摘要:
The present invention describes a novel security model in which security context is pre-negotiated and is used at future instances to secure messaging between nodes involved in sending and receiving data during the execution of the protocol. This anticipatory pre-negotiation of security context avoids expensive handshakes to establish security contexts that occur at future instances to secure sessions during the execution of the protocol.
摘要:
Method and equipment for use in connection with a wireless communication terminal accessing an IMS of a third generation telecommunication system via a WLAN, and in particular based on WLAN interworking scenario 3 and 4.
摘要:
An apparatus for re-keying a mobile terminal in a foreign network includes a processor. The processor is configured to receive, at the apparatus which is physically located in the foreign network, a request for re-keying from the mobile terminal in the foreign network. The processor is also configured to translate the request for transmission to a home network of the mobile terminal and to transmit the translated request to a bootstrapping server function of the home network.
摘要:
A mobile node includes first and second communication interfaces for connecting to first and second types of networks, respectively. The mobile node also includes a processor capable of connecting to a first type of network via the first communication interface. The processor can monitor location information from the first type of network, the location information being representative of a geographic area within which the mobile node is currently located and available as a result of the connection to the first type of network. The processor can determine if the mobile node is currently located in an area associated with a second type of network based upon the monitoring of the location information. If so, the processor can turn on the second communication interface, and effectuate a handoff of the mobile node from the first type of network to the second type of network via the second communication interface.
摘要:
A system for connecting a mobile node includes a target network, and may include an anchor network. The anchor network can generate token information based upon a trust relationship between the mobile node and the anchor network, and a trust relationship between the target network and the anchor network. The anchor network can then transmit the token information to the mobile node. Thereafter, during connection of the mobile node, the target network is capable of establishing a link-layer connection with the mobile node over a previously established physical-layer connection. The target network is also capable receiving of a handoff attach message including the token information, and thereafter authenticating the mobile node based upon the handoff attach message. And if the mobile node is authenticated, the target network is capable of establishing a network-layer connection with the mobile node over the link-layer connection.
摘要:
A network entity includes a controller adapted to operate a location-based application for initiating a location reporting session. The location reporting session includes determining and reporting a current location of a mobile station based on one or more parameters having one or more associated values, where, when the session is a periodic location reporting session, one of the parameters may be a periodicity of reporting the current location of the mobile station. The location-based application is also adapted to change the value of one or more of the parameters during the location reporting session. The same location reporting session may therefore continue based on the changed values of the respective parameter(s).
摘要:
An approach provides signaling for administrative domain change during location tracking. Departure of a mobile node from a first administrative domain is detected during a position reporting session. It is determined whether a first, configured to determine position, within the first administrative domain is inaccessible. If inaccessible, signaling for a handoff is initiated for assignment of a second, configured to determine position, within a second administrative domain to continue the position reporting session.
摘要:
Apparatus, and an associated method, for facilitating performance of location services for a mobile station that roams beyond its home network. A cache is provided at the mobile station. The cache is populated with a value identifying the address of the serving position server. When a location service is requested, the cache is accessed, and a message is sent to the address identified in the cache. The cache is updatable, such as through the generation and forwarding of a message to the mobile station by the home position server responsive to registration of the mobile station.
摘要:
Methods, apparatuses, systems, and computer-readable media for performing authenticated gesture recognition are presented. According to one or more aspects, a gesture performed by a user may be detected. An identity of the user may be determined based on sensor input captured substantially contemporaneously with the detected gesture. Then, it may be determined, based on the identity of the user, that the detected gesture corresponds to at least one command of a plurality of commands. Subsequently, the at least one command may be executed. In some arrangements, the gesture may correspond to a first command when performed by a first user, and the same gesture may correspond to a second command different from the first command when performed by a second user different from the first user.
摘要:
In some embodiments, a method for generating a mobile device's user interface is provided. The method may include: receiving, via the mobile device, input from a user of the mobile device, the input being related to a property for presenting dynamic context-dependent informational cues; determining a context; identifying a subset of a set of informational cues, the subset being associated with the context; and predominately presenting, via the mobile device, the identified subset to the user, the presentation being predominate as compared to any presentation of other informational cues in the set of informational cues, wherein the presentation accords with the received user input.