Abstract:
Systems and methodologies are described that facilitate Mobile IP home agent (HA) discovery in a wireless communication system. Discovery of a HA for Mobile IP can be conducted as described herein for a mobile terminal located on a network wherein movement of the terminal is managed by a network-based mobility protocol. For example, various aspects described herein can be utilized for discovery of a HA located in a 3GPP network from 3GPP and/or non-3GPP access. Further, various aspects described herein can be utilized to discover a gateway acting as mobility anchor for a network mobility protocol utilized by the network. As additionally described herein, HA discovery can be conducted in connection with DNS query formation and communication, network attach and/or re-attach procedures, Neighbor Discovery signaling, and/or other procedures.
Abstract:
Described herein are techniques for identifying an access network in a wireless communication system. For example, the technique may involve determining a scheme for access network identification based on a public land mobile network-identifier (PLMN-ID) and an additional identifier. The technique may involve, receiving from the access network, broadcast information comprising the PLMN-ID and the additional identifier. The technique may involve determining that the access network belongs to a class of access networks that utilizes the additional identifier. The technique may involve identifying the access network using a combination of the PLMN-ID and additional identifier based on the class of access networks and the determined scheme.
Abstract:
A method, an apparatus, and a computer program product for wireless communication are provided. The apparatus establishes a first cellular communication link with a first cellular network based on a subscriber identifier, establishes a second cellular communication link with a second cellular network based on the subscriber identifier, and maintains the first cellular communication link concurrently with the second cellular communication link.
Abstract:
Systems, devices, and methods for reporting information in real time about traffic generated by each application for a device are described. In one aspect, the network can configure a list of applications user equipment (UE) devices need to report traffic information for and then when one of these applications starts a communication, the UE may send traffic descriptor(s) describing the traffic generated by the application. In this way the network can accurately identify the traffic and take actions based on UE report and local policy or subscription.
Abstract:
A method, an apparatus, and a computer program product for wireless communication are provided. The apparatus establishes a first cellular communication link with a first cellular network based on a subscriber identifier, establishes a second cellular communication link with a second cellular network based on the subscriber identifier, and maintains the first cellular communication link concurrently with the second cellular communication link.
Abstract:
Systems, devices, and methods for reporting information in real time about traffic generated by each application for a device are described. In one aspect, the network can configure a list of applications user equipment (UE) devices need to report traffic information for and then when one of these applications starts a communication, the UE may send traffic descriptor(s) describing the traffic generated by the application. In this way the network can accurately identify the traffic and take actions based on UE report and local policy or subscription.
Abstract:
Systems, devices, and methods for reporting information in real time about traffic generated by each application for a device are described. In one aspect, the network can configure a list of applications user equipment (UE) devices need to report traffic information for and then when one of these applications starts a communication, the UE may send traffic descriptor(s) describing the traffic generated by the application. In this way the network can accurately identify the traffic and take actions based on UE report and local policy or subscription.
Abstract:
Apparatus and methods of communication include receiving, at a device, a device-specific identifier and a credential associated with an issuing identity provider, wherein an identity of the device is capable of authentication by the identity provider based on the device-specific identifier and the credential. Further, the aspects include storing the device-specific identifier and the credential in a secure environment on the device. Additionally, the device-specific identifier is capable of being associated with different subscriber service accounts each with a different one of a plurality of service providers. The described aspects also include apparatus and methods of an identity provider and a provisioning provider for managing identities in a multiple network environment, and apparatus and methods of a service provider for providing the device with access to a service.
Abstract:
A method, an apparatus, and a computer program product for wireless communication in which provisioning of credentials for network deployments are provided. As such, the method, apparatus, and computer program product may provision a user equipment (UE) even though the UE does not have any valid security credentials, so as to provide access to a network (e.g., a network using a contention based frequency band such as a Long Term Evolution (LTE) Advanced network in the contention based radio frequency band). Accordingly, in some aspects, the present method, apparatus, and computer program product may enable the UE to perform a provisioning procedure with one or more network entities to obtain one or more security credential parameters.
Abstract:
A method for authentication, operational in a device configured to communicate with a Long-Term Evolution (LTE) network, is described. The method includes receiving a first message from the LTE network that indicates the LTE network supports establishment of an LTE security context based on executing certificate-based authentication in lieu of subscriber identity module (SIM)-based authentication. The method also includes communicating one or more messages with the LTE network to execute certificate-based authentication. The method further includes establishing the LTE security context based on keys derived from the certificate-based authentication.