摘要:
A key distribution scheme is provided, which is useful for establishing, distributing, and maintaining security associations in a Mobile IP network. An authentication server performs an initial validation of a new session and generates a root key which it delivers to the initial access gateway and to the home agent. The initial access gateway and the home agent each independently compute a derivative key available only to themselves. The initial access gateway, acting as proxy for the mobile station, uses the derivative key to sign the Mobile IP registration or binding update transactions, and sends the signed registration or binding update to the home agent for validation. Once the session is established between the mobile station and the home agent, the access gateways act as proxies on behalf of the mobile station to maintain the session mobility. In handoff, the new access gateway acquires the root key as part of the transferred session context. The new access gateway, acting as proxy for the mobile station, computes a new derivative key from the root key and uses it to sign a binding update.
摘要:
A key distribution scheme is provided, which is useful for establishing, distributing, and maintaining security associations in a Mobile IP network. An authentication server performs an initial validation of a new session and generates a root key which it delivers to the initial access gateway and to the home agent. The initial access gateway and the home agent each independently compute a derivative key available only to themselves. The initial access gateway, acting as proxy for the mobile station, uses the derivative key to sign the Mobile IP registration or binding update transactions, and sends the signed registration or binding update to the home agent for validation. Once the session is established between the mobile station and the home agent, the access gateways act as proxies on behalf of the mobile station to maintain the session mobility. In handoff, the new access gateway acquires the root key as part of the transferred session context. The new access gateway, acting as proxy for the mobile station, computes a new derivative key from the root key and uses it to sign a binding update.
摘要:
A system includes a compiler component that employs a declarative notation, for a description, that describes one or more fields of a network packet. The compiler component employs a declarative notation, for the description, that describes one or more constraints for at least one field of the one or more fields. The description is of a portion of the network packet. A representation based on the description is employable for recognition of the portion of the network packet at a network interface.
摘要:
A method is provided for controlling communications to and from an access terminal during a hand off period. A smart packet filter is used to identify a packet flow, apply a first treatment to a packet flow based on its destination, and transmit the first treated packet flow along a first route to the access terminal. During a hand off, the packet stream is duplicated, a second treatment is applied to the packet flow and the second treated duplicate packet flow is transmitted to the access terminal via a second route.
摘要:
Cryptography is used to generate a token that both authorizes request processing and establishes constraints on that authorization. A mobile communications device user or client subscribes to an information service of a content provider. A description of the subscribed service is generated. The client applies a digital signature to the description and optionally encrypts the signed description. A token is generated based on the signed description. The content provider presents the token to the request processing entity of a mobile service provider in order to establish trust between the content provider and the request processing entity. The request processing entity decrypts the token and verifies the signature of the client. The request of the content provider is validated through a comparison of the request with the constraints indicated in the decrypted token. Valid requests are processed. For example, a request for location information about the client is fulfilled in order for the content provider to push a local weather report to the mobile device of the client.
摘要:
An isochronous telecommunication stream comprises a plurality of frames encoded by a variable rate isochronous coder-decoder (codec) at a plurality of code rates of multiple available code rates. A control component removes one or more encoded frames from the plurality of frames of the isochronous telecommunication stream based on one or more code rates of the one or more encoded frames to create a non-isochronous telecommunication stream.
摘要:
Voice packets transmitted by an originating wireless user for use in a half-duplex communication mode in a one to many communication session are monitored for an unexpected cessation. If an unexpected cessation of such voice packets is detected for a predetermined time period, the session server controlling the communications session is notified to release the supporting half-duplex communication paths associated with the originating user.
摘要:
A method for allowing a mobile of a wireless communication simultaneous access to multiple data networks coupled to the wireless communication network. A network interface is created between network controlling elements, such as Base Station Controllers, of the wireless communication network. The network interface allows various communication channels established by the mobile to be routed to network controlling elements that are coupled to the various data networks. Information from various established communication channels are routed between various network controlling elements. Thus, a mobile is able to communicate simultaneously with different data networks. The network interface also allows handoffs to be executed with virtually no interruptions and no loss of information being exchanged between the mobile and system equipment involved in the handoff.