method may include distributing a paging message to all of a plurality of base stations through a single transmission of a paging message from a paging controller over a secured IP-multicast group.
摘要:
An exemplary method of confirming authorized use of a microcell base station includes determining that the microcell base station has made a connection with a mobile station. A determination is made whether the mobile station subsequently establishes a connection with a selected macrocell base station. Whether the mobile station successfully makes the connection with the selected macrocell base station is used as an indication of authorized use of the microcell base station.
摘要:
The present invention provides a method for implementation in a first mobile unit that supports an air interface with a network element. The method includes determining, while the first mobile unit is participating in a call, that at least one channel associated with the air interface is unable to support voice transmission. The method also includes rendering a first user-detectable signal in response to determining that said at least one channel is unable to support voice transmission.
摘要:
A method in one example has: establishing communication between two mobile terminals in a base station routing architecture network; and optimizing routing between the two mobiles terminals without requiring all traffic to traverse an anchor point in the base station routing architecture network. An IP base station transceiver architecture utilizes network controlled mobility to provide a transparent connection between a mobile terminal and an anchor point in the network. This transparency hides the mobility associated with changing IP base station transceivers from the mobile terminal and reduces over-the-air signaling.