摘要:
A method and apparatus for providing policy control in a wireless communication system. A mobile station generates a resource request for a communication service, where the resource request includes an identifier uniquely identifying a type of communication service. A packet data serving node receives the resource request for the communication service and selects a policy control entity to process the resource request. The selection by the packet data serving node is based at least on the identifier. The selected policy control entity performs policy control on the resource request.
摘要:
A mobile station for wireless communication includes a control processor configured to generate a message for transmission on a reverse signaling channel, the message including a Station Class Mark field having a plurality of bits, a portion of the Station Class Mark field indicating that the mobile station is uniquely identified by a Mobile Station Equipment Identifier.
摘要:
Systems and techniques are disclosed relating to wireless communications. The systems and techniques involve wireless communications wherein a packet data session may be established between a wireless communications device and a packet data serving node to support a network connection to a packet-switched network. The wireless communications device may be configured to receive a notification of an incoming call from a circuit-switched network even when the network connection is active.
摘要:
Certain aspects of the present disclosure propose methods for identifying machine to machine (M2M) devices and services. Each device may indicate its M2M functionality either for each of the services performed by the device or for all of its services to a core network. The core network may report the M2M functionality of the device to other nodes in the network that may be involved with the M2M functionality of the device.
摘要:
Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point.
摘要:
Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point.
摘要:
A method and apparatus for over-the-air provisioning of authentication credentials at an access device via a first access system, wherein the authentication credentials are for a second access system lacking an over-the-air provisioning procedure. For example, the second access system may be a 3GPP system using AKA authentication methods. The first access system may be CDMA, using an OTASP or IOTA procedure. Provisioning the authentication credentials may include provisioning any of a 3GPP AKA authentication root key (K), AKA authentication related parameters, an AKA authentication algorithm to be used in the 3GPP authentication, or authentication algorithm customization parameters.
摘要:
Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point.
摘要:
Systems and methods for switching among networks (e.g., heterogeneous) and inter-working between a source access system and a target access system, by implementing tunneling from the AT to the target access system via the source access system. An inter-system handoff control component can facilitate setting tunneling by the mobile unit to the target access and/or between the source access system and the target access system—wherein signaling/packeting associated with the target system can be transferred over the source system.
摘要:
Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point.