US20090046861A1 - Security for a heterogeneous ad hoc mobile broadband network - Google Patents
Security for a heterogeneous ad hoc mobile broadband network Download PDFInfo
- Publication number
- US20090046861A1 US20090046861A1 US12/189,008 US18900808A US2009046861A1 US 20090046861 A1 US20090046861 A1 US 20090046861A1 US 18900808 A US18900808 A US 18900808A US 2009046861 A1 US2009046861 A1 US 2009046861A1
- Authority
- US
- United States
- Prior art keywords
- service provider
- mobile client
- hoc service
- server
- session
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/009—Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/029—Firewall traversal, e.g. tunnelling or, creating pinholes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/062—Pre-authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/04—Terminal devices adapted for relaying to or from another terminal or user
Definitions
- the present disclosure relates generally to telecommunications, and more specifically to handoff in an ad-hoc mobile broadband network.
- Wireless telecommunication systems are widely deployed to provide various services to consumers, such as telephony, data, video, audio, messaging, broadcasts, etc. These systems continue to evolve as market forces drive wireless telecommunications to new heights.
- wireless networks are providing broadband Internet access to mobile subscribers over a regional, a nationwide, or even a global region. Such networks are sometimes referred as Wireless Wide Area Networks (WWANs).
- WWAN operators generally offer wireless access plans to their subscribers such as subscription plans at a monthly fixed rate.
- WWANs from all mobile devices may not be possible. Some mobile devices may not have a WWAN radio. Other mobile devices with a WWAN radio may not have a subscription plan enabled. Adhoc networking allows mobile devices to dynamically connect over wireless interfaces using protocols such as WLAN, Bluetooth, UWB or other protocols. There is a need in the art for a methodology to allow a user of a mobile device without WWAN access to dynamically subscribe to wireless access service provided by a user with a WWAN-capable mobile device using wireless adhoc networking between the mobile devices belong to the two users.
- a server includes a processing system configured to maintain an encrypted control session with an ad-hoc service provider and a mobile client while enabling the mobile client to support an encrypted data tunnel through the ad-hoc service provider.
- a server in another aspect of the disclosure, includes means for enabling a mobile client to support an encrypted data tunnel through an ad-hoc service provider, and means for maintaining an encrypted control session with an ad-hoc service provider and a mobile client while enabling the mobile client to support the encrypted data tunnel through the ad-hoc service provider.
- a method of providing security to a network from a server includes enabling a mobile client to support an encrypted data tunnel through an ad-hoc service provider, and maintaining an encrypted control session with an ad-hoc service provider and a mobile client while enabling the mobile client to support the encrypted data tunnel through the ad-hoc service provider.
- a machine-readable medium includes instructions executable by a processing system in a server.
- the instructions include code for enabling a mobile client to support an encrypted data tunnel through the ad-hoc service provider, and maintaining an encrypted control session with an ad-hoc service provider and a mobile client while enabling the mobile client to support the encrypted data tunnel through the ad-hoc service provider.
- FIG. 1 is a conceptual diagram illustrating an example of a telecommunications system.
- FIG. 2 is a conceptual diagram illustrating an example of the hardware configuration for a server.
- FIG. 3 is a conceptual diagram illustrating an example of the hardware configuration for a processing system in a server.
- FIG. 4A is a flow chart illustrating an example of the functionality of a server supporting a connection with an ad-hoc service provider.
- FIG. 4B is a flow chart illustrating an example of the functionality of a server supporting a mobile client.
- FIG. 5 is a conceptual block diagram illustrating an example of the functionality of an ad-hoc service provider.
- FIG. 1 is a conceptual block diagram illustrating an example of a telecommunications system.
- the telecommunications system 100 is shown with multiple WWANs that provide broadband access to a network 102 for mobile subscribers.
- the network 102 may be a packet-based network such as the Internet or some other suitable network.
- two WWANs 104 are shown with a backhaul connection to the Internet 102 .
- Each WWAN 104 may be implemented with multiple fixed-site base stations (not shown) dispersed throughout a geographic region. The geographic region may be generally subdivided into smaller regions known as cells.
- Each base station may be configured to serve all mobile subscribers within its respective cell.
- a base station controller (not shown) may be used to manage and coordinate the base stations in the WWAN 104 and support the backhaul connection to the Internet 102 .
- Each WWAN 104 may use one of many different wireless access protocols to support radio communications with mobile subscribers.
- one WWAN 104 may support Evolution-Data Optimized (EV-DO), while the other WWAN 104 may support Ultra Mobile Broadband (UMB).
- EV-DO and UMB are air interface standards promulgated by the 3rd Generation Partnership Project 2 (3GPP2) as part of the CDMA2000 family of standards and employs multiple access techniques such as Code Division Multiple Access (CDMA) to provide broadband Internet access to mobile subscribers.
- 3GPP2 3rd Generation Partnership Project 2
- CDMA Code Division Multiple Access
- one of WWAN 104 may support Long Term Evolution (LTE), which is a project within the 3GPP2 to improve the Universal Mobile Telecommunications System (UMTS) mobile phone standard based primarily on a Wideband CDMA (W-CDMA) air interface.
- LTE Long Term Evolution
- UMTS Universal Mobile Telecommunications System
- WWAN 104 may also support the WiMAX standard being developed by the WiMAX forum.
- WiMAX WiMAX forum.
- the actual wireless access protocol employed by a WWAN for any particular telecommunications system will depend on the specific application and the overall design constraints imposed on the system.
- the various techniques presented throughout this disclosure are equally applicable to any combination of heterogeneous or homogeneous WWANs regardless of the wireless access protocols utilized.
- Each WWAN 104 has a number of mobile subscribers. Each subscriber may have a mobile node 106 capable of accessing the Internet 102 directly through the WWAN 104 . In the telecommunications system shown in FIG. 1 , these mobile nodes 106 access the WWAN 104 using a EV-DO, UMB or LTE wireless access protocol; however, in actual implementations, these mobile nodes 106 may be configured to support any wireless access protocol.
- a mobile node 106 may be configured to create in its vicinity an ad-hoc network based on the same or different wireless access protocol used to access the WWAN 104 .
- a mobile node 106 may support a UMB wireless access protocol with a WWAN, while providing an IEEE 802.11 access point for mobile nodes 108 that cannot directly access a WWAN.
- IEEE 802.11 denotes a set of Wireless Local Access Network (WLAN) standards developed by the IEEE 802.11 committee for short-range communications (e.g., tens of meters to a few hundred meters).
- IEEE 802.11 is a common WLAN wireless access protocol, other suitable protocols may be used.
- a mobile node 106 that may be used to provide an access point for another mobile node 108 will be referred to herein as an “ad-hoc service provider.”
- a mobile node 108 that may use an access point of an ad-hoc service provider 106 will be referred to herein as a “mobile client.”
- a mobile node, whether an ad-hoc service provider 106 or a mobile client 108 may be a laptop computer, a mobile telephone, a personal digital assistant (PDA), a mobile digital audio player, a mobile game console, a digital camera, a digital camcorder, a mobile audio device, a mobile video device, a mobile multimedia device, or any other device capable of supporting at least one wireless access protocol.
- PDA personal digital assistant
- the ad-hoc service provider 106 may extend its wireless broadband Internet access service to mobile clients 108 that would otherwise not have Internet access.
- a server 110 may be used as an “exchange” to enable mobile clients 108 to purchase unused bandwidth from ad-hoc service providers 106 to access, for example, the Internet 102 across WWANs 104 .
- the server 110 charges the mobile clients 108 based on usage. For the occasional user of mobile Internet services, this may be an attractive alternative to the monthly fixed rate wireless access plans.
- the revenue generated from the usage charges may be allocated to the various entities in the telecommunications system 100 in a way that tends to perpetuate the vitality of the exchange.
- a portion of the revenue may be distributed to the ad hoc service providers, thus providing a financial incentive for mobile subscribers to become ad hoc service providers.
- Another portion of the revenue may be distributed to the WWAN operators to compensate them for the bandwidth that would otherwise go unutilized.
- Another portion of the revenue may be distributed to the manufacturers of the mobile nodes.
- An ad-hoc service provider 106 , a server 110 , and one or more mobile clients 108 may establish a network that is an ad-hoc heterogeneous wireless network.
- a heterogeneous wireless network may include at least two types of wireless networks (e.g., a WWAN and a WLAN).
- an ad-hoc network may be a network whose specific configuration may change from time to time or from the formation of one network to the next. The network configuration is not pre-planned prior to establishing the network.
- Examples of configurations for an ad-hoc network may include a configuration as to which members are to be in the network (e.g., which ad-hoc service provider, which server, and/or which mobile client(s) are to be included in a network), a configuration as to the geographic locations of an ad-hoc service provider and mobile client(s), and a configuration as to when and how long a network is to be established.
- FIG. 2 is illustrates an example of a hardware implementation for a server.
- the server 110 may be a centralized server or a distributed server.
- a centralized server may be a dedicated server or integrated into another network-related entity, such as a desktop or laptop computer, mainframe, or other suitable entity.
- a distributed server may be distributed across multiple servers and/or one or more network-related entities, such as a desktop or laptop computer, mainframe, or some other suitable entity.
- the server may be integrated, either in whole or part, into one or more ad-hoc service providers.
- the server 110 is shown with a network interface 202 , which may support a wired and/or wireless connection to the Internet 102 .
- the network interface 202 may be used to implement the physical layer by providing the means to transmit raw data bits in accordance with the physical and electrical specifications required to interface to the transmission medium.
- the network 202 may also be configured to implement the lower portion of the data link layer by managing access to the transmission medium.
- the server 110 is also shown with a processing system 204 that provides various functions, including registration and authentication of the ad-hoc service providers and mobile clients, control session management for the ad-hoc service providers and mobile clients, handoff support between ad-hoc service providers, data tunneling for mobile clients, and services to mobile clients.
- the processing system 204 is shown separate from the network interface 202 , however, as those skilled in the art will readily appreciate, the network interface 202 , or any portion thereof, may be integrated into the processing system 204 .
- FIG. 3 is illustrates an example of a hardware implementation for a processing system in a server.
- the processing system 204 may be implemented with a bus architecture represented generally by bus 302 .
- the bus 302 may include any number of interconnecting buses and bridges depending on the specific application of the processing system 204 and the overall design constraints.
- the bus links together various circuits including a processor 304 and machine-readable media 306 .
- the bus 302 may also link various other circuits such as timing sources, peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further.
- a network adapter 308 provides an interface between the network interface 202 (see FIG. 2 ) and the bus 302 .
- the processor 304 is responsible for managing the bus and general processing, including the execution of software stored on the machine-readable media 306 .
- the processor 304 may be implemented with one or more general-purpose and/or special-purpose processors. Examples include microprocessors, microcontrollers, DSP processors, and other circuitry that can execute software.
- Software shall be construed broadly to mean instructions, data, or any combination thereof, whether referred to as software, firmware, middleware, microcode, hardware description language, or otherwise.
- Machine-readable media may include, by way of example, RAM (Random Access Memory), flash memory, ROM (Read Only Memory), PROM (Programmable Read-Only Memory), EPROM (Erasable Programmable Read-Only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory), registers, magnetic disks, optical disks, hard drives, or any other suitable storage medium, or any combination thereof.
- RAM Random Access Memory
- flash memory read Only Memory
- PROM PROM (Programmable Read-Only Memory)
- EPROM Erasable Programmable Read-Only Memory
- EEPROM Electrically Erasable Programmable Read-Only Memory
- registers magnetic disks, optical disks, hard drives, or any other suitable storage medium, or any combination thereof.
- the machine-readable media 306 is shown as part of the processing system 204 separate from the processor 304 .
- the machine-readable media 306 may be external to the processing system 204 .
- the machine-readable media 306 may include a transmission line, a carrier wave modulated by data, and/or a computer product separate from the server, all which may be accessed by the processor 304 through the network interface 308 .
- the machine readable media 306 may be integrated into the processor 304 , such as the case may be with cache and/or general register files.
- the processing system 204 may be configured as a general-purpose processing system with one or more microprocessors providing the processor functionality and external memory providing at least a portion of the machine-readable media 306 , all linked together with other supporting circuitry through an external bus architecture.
- the processing system 204 may be implemented with an ASIC (Application Specific Integrated Circuit) with the processor 304 , the network interface 308 , supporting circuitry (not shown), and at least a portion of the machine-readable media 306 integrated into a single chip, or with one or more FPGAs (Field Programmable Gate Array), PLDs (Programmable Logic Device), controllers, state machines, gated logic, discrete hardware components, or any other suitable circuitry, or any combination of circuits that can perform the various functionality described throughout this disclosure.
- ASIC Application Specific Integrated Circuit
- the machine-readable media 306 is shown with a number of software modules. Each module includes a set of instructions that when executed by the processor 304 cause the processing system 204 to perform the various functions described below.
- the software modules include a protocol stack module 309 , a security module 310 , a service provider control session manager module 312 , a mobile client control session manager module 314 , a tunneling/routing module 316 , a handoff module 318 , and a services module 320 .
- Each software module may reside in a single storage device or distributed across multiple memory devices. By way of example, a software module may be loaded into RAM from a hard drive when a triggering event occurs (e.g., a mobile node decides to become an ad-hoc service provider).
- the processor 304 may load some of the instructions into cache to increase access speed. One or more cache lines may then be loaded into a general register file for execution by the processor 304 .
- the functionality of a software module below, it will be understood that such functionality is implemented by the processor 304 when executing instructions from that software module.
- the protocol stack module 309 may be used to implement the protocol architecture, or any portion thereof, for the server. In the implementation described thus far, the protocol stack module 309 is responsible for implementing several protocol layers running on top of the data link layer implemented by the network interface 202 (see FIG. 2 ). By way of example, the protocol stack module 309 may be used to implement the upper portion of the data link layer by providing flow control, acknowledgement, and error recovery. The protocol stack module 309 may also be used to implement the network layer by managing source to destination data packet transfer, as well as the transport layer by providing transparent transfer of data between end users. Although described as part of the processing system, the protocol stack module 309 , or any portion thereof, may be implemented by the network adapter 202 .
- the security module 310 may be used for registration. Registration of a mobile client or an ad-hoc service provider can be static (non-mobile) or dynamic (mobile).
- a server certificate may be supplied to the mobile client or the ad-hoc service provider. This certificate contains the public key of the server signed with the private key of an external certificate authority.
- the mobile client and the ad-hoc service provider are provisioned with the public key of that certificate authority, and therefore, are able to verify the signature of the certificate authority, and to then use the public key to communicate privately with the server.
- a mobile client and ad-hoc service provide may register with the server to set up a user name and password with payment information.
- an ad-hoc service provider may register with the server setting up a user name and password. The user names and passwords are set up by the security module 310 and stored in an authentication database 322 .
- the security module 310 may authenticate an ad-hoc service provider when the ad-hoc service provider desires to provide a wireless access point to other mobile clients.
- the ad-hoc service provider requests a certificate from the server, which is forwarded by the security module 310 .
- the ad-hoc service provider suggests a session key (K SP,S ) encrypted with the public key of the server. This is received by the server and provided to the security module 310 to encrypt all subsequent messages with the session key K SP,S .
- the ad-hoc service provider provides its username and password encrypted with the session key K SP,S .
- the security module 310 authenticates the ad-hoc service provider based on the information stored in the authentication database 322 .
- the security module 310 may also be used to authenticate mobile clients that have registered with the server. Authentication will generally require connectivity over an ad-hoc wireless link between the mobile client and the ad-hoc service provider, but may be performed in some cases directly between the mobile client and the server. Existing connectivity between an ad-hoc service provider and the server is used to establish connectivity between the mobile client and the server.
- the mobile client is the supplicant
- the ad-hoc service provider is the authenticator
- the server is the authentication server.
- the mobile client requests a certificate from the server.
- the ad-hoc service provider forwards this request to the server, receives a certificate from the security module 310 , and forwards that certificate to the mobile client.
- the mobile client receives the certificate.
- the mobile client After validating the server certificate, the mobile client suggests a session key (K C,S ) encrypted with the public key of the server. This is received by the server and provided to the security module 310 so that all subsequent messages between the server and the mobile client can encrypted with the session key K C,S .
- the mobile client provides its username and password encrypted with the session key K C,S to the server.
- the security module 310 authenticates the mobile client based on the information stored in the authentication database 322 . Upon completion of authentication, the security module 310 communicates to the ad-hoc service provider and to the mobile client that the mobile client is now authenticated and may receive service.
- the control session manager module 312 establishes and maintains a secure session X SP,S between the ad-hoc service provider and the server using the key K SP,S .
- the control session manager module 314 establishes and maintains a secure session X C,S between the mobile client and the server using the key K C,S .
- a key K SP,C may be generated at the mobile client and communicated to the control session manager module 314 server over the session X C,S .
- the key K SP,C may then be provided to the ad-hoc service provider via the control session manager module 312 over the session X SP,S .
- the key K SP,C may be generated by the security module 204 in the server or the ad-hoc service provider.
- the session keys described thus far, K SP,S , K C,S and K SP,C are exchanged at the application layer. IP-headers and information regarding the message type may be exposed. To prevent any visibility into information flowing over the ad-hoc wireless link between the mobile client and the ad-hoc service provider, securing the transmissions over the wireless link can be performed.
- the mobile client and the ad-hoc service provider can agree to a data link encryption key WK SP,C for the wireless link.
- WK SP,C data link encryption key
- Such a key may be generated at either the mobile client, the ad-hoc service provider, or the security module 204 in the server. Once the mobile client and the ad-hoc service provider agree to using this data link encryption key, all transmissions between them can be communicated using this key.
- information can be exchanged between the mobile client and the control session manager module 314 in the server to establish an encrypted VPN tunnel to transport data to the Internet through the server.
- all data from the mobile client destined to any location on the Internet is tunneled through the tunnel/routing module 316 in the server. This is done to ensure that the ad-hoc service provider has no visibility into data associated with the mobile client, and hence ensures the privacy of the mobile client.
- This tunneling also provides security to the ad-hoc service provider by ensuring that all data associated with the mobile client flows through the tunnel/routing module 316 , leaving the responsibility of such mobile client transactions to the server and the mobile client, with the ad-hoc service provider merely serving as a transport to allow data associated with the mobile client to reach the server.
- the tunnel/routing module 316 is depicted with short-dashed lines to emphasize that it may be located in the server or elsewhere in the telecommunications system.
- the services module 320 may be used to provide various services to the mobile client.
- the services module 320 may support audio or video services to the mobile client 108 .
- the services module 320 may also support advertising services to the mobile client 108 .
- Other functions of the services module 320 may include routing to and from the Internet for mobile client data as well as providing network address translation to and from the Internet for the mobile client.
- the handoff module may also provide support for a handoff of a mobile client from one ad-hoc service provider to another based on any number of factors. These factors may include, by way of example, the quality of service (QoS) required by the mobile client, the duration of the session required by the mobile client, and the loading, link conditions, and energy level (e.g., battery life) at the ad-hoc service provider.
- QoS quality of service
- the duration of the session required by the mobile client may include, by way of example, the duration of the session required by the mobile client, and the loading, link conditions, and energy level (e.g., battery life) at the ad-hoc service provider.
- energy level e.g., battery life
- a mobile client connected to a through a “serving ad-hoc service provider” (SP 1 ) is handed off to a “target ad-hoc service provider” (SP 2 ).
- SP 1 serving ad-hoc service provider
- SP 2 target ad-hoc service provider
- three secure sessions X SP1,S , X C,S and X SP1,C exist using session keys K SP1,S , K C,S and K SP1,C , respectively.
- a secure session X SP2,S may be established with the control session manager module 312 using a session key K SP2,S negotiated between the target ad-hoc service provider SP 2 and the security module 310 .
- a handoff request may be initiated by either the mobile client, the serving ad-hoc service provider SP 1 , or the handoff module 316 over the secure session X SP2,S .
- the security module 310 can provide information to target ad-hoc service provider SP 2 indicating that the mobile client is authenticated. Over the secure session X C,S , the mobile client may be informed by the security module 310 that it has been authenticated with the target ad-hoc service provider SP 2 .
- a session key K SP2,C may be generated by the mobile client, the target ad-hoc service provider SP 2 , or the security module 310 in the server to establish and maintain a secure session X SP2,C .
- the mobile client disassociates with serving ad-hoc service provider SP 1 and associates with target service provider SP 2 .
- the session key K SP2,C may be used for the secure session X SP2,C between the mobile client and the target ad-hoc service provider SP 2 , which has now become the serving ad-hoc service provider.
- Information (such as residual packets associated with the mobile client) can be exchanged between the service providers through the server with the assistance of the handoff module 318 for both service providers.
- a session key K SP1,SP2 may be established for secure exchange of messages between the service providers. Alternatively, such exchange of information can occur over a direct wireless link between the service providers if the service providers can reach each other over a local wireless link.
- a multi-hop wireless path between the service providers is used in a wireless mesh network topology if such a path is available. It is possible that some information (such as control flow information) may go through the server with the assistance of the handoff module 318 , while other information (such as data flow information) may go over the direct wireless link/path between the service providers.
- FIG. 4A is a flow chart illustrating an example of a process implemented by the server to support an ad-hoc service provider.
- FIG. 4B is a flow chart illustrating an example of a process implemented by the server to support a mobile client.
- the server may allow an ad-hoc service provider to register to provide an access point to a wireless broadband network for mobile clients.
- the server may authenticate the ad-hoc service provider in block 404 A from the information obtained during the registration process.
- the authentication process may include the creation of a session key K SP,S between the server and the ad-hoc service provider.
- the server establishes and manages a secure control session with the ad-hoc service provider in block 406 A using the session key K SP,S .
- the server continues to manage the secure control session until the connection is terminated as shown in block 412 A.
- the server closes the control session with the ad-hoc service provider in block 414 A. Since the ad-hoc service provider remains registered, it may later serve as an access point again by invoking the authentication process of the server in block 404 A.
- the server may allow a mobile client to register in block 402 B in order to receive service from an ad-hoc service provider for wireless broadband access to a network.
- the server may authenticate the mobile client in block 404 B from the information obtained during the registration process.
- the authentication process may include the creation of a session key K C,S between the server and the mobile client.
- the server establishes and manages a secure control session with the mobile client in block 406 B using the session key K C,S .
- the server also establishes and maintains an encrypted data tunnel to transport data through the server to the network in block 408 B.
- the server may provide various services to the mobile client in block 410 B. Should a handoff of the mobile client to another ad-hoc service provider be required in step 412 B, the server may support the handoff in block 414 B and continue to provide services to the mobile client in step 410 B during and after the handoff. These services may be provided by the service until the connection is terminated as shown in block 416 B. Once the connection is terminated, the server closes the control session and tunnel with the mobile client in block 418 B. Since the mobile client remains registered, it may later connect to an ad-hoc service provider by invoking the authentication process of the server in block 404 B.
- FIG. 5 is a conceptual block diagram illustrating an example of the functionality of an ad-hoc service provider.
- the ad-hoc service provider 106 has the ability to bridge wireless links over homogeneous or heterogeneous wireless access protocols. This may be achieved with a WWAN network adapter 502 that supports a wireless access protocol for a WWAN to the Internet 102 , and a WLAN network adapter 504 that provides a wireless access point for mobile clients 108 .
- the WWAN network adapter 502 may include a transceiver function that supports EV-DO for Internet access through a WWAN
- the WLAN network adapter 504 may include a transceiver function that provides an 802.11 access point for mobile clients 108 .
- Each network adapter 502 , 504 may be configured to implement the physical layer by demodulating wireless signals and performing other radio frequency (RF) front end processing.
- Each network adapter 502 , 504 may also be configured to implement the link layer by managing data transfer across the physical layer, and the network layer by managing source to destination packet delivery.
- RF radio frequency
- the ad-hoc service provider 106 is shown with a filtered interconnection and session monitoring module 506 .
- the module 506 provides filtered processing of content from mobile clients 108 so that the interconnection between the adhoc wireless links to the WWAN network adapter 502 is provided only to mobile clients 108 authenticated and permitted by the server to use the WWAN network.
- the module 506 also maintains tunneled connectivity between the server and the authenticated mobile clients 108 .
- the ad-hoc service provider 106 also includes a service provider application 508 that (1) enables the module 506 to provide adhoc services to mobile clients 108 , and (2) supports WWAN or Internet access to a mobile subscriber or user of the ad-hoc service provider 106 .
- the latter function is supported by a user interface 512 that communicates with the WWAN network adapter 502 through the module 506 under control of the service provider application 508 .
- the user interface 512 may include a keypad, display, speaker, microphone, joystick, and/or any other combination user interface devices that enable a mobile subscriber or user to access the WWAN 104 or the Internet 102 (see FIG. 1 ).
- the service provider application 508 enables the module 506 to provide adhoc services to mobile clients 108 .
- the service provider application 508 maintains a control session with the server to exchange custom messages with the server.
- the service provider application 508 also maintains a separate control session with each mobile client 108 for exchanging custom messages between the service provider application 508 and the mobile client 108 .
- the service provider application 508 provides information on authenticated and permitted clients to the filtered interconnection and session monitoring module 506 .
- the filtered interconnection and session monitoring module 508 allows content flow for only authenticated and permitted mobile clients 108 .
- the filtered interconnection and session monitoring module 506 also optionally monitors information regarding content flow related to mobile clients 108 such as the amount of content outbound from the mobile clients and inbound to the mobile clients, and regarding WWAN and WLAN network resource utilization and available bandwidths on the wireless channels.
- the filtered interconnection and session monitoring module 506 can additionally and optionally provide such information to the service provider application 508 .
- the service provider application 508 can optionally act on such information and take appropriate actions such as determining whether to continue maintaining connectivity with the mobile clients 108 and with the server, or whether to continue to provide service. It should be noted that the functions described in modules 506 and 508 can be implemented in any given platform in one or multiple sets of modules that coordinate to provide such functionality at the ad-hoc service provider 106 .
- the service provider application 508 sends a request to the server for approval.
- the service provider application 508 requests authentication by the server and approval from the server to provide service to one or more mobile clients 108 .
- the server may authenticate the ad-hoc service provider 106 and then determine whether it will grant the ad-hoc service provider's request. As discussed earlier, the request may be denied if the number of ad-hoc service providers in the same geographic location is too great or if the WWAN operator has imposed certain constraints on the ad-hoc service provider 106 .
- the service provider application 508 may advertise an ad-hoc WLAN Service Set Identifier (SSID). Interested mobile clients 108 may associate with the SSID to access the ad-hoc service provider 106 . The service provider application 508 may then authenticate the mobile clients 108 with the server and then configure the filtered interconnection and session monitoring module 506 to connect the mobile clients 108 to the server. During the authentication of a mobile client 108 , the service provider application 508 may use an unsecured wireless link.
- SSID ad-hoc WLAN Service Set Identifier
- the service provider application 508 may optionally choose to move a mobile client 108 to a new SSID with a secure link once the mobile client 108 is authenticated. In such situations, the service provider application 508 may distribute the time it spends in each SSID depending on the load that it has to support for existing sessions with mobile clients 108 .
- the service provider application 508 may also be able to determine whether it can support a mobile client 108 before allowing the mobile client 108 to access a network. Resource intelligence that estimates the drain on the battery power and other processing resources that would occur by accepting a mobile client 108 may assist in determining whether the service provider application 508 should consider supporting a new mobile client 108 or accepting a handoff of that mobile client 108 from another ad-hoc service provider.
- the service provider application 508 may admit mobile clients 108 and provide them with a certain QoS guarantee, such as an expected average bandwidth during a session. Average throughputs provided to each mobile client 108 over a time window may be monitored. The service provider application 508 may monitor the throughputs for all flows going through it to ensure that resource utilization by the mobile clients 108 is below a certain threshold, and that it is meeting the QoS requirement that it has agreed to provide to the mobile clients 108 during the establishment of the session.
- a certain QoS guarantee such as an expected average bandwidth during a session.
- Average throughputs provided to each mobile client 108 over a time window may be monitored.
- the service provider application 508 may monitor the throughputs for all flows going through it to ensure that resource utilization by the mobile clients 108 is below a certain threshold, and that it is meeting the QoS requirement that it has agreed to provide to the mobile clients 108 during the establishment of the session.
- the service provider application 508 may also provide a certain level of security to the wireless access point by routing content through the filtered interconnection and session monitoring module 506 without being able to decipher the content. Similarly, the service provider application 508 may be configured to ensure content routed between the user interface 510 and the WWAN 104 via the module 506 cannot be deciphered by mobile clients 108 . The service provider application 508 may use any suitable encryption technology to implement this functionality.
- the service provider application 508 may also maintain a time period for a mobile client 108 to access a network.
- the time period may be agreed upon between the service provider application 508 and the mobile client 108 during the initiation of the session. If the service provider application 508 determines that it is unable to provide the mobile client 108 with access to the network for the agreed upon time period, then it may notify both the server and the mobile client 108 regarding its unavailability. This may occur due to energy constraints (e.g., a low battery), or other unforeseen events.
- the server may then consider a handoff of the mobile client to another ad-hoc service provider, if there is such an ad-hoc service provider in the vicinity of the mobile client 108 .
- the service provider application 508 may support the handoff of the mobile client 108 .
- the service provider application 508 may also dedicate processing resources to maintain a wireless link or limited session with mobile clients 108 served by other ad-hoc service providers. This may facilitate the handoff of mobile clients 108 to the ad-hoc service provider 106 .
- the service provider application 508 may manage the mobile client 108 generally, and the session specifically, through the user interface 512 .
- the service provider application 508 may support a seamless operation mode with processing resources being dedicated to servicing mobile clients 108 .
- the mobile client 108 is managed in a way that is transparent to the mobile subscriber.
- the seamless operation mode may be desired where the mobile subscriber does not want to be managing mobile clients 108 , but would like to continue generating revenue by sharing bandwidth with mobile clients 108 .
- a session may be used by the mobile client 108 to register with the server 110 .
- the mobile client 108 may search for available ad-hoc service providers 106 .
- the mobile client 108 detects the presence of one or more ad-hoc service providers 106 , it may initiate a session with an ad-hoc service provider 106 based on parameters such as the available bandwidth that the ad-hoc service provider 106 can support, the QoS metric of the ad-hoc service provider 106 , and the cost of the service advertised.
- a link encryption key may be established between the mobile client 108 and the ad-hoc service provider 106 during the establishment of the session.
- a session may be established between the mobile client 108 and the server 110 so that all traffic between the two is encrypted.
- the transport layer ports may be kept in the open and not encrypted to provide visibility for the network address translation functionality at the ad-hoc service provider 106 .
- the handoff of the mobile client 108 may be performed in a variety of ways.
- the mobile client 108 may maintain a limited session with multiple ad-hoc service providers 106 , while using one ad-hoc service provider 106 to access the Internet. As described earlier, this approach may facilitate the handoff process.
- the mobile client 108 may consider a handoff only when necessary.
- the mobile client 108 may maintain an active list of ad-hoc service providers 106 in its vicinity for handoff. The mobile client 108 may select an ad-hoc service provider 106 for handoff from the active list when the current ad-hoc service provider 106 needs to discontinue its service.
- a mobile client 108 may need to reconnect through a different ad-hoc service provider 106 to access the Internet. Persistence of the tunnel between the mobile client and the server can enable a soft handoff of a mobile client from one service provider to another service provider.
- the mobile client 108 may access multiple ad-hoc service providers 106 simultaneously.
- a mobile client 108 with multiple transceivers could potentially access multiple ad-hoc service providers 106 simultaneously using a different transceiver for each ad-hoc service provider 106 .
- the same wireless access protocol can be used to access multiple ad-hoc service providers 106 , then different channels may be used.
- the mobile client 108 has only one transceiver available, then it may distribute the time that it spends accessing each ad-hoc service provider 106 .
Abstract
A server provides security for a heterogeneous ad hoc mobile broadband network. The server is configured to maintain an encrypted control session with an ad-hoc service provider and a mobile client while enabling the mobile client to support an encrypted data tunnel through the ad-hoc service provider.
Description
- The present application for patent claims priority under 35 U.S.C. §119 to Provisional Application No. 60/956,658 entitled, “Method for a Heterogeneous Wireless Ad Hoc Mobile Service Provider,” filed Aug. 17, 2007.
- 1. Field
- The present disclosure relates generally to telecommunications, and more specifically to handoff in an ad-hoc mobile broadband network.
- 2. Background
- Wireless telecommunication systems are widely deployed to provide various services to consumers, such as telephony, data, video, audio, messaging, broadcasts, etc. These systems continue to evolve as market forces drive wireless telecommunications to new heights. Today, wireless networks are providing broadband Internet access to mobile subscribers over a regional, a nationwide, or even a global region. Such networks are sometimes referred as Wireless Wide Area Networks (WWANs). WWAN operators generally offer wireless access plans to their subscribers such as subscription plans at a monthly fixed rate.
- Accessing WWANs from all mobile devices may not be possible. Some mobile devices may not have a WWAN radio. Other mobile devices with a WWAN radio may not have a subscription plan enabled. Adhoc networking allows mobile devices to dynamically connect over wireless interfaces using protocols such as WLAN, Bluetooth, UWB or other protocols. There is a need in the art for a methodology to allow a user of a mobile device without WWAN access to dynamically subscribe to wireless access service provided by a user with a WWAN-capable mobile device using wireless adhoc networking between the mobile devices belong to the two users.
- In one aspect of the disclosure, a server includes a processing system configured to maintain an encrypted control session with an ad-hoc service provider and a mobile client while enabling the mobile client to support an encrypted data tunnel through the ad-hoc service provider.
- In another aspect of the disclosure, a server includes means for enabling a mobile client to support an encrypted data tunnel through an ad-hoc service provider, and means for maintaining an encrypted control session with an ad-hoc service provider and a mobile client while enabling the mobile client to support the encrypted data tunnel through the ad-hoc service provider.
- In yet another aspect of the disclosure, a method of providing security to a network from a server includes enabling a mobile client to support an encrypted data tunnel through an ad-hoc service provider, and maintaining an encrypted control session with an ad-hoc service provider and a mobile client while enabling the mobile client to support the encrypted data tunnel through the ad-hoc service provider.
- In a further aspect of the disclosure, a machine-readable medium includes instructions executable by a processing system in a server. The instructions include code for enabling a mobile client to support an encrypted data tunnel through the ad-hoc service provider, and maintaining an encrypted control session with an ad-hoc service provider and a mobile client while enabling the mobile client to support the encrypted data tunnel through the ad-hoc service provider.
- It is understood that other aspects of the disclosure will become readily apparent to those skilled in the art from the following detailed description, wherein various aspects of an ad-hoc mobile broadband network are shown and described by way of illustration. As will be realized, these aspects of the disclosure are capable of other and different configurations and its several details are capable of modification in various other respects. Accordingly, the drawings and detailed description are to be regarded as illustrative in nature and not as restrictive.
-
FIG. 1 is a conceptual diagram illustrating an example of a telecommunications system. -
FIG. 2 is a conceptual diagram illustrating an example of the hardware configuration for a server. -
FIG. 3 is a conceptual diagram illustrating an example of the hardware configuration for a processing system in a server. -
FIG. 4A is a flow chart illustrating an example of the functionality of a server supporting a connection with an ad-hoc service provider. -
FIG. 4B is a flow chart illustrating an example of the functionality of a server supporting a mobile client. -
FIG. 5 is a conceptual block diagram illustrating an example of the functionality of an ad-hoc service provider. - The detailed description set forth below in connection with the appended drawings is intended as a description of various aspects of an ad-hoc mobile broadband network and is not intended to represent the only aspects which are encompassed by the claims. The detailed description includes specific details for the purpose of providing a thorough understanding of these aspects. However, it will be apparent to those skilled in the art that various aspects of an ad-hoc mobile broadband network may be practiced without these specific details. In some instances, well-known structures and components are shown in block diagram form in order to avoid obscuring the various concepts presented throughout this disclosure.
-
FIG. 1 is a conceptual block diagram illustrating an example of a telecommunications system. Thetelecommunications system 100 is shown with multiple WWANs that provide broadband access to anetwork 102 for mobile subscribers. Thenetwork 102 may be a packet-based network such as the Internet or some other suitable network. For clarity of presentation, two WWANs 104 are shown with a backhaul connection to the Internet 102. Each WWAN 104 may be implemented with multiple fixed-site base stations (not shown) dispersed throughout a geographic region. The geographic region may be generally subdivided into smaller regions known as cells. Each base station may be configured to serve all mobile subscribers within its respective cell. A base station controller (not shown) may be used to manage and coordinate the base stations in the WWAN 104 and support the backhaul connection to the Internet 102. - Each WWAN 104 may use one of many different wireless access protocols to support radio communications with mobile subscribers. By way of example, one WWAN 104 may support Evolution-Data Optimized (EV-DO), while the other WWAN 104 may support Ultra Mobile Broadband (UMB). EV-DO and UMB are air interface standards promulgated by the 3rd Generation Partnership Project 2 (3GPP2) as part of the CDMA2000 family of standards and employs multiple access techniques such as Code Division Multiple Access (CDMA) to provide broadband Internet access to mobile subscribers. Alternatively, one of WWAN 104 may support Long Term Evolution (LTE), which is a project within the 3GPP2 to improve the Universal Mobile Telecommunications System (UMTS) mobile phone standard based primarily on a Wideband CDMA (W-CDMA) air interface. One of WWAN 104 may also support the WiMAX standard being developed by the WiMAX forum. The actual wireless access protocol employed by a WWAN for any particular telecommunications system will depend on the specific application and the overall design constraints imposed on the system. The various techniques presented throughout this disclosure are equally applicable to any combination of heterogeneous or homogeneous WWANs regardless of the wireless access protocols utilized.
- Each WWAN 104 has a number of mobile subscribers. Each subscriber may have a
mobile node 106 capable of accessing the Internet 102 directly through the WWAN 104. In the telecommunications system shown inFIG. 1 , thesemobile nodes 106 access the WWAN 104 using a EV-DO, UMB or LTE wireless access protocol; however, in actual implementations, thesemobile nodes 106 may be configured to support any wireless access protocol. - One or more of these
mobile nodes 106 may be configured to create in its vicinity an ad-hoc network based on the same or different wireless access protocol used to access the WWAN 104. By way of example, amobile node 106 may support a UMB wireless access protocol with a WWAN, while providing an IEEE 802.11 access point formobile nodes 108 that cannot directly access a WWAN. IEEE 802.11 denotes a set of Wireless Local Access Network (WLAN) standards developed by the IEEE 802.11 committee for short-range communications (e.g., tens of meters to a few hundred meters). Although IEEE 802.11 is a common WLAN wireless access protocol, other suitable protocols may be used. - A
mobile node 106 that may be used to provide an access point for anothermobile node 108 will be referred to herein as an “ad-hoc service provider.” Amobile node 108 that may use an access point of an ad-hoc service provider 106 will be referred to herein as a “mobile client.” A mobile node, whether an ad-hoc service provider 106 or amobile client 108, may be a laptop computer, a mobile telephone, a personal digital assistant (PDA), a mobile digital audio player, a mobile game console, a digital camera, a digital camcorder, a mobile audio device, a mobile video device, a mobile multimedia device, or any other device capable of supporting at least one wireless access protocol. - The ad-
hoc service provider 106 may extend its wireless broadband Internet access service tomobile clients 108 that would otherwise not have Internet access. Aserver 110 may be used as an “exchange” to enablemobile clients 108 to purchase unused bandwidth from ad-hoc service providers 106 to access, for example, theInternet 102 acrossWWANs 104. In one configuration of atelecommunications system 100, theserver 110 charges themobile clients 108 based on usage. For the occasional user of mobile Internet services, this may be an attractive alternative to the monthly fixed rate wireless access plans. The revenue generated from the usage charges may be allocated to the various entities in thetelecommunications system 100 in a way that tends to perpetuate the vitality of the exchange. By way of example, a portion of the revenue may be distributed to the ad hoc service providers, thus providing a financial incentive for mobile subscribers to become ad hoc service providers. Another portion of the revenue may be distributed to the WWAN operators to compensate them for the bandwidth that would otherwise go unutilized. Another portion of the revenue may be distributed to the manufacturers of the mobile nodes. - An ad-
hoc service provider 106, aserver 110, and one or moremobile clients 108 may establish a network that is an ad-hoc heterogeneous wireless network. By way of example, a heterogeneous wireless network may include at least two types of wireless networks (e.g., a WWAN and a WLAN). By way of example, an ad-hoc network may be a network whose specific configuration may change from time to time or from the formation of one network to the next. The network configuration is not pre-planned prior to establishing the network. Examples of configurations for an ad-hoc network may include a configuration as to which members are to be in the network (e.g., which ad-hoc service provider, which server, and/or which mobile client(s) are to be included in a network), a configuration as to the geographic locations of an ad-hoc service provider and mobile client(s), and a configuration as to when and how long a network is to be established. -
FIG. 2 is illustrates an example of a hardware implementation for a server. Theserver 110 may be a centralized server or a distributed server. A centralized server may be a dedicated server or integrated into another network-related entity, such as a desktop or laptop computer, mainframe, or other suitable entity. A distributed server may be distributed across multiple servers and/or one or more network-related entities, such as a desktop or laptop computer, mainframe, or some other suitable entity. In at least one configuration, the server may be integrated, either in whole or part, into one or more ad-hoc service providers. - The
server 110 is shown with anetwork interface 202, which may support a wired and/or wireless connection to theInternet 102. Thenetwork interface 202 may be used to implement the physical layer by providing the means to transmit raw data bits in accordance with the physical and electrical specifications required to interface to the transmission medium. Thenetwork 202 may also be configured to implement the lower portion of the data link layer by managing access to the transmission medium. - The
server 110 is also shown with aprocessing system 204 that provides various functions, including registration and authentication of the ad-hoc service providers and mobile clients, control session management for the ad-hoc service providers and mobile clients, handoff support between ad-hoc service providers, data tunneling for mobile clients, and services to mobile clients. Theprocessing system 204 is shown separate from thenetwork interface 202, however, as those skilled in the art will readily appreciate, thenetwork interface 202, or any portion thereof, may be integrated into theprocessing system 204. -
FIG. 3 is illustrates an example of a hardware implementation for a processing system in a server. In this example, theprocessing system 204 may be implemented with a bus architecture represented generally bybus 302. Thebus 302 may include any number of interconnecting buses and bridges depending on the specific application of theprocessing system 204 and the overall design constraints. The bus links together various circuits including aprocessor 304 and machine-readable media 306. Thebus 302 may also link various other circuits such as timing sources, peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further. Anetwork adapter 308 provides an interface between the network interface 202 (seeFIG. 2 ) and thebus 302. - The
processor 304 is responsible for managing the bus and general processing, including the execution of software stored on the machine-readable media 306. Theprocessor 304 may be implemented with one or more general-purpose and/or special-purpose processors. Examples include microprocessors, microcontrollers, DSP processors, and other circuitry that can execute software. Software shall be construed broadly to mean instructions, data, or any combination thereof, whether referred to as software, firmware, middleware, microcode, hardware description language, or otherwise. Machine-readable media may include, by way of example, RAM (Random Access Memory), flash memory, ROM (Read Only Memory), PROM (Programmable Read-Only Memory), EPROM (Erasable Programmable Read-Only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory), registers, magnetic disks, optical disks, hard drives, or any other suitable storage medium, or any combination thereof. - In the hardware implementation illustrated in
FIG. 3 , the machine-readable media 306 is shown as part of theprocessing system 204 separate from theprocessor 304. However, as those skilled in the art will readily appreciate, the machine-readable media 306, or any portion thereof, may be external to theprocessing system 204. By way of example, the machine-readable media 306 may include a transmission line, a carrier wave modulated by data, and/or a computer product separate from the server, all which may be accessed by theprocessor 304 through thenetwork interface 308. Alternatively, or in addition to, the machinereadable media 306, or any portion thereof, may be integrated into theprocessor 304, such as the case may be with cache and/or general register files. - The
processing system 204 may be configured as a general-purpose processing system with one or more microprocessors providing the processor functionality and external memory providing at least a portion of the machine-readable media 306, all linked together with other supporting circuitry through an external bus architecture. Alternatively, theprocessing system 204 may be implemented with an ASIC (Application Specific Integrated Circuit) with theprocessor 304, thenetwork interface 308, supporting circuitry (not shown), and at least a portion of the machine-readable media 306 integrated into a single chip, or with one or more FPGAs (Field Programmable Gate Array), PLDs (Programmable Logic Device), controllers, state machines, gated logic, discrete hardware components, or any other suitable circuitry, or any combination of circuits that can perform the various functionality described throughout this disclosure. Those skilled in the art will recognize how best to implement the described functionality for theprocessing system 204 depending on the particular application and the overall design constraints imposed on the overall system. - The machine-
readable media 306 is shown with a number of software modules. Each module includes a set of instructions that when executed by theprocessor 304 cause theprocessing system 204 to perform the various functions described below. The software modules include aprotocol stack module 309, asecurity module 310, a service provider controlsession manager module 312, a mobile client control session manager module 314, a tunneling/routing module 316, ahandoff module 318, and aservices module 320. Each software module may reside in a single storage device or distributed across multiple memory devices. By way of example, a software module may be loaded into RAM from a hard drive when a triggering event occurs (e.g., a mobile node decides to become an ad-hoc service provider). During execution of the software module, theprocessor 304 may load some of the instructions into cache to increase access speed. One or more cache lines may then be loaded into a general register file for execution by theprocessor 304. When referring to the functionality of a software module below, it will be understood that such functionality is implemented by theprocessor 304 when executing instructions from that software module. - The
protocol stack module 309 may be used to implement the protocol architecture, or any portion thereof, for the server. In the implementation described thus far, theprotocol stack module 309 is responsible for implementing several protocol layers running on top of the data link layer implemented by the network interface 202 (seeFIG. 2 ). By way of example, theprotocol stack module 309 may be used to implement the upper portion of the data link layer by providing flow control, acknowledgement, and error recovery. Theprotocol stack module 309 may also be used to implement the network layer by managing source to destination data packet transfer, as well as the transport layer by providing transparent transfer of data between end users. Although described as part of the processing system, theprotocol stack module 309, or any portion thereof, may be implemented by thenetwork adapter 202. - The
security module 310 may be used for registration. Registration of a mobile client or an ad-hoc service provider can be static (non-mobile) or dynamic (mobile). A server certificate may be supplied to the mobile client or the ad-hoc service provider. This certificate contains the public key of the server signed with the private key of an external certificate authority. The mobile client and the ad-hoc service provider are provisioned with the public key of that certificate authority, and therefore, are able to verify the signature of the certificate authority, and to then use the public key to communicate privately with the server. A mobile client and ad-hoc service provide may register with the server to set up a user name and password with payment information. Similarly, an ad-hoc service provider may register with the server setting up a user name and password. The user names and passwords are set up by thesecurity module 310 and stored in anauthentication database 322. - Once registered, the
security module 310 may authenticate an ad-hoc service provider when the ad-hoc service provider desires to provide a wireless access point to other mobile clients. In this example, the ad-hoc service provider requests a certificate from the server, which is forwarded by thesecurity module 310. Upon receipt of the certificate, and after validating the server certificate, the ad-hoc service provider suggests a session key (KSP,S) encrypted with the public key of the server. This is received by the server and provided to thesecurity module 310 to encrypt all subsequent messages with the session key KSP,S. The ad-hoc service provider provides its username and password encrypted with the session key KSP,S. Thesecurity module 310 authenticates the ad-hoc service provider based on the information stored in theauthentication database 322. - The
security module 310 may also be used to authenticate mobile clients that have registered with the server. Authentication will generally require connectivity over an ad-hoc wireless link between the mobile client and the ad-hoc service provider, but may be performed in some cases directly between the mobile client and the server. Existing connectivity between an ad-hoc service provider and the server is used to establish connectivity between the mobile client and the server. In this example, the mobile client is the supplicant, the ad-hoc service provider is the authenticator, and the server is the authentication server. The mobile client requests a certificate from the server. The ad-hoc service provider forwards this request to the server, receives a certificate from thesecurity module 310, and forwards that certificate to the mobile client. The mobile client receives the certificate. After validating the server certificate, the mobile client suggests a session key (KC,S) encrypted with the public key of the server. This is received by the server and provided to thesecurity module 310 so that all subsequent messages between the server and the mobile client can encrypted with the session key KC,S. The mobile client provides its username and password encrypted with the session key KC,S to the server. Thesecurity module 310 authenticates the mobile client based on the information stored in theauthentication database 322. Upon completion of authentication, thesecurity module 310 communicates to the ad-hoc service provider and to the mobile client that the mobile client is now authenticated and may receive service. - Once the ad-hoc service provider is authenticated, the control
session manager module 312 establishes and maintains a secure session XSP,S between the ad-hoc service provider and the server using the key KSP,S. Similarly, once the mobile client is authenticated, the control session manager module 314 establishes and maintains a secure session XC,S between the mobile client and the server using the key KC,S. A key KSP,C may be generated at the mobile client and communicated to the control session manager module 314 server over the session XC,S. The key KSP,C may then be provided to the ad-hoc service provider via the controlsession manager module 312 over the session XSP,S. This allows a secure session XSP,C to be established and maintained between the mobile client and the ad-hoc service provider using the key KSP,C. In alternative configurations, the key KSP,C may be generated by thesecurity module 204 in the server or the ad-hoc service provider. - The session keys described thus far, KSP,S, KC,S and KSP,C, are exchanged at the application layer. IP-headers and information regarding the message type may be exposed. To prevent any visibility into information flowing over the ad-hoc wireless link between the mobile client and the ad-hoc service provider, securing the transmissions over the wireless link can be performed. The mobile client and the ad-hoc service provider can agree to a data link encryption key WKSP,C for the wireless link. Such a key may be generated at either the mobile client, the ad-hoc service provider, or the
security module 204 in the server. Once the mobile client and the ad-hoc service provider agree to using this data link encryption key, all transmissions between them can be communicated using this key. - Over the secure session XC,S, information can be exchanged between the mobile client and the control session manager module 314 in the server to establish an encrypted VPN tunnel to transport data to the Internet through the server. In at least one configuration of a telecommunications system, all data from the mobile client destined to any location on the Internet is tunneled through the tunnel/
routing module 316 in the server. This is done to ensure that the ad-hoc service provider has no visibility into data associated with the mobile client, and hence ensures the privacy of the mobile client. This tunneling also provides security to the ad-hoc service provider by ensuring that all data associated with the mobile client flows through the tunnel/routing module 316, leaving the responsibility of such mobile client transactions to the server and the mobile client, with the ad-hoc service provider merely serving as a transport to allow data associated with the mobile client to reach the server. The tunnel/routing module 316 is depicted with short-dashed lines to emphasize that it may be located in the server or elsewhere in the telecommunications system. - Once the tunnel is established between the
mobile client 108 and the tunnel/routing module 316 in the server, theservices module 320 may be used to provide various services to the mobile client. By way of example, theservices module 320 may support audio or video services to themobile client 108. Theservices module 320 may also support advertising services to themobile client 108. Other functions of theservices module 320 may include routing to and from the Internet for mobile client data as well as providing network address translation to and from the Internet for the mobile client. - The handoff module may also provide support for a handoff of a mobile client from one ad-hoc service provider to another based on any number of factors. These factors may include, by way of example, the quality of service (QoS) required by the mobile client, the duration of the session required by the mobile client, and the loading, link conditions, and energy level (e.g., battery life) at the ad-hoc service provider.
- An example will now be presented where a mobile client connected to a through a “serving ad-hoc service provider” (SP1) is handed off to a “target ad-hoc service provider” (SP2). Initially, three secure sessions XSP1,S, XC,S and XSP1,C exist using session keys KSP1,S, KC,S and KSP1,C, respectively. When the target ad-hoc service provider SP2 becomes available, a secure session XSP2,S may be established with the control
session manager module 312 using a session key KSP2,S negotiated between the target ad-hoc service provider SP2 and thesecurity module 310. A handoff request may be initiated by either the mobile client, the serving ad-hoc service provider SP1, or thehandoff module 316 over the secure session XSP2,S. Thesecurity module 310 can provide information to target ad-hoc service provider SP2 indicating that the mobile client is authenticated. Over the secure session XC,S, the mobile client may be informed by thesecurity module 310 that it has been authenticated with the target ad-hoc service provider SP2. A session key KSP2,C may be generated by the mobile client, the target ad-hoc service provider SP2, or thesecurity module 310 in the server to establish and maintain a secure session XSP2,C. The mobile client disassociates with serving ad-hoc service provider SP1 and associates with target service provider SP2. The session key KSP2,C may be used for the secure session XSP2,C between the mobile client and the target ad-hoc service provider SP2, which has now become the serving ad-hoc service provider. Information (such as residual packets associated with the mobile client) can be exchanged between the service providers through the server with the assistance of thehandoff module 318 for both service providers. A session key KSP1,SP2 may be established for secure exchange of messages between the service providers. Alternatively, such exchange of information can occur over a direct wireless link between the service providers if the service providers can reach each other over a local wireless link. It is possible that a multi-hop wireless path between the service providers is used in a wireless mesh network topology if such a path is available. It is possible that some information (such as control flow information) may go through the server with the assistance of thehandoff module 318, while other information (such as data flow information) may go over the direct wireless link/path between the service providers. - The functionality of the processing system in the server will now be described with reference to
FIGS. 4A and 4B .FIG. 4A is a flow chart illustrating an example of a process implemented by the server to support an ad-hoc service provider.FIG. 4B is a flow chart illustrating an example of a process implemented by the server to support a mobile client. - Referring to
FIG. 4A , inblock 402A, the server may allow an ad-hoc service provider to register to provide an access point to a wireless broadband network for mobile clients. When the ad-hoc service provider actually desires to provide an access point, the server may authenticate the ad-hoc service provider inblock 404A from the information obtained during the registration process. The authentication process may include the creation of a session key KSP,S between the server and the ad-hoc service provider. Once authenticated, the server establishes and manages a secure control session with the ad-hoc service provider inblock 406A using the session key KSP,S. The server continues to manage the secure control session until the connection is terminated as shown inblock 412A. Once the connection is terminated, the server closes the control session with the ad-hoc service provider inblock 414A. Since the ad-hoc service provider remains registered, it may later serve as an access point again by invoking the authentication process of the server inblock 404A. - Turning to
FIG. 4B , the server may allow a mobile client to register inblock 402B in order to receive service from an ad-hoc service provider for wireless broadband access to a network. When the mobile client actually desires to connect to an ad-hoc service provider, the server may authenticate the mobile client inblock 404B from the information obtained during the registration process. The authentication process may include the creation of a session key KC,S between the server and the mobile client. Once authenticated, the server establishes and manages a secure control session with the mobile client inblock 406B using the session key KC,S. The server also establishes and maintains an encrypted data tunnel to transport data through the server to the network inblock 408B. Once the tunnel is established, the server may provide various services to the mobile client inblock 410B. Should a handoff of the mobile client to another ad-hoc service provider be required instep 412B, the server may support the handoff inblock 414B and continue to provide services to the mobile client instep 410B during and after the handoff. These services may be provided by the service until the connection is terminated as shown inblock 416B. Once the connection is terminated, the server closes the control session and tunnel with the mobile client inblock 418B. Since the mobile client remains registered, it may later connect to an ad-hoc service provider by invoking the authentication process of the server inblock 404B. -
FIG. 5 is a conceptual block diagram illustrating an example of the functionality of an ad-hoc service provider. The ad-hoc service provider 106 has the ability to bridge wireless links over homogeneous or heterogeneous wireless access protocols. This may be achieved with a WWAN network adapter 502 that supports a wireless access protocol for a WWAN to theInternet 102, and aWLAN network adapter 504 that provides a wireless access point formobile clients 108. By way of example, the WWAN network adapter 502 may include a transceiver function that supports EV-DO for Internet access through a WWAN, and theWLAN network adapter 504 may include a transceiver function that provides an 802.11 access point formobile clients 108. Eachnetwork adapter 502, 504 may be configured to implement the physical layer by demodulating wireless signals and performing other radio frequency (RF) front end processing. Eachnetwork adapter 502, 504 may also be configured to implement the link layer by managing data transfer across the physical layer, and the network layer by managing source to destination packet delivery. - The ad-
hoc service provider 106 is shown with a filtered interconnection andsession monitoring module 506. Themodule 506 provides filtered processing of content frommobile clients 108 so that the interconnection between the adhoc wireless links to the WWAN network adapter 502 is provided only tomobile clients 108 authenticated and permitted by the server to use the WWAN network. Themodule 506 also maintains tunneled connectivity between the server and the authenticatedmobile clients 108. - The ad-
hoc service provider 106 also includes aservice provider application 508 that (1) enables themodule 506 to provide adhoc services tomobile clients 108, and (2) supports WWAN or Internet access to a mobile subscriber or user of the ad-hoc service provider 106. The latter function is supported by auser interface 512 that communicates with the WWAN network adapter 502 through themodule 506 under control of theservice provider application 508. Theuser interface 512 may include a keypad, display, speaker, microphone, joystick, and/or any other combination user interface devices that enable a mobile subscriber or user to access theWWAN 104 or the Internet 102 (seeFIG. 1 ). - As discussed above, the
service provider application 508 enables themodule 506 to provide adhoc services tomobile clients 108. Theservice provider application 508 maintains a control session with the server to exchange custom messages with the server. In addition, theservice provider application 508 also maintains a separate control session with eachmobile client 108 for exchanging custom messages between theservice provider application 508 and themobile client 108. Theservice provider application 508 provides information on authenticated and permitted clients to the filtered interconnection andsession monitoring module 506. The filtered interconnection andsession monitoring module 508 allows content flow for only authenticated and permittedmobile clients 108. The filtered interconnection andsession monitoring module 506 also optionally monitors information regarding content flow related tomobile clients 108 such as the amount of content outbound from the mobile clients and inbound to the mobile clients, and regarding WWAN and WLAN network resource utilization and available bandwidths on the wireless channels. The filtered interconnection andsession monitoring module 506 can additionally and optionally provide such information to theservice provider application 508. Theservice provider application 508 can optionally act on such information and take appropriate actions such as determining whether to continue maintaining connectivity with themobile clients 108 and with the server, or whether to continue to provide service. It should be noted that the functions described inmodules hoc service provider 106. - When the ad-
hoc service provider 106 decides to provide these services, theservice provider application 508 sends a request to the server for approval. Theservice provider application 508 requests authentication by the server and approval from the server to provide service to one or moremobile clients 108. The server may authenticate the ad-hoc service provider 106 and then determine whether it will grant the ad-hoc service provider's request. As discussed earlier, the request may be denied if the number of ad-hoc service providers in the same geographic location is too great or if the WWAN operator has imposed certain constraints on the ad-hoc service provider 106. - Once the ad-
hoc service provider 106 is authenticated, theservice provider application 508 may advertise an ad-hoc WLAN Service Set Identifier (SSID). Interestedmobile clients 108 may associate with the SSID to access the ad-hoc service provider 106. Theservice provider application 508 may then authenticate themobile clients 108 with the server and then configure the filtered interconnection andsession monitoring module 506 to connect themobile clients 108 to the server. During the authentication of amobile client 108, theservice provider application 508 may use an unsecured wireless link. - The
service provider application 508 may optionally choose to move amobile client 108 to a new SSID with a secure link once themobile client 108 is authenticated. In such situations, theservice provider application 508 may distribute the time it spends in each SSID depending on the load that it has to support for existing sessions withmobile clients 108. - The
service provider application 508 may also be able to determine whether it can support amobile client 108 before allowing themobile client 108 to access a network. Resource intelligence that estimates the drain on the battery power and other processing resources that would occur by accepting amobile client 108 may assist in determining whether theservice provider application 508 should consider supporting a newmobile client 108 or accepting a handoff of thatmobile client 108 from another ad-hoc service provider. - The
service provider application 508 may admitmobile clients 108 and provide them with a certain QoS guarantee, such as an expected average bandwidth during a session. Average throughputs provided to eachmobile client 108 over a time window may be monitored. Theservice provider application 508 may monitor the throughputs for all flows going through it to ensure that resource utilization by themobile clients 108 is below a certain threshold, and that it is meeting the QoS requirement that it has agreed to provide to themobile clients 108 during the establishment of the session. - The
service provider application 508 may also provide a certain level of security to the wireless access point by routing content through the filtered interconnection andsession monitoring module 506 without being able to decipher the content. Similarly, theservice provider application 508 may be configured to ensure content routed between the user interface 510 and theWWAN 104 via themodule 506 cannot be deciphered bymobile clients 108. Theservice provider application 508 may use any suitable encryption technology to implement this functionality. - The
service provider application 508 may also maintain a time period for amobile client 108 to access a network. The time period may be agreed upon between theservice provider application 508 and themobile client 108 during the initiation of the session. If theservice provider application 508 determines that it is unable to provide themobile client 108 with access to the network for the agreed upon time period, then it may notify both the server and themobile client 108 regarding its unavailability. This may occur due to energy constraints (e.g., a low battery), or other unforeseen events. The server may then consider a handoff of the mobile client to another ad-hoc service provider, if there is such an ad-hoc service provider in the vicinity of themobile client 108. Theservice provider application 508 may support the handoff of themobile client 108. - The
service provider application 508 may also dedicate processing resources to maintain a wireless link or limited session withmobile clients 108 served by other ad-hoc service providers. This may facilitate the handoff ofmobile clients 108 to the ad-hoc service provider 106. - The
service provider application 508 may manage themobile client 108 generally, and the session specifically, through theuser interface 512. Alternatively, theservice provider application 508 may support a seamless operation mode with processing resources being dedicated to servicingmobile clients 108. In this way, themobile client 108 is managed in a way that is transparent to the mobile subscriber. The seamless operation mode may be desired where the mobile subscriber does not want to be managingmobile clients 108, but would like to continue generating revenue by sharing bandwidth withmobile clients 108. - Turning now to the mobile client, a session may be used by the
mobile client 108 to register with theserver 110. Once registered, themobile client 108 may search for available ad-hoc service providers 106. When themobile client 108 detects the presence of one or more ad-hoc service providers 106, it may initiate a session with an ad-hoc service provider 106 based on parameters such as the available bandwidth that the ad-hoc service provider 106 can support, the QoS metric of the ad-hoc service provider 106, and the cost of the service advertised. As described earlier, a link encryption key may be established between themobile client 108 and the ad-hoc service provider 106 during the establishment of the session. A session may be established between themobile client 108 and theserver 110 so that all traffic between the two is encrypted. The transport layer ports may be kept in the open and not encrypted to provide visibility for the network address translation functionality at the ad-hoc service provider 106. - The handoff of the
mobile client 108 may be performed in a variety of ways. In one configuration, themobile client 108 may maintain a limited session with multiple ad-hoc service providers 106, while using one ad-hoc service provider 106 to access the Internet. As described earlier, this approach may facilitate the handoff process. In an alternative configuration, themobile client 108 may consider a handoff only when necessary. In this configuration, themobile client 108 may maintain an active list of ad-hoc service providers 106 in its vicinity for handoff. Themobile client 108 may select an ad-hoc service provider 106 for handoff from the active list when the current ad-hoc service provider 106 needs to discontinue its service. When handoff is not possible, amobile client 108 may need to reconnect through a different ad-hoc service provider 106 to access the Internet. Persistence of the tunnel between the mobile client and the server can enable a soft handoff of a mobile client from one service provider to another service provider. - If the bandwidth needs of a
mobile client 108 are greater than the capabilities of the available ad-hoc service providers 106, then themobile client 108 may access multiple ad-hoc service providers 106 simultaneously. Amobile client 108 with multiple transceivers could potentially access multiple ad-hoc service providers 106 simultaneously using a different transceiver for each ad-hoc service provider 106. If the same wireless access protocol can be used to access multiple ad-hoc service providers 106, then different channels may be used. If themobile client 108 has only one transceiver available, then it may distribute the time that it spends accessing each ad-hoc service provider 106. - Those of skill in the art would appreciate that the various illustrative blocks, modules, elements, components, methods, and algorithms described herein may be implemented as electronic hardware, computer software, or combinations of both. To illustrate this interchangeability of hardware and software, various illustrative blocks, modules, elements, components, methods, and algorithms have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application.
- It is understood that the specific order or hierarchy of steps in the processes disclosed is an illustration of exemplary approaches. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the processes may be rearranged. The accompanying method claims present elements of the various steps in a sample order, and are not meant to be limited to the specific order or hierarchy presented.
- The previous description is provided to enable any person skilled in the art to practice the various aspects described herein. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects. Thus, the claims are not intended to be limited to the aspects shown herein, but is to be accorded the full scope consistent with the language claims, wherein reference to an element in the singular is not intended to mean “one and only one” unless specifically so stated, but rather “one or more.” Unless specifically stated otherwise, the term “some” refers to one or more. Pronouns in the masculine (e.g., his) include the feminine and neuter gender (e.g., her and its) and vice versa. All structural and functional equivalents to the elements of the various aspects described throughout this disclosure that are known or later come to be known to those of ordinary skill in the art are expressly incorporated herein by reference and are intended to be encompassed by the claims. Moreover, nothing disclosed herein is intended to be dedicated to the public regardless of whether such disclosure is explicitly recited in the claims. No claim element is to be construed under the provisions of 35 U.S.C. §112, sixth paragraph, unless the element is expressly recited using the phrase “means for” or, in the case of a method claim, the element is recited using the phrase “step for.”
Claims (76)
1. A server, comprising:
a processing system configured to maintain an encrypted control session with an ad-hoc service provider and a mobile client while enabling the mobile client to support an encrypted data tunnel through the ad-hoc service provider.
2. The server of claim 1 wherein the processing system is further configured to enable the mobile client to support the encrypted data tunnel through the ad-hoc service provider to the server.
3. The server of claim 1 wherein the processing system is further configured to use a first session key for the encrypted control session with the ad-hoc service provider and a second session key for the encrypted control session with the mobile client, wherein the first session key is different from the second session key.
4. The server of claim 3 wherein the processing system is further configured to receive from the ad-hoc service provider the first session key encrypted with a public key for the server and receive from the mobile client the second session key encrypted with the public key for the server.
5. The server of claim 1 wherein the processing system is further configured to authenticate the ad-hoc service provider to establish the encrypted control session with the ad-hoc service provider.
6. The server of claim 1 wherein the processing system is further configured to authenticate the mobile client to establish the encrypted control session with the mobile client.
7. The server of claim 6 wherein the processing system is further configured to authenticate the mobile client through the ad-hoc service provider.
8. The server of claim 7 wherein the processing system is further configured to communicate to the ad-hoc service provider and the mobile client that the mobile client is authenticated.
9. The server of claim 1 wherein the processing system is further configured to assist in establishing an encrypted control session between the ad-hoc service provider and the mobile client.
10. The server of claim 9 wherein the processing system is further configured to assist in establishing the encrypted control session between the ad-hoc service provider and the mobile client by receiving a session key from one of the mobile client and ad-hoc service provider and providing the session key to the other one of the mobile client and ad-hoc service provider.
11. The server of claim 9 wherein the processing system is further configured to assist in establishing the encrypted control session between the ad-hoc service provider and the mobile client by generating a session key and providing the session key to the ad-hoc service provider and the mobile client.
12. The server of claim 1 wherein the processing system is further configured to assist in establishing an encrypted wireless link between the ad-hoc service provider and the mobile client.
13. The server of claim 12 wherein the processing system is further configured to assist in establishing the encrypted wireless link between the ad-hoc service provider and the mobile client by generating a wireless link encryption key and providing the wireless link encryption key to the ad-hoc service provider and the mobile client.
14. The server of claim 1 wherein the processing system is further configured to support a handoff of the mobile client from the ad-hoc service provider to another ad-hoc service provider.
15. The server of claim 14 wherein the processing system is further configured to support the handoff by establishing an encrypted control session with said another ad-hoc service provider.
16. The server of claim 14 wherein the processing system is further configured to authenticate the mobile client with said another ad-hoc service provider.
17. The server of claim 16 wherein the processing system is further configured to communicate to the mobile client that the mobile client has been authenticated with said another ad-hoc service provider.
18. The server of claim 14 wherein the processing system is further configured to support the handoff by assisting in establishing an encrypted control session between said another ad-hoc service provider and the mobile client.
19. The server of claim 18 wherein the processing system is further configured to assist in establishing the encrypted control session between said another ad-hoc service provider and the mobile client by generating a session key and providing the session key to said another ad-hoc service provider and the mobile client.
20. A server, comprising:
means for enabling a mobile client to support an encrypted data tunnel through an ad-hoc service provider; and
means for maintaining an encrypted control session with an ad-hoc service provider and a mobile client while enabling the mobile client to support the encrypted data tunnel through the ad-hoc service provider.
21. The server of claim 20 wherein the means for enabling the mobile client to support an encrypted data tunnel is configured to enable the mobile client to support the encrypted data tunnel through the ad-hoc service provider to the server.
22. The server of claim 20 wherein the means for maintaining an encrypted control session with an ad-hoc service provider and a mobile client comprises means for using a first session key for the encrypted control session with the ad-hoc service provider and means for using a second session key for the encrypted control session with the mobile client, wherein the first session key is different from the second session key.
23. The server of claim 22 further comprising means for receiving from the ad-hoc service provider the first session key encrypted with a public key for the server and means for receiving from the mobile client the second session key encrypted with the public key for the server.
24. The server of claim 20 further comprising means for authenticating the ad-hoc service provider to establish the encrypted control session with the ad-hoc service provider.
25. The server of claim 20 further comprising means for authenticating the mobile client to establish the encrypted control session with the mobile client.
26. The server of claim 25 wherein the means for authenticating the mobile client is configured to authenticate the mobile client through the ad-hoc service provider.
27. The server of claim 26 further comprising means for communicating to the ad-hoc service provider and the mobile client that the mobile client is authenticated.
28. The server of claim 20 further comprising means for assisting in establishing an encrypted control session between the ad-hoc service provider and the mobile client.
29. The server of claim 28 wherein the means for assisting in establishing an encrypted control session between the ad-hoc service provider and the mobile client comprises means for receiving a session key from one of the mobile client and ad-hoc service provider and means for providing the session key to the other one of the mobile client and ad-hoc service provider.
30. The server of claim 28 wherein the means for assisting in establishing an encrypted control session between the ad-hoc service provider and the mobile client comprises means for generating a session key and means for providing the session key to the ad-hoc service provider and the mobile client.
31. The server of claim 20 further comprising means for assisting in establishing an encrypted wireless link between the ad-hoc service provider and the mobile client.
32. The server of claim 31 wherein the means for assisting in establishing an encrypted wireless link between the ad-hoc service provider and the mobile client comprises means for generating a wireless link encryption key and means for providing the wireless link encryption key to the ad-hoc service provider and the mobile client.
33. The server of claim 20 further comprising means for supporting a handoff of the mobile client from the ad-hoc service provider to another ad-hoc service provider.
34. The server of claim 33 wherein the means for supporting a handoff is configured to support the handoff by establishing an encrypted control session with said another ad-hoc service provider.
35. The server of claim 33 further comprising means for authenticating the mobile client with said another ad-hoc service provider.
36. The server of claim 35 further comprising means for communicating to the mobile client that the mobile client has been authenticated with said another ad-hoc service provider.
37. The server of claim 33 wherein the means for supporting a handoff is configured to support the handoff by assisting in establishing an encrypted control session between said another ad-hoc service provider and the mobile client.
38. The server of claim 37 wherein the means for supporting a handoff is further configured to assist in establishing the encrypted control session between said another ad-hoc service provider and the mobile client by generating a session key and providing the session key to said another ad-hoc service provider and the mobile client.
39. A method of providing security to a network from a server, comprising:
enabling a mobile client to support an encrypted data tunnel through an ad-hoc service provider; and
maintaining an encrypted control session with an ad-hoc service provider and a mobile client while enabling the mobile client to support the encrypted data tunnel through the ad-hoc service provider.
40. The method of claim 39 wherein the mobile client is enabled to support the encrypted data tunnel through the ad-hoc service provider to the server.
41. The method of claim 39 wherein the encrypted control session is maintained with the ad-hoc service provider and the mobile client by for using a first session key for the encrypted control session with the ad-hoc service provider and using a second session key for the encrypted control session with the mobile client, wherein the first session key is different from the second session key.
42. The method of claim 41 further comprising receiving from the ad-hoc service provider the first session key encrypted with a public key for the server and receiving from the mobile client the second session key encrypted with the public key for the server.
43. The method of claim 39 further comprising authenticating the ad-hoc service provider to establish the encrypted control session with the ad-hoc service provider.
44. The method of claim 39 further comprising authenticating the mobile client to establish the encrypted control session with the mobile client.
45. The method of claim 44 wherein the mobile client is authenticated through the ad-hoc service provider.
46. The method of claim 45 further comprising communicating to the ad-hoc service provider and the mobile client that the mobile client is authenticated.
47. The method of claim 39 further comprising assisting in establishing an encrypted control session between the ad-hoc service provider and the mobile client.
48. The method of claim 47 wherein the establishment of the encrypted control session between the ad-hoc service provider and the mobile client is assisted by receiving a session key from one of the mobile client and ad-hoc service provider and providing the session key to the other one of the mobile client and ad-hoc service provider.
49. The method of claim 47 wherein the establishing an encrypted control session between the ad-hoc service provider and the mobile client is assisted by generating a session key and providing the session key to the ad-hoc service provider and the mobile client.
50. The method of claim 39 further comprising assisting in establishing an encrypted wireless link between the ad-hoc service provider and the mobile client.
51. The method of claim 50 wherein the establishment of the encrypted wireless link between the ad-hoc service provider and the mobile client is assisted by generating a wireless link encryption key and providing the wireless link encryption key to the ad-hoc service provider and the mobile client.
52. The method of claim 39 further comprising supporting a handoff of the mobile client from the ad-hoc service provider to another ad-hoc service provider.
53. The method of claim 52 wherein the handoff is supported by establishing an encrypted control session with said another ad-hoc service provider.
54. The method of claim 52 further comprising authenticating the mobile client with said another ad-hoc service provider.
55. The method of claim 54 further comprising communicating to the mobile client that the mobile client has been authenticated with said another ad-hoc service provider.
56. The method of claim 52 wherein the handoff is supported by assisting in establishing an encrypted control session between said another ad-hoc service provider and the mobile client.
57. The method of claim 56 wherein the handoff is supported by assisting in establishing the encrypted control session between said another ad-hoc service provider and the mobile client by generating a session key and providing the session key to said another ad-hoc service provider and the mobile client.
58. A machine-readable medium comprising instructions executable by a processing system in a server, the instructions comprising code for:
enabling a mobile client to support an encrypted data tunnel through the ad-hoc service provider; and
maintaining an encrypted control session with an ad-hoc service provider and a mobile client while enabling the mobile client to support the encrypted data tunnel through the ad-hoc service provider.
59. The machine-readable medium of claim 58 wherein the code for enabling the mobile client to support an encrypted data tunnel is configured to enable the mobile client to support the encrypted data tunnel through the ad-hoc service provider to the server.
60. The machine-readable medium of claim 58 wherein the code for maintaining an encrypted control session with an ad-hoc service provider and a mobile client comprises code for using a first session key for the encrypted control session with the ad-hoc service provider and code for using a second session key for the encrypted control session with the mobile client, wherein the first session key is different from the second session key.
61. The machine-readable medium of claim 60 wherein the instructions further comprise code for receiving from the ad-hoc service provider the first session key encrypted with a public key for the server and code for receiving from the mobile client the second session key encrypted with the public key for the server.
62. The machine-readable medium of claim 20 wherein the instructions further comprise code for authenticating the ad-hoc service provider to establish the encrypted control session with the ad-hoc service provider.
63. The machine-readable medium of claim 58 wherein the instructions further comprise code for authenticating the mobile client to establish the encrypted control session with the mobile client.
64. The machine-readable medium of claim 63 wherein the code for authenticating the mobile client is configured to authenticate the mobile client through the ad-hoc service provider.
65. The machine-readable medium of claim 64 wherein the instructions further comprise code for communicating to the ad-hoc service provider and the mobile client that the mobile client is authenticated.
66. The machine-readable medium of claim 58 wherein the instructions further comprise code for assisting in establishing an encrypted control session between the ad-hoc service provider and the mobile client.
67. The machine-readable medium of claim 66 wherein the code for assisting in establishing an encrypted control session between the ad-hoc service provider and the mobile client comprises code for receiving a session key from one of the mobile client and ad-hoc service provider and code for providing the session key to the other one of the mobile client and ad-hoc service provider.
68. The machine-readable medium of claim 66 wherein the code for assisting in establishing an encrypted control session between the ad-hoc service provider and the mobile client comprises code for generating a session key and code for providing the session key to the ad-hoc service provider and the mobile client.
69. The machine-readable medium of claim 58 wherein the instructions further comprise code for assisting in establishing an encrypted wireless link between the ad-hoc service provider and the mobile client.
70. The machine-readable medium of claim 69 wherein the code for assisting in establishing an encrypted wireless link between the ad-hoc service provider and the mobile client comprises code for generating a wireless link encryption key and code providing the wireless link encryption key to the ad-hoc service provider and the mobile client.
71. The machine-readable medium of claim 58 wherein the instructions further comprise code for supporting a handoff of the mobile client from the ad-hoc service provider to another ad-hoc service provider.
72. The machine-readable medium of claim 71 wherein the code for supporting a handoff is configured to support the handoff by establishing an encrypted control session with said another ad-hoc service provider.
73. The machine-readable medium of claim 71 wherein the instructions further comprise code for authenticating the mobile client with said another ad-hoc service provider.
74. The machine-readable medium of claim 73 wherein the instructions further comprise code for communicating to the mobile client that the mobile client has been authenticated with said another ad-hoc service provider.
75. The machine-readable medium of claim 71 wherein the code for supporting a handoff is configured to support the handoff by assisting in establishing an encrypted control session between said another ad-hoc service provider and the mobile client.
76. The machine-readable medium of claim 75 wherein the code for supporting a handoff is further configured to assist in establishing the encrypted control session between said another ad-hoc service provider and the mobile client by generating a session key and providing the session key to said another ad-hoc service provider and the mobile client.
Priority Applications (12)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/189,008 US20090046861A1 (en) | 2007-08-17 | 2008-08-08 | Security for a heterogeneous ad hoc mobile broadband network |
JP2010521946A JP2010537572A (en) | 2007-08-17 | 2008-08-15 | Security for heterogeneous ad hoc mobile broadband networks |
EP08827626A EP2189019A1 (en) | 2007-08-17 | 2008-08-15 | Security for a heterogeneous ad hoc mobile broadband network |
MX2010001891A MX2010001891A (en) | 2007-08-17 | 2008-08-15 | Security for a heterogeneous ad hoc mobile broadband network. |
RU2010109888/08A RU2010109888A (en) | 2007-08-17 | 2008-08-15 | SECURITY FOR A HETEROGENEOUS SELF-ORGANIZING WIDESBAND MOBILE NETWORK |
KR1020107005907A KR20100055487A (en) | 2007-08-17 | 2008-08-15 | Security for a heterogeneous ad hoc mobile broadband network |
AU2008289174A AU2008289174A1 (en) | 2007-08-17 | 2008-08-15 | Security for a heterogeneous ad hoc mobile broadband network |
CN200880102987A CN101779481A (en) | 2007-08-17 | 2008-08-15 | Security for a heterogeneous ad hoc mobile broadband network |
PCT/US2008/073321 WO2009026154A1 (en) | 2007-08-17 | 2008-08-15 | Security for a heterogeneous ad hoc mobile broadband network |
TW097131373A TW200924465A (en) | 2007-08-17 | 2008-08-15 | Security for a heterogeneous ad hoc mobile broadband network |
BRPI0814946-1A2A BRPI0814946A2 (en) | 2007-08-17 | 2008-08-15 | SECURITY FOR A Heterogeneous Mobile Broadband Ad Hoc Network |
CA2695349A CA2695349A1 (en) | 2007-08-17 | 2008-08-15 | Security for a heterogeneous ad hoc mobile broadband network |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US95665807P | 2007-08-17 | 2007-08-17 | |
US12/189,008 US20090046861A1 (en) | 2007-08-17 | 2008-08-08 | Security for a heterogeneous ad hoc mobile broadband network |
Publications (1)
Publication Number | Publication Date |
---|---|
US20090046861A1 true US20090046861A1 (en) | 2009-02-19 |
Family
ID=40362858
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/861,279 Active 2029-03-20 US9398453B2 (en) | 2007-08-17 | 2007-09-26 | Ad hoc service provider's ability to provide service for a wireless network |
US11/861,280 Expired - Fee Related US8644206B2 (en) | 2007-08-17 | 2007-09-26 | Ad hoc service provider configuration for broadcasting service information |
US12/189,008 Abandoned US20090046861A1 (en) | 2007-08-17 | 2008-08-08 | Security for a heterogeneous ad hoc mobile broadband network |
US13/270,138 Expired - Fee Related US9167426B2 (en) | 2007-08-17 | 2011-10-10 | Ad hoc service provider's ability to provide service for a wireless network |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/861,279 Active 2029-03-20 US9398453B2 (en) | 2007-08-17 | 2007-09-26 | Ad hoc service provider's ability to provide service for a wireless network |
US11/861,280 Expired - Fee Related US8644206B2 (en) | 2007-08-17 | 2007-09-26 | Ad hoc service provider configuration for broadcasting service information |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/270,138 Expired - Fee Related US9167426B2 (en) | 2007-08-17 | 2011-10-10 | Ad hoc service provider's ability to provide service for a wireless network |
Country Status (13)
Country | Link |
---|---|
US (4) | US9398453B2 (en) |
EP (1) | EP2189019A1 (en) |
JP (3) | JP5313247B2 (en) |
KR (3) | KR101163001B1 (en) |
CN (3) | CN101779497B (en) |
AU (3) | AU2008289290A1 (en) |
BR (4) | BRPI0815220A2 (en) |
CA (3) | CA2694665A1 (en) |
MX (3) | MX2010001899A (en) |
RU (4) | RU2010109919A (en) |
TW (3) | TWI419512B (en) |
UA (2) | UA94348C2 (en) |
WO (3) | WO2009026034A1 (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090046676A1 (en) * | 2007-08-17 | 2009-02-19 | Qualcomm Incorporated | Ad hoc service provider configuration for broadcasting service information |
US20090049158A1 (en) * | 2007-08-17 | 2009-02-19 | Qualcomm Incorporated | Ad hoc service provider topology |
US20090046658A1 (en) * | 2007-08-17 | 2009-02-19 | Qualcomm Incorporated | Handoff at an ad-hoc mobile service provider |
US20090046598A1 (en) * | 2007-08-17 | 2009-02-19 | Qualcomm Incorporated | System and method for acquiring or distributing information related to one or more alternate ad hoc service providers |
US20090073943A1 (en) * | 2007-08-17 | 2009-03-19 | Qualcomm Incorporated | Heterogeneous wireless ad hoc network |
US20110019627A1 (en) * | 2009-05-26 | 2011-01-27 | Qualcomm Incorporated | Maximizing Service Provider Utility in a Heterogeneous Wireless Ad-Hoc Network |
US20110040888A1 (en) * | 2009-08-13 | 2011-02-17 | Qualcomm Incorporated | Method and apparatus for link aggregation in a heterogeneous communication system |
US20120331165A1 (en) * | 2010-03-08 | 2012-12-27 | Nobuhiko Arashin | Server device for transmitting and receiving data to and from client device through access point |
US20140219164A1 (en) * | 2013-02-07 | 2014-08-07 | David Sanders | Hardware-Based Private Network Using WiMAX |
US20150113618A1 (en) * | 2013-10-23 | 2015-04-23 | Microsoft Corporation | Verifying the security of a remote server |
US9215075B1 (en) | 2013-03-15 | 2015-12-15 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
EP4192117A4 (en) * | 2020-07-31 | 2023-10-11 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Method for device access authentication, terminal device, and cloud platform |
Families Citing this family (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8446830B2 (en) * | 2009-12-22 | 2013-05-21 | Novatel Wireless, Inc. | System, method and device for switching between WWAN and WLAN in a mobile wireless hotspot device |
US20090047966A1 (en) * | 2007-08-17 | 2009-02-19 | Qualcomm Incorporated | Method for a heterogeneous wireless ad hoc mobile internet access service |
US9633381B2 (en) * | 2008-01-09 | 2017-04-25 | T-Mobile Usa, Inc. | Mobile application monitoring system |
US8447303B2 (en) | 2008-02-07 | 2013-05-21 | Research In Motion Limited | Method and system for automatic seamless mobility |
TWI455626B (en) * | 2009-06-22 | 2014-10-01 | Htc Corp | Method of handling positioning measurement |
US9667652B2 (en) * | 2009-08-25 | 2017-05-30 | Aruba Networks, Inc. | Mobile remote access |
US20110069179A1 (en) * | 2009-09-24 | 2011-03-24 | Microsoft Corporation | Network coordinated event capture and image storage |
US20110078775A1 (en) * | 2009-09-30 | 2011-03-31 | Nokia Corporation | Method and apparatus for providing credibility information over an ad-hoc network |
KR101066328B1 (en) | 2009-10-09 | 2011-09-20 | 삼성에스디에스 주식회사 | Method for balancing load in mobile environment and mobile device implementing the same |
US8750824B2 (en) * | 2009-10-30 | 2014-06-10 | International Business Machines Corporation | Global mobility infrastructure for user devices |
EP2364041B1 (en) * | 2010-03-03 | 2012-09-19 | Research In Motion Limited | Method and apparatus to signal use-specific capabilities of mobile stations to establish data transfer sessions |
EP2364039A1 (en) * | 2010-03-03 | 2011-09-07 | Research In Motion Limited | Method and apparatus to signal access stratum capabilities of mobile stations for data transfer sessions |
EP3179809B1 (en) | 2010-03-03 | 2019-07-10 | BlackBerry Limited | Method and apparatus to signal use-specific capabilities of mobile stations to establish data transfer sessions |
EP2364040A1 (en) * | 2010-03-03 | 2011-09-07 | Research In Motion Limited | Method and apparatus to initiate data transfers between mobile stations and network using pre-defined capability configurations |
EP3285537B1 (en) * | 2010-03-12 | 2019-12-25 | BlackBerry Limited | Method and device for registration and data transmission using fast / zero contention resolution |
EP2367394B1 (en) | 2010-03-12 | 2015-11-25 | BlackBerry Limited | Base station and method for receiving transmissions on an enhanced random access channel |
EP2367393B8 (en) * | 2010-03-12 | 2015-12-30 | BlackBerry Limited | Communication Station and Method for Transmitting Additional Information on an Enhanced Random Access Channel |
EP2367386B1 (en) | 2010-03-12 | 2020-08-12 | BlackBerry Limited | Timing advance enhancements for cellular communications |
EP4033824A1 (en) | 2010-03-12 | 2022-07-27 | BlackBerry Limited | Communication station and method for transmitting on a random access channel |
US8665842B2 (en) | 2010-05-13 | 2014-03-04 | Blackberry Limited | Methods and apparatus to discover network capabilities for connecting to an access network |
US8644276B2 (en) | 2010-05-13 | 2014-02-04 | Research In Motion Limited | Methods and apparatus to provide network capabilities for connecting to an access network |
US10142292B2 (en) | 2010-06-30 | 2018-11-27 | Pulse Secure Llc | Dual-mode multi-service VPN network client for mobile device |
US8127350B2 (en) * | 2010-06-30 | 2012-02-28 | Juniper Networks, Inc. | Multi-service VPN network client for mobile device |
US8549617B2 (en) | 2010-06-30 | 2013-10-01 | Juniper Networks, Inc. | Multi-service VPN network client for mobile device having integrated acceleration |
US8830872B2 (en) * | 2011-04-08 | 2014-09-09 | Texas Instruments Incorporated | Network configuration for devices with constrained resources |
US9445334B2 (en) | 2011-04-20 | 2016-09-13 | Qualcomm Incorporated | Switching between radio access technologies at a multi-mode access point |
GB2494920B8 (en) * | 2011-09-26 | 2014-02-19 | Validsoft Uk Ltd | Network connection method |
KR101270658B1 (en) * | 2011-12-14 | 2013-06-03 | 전남대학교산학협력단 | Method for managing cache of service information in zigbee network |
US9497694B2 (en) | 2012-03-29 | 2016-11-15 | Nec Corporation | Wireless communication device, wireless communication system and wireless communication method |
CN104221321A (en) | 2012-03-31 | 2014-12-17 | 诺基亚公司 | Method and apparatus for secured social networking |
WO2013157711A1 (en) * | 2012-04-18 | 2013-10-24 | 부산대학교 산학협력단 | System and portable terminal for relaying wireless signal in wireless multi-hop network and method therefor |
EP2842288A1 (en) * | 2012-04-27 | 2015-03-04 | Interdigital Patent Holdings, Inc. | Systems and methods for personalizing and/or tailoring a service interface |
US10129751B2 (en) | 2012-05-25 | 2018-11-13 | Comcast Cable Communications, Llc | Wireless gateway supporting public and private networks |
WO2014059622A1 (en) | 2012-10-17 | 2014-04-24 | Nokia Corporation | Method and apparatus for providing secure communications based on trust evaluations in a distributed manner |
WO2014179997A1 (en) * | 2013-05-10 | 2014-11-13 | 华为技术有限公司 | Information notification and receiving method, apparatus and system of radio access network |
WO2015036817A1 (en) * | 2013-09-15 | 2015-03-19 | Yogesh Chunilal Rathod | Structured updated status, requests, user data & programming based presenting & accessing of connections |
WO2015131029A1 (en) * | 2014-02-28 | 2015-09-03 | Sun Chemical Corporation | Radiation curable inks and coatings containing diacetone acrylamide |
US9526032B2 (en) * | 2014-09-26 | 2016-12-20 | Apple Inc. | Network bandwidth sharing for small mobile devices |
WO2016144422A1 (en) | 2015-03-06 | 2016-09-15 | Apple Inc. | Determining when to establish connection between mobile client and proxy devices |
US9729641B2 (en) * | 2015-08-05 | 2017-08-08 | Live Nation Entertainment, Inc. | Event saturation networking |
US20180115924A1 (en) * | 2016-10-20 | 2018-04-26 | Nokia Solutions And Networks Oy | Dynamic Exchange Of Wireless Communication Services |
US10291790B2 (en) * | 2017-10-06 | 2019-05-14 | Wipro Limited | System and method for dynamic charging in communication networks |
US10080117B1 (en) * | 2017-10-20 | 2018-09-18 | International Business Machines Corporation | Controlling operation of computing devices |
CN109842498B (en) * | 2017-11-24 | 2022-06-24 | 阿里巴巴集团控股有限公司 | Client configuration method, server, client and electronic equipment |
US10813169B2 (en) | 2018-03-22 | 2020-10-20 | GoTenna, Inc. | Mesh network deployment kit |
RU2696298C1 (en) * | 2018-04-03 | 2019-08-01 | Акционерное общество "Научно-производственная фирма "Микран" | Telecommunication equipment configuration method and telecommunication equipment protection method |
US10992670B1 (en) * | 2018-11-12 | 2021-04-27 | Amazon Technologies, Inc. | Authenticating identities for establishing secure network tunnels |
CN114286296A (en) * | 2021-12-14 | 2022-04-05 | 达闼机器人有限公司 | Remote control method, server, controlled device, system, device, and medium |
Citations (102)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5301359A (en) * | 1989-04-27 | 1994-04-05 | Motorola, Inc. | Bulletin board resource for communication system access |
US6125185A (en) * | 1997-05-27 | 2000-09-26 | Cybercash, Inc. | System and method for encryption key generation |
US20010012757A1 (en) * | 2000-02-03 | 2001-08-09 | U.S. Philips Corporation | Ad-hoc radio communication system |
US6295453B1 (en) * | 1998-10-07 | 2001-09-25 | Telefonaktiebolaget Lm Ericsson (Publ) | Multi-full rate channel assignment for a cellular telephone system |
US20010024443A1 (en) * | 1999-12-20 | 2001-09-27 | Fredrik Alriksson | Mobile IP for mobile Ad Hoc networks |
US20020039367A1 (en) * | 2000-09-29 | 2002-04-04 | Jukka Seppala | Selection of serving network element in telecommunications network |
US20020082738A1 (en) * | 2000-12-27 | 2002-06-27 | Insyst Ltd. | Method for global automated process control |
US20020138635A1 (en) * | 2001-03-26 | 2002-09-26 | Nec Usa, Inc. | Multi-ISP controlled access to IP networks, based on third-party operated untrusted access stations |
US20030054796A1 (en) * | 2001-09-17 | 2003-03-20 | Hitachi, Ltd. | Charging method and terminal equipment in the information and communication network system |
US20030095504A1 (en) * | 2000-09-12 | 2003-05-22 | Ogier Richard G. | Reduced-overhead protocol for discovering new neighbor nodes and detecting the loss of existing neighbor nodes in a network |
US20030103521A1 (en) * | 2001-06-18 | 2003-06-05 | Itran Communications Ltd. | Channel access method for powerline carrier based media access control protocol |
US20030157951A1 (en) * | 2002-02-20 | 2003-08-21 | Hasty William V. | System and method for routing 802.11 data traffic across channels to increase ad-hoc network capacity |
US20040001442A1 (en) * | 2002-06-28 | 2004-01-01 | Rayment Stephen G. | Integrated wireless distribution and mesh backhaul networks |
US20040008663A1 (en) * | 2000-12-29 | 2004-01-15 | Devabhaktuni Srikrishna | Selection of routing paths based upon path quality of a wireless mesh network |
US20040029528A1 (en) * | 2000-11-28 | 2004-02-12 | Chandler Stephen Anthony Gerard | Routing algorithm for distributed telecommunication networks |
US20040068668A1 (en) * | 2002-10-08 | 2004-04-08 | Broadcom Corporation | Enterprise wireless local area network switching system |
US6735417B2 (en) * | 2002-08-15 | 2004-05-11 | Motorola, Inc. | Method and apparatus for relaying information in an AD-HOC network |
US20040174822A1 (en) * | 2003-03-05 | 2004-09-09 | Bui Thomas T. | Systems and methods for providing collaboration between systems |
US20040203787A1 (en) * | 2002-06-28 | 2004-10-14 | Siamak Naghian | System and method for reverse handover in mobile mesh Ad-Hoc networks |
US20050053005A1 (en) * | 2003-09-09 | 2005-03-10 | Harris Corporation | Mobile ad hoc network (MANET) providing connectivity enhancement features and related methods |
US6871071B2 (en) * | 1999-12-28 | 2005-03-22 | Ntt Docomo, Inc. | Handover control method and system |
US6879574B2 (en) * | 2002-06-24 | 2005-04-12 | Nokia Corporation | Mobile mesh Ad-Hoc networking |
US20050088980A1 (en) * | 2001-06-27 | 2005-04-28 | Mikko Olkkonen | Ad hoc network discovery menu |
US20050094588A1 (en) * | 2002-06-12 | 2005-05-05 | Globespan Virata Incorporated | Direct link relay in a wireless network |
US20050108527A1 (en) * | 2003-11-13 | 2005-05-19 | Boris Ginzburg | Method and apparatus to provide secured link |
US20050138671A1 (en) * | 2003-12-22 | 2005-06-23 | Love Robert T. | Apparatus and method for adaptive broadcast transmission |
US20050136834A1 (en) * | 2003-12-19 | 2005-06-23 | Motorola, Inc. | Communication system with adopted remote identity |
US20050197098A1 (en) * | 2004-03-02 | 2005-09-08 | Nokia Corporation | Method and apparatus to provide charging for ad-hoc service provisioning between trusted parties and between untrusted parties |
US20060005008A1 (en) * | 2004-07-02 | 2006-01-05 | Wen-Hung Kao | Security gateway utilizing ssl protocol protection and related method |
US20060007863A1 (en) * | 2002-09-05 | 2006-01-12 | Siamak Naghian | Signal propagation delay routing |
US7003117B2 (en) * | 2003-02-05 | 2006-02-21 | Voltage Security, Inc. | Identity-based encryption system for secure data distribution |
US20060056368A1 (en) * | 2004-09-10 | 2006-03-16 | Nivis, Llc | System and method for a wireless mesh network of configurable signage |
US20060064589A1 (en) * | 2004-09-17 | 2006-03-23 | Fujitsu Limited | Setting information distribution apparatus, method, program, medium, and setting information reception program |
US20060092939A1 (en) * | 2004-10-29 | 2006-05-04 | Samsung Electronics Co., Ltd. | Apparatus and method for extending mobility in a mobile ad hoc network |
US20060098598A1 (en) * | 2004-11-10 | 2006-05-11 | Michael Gallagher | Seamless transitions of active calls between enterprise telecommunications networks and licensed public telecommunications networks |
US20060101400A1 (en) * | 2004-10-14 | 2006-05-11 | International Business Machines Corporation | Apparatus and methods for performing computer system maintenance and notification activities in an opportunistic manner |
US7046647B2 (en) * | 2004-01-22 | 2006-05-16 | Toshiba America Research, Inc. | Mobility architecture using pre-authentication, pre-configuration and/or virtual soft-handoff |
US20060114850A1 (en) * | 2004-01-13 | 2006-06-01 | Joshi Avinash | System and method for achieving continuous connectivity to an access point or gateway in a wireless network following an on-demand routing protocol, and to perform smooth handoff of mobile terminals between fixed terminals in the network |
US7089417B2 (en) * | 1998-10-16 | 2006-08-08 | Tecsec, Inc. | Cryptographic information and flow control |
US20060176852A1 (en) * | 2005-02-04 | 2006-08-10 | Industrial Technology Research Institute | System and method for connection handover in a virtual private network |
US20060178149A1 (en) * | 2005-02-04 | 2006-08-10 | Kamat Sandip D | Systems and methods for wireless cellular telephone routers |
US7110372B2 (en) * | 2000-11-17 | 2006-09-19 | Sony Deutschland Gmbh | Transmission of carry-on objects using a wireless ad-hoc networking environment |
US20060215576A1 (en) * | 2005-01-05 | 2006-09-28 | International Business Machines Corporation | Switching between two communicaiton modes in a WLAN |
US20060217062A1 (en) * | 2003-09-23 | 2006-09-28 | Saffre Fabrice T P | Decentralized channel selection in a self-organizing adhoc network |
US7155518B2 (en) * | 2001-01-08 | 2006-12-26 | Interactive People Unplugged Ab | Extranet workgroup formation across multiple mobile virtual private networks |
US20070008902A1 (en) * | 2005-07-11 | 2007-01-11 | Saritha Yaramada | Managing negotiations of quality of service parameters in wireless networks |
US20070016262A1 (en) * | 2005-07-13 | 2007-01-18 | Betastim, Ltd. | Gi and pancreatic device for treating obesity and diabetes |
US7170878B2 (en) * | 2000-03-07 | 2007-01-30 | Sony Corporation | Communication device and communication method |
US20070042769A1 (en) * | 2005-08-17 | 2007-02-22 | Freescale Semiconductor, Inc. | Communications security management |
US20070076875A1 (en) * | 2005-10-05 | 2007-04-05 | Canon Kabushiki Kaisha | Wireless communication system and authentication method and communication control method in wireless communication system |
US20070111705A1 (en) * | 2004-04-30 | 2007-05-17 | Wenlin Zhang | Method for implementing roaming charging and system thereof |
US20070110009A1 (en) * | 2003-11-12 | 2007-05-17 | Matsushita Electric Industrial Co., Ltd. | Contex transfer in a communication network comprising plural heterogeneous access networks |
US20070149139A1 (en) * | 2004-06-10 | 2007-06-28 | Jean-Louis Gauvreau | Wireless Network System with Energy Management |
US7254119B2 (en) * | 2002-05-28 | 2007-08-07 | Zte San Diego, Inc. | Interworking mechanism between CDMA2000 and WLAN |
US7266383B2 (en) * | 2005-02-14 | 2007-09-04 | Scenera Technologies, Llc | Group interaction modes for mobile devices |
US7266374B2 (en) * | 2003-07-22 | 2007-09-04 | Samsung Electronics Co., Ltd. | Communication system and method in wireless infrastructure network environments |
US20070206527A1 (en) * | 2006-03-01 | 2007-09-06 | Yuan-Chang Lo | Virtual access point for configuration of a LAN |
US20070220219A1 (en) * | 2006-03-16 | 2007-09-20 | International Business Machines Corporation | System and method for optimizing data in value-based storage system |
US20070223408A1 (en) * | 2003-10-06 | 2007-09-27 | Broadbeam Corporation | Method and Apparatus for Intelligent Seamless Network Switching |
US20070253376A1 (en) * | 2006-04-28 | 2007-11-01 | Motorola, Inc. | Method and system for providing cellular assisted secure communications of a plurality of ad hoc devices |
US20080040481A1 (en) * | 2006-08-11 | 2008-02-14 | Motorola, Inc. | Method and system for compensation in ad hoc networks |
US20080049689A1 (en) * | 2006-08-23 | 2008-02-28 | Motorola, Inc. | Tunneling data to multiple wireless networks from device without connectivity through employment of device with connectivity |
US7339915B2 (en) * | 2005-10-11 | 2008-03-04 | Cisco Technology, Inc. | Virtual LAN override in a multiple BSSID mode of operation |
US7346167B2 (en) * | 2002-05-10 | 2008-03-18 | Harris Corporation | Secure mobile ad-hoc network and related methods |
US20080069105A1 (en) * | 2004-06-24 | 2008-03-20 | Telecom Italia S.P.A. | Method and System for Controlling Access to Communication Networks, Related Network and Computer Program Therefor |
US20080080387A1 (en) * | 2006-10-02 | 2008-04-03 | Tropos Networks, Inc. | Probe response determination |
US20080089288A1 (en) * | 2006-10-12 | 2008-04-17 | Bellsouth Intellectual Property Corporation | Methods, systems, and computer program products for providing advertising and/or information services over mobile ad hoc cooperative networks using electronic billboards and related devices |
US7362731B2 (en) * | 2004-03-23 | 2008-04-22 | Nokia Corporation | Selection of network access entity in a communication system |
US7363050B2 (en) * | 2005-02-01 | 2008-04-22 | Fujitsu Limited | Mobile station, base station, and wireless communication system |
US20080095134A1 (en) * | 2006-10-23 | 2008-04-24 | Wai Chen | Roadside network unit and method of organizing, managing and maintaining local network using local peer groups as network groups |
US20080112355A1 (en) * | 2006-11-09 | 2008-05-15 | Avaya Technology Llc | Multi-Hop Ad-hoc Wireless Networks That Support Non-Multi-Hop Wireless Terminals |
US20080112362A1 (en) * | 2006-11-10 | 2008-05-15 | Motorola, Inc. | Ip layer-handoff using mobility domains and ip caching |
US20080139239A1 (en) * | 2006-12-11 | 2008-06-12 | O'connor Dennis M | Techniques to share multimedia and enable cellular phone conference calling using ad-hoc wireless networks |
US20080146232A1 (en) * | 2006-12-19 | 2008-06-19 | Douglas Norman Knisely | Neighbor list provision in a communication network |
US7394826B2 (en) * | 2003-09-09 | 2008-07-01 | Harris Corporation | Mobile ad hoc network (MANET) providing quality-of-service (QoS) based unicast and multicast features |
US20080165735A1 (en) * | 2007-01-05 | 2008-07-10 | Jen-Jee Chen | Handoff method of mobile device utilizing dynamic tunnel |
US7408929B2 (en) * | 2001-09-28 | 2008-08-05 | Kabushiki Kaisha Toshiba | Radio communication system, terminal and packet |
US20080192666A1 (en) * | 2007-02-12 | 2008-08-14 | Motorola, Inc. | Method and system for dynamically utilizing a peer network to extend battery life |
US7420952B2 (en) * | 2002-10-28 | 2008-09-02 | Mesh Dynamics, Inc. | High performance wireless networks using distributed control |
US7486651B2 (en) * | 2004-03-02 | 2009-02-03 | Ntt Docomo, Inc. | Mobile node, an ad hoc network routing controlling method and an ad hoc network system |
US20090047966A1 (en) * | 2007-08-17 | 2009-02-19 | Qualcomm Incorporated | Method for a heterogeneous wireless ad hoc mobile internet access service |
US20090046644A1 (en) * | 2007-08-17 | 2009-02-19 | Qualcomm Incorporated | Service set manager for ad hoc mobile service provider |
US20090046598A1 (en) * | 2007-08-17 | 2009-02-19 | Qualcomm Incorporated | System and method for acquiring or distributing information related to one or more alternate ad hoc service providers |
US7496363B2 (en) * | 2003-12-17 | 2009-02-24 | Motorola, Inc. | Method of changing access point for a mobile node in a wireless access network |
US7519071B2 (en) * | 2002-09-20 | 2009-04-14 | Cisco Technology, Inc. | Arrangement in a gateway for registering mobile routers of a mobile AD HOC network to respective home agents |
US20090125429A1 (en) * | 1997-08-13 | 2009-05-14 | Matsushita Electric Industrial Co., Ltd. | Mobile electronic commerce system |
US7551576B2 (en) * | 2001-02-06 | 2009-06-23 | Nokia Corporation | Access system for an access network |
US7552234B2 (en) * | 2003-02-11 | 2009-06-23 | Cisco Technology, Inc. | Arrangement for establishing a bidirectional tunnel between a mobile router and a correspondent node |
US20090172391A1 (en) * | 2004-06-30 | 2009-07-02 | Matsushita Electric Industrial Co., Ltd. | Communication handover method, communication message processing method, and communication control method |
US7573904B2 (en) * | 2002-06-24 | 2009-08-11 | Nokia Corporation | Ad hoc networking of terminals aided by a cellular network |
US7664049B1 (en) * | 1999-09-29 | 2010-02-16 | Nokia Corporation | Multilayer telecommunications network |
US7680079B2 (en) * | 2004-11-04 | 2010-03-16 | Samsung Electronics Co., Ltd. | Method of signaling QoS information at hand-over between access networks in an IP-based core network |
US20100202428A1 (en) * | 2000-04-18 | 2010-08-12 | Cisco Technology, Inc. | System and Method for Concurrently Utilizing Multiple System Identifiers |
US7881474B2 (en) * | 2006-07-17 | 2011-02-01 | Nortel Networks Limited | System and method for secure wireless multi-hop network formation |
US20110039566A1 (en) * | 2007-08-27 | 2011-02-17 | Telefonaktiebolaget Lm Ericsson (Publ) | method and a network control node for bandwidth and access control in femto cells of a wireless system |
US7903817B2 (en) * | 2006-03-02 | 2011-03-08 | Cisco Technology, Inc. | System and method for wireless network profile provisioning |
US7929460B2 (en) * | 2006-09-14 | 2011-04-19 | Vanu, Inc. | Communication network topology determination |
US7933247B2 (en) * | 2004-11-18 | 2011-04-26 | Sanjay M. Gidwani | Real-time scalable wireless switching network |
US20110183685A1 (en) * | 2010-01-20 | 2011-07-28 | Airpatrol Corporation | Multi-band radio frequency detection and location system |
US8014368B2 (en) * | 2005-02-01 | 2011-09-06 | Samsung Electronics Co., Ltd. | Gateway for interconnecting ad-hoc network and infrastructure network, and methods for discovering and registering service provider using gateway |
US8717931B2 (en) * | 2004-11-05 | 2014-05-06 | Toshiba America Research, Inc. | Network discovery mechanisms |
US20140241296A1 (en) * | 2002-05-14 | 2014-08-28 | Genghiscomm Holdings, LLC | Cooperative Wireless Networks |
Family Cites Families (173)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5263121A (en) | 1991-09-12 | 1993-11-16 | Tellabs, Inc. | Neural network solution for interconnection apparatus |
US5734699A (en) | 1995-05-04 | 1998-03-31 | Interwave Communications International, Ltd. | Cellular private branch exchanges |
US6081536A (en) | 1997-06-20 | 2000-06-27 | Tantivy Communications, Inc. | Dynamic bandwidth allocation to transmit a wireless protocol across a code division multiple access (CDMA) radio link |
US6240073B1 (en) | 1997-11-14 | 2001-05-29 | Shiron Satellite Communications (1996) Ltd. | Reverse link for a satellite communication network |
GB2337414A (en) | 1998-05-14 | 1999-11-17 | Fujitsu Ltd | Soft handoff in cellular communications networks |
JP3757642B2 (en) | 1998-09-29 | 2006-03-22 | 富士電機機器制御株式会社 | Wireless communication network system |
US6275712B1 (en) * | 1999-02-26 | 2001-08-14 | Nokia Mobile Phones Ltd | Mobile station control states based on available power |
SE514264C2 (en) | 1999-05-07 | 2001-01-29 | Ericsson Telefon Ab L M | A communication system |
US7023800B1 (en) | 1999-06-01 | 2006-04-04 | Microsoft Corporation | Congestion avoidance within aggregate channels |
US6377805B1 (en) | 1999-08-04 | 2002-04-23 | International Business Machines Corporation | Maintaining data communication through neighboring mobile units during handoff |
US6954739B1 (en) * | 1999-11-16 | 2005-10-11 | Lucent Technologies Inc. | Measurement-based management method for packet communication networks |
US6895558B1 (en) | 2000-02-11 | 2005-05-17 | Microsoft Corporation | Multi-access mode electronic personal assistant |
US7028186B1 (en) | 2000-02-11 | 2006-04-11 | Nokia, Inc. | Key management methods for wireless LANs |
US6650900B1 (en) | 2000-02-29 | 2003-11-18 | Avaya Technology Corp. | Dynamic logical coverage areas for wireless base stations |
WO2001099053A2 (en) | 2000-06-19 | 2001-12-27 | Emt As | Method and system for organizing the payment of parking services |
EE00315U1 (en) | 2001-02-01 | 2002-07-15 | As Emt | Paid parking method |
US6970422B1 (en) | 2000-07-14 | 2005-11-29 | At&T Corp. | Admission control for QoS-Driven Wireless LANs |
US7505451B2 (en) | 2000-10-05 | 2009-03-17 | Sony Corporation | Usage-based charging device and usage-based charging method |
US7072650B2 (en) | 2000-11-13 | 2006-07-04 | Meshnetworks, Inc. | Ad hoc peer-to-peer mobile radio access system interfaced to the PSTN and cellular networks |
KR100375825B1 (en) * | 2000-12-22 | 2003-03-15 | 한국전자통신연구원 | Hard Handoff Method for Packet Mobile Network |
JP4050001B2 (en) | 2001-02-09 | 2008-02-20 | 株式会社 リーテック | Gas-fired hair dryer |
US6882677B2 (en) | 2001-02-28 | 2005-04-19 | Motorola, Inc. | Method and apparatus for facilitating handoff in a wireless local area network |
JP3858746B2 (en) | 2001-05-08 | 2006-12-20 | ソニー株式会社 | Wireless communication system, wireless communication control device, wireless communication control method, and computer program |
US6826154B2 (en) | 2001-05-24 | 2004-11-30 | 3Com Corporation | Method and apparatus for seamless mobility between different access technologies |
US6678517B2 (en) | 2001-06-21 | 2004-01-13 | Spatial Wireless, Inc. | Method and system for providing continuous voice and packet data services to a mobile station |
US20030068975A1 (en) * | 2001-08-06 | 2003-04-10 | The Research Foundation Of Suny | Integrated cellular and ad hoc relaying system |
US7295532B2 (en) | 2001-08-17 | 2007-11-13 | Ixi Mobile (R & D), Ltd. | System, device and computer readable medium for providing networking services on a mobile device |
JP4230683B2 (en) | 2001-08-28 | 2009-02-25 | 株式会社エヌ・ティ・ティ・ドコモ | Security judgment method and security judgment device |
US20040171386A1 (en) | 2001-09-04 | 2004-09-02 | Enric Mitjana | Method for identifying a station with specific functions in a wireless-based ad-hoc network, and a substation for carrying out the method |
EP1289200A1 (en) | 2001-09-04 | 2003-03-05 | Siemens Aktiengesellschaft | Identification procedure for a station with particular functionality in a radio ad-hoc network and network terminal for carrying out such a procedure |
US8014305B1 (en) | 2001-09-07 | 2011-09-06 | Qualcomm Atheros, Inc. | Wireless LAN using transmission monitoring |
JP2003101553A (en) | 2001-09-20 | 2003-04-04 | Canon Inc | Device and system for wireless communication, communication connecting method, program and storage medium |
RU2206177C1 (en) | 2001-10-08 | 2003-06-10 | Уральский государственный университет путей сообщения | Carry-on communication network of train |
US7545754B2 (en) | 2001-11-02 | 2009-06-09 | Ntt Docomo, Inc. | Geographically adjacent access router discovery and caching for mobile nodes |
US7684798B2 (en) | 2001-11-09 | 2010-03-23 | Nokia Corporation | Method of pre-authorizing handovers among access routers in communication networks |
AU2002353270A1 (en) | 2001-12-03 | 2003-06-17 | Nokia Corporation | Policy based mechanisms for selecting access routers and mobile context |
US7408928B2 (en) * | 2001-12-21 | 2008-08-05 | Nortel Networks Limited | Methods and apparatus for setting up telephony connections between two address domains having overlapping address ranges |
RU2192049C1 (en) | 2001-12-26 | 2002-10-27 | Гаврилов Сергей Анатольевич | Method for distributing publicity information messages |
US7206293B2 (en) | 2001-12-28 | 2007-04-17 | Arraycomm Llc | System and related methods for beamforming in a multi-point communications environment |
US6947772B2 (en) | 2002-01-31 | 2005-09-20 | Qualcomm Incorporated | System and method for providing messages on a wireless device connecting to an application server |
JP2003230167A (en) | 2002-02-04 | 2003-08-15 | Ntt Docomo Inc | Mobile communication terminal and connection method possible to connect with ad hoc network |
DE10208689C2 (en) | 2002-02-28 | 2003-11-27 | Deutsch Zentr Luft & Raumfahrt | Method for connecting user terminals serving for communication and belonging to a collectively mobile user network |
EP1484935B1 (en) | 2002-03-13 | 2011-05-11 | Mitsubishi Electric Corporation | Radio area network control system and wide radio area network control system |
US8432893B2 (en) | 2002-03-26 | 2013-04-30 | Interdigital Technology Corporation | RLAN wireless telecommunication system with RAN IP gateway and methods |
US7161914B2 (en) | 2002-04-11 | 2007-01-09 | Ntt Docomo, Inc. | Context aware application level triggering mechanism for pre-authentication, service adaptation, pre-caching and handover in a heterogeneous network environment |
US6704584B2 (en) | 2002-04-16 | 2004-03-09 | Thomson Licensing S.A. | Mechanism for a wireless device to relinquish its network master status based on its power reserve |
US8923191B2 (en) | 2002-04-17 | 2014-12-30 | Northrop Grumman Systems Corporation | Internet protocol collaborative mobility |
JP3712381B2 (en) | 2002-04-18 | 2005-11-02 | 富士通株式会社 | Push distribution service providing method, information providing service system, server system, and user terminal |
US6941332B2 (en) | 2002-04-23 | 2005-09-06 | Medtronic, Inc. | Implantable medical device fast median filter |
JP2003324443A (en) | 2002-04-26 | 2003-11-14 | Toshiba Corp | Ad hoc network system, ad hoc network communication method and radio terminal equipment |
US6954435B2 (en) | 2002-04-29 | 2005-10-11 | Harris Corporation | Determining quality of service (QoS) routing for mobile ad hoc networks |
GB2388276B (en) | 2002-05-04 | 2004-06-30 | Motorola Inc | A wireless communicaton system, a wireless communication device and method of monitoring therefor |
US20030212802A1 (en) * | 2002-05-09 | 2003-11-13 | Gateway, Inc. | Proximity network encryption and setup |
US7340253B2 (en) | 2002-06-10 | 2008-03-04 | Lucent Technologies Inc. | IP-based distributed wireless access network architecture for CDMA networks |
US7203183B2 (en) | 2002-06-26 | 2007-04-10 | International Business Machines Corporation | Access point initiated forced roaming based upon bandwidth |
US7444152B2 (en) * | 2002-06-28 | 2008-10-28 | Nokia Corporation | Signaling and routing protocols for an integrated cellular and relaying system |
DE60210177T2 (en) | 2002-08-14 | 2006-12-28 | Sony Deutschland Gmbh | Bandwidth-oriented reconfiguration of ad hoc wireless networks |
US7006481B2 (en) | 2002-10-10 | 2006-02-28 | Interdigital Technology Corporation | System and method for integrating WLAN and 3G |
JP3779673B2 (en) | 2002-10-30 | 2006-05-31 | 株式会社東芝 | Relay device and communication system |
EP1563641A1 (en) | 2002-11-06 | 2005-08-17 | Koninklijke Philips Electronics N.V. | Mobile ad-hoc internet sharing |
CN1711796A (en) | 2002-11-20 | 2005-12-21 | 国际商业机器公司 | Managing network resources for wireless communication |
US7797434B2 (en) | 2002-12-31 | 2010-09-14 | International Business Machines Corporation | Method and system for user-determind attribute storage in a federated environment |
FI114126B (en) | 2002-12-31 | 2004-08-13 | Vioteq Oy | Wireless LAN Management |
GB0303471D0 (en) | 2003-02-14 | 2003-03-19 | Toshiba Res Europ Ltd | Improved communication network for indoor environment |
JP3925425B2 (en) | 2003-02-18 | 2007-06-06 | Kddi株式会社 | Wireless multi-hop network configuration method |
JP4098645B2 (en) | 2003-02-28 | 2008-06-11 | 株式会社リコー | Wireless LAN system and wireless LAN communication method |
US7512783B2 (en) | 2003-03-14 | 2009-03-31 | Naghian Siamaek | Provision of security services for an ad-hoc network |
US7349338B2 (en) | 2003-04-15 | 2008-03-25 | Lucent Technologies Inc | Scheduler and method for scheduling transmissions in a communication network |
US7313363B2 (en) | 2003-05-08 | 2007-12-25 | M/A-Com, Inc. | Activation method for wireless communication system |
US20040235452A1 (en) | 2003-05-22 | 2004-11-25 | Fischer Michael Andrew | Network access point for providing multiple levels of security |
US7212514B2 (en) | 2003-05-29 | 2007-05-01 | Matsushita Electric Industrial Co., Ltd. | Mobile communication device containable in ad hoc network |
US7577108B2 (en) | 2003-06-03 | 2009-08-18 | Palo Alto Research Center Incorporated | Learning-based strategies for message-initiated constraint-based routing |
US7406313B2 (en) | 2003-06-25 | 2008-07-29 | International Business Machines Corporation | Systems, methods and computer program products for connecting ad hoc piconets to wide area networks |
KR100547133B1 (en) | 2003-07-11 | 2006-01-26 | 삼성전자주식회사 | Apparatus and method for constructing ad-hoc network of heterogeneous terminals |
DE10334582A1 (en) * | 2003-07-28 | 2005-02-24 | Basf Ag | Maleic anhydride production by VPO-catalyzed gas-phase oxidation of n- butane involves setting the n-butane and oxygen content levels in a pressure- controlled feed to reduce risk of explosions |
JP2005341290A (en) | 2004-05-27 | 2005-12-08 | Keio Gijuku | Communications system, and radio communications device |
EP1665640A1 (en) | 2003-09-09 | 2006-06-07 | Roamad Holdings Limited | Wireless networking system and method |
US6888808B2 (en) | 2003-09-15 | 2005-05-03 | Cisco Technology, Inc. | System and method for providing transparency in delivering private network features |
US20050058109A1 (en) | 2003-09-16 | 2005-03-17 | Jan-Erik Ekberg | Mechanism for improving connection control in peer-to-peer ad-hoc networks |
JP4578917B2 (en) | 2003-10-03 | 2010-11-10 | 富士通株式会社 | Apparatus, method and medium for self-organizing multi-hop radio access network |
JP2005123781A (en) | 2003-10-15 | 2005-05-12 | Sony Corp | Radio communication system, radio communication apparatus and method, radio communication managing apparatus and method, and computer program |
US7212810B2 (en) | 2003-10-17 | 2007-05-01 | Qualcomm Incorporated | System selection for wireless data services |
KR100567823B1 (en) * | 2003-10-22 | 2006-04-05 | 삼성전자주식회사 | Networking apparatus for stabile handoff in ip-based mobile ad-hoc network system and handoff method using the same |
GB2408173A (en) | 2003-11-13 | 2005-05-18 | Toshiba Res Europ Ltd | Use of communication terminal as a repeater. |
US7757076B2 (en) | 2003-12-08 | 2010-07-13 | Palo Alto Research Center Incorporated | Method and apparatus for using a secure credential infrastructure to access vehicle components |
JP2005176021A (en) | 2003-12-12 | 2005-06-30 | Toshiba Corp | Information processor and program |
US7049170B2 (en) * | 2003-12-17 | 2006-05-23 | Tru-Si Technologies, Inc. | Integrated circuits and packaging substrates with cavities, and attachment methods including insertion of protruding contact pads into cavities |
US7340014B2 (en) | 2003-12-31 | 2008-03-04 | Intel Corporation | Apparatus and method of multi-user detection |
JP2005204213A (en) | 2004-01-19 | 2005-07-28 | Toshiba Corp | Call arrival control method for mobile communication terminal, mobile communication terminal, and call arrival control system for same |
TWI249316B (en) | 2004-02-10 | 2006-02-11 | Ind Tech Res Inst | SIM-based authentication method for supporting inter-AP fast handover |
CA2457909A1 (en) | 2004-02-16 | 2005-08-16 | Christopher Davies | Method and system for self-organizing reliable, multiple path data flow transmission of data on a network |
US20050207416A1 (en) | 2004-03-16 | 2005-09-22 | Samsung Electronics Co. , Ltd. | Apparatus and method for deploying efficient broadcast multicast services in a wireless network |
JP2005275617A (en) * | 2004-03-23 | 2005-10-06 | Fujitsu Ltd | Service provision support method |
JP2005295310A (en) | 2004-04-01 | 2005-10-20 | Fuji Electric Holdings Co Ltd | Radio communication method, radio communication system, radio terminal, program and recording medium |
US8139520B2 (en) | 2004-05-03 | 2012-03-20 | Nokia Corporation | Method of preventing or limiting the number of simultaneous sessions in wireless local area network (WLAN) |
WO2005109693A1 (en) | 2004-05-07 | 2005-11-17 | Samsung Electronics Co., Ltd. | System and method for handover capable of minimizing service delay in broadband wireless access communication system |
KR100612496B1 (en) | 2004-05-11 | 2006-08-14 | 삼성전자주식회사 | Method for service discovery in Mobile Ad-hoc Network |
WO2005116841A1 (en) | 2004-05-26 | 2005-12-08 | Matsushita Electric Industrial Co., Ltd. | Network system and method for providing an ad-hoc access environment |
US7881267B2 (en) | 2004-06-04 | 2011-02-01 | Hewlett-Packard Development Company, L.P. | Portable computing device for wireless communications and method of operation |
JP2006013811A (en) | 2004-06-24 | 2006-01-12 | Matsushita Electric Ind Co Ltd | Information terminal |
JP4645939B2 (en) | 2004-07-22 | 2011-03-09 | 日本電気株式会社 | Mobile base station position determination system, terminal position determination system, mobile base station, radio terminal and base station position determination program |
CN1819536B (en) | 2004-07-28 | 2011-01-26 | 美国博通公司 | Method and apparatus of mobile handoff through multi-network simulcasting |
JP2006050224A (en) | 2004-08-04 | 2006-02-16 | Canon Inc | Wireless communication system |
EP1631000A1 (en) | 2004-08-31 | 2006-03-01 | Matsushita Electric Industrial Co., Ltd. | Deterministic feedback control for multicast or broadcast services |
JP2006074621A (en) | 2004-09-03 | 2006-03-16 | Oki Electric Ind Co Ltd | Communication system, communication terminal for relay, communication method, and communication program |
JP4460399B2 (en) | 2004-09-07 | 2010-05-12 | 株式会社エヌ・ティ・ティ・ドコモ | Mobile communication system and mobile communication terminal |
US7681474B2 (en) * | 2004-10-21 | 2010-03-23 | Continental Automotive Systems Us, Inc. | System for adjusting the pedals of a vehicle |
US7853204B2 (en) | 2004-10-21 | 2010-12-14 | Panasonic Corporation | Method and system for identifying a relay mobile station in a wireless communication network |
CN101084572A (en) | 2004-10-21 | 2007-12-05 | 卓越自动系统有限公司 | Singulating and de-tapping arrays of semiconductor packages |
CN1225942C (en) | 2004-11-04 | 2005-11-02 | 西安西电捷通无线网络通信有限公司 | Method of improving mobile terminal handover switching performance in radio IP system |
JP2006163793A (en) | 2004-12-07 | 2006-06-22 | Fuji Xerox Co Ltd | Radio communication system |
US7346341B2 (en) | 2004-12-10 | 2008-03-18 | Nokia Corporation | Providing mobile-specific services for mobile devices via ad-hoc networks |
KR100703726B1 (en) | 2004-12-11 | 2007-04-05 | 삼성전자주식회사 | Method for managing neighbor node and determining routing path in mobile ad hoc network, and network apparatus thereof |
US7532907B2 (en) | 2004-12-22 | 2009-05-12 | Sony Ericsson Mobile Communication Ab | Method of providing multiple data paths using a mobile terminal and related devices |
US20060143026A1 (en) | 2004-12-23 | 2006-06-29 | Srinivasan Jagannathan | Network usage analysis system using cost structure and revenue and method |
EP1677462A1 (en) | 2004-12-28 | 2006-07-05 | Eidgenössische Technische Hochschule Zürich | Service discovery in ad hoc networks |
JP4527553B2 (en) | 2005-01-17 | 2010-08-18 | Necインフロンティア株式会社 | Mobile communication terminal and user authentication method |
JP2006218580A (en) * | 2005-02-10 | 2006-08-24 | Smc Corp | Chuck for work holding and its control method |
EP1701486A1 (en) | 2005-03-07 | 2006-09-13 | BRITISH TELECOMMUNICATIONS public limited company | Route selection in multi-hop cellular network |
US8677125B2 (en) | 2005-03-31 | 2014-03-18 | Alcatel Lucent | Authenticating a user of a communication device to a wireless network to which the user is not associated with |
JP4630706B2 (en) | 2005-03-31 | 2011-02-09 | 富士通株式会社 | Service device, client device connection destination switching control method and program by service device |
US7433324B2 (en) | 2005-04-01 | 2008-10-07 | Microsoft Corporation | User experience for collaborative ad-hoc networks |
US7366111B2 (en) | 2005-04-08 | 2008-04-29 | Cisco Technology, Inc. | Arrangement for providing optimized connections between peer routers in a tree-based ad hoc mobile network |
US7619977B2 (en) * | 2005-04-08 | 2009-11-17 | The Boeing Company | Net-centric coordination channel (NCC) |
JP2006304005A (en) | 2005-04-21 | 2006-11-02 | Mitsubishi Electric Corp | Wireless lan internet telephone |
US7515909B2 (en) * | 2005-04-21 | 2009-04-07 | Qualcomm Incorporated | Wireless handoffs between multiple networks |
US20060248337A1 (en) | 2005-04-29 | 2006-11-02 | Nokia Corporation | Establishment of a secure communication |
JP4356647B2 (en) | 2005-05-09 | 2009-11-04 | ソニー株式会社 | Wireless communication system, access point management apparatus, access point management method, wireless communication apparatus, wireless communication method, and computer program |
KR100690762B1 (en) | 2005-05-10 | 2007-03-09 | 엘지전자 주식회사 | A telephone call method and system for using many number in mobile communication station |
WO2006124938A2 (en) | 2005-05-17 | 2006-11-23 | Rajant Corporation | System and method for communication in a wireless mobile ad-hoc network |
DE602005002259T2 (en) | 2005-06-30 | 2008-05-21 | Ntt Docomo Inc. | Apparatus and method for improved handoff in mesh networks |
TWI393414B (en) | 2005-07-06 | 2013-04-11 | Nokia Corp | Secure session keys context |
US8126477B2 (en) | 2005-07-07 | 2012-02-28 | Qualcomm Incorporated | Methods and devices for interworking of wireless wide area networks and wireless local area networks or wireless personal area networks |
JP2007036828A (en) | 2005-07-28 | 2007-02-08 | Oki Electric Ind Co Ltd | Communication control system and communication control method |
JP2007050553A (en) | 2005-08-15 | 2007-03-01 | Citizen Electronics Co Ltd | Gate system in injection mold |
US7903628B2 (en) | 2005-08-22 | 2011-03-08 | Qualcomm Incorporated | Configurable pilots in a wireless communication system |
CN1921418A (en) | 2005-08-23 | 2007-02-28 | 华为技术有限公司 | Method and device for checking independency of wireless local area network switch-in |
EP1761082B1 (en) | 2005-09-02 | 2018-06-13 | Nokia Solutions and Networks GmbH & Co. KG | Method and system to connect a second communication network having a connection node to a first communication network having a contact node |
JP2007074177A (en) | 2005-09-06 | 2007-03-22 | Hitachi Ltd | Mobile ad hoc network system |
JP4652934B2 (en) | 2005-09-07 | 2011-03-16 | 株式会社日立製作所 | Access point, communication system, and connection switching method |
CN1953406B (en) | 2005-10-19 | 2011-06-01 | 株式会社Ntt都科摩 | A method to access hybrid network and gateway equipment, wireless terminal and communication system |
AU2006309464B2 (en) | 2005-10-31 | 2009-10-29 | Lg Electronics Inc. | Method for processing control information in a wireless mobile communication system |
GB2433677A (en) | 2005-10-31 | 2007-06-27 | Israel Aircraft Ind Ltd | Medium access control (MAC) method and system for dynamic time slot allocation and QoS priority access in a mobile ad hoc network (MANET) |
JP4830451B2 (en) * | 2005-11-02 | 2011-12-07 | 日本電気株式会社 | Wireless line control system, centralized control apparatus, wireless line control method used therefor, and program thereof |
JP2007143066A (en) | 2005-11-22 | 2007-06-07 | Canon Inc | Imaging apparatus and key managing method |
EP1958345B1 (en) | 2005-11-29 | 2018-05-23 | Telefonaktiebolaget LM Ericsson (publ) | Scheduling in a wireless multi-hop relay network |
US20070174429A1 (en) | 2006-01-24 | 2007-07-26 | Citrix Systems, Inc. | Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment |
US7831027B2 (en) | 2006-01-25 | 2010-11-09 | Accenture Global Services Limited | Configurable charging system for a telecommunications service provider |
US20070201388A1 (en) | 2006-01-31 | 2007-08-30 | Qualcomm Incorporated | Methods and systems for resizing multimedia content based on quality and rate information |
WO2007091699A2 (en) | 2006-02-06 | 2007-08-16 | Matsushita Electric Industrial Co., Ltd. | Method, system and apparatus for indirect access by communication device |
JP4504934B2 (en) | 2006-02-28 | 2010-07-14 | 矢崎総業株式会社 | Vehicle display device |
US20070217433A1 (en) | 2006-03-14 | 2007-09-20 | Nokia Corporation | Apparatus, method and computer program product providing relay division multiple access |
WO2007149140A2 (en) * | 2006-03-30 | 2007-12-27 | Antlabs | System and method for providing transactional security for an end-user device |
US20070254614A1 (en) * | 2006-05-01 | 2007-11-01 | Infosys Technologies Ltd. | Secure wireless connections using ssid fields |
US7593378B1 (en) * | 2006-06-15 | 2009-09-22 | Redpine Signals, Inc. | SINR-based powerdown apparatus and method for a wireless communications systems |
KR100713626B1 (en) | 2006-06-19 | 2007-05-02 | 삼성전자주식회사 | Motile communication terminal for providing ad-hoc network service and method for managing ad-hoc network using the same |
JP4899696B2 (en) | 2006-07-31 | 2012-03-21 | 富士通株式会社 | Communication device, relay device, communication system, communication method, and communication program |
US8295225B2 (en) | 2006-09-08 | 2012-10-23 | Qualcomm Incorporated | Reverse link feedback for interference control in a wireless communication system |
US20080081606A1 (en) | 2006-09-29 | 2008-04-03 | Cole Terry L | Connection manager with branded connection notification |
US20080081623A1 (en) | 2006-09-29 | 2008-04-03 | Motorola, Inc. | Priority handoff based on battery charge level |
US20080095114A1 (en) | 2006-10-21 | 2008-04-24 | Toshiba America Research, Inc. | Key Caching, QoS and Multicast Extensions to Media-Independent Pre-Authentication |
US7924793B2 (en) | 2006-11-20 | 2011-04-12 | At&T Intellectual Property I, L.P. | Methods and apparatus to manage bandwidth in a wireless network |
US8204034B2 (en) | 2007-01-10 | 2012-06-19 | Motorola Solutions, Inc. | Method and device for transmitting data packets |
US10419360B2 (en) | 2007-05-31 | 2019-09-17 | International Business Machines Corporation | Market-driven variable price offerings for bandwidth-sharing ad hoc networks |
US20090073943A1 (en) | 2007-08-17 | 2009-03-19 | Qualcomm Incorporated | Heterogeneous wireless ad hoc network |
US20090047930A1 (en) * | 2007-08-17 | 2009-02-19 | Qualcomm Incorporated | Method for a heterogeneous wireless ad hoc mobile service provider |
US20090049158A1 (en) * | 2007-08-17 | 2009-02-19 | Qualcomm Incorporated | Ad hoc service provider topology |
US9392445B2 (en) * | 2007-08-17 | 2016-07-12 | Qualcomm Incorporated | Handoff at an ad-hoc mobile service provider |
US9398453B2 (en) | 2007-08-17 | 2016-07-19 | Qualcomm Incorporated | Ad hoc service provider's ability to provide service for a wireless network |
PT2236000E (en) | 2008-01-22 | 2015-12-04 | Savox Comm Oy Ab Ltd | An arrangement and method for connecting an ad-hoc communication network to a permanent communication network via a half-duplex communication link |
WO2010000870A1 (en) | 2008-07-04 | 2010-01-07 | Telespazio S.P.A. | Identification and analysis of persistent scatterers in series of sar images |
US8270975B2 (en) * | 2009-01-05 | 2012-09-18 | Intel Corporation | Method of managing network traffic within a wireless network |
US9179367B2 (en) | 2009-05-26 | 2015-11-03 | Qualcomm Incorporated | Maximizing service provider utility in a heterogeneous wireless ad-hoc network |
-
2007
- 2007-09-26 US US11/861,279 patent/US9398453B2/en active Active
- 2007-09-26 US US11/861,280 patent/US8644206B2/en not_active Expired - Fee Related
-
2008
- 2008-08-08 US US12/189,008 patent/US20090046861A1/en not_active Abandoned
- 2008-08-12 KR KR1020107005898A patent/KR101163001B1/en not_active IP Right Cessation
- 2008-08-12 BR BRPI0815220 patent/BRPI0815220A2/en not_active IP Right Cessation
- 2008-08-12 CA CA2694665A patent/CA2694665A1/en not_active Abandoned
- 2008-08-12 WO PCT/US2008/072866 patent/WO2009026034A1/en active Application Filing
- 2008-08-12 BR BRPI0815219 patent/BRPI0815219A2/en active Search and Examination
- 2008-08-12 RU RU2010109919/08A patent/RU2010109919A/en not_active Application Discontinuation
- 2008-08-12 CA CA2694675A patent/CA2694675C/en active Active
- 2008-08-12 RU RU2010109865/07A patent/RU2454035C2/en not_active IP Right Cessation
- 2008-08-12 JP JP2010521926A patent/JP5313247B2/en not_active Expired - Fee Related
- 2008-08-12 WO PCT/US2008/072863 patent/WO2009026033A1/en active Application Filing
- 2008-08-12 AU AU2008289290A patent/AU2008289290A1/en not_active Abandoned
- 2008-08-12 CN CN200880102986.6A patent/CN101779497B/en not_active Expired - Fee Related
- 2008-08-12 CN CN200880102751.7A patent/CN101779484B/en not_active Expired - Fee Related
- 2008-08-12 BR BRPI0814259-9A2A patent/BRPI0814259A2/en not_active IP Right Cessation
- 2008-08-12 KR KR1020107005919A patent/KR101230330B1/en not_active IP Right Cessation
- 2008-08-12 MX MX2010001899A patent/MX2010001899A/en not_active Application Discontinuation
- 2008-08-12 AU AU2008289289A patent/AU2008289289A1/en not_active Abandoned
- 2008-08-12 MX MX2010001892A patent/MX2010001892A/en not_active Application Discontinuation
- 2008-08-12 JP JP2010521925A patent/JP5048837B2/en not_active Expired - Fee Related
- 2008-08-13 UA UAA201003021A patent/UA94348C2/en unknown
- 2008-08-14 RU RU2010109903/08A patent/RU2010109903A/en unknown
- 2008-08-15 TW TW097131329A patent/TWI419512B/en not_active IP Right Cessation
- 2008-08-15 WO PCT/US2008/073321 patent/WO2009026154A1/en active Application Filing
- 2008-08-15 UA UAA201002976A patent/UA94347C2/en unknown
- 2008-08-15 TW TW097131335A patent/TW200924419A/en unknown
- 2008-08-15 TW TW097131373A patent/TW200924465A/en unknown
- 2008-08-15 BR BRPI0814946-1A2A patent/BRPI0814946A2/en not_active IP Right Cessation
- 2008-08-15 CN CN200880102987A patent/CN101779481A/en active Pending
- 2008-08-15 JP JP2010521946A patent/JP2010537572A/en active Pending
- 2008-08-15 EP EP08827626A patent/EP2189019A1/en not_active Withdrawn
- 2008-08-15 MX MX2010001891A patent/MX2010001891A/en not_active Application Discontinuation
- 2008-08-15 AU AU2008289174A patent/AU2008289174A1/en not_active Abandoned
- 2008-08-15 KR KR1020107005907A patent/KR20100055487A/en not_active Application Discontinuation
- 2008-08-15 CA CA2695349A patent/CA2695349A1/en not_active Abandoned
- 2008-08-15 RU RU2010109888/08A patent/RU2010109888A/en not_active Application Discontinuation
-
2011
- 2011-10-10 US US13/270,138 patent/US9167426B2/en not_active Expired - Fee Related
Patent Citations (103)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5301359A (en) * | 1989-04-27 | 1994-04-05 | Motorola, Inc. | Bulletin board resource for communication system access |
US6125185A (en) * | 1997-05-27 | 2000-09-26 | Cybercash, Inc. | System and method for encryption key generation |
US20090125429A1 (en) * | 1997-08-13 | 2009-05-14 | Matsushita Electric Industrial Co., Ltd. | Mobile electronic commerce system |
US6295453B1 (en) * | 1998-10-07 | 2001-09-25 | Telefonaktiebolaget Lm Ericsson (Publ) | Multi-full rate channel assignment for a cellular telephone system |
US7089417B2 (en) * | 1998-10-16 | 2006-08-08 | Tecsec, Inc. | Cryptographic information and flow control |
US7664049B1 (en) * | 1999-09-29 | 2010-02-16 | Nokia Corporation | Multilayer telecommunications network |
US20010024443A1 (en) * | 1999-12-20 | 2001-09-27 | Fredrik Alriksson | Mobile IP for mobile Ad Hoc networks |
US6871071B2 (en) * | 1999-12-28 | 2005-03-22 | Ntt Docomo, Inc. | Handover control method and system |
US20010012757A1 (en) * | 2000-02-03 | 2001-08-09 | U.S. Philips Corporation | Ad-hoc radio communication system |
US7170878B2 (en) * | 2000-03-07 | 2007-01-30 | Sony Corporation | Communication device and communication method |
US20100202428A1 (en) * | 2000-04-18 | 2010-08-12 | Cisco Technology, Inc. | System and Method for Concurrently Utilizing Multiple System Identifiers |
US20030095504A1 (en) * | 2000-09-12 | 2003-05-22 | Ogier Richard G. | Reduced-overhead protocol for discovering new neighbor nodes and detecting the loss of existing neighbor nodes in a network |
US20020039367A1 (en) * | 2000-09-29 | 2002-04-04 | Jukka Seppala | Selection of serving network element in telecommunications network |
US7110372B2 (en) * | 2000-11-17 | 2006-09-19 | Sony Deutschland Gmbh | Transmission of carry-on objects using a wireless ad-hoc networking environment |
US20040029528A1 (en) * | 2000-11-28 | 2004-02-12 | Chandler Stephen Anthony Gerard | Routing algorithm for distributed telecommunication networks |
US20020082738A1 (en) * | 2000-12-27 | 2002-06-27 | Insyst Ltd. | Method for global automated process control |
US20040008663A1 (en) * | 2000-12-29 | 2004-01-15 | Devabhaktuni Srikrishna | Selection of routing paths based upon path quality of a wireless mesh network |
US7155518B2 (en) * | 2001-01-08 | 2006-12-26 | Interactive People Unplugged Ab | Extranet workgroup formation across multiple mobile virtual private networks |
US7551576B2 (en) * | 2001-02-06 | 2009-06-23 | Nokia Corporation | Access system for an access network |
US20020138635A1 (en) * | 2001-03-26 | 2002-09-26 | Nec Usa, Inc. | Multi-ISP controlled access to IP networks, based on third-party operated untrusted access stations |
US20030103521A1 (en) * | 2001-06-18 | 2003-06-05 | Itran Communications Ltd. | Channel access method for powerline carrier based media access control protocol |
US20050088980A1 (en) * | 2001-06-27 | 2005-04-28 | Mikko Olkkonen | Ad hoc network discovery menu |
US20030054796A1 (en) * | 2001-09-17 | 2003-03-20 | Hitachi, Ltd. | Charging method and terminal equipment in the information and communication network system |
US7408929B2 (en) * | 2001-09-28 | 2008-08-05 | Kabushiki Kaisha Toshiba | Radio communication system, terminal and packet |
US20030157951A1 (en) * | 2002-02-20 | 2003-08-21 | Hasty William V. | System and method for routing 802.11 data traffic across channels to increase ad-hoc network capacity |
US7346167B2 (en) * | 2002-05-10 | 2008-03-18 | Harris Corporation | Secure mobile ad-hoc network and related methods |
US20140241296A1 (en) * | 2002-05-14 | 2014-08-28 | Genghiscomm Holdings, LLC | Cooperative Wireless Networks |
US7254119B2 (en) * | 2002-05-28 | 2007-08-07 | Zte San Diego, Inc. | Interworking mechanism between CDMA2000 and WLAN |
US20050094588A1 (en) * | 2002-06-12 | 2005-05-05 | Globespan Virata Incorporated | Direct link relay in a wireless network |
US7649872B2 (en) * | 2002-06-24 | 2010-01-19 | Nokia Corporation | Mobile mesh Ad-Hoc networking |
US7573904B2 (en) * | 2002-06-24 | 2009-08-11 | Nokia Corporation | Ad hoc networking of terminals aided by a cellular network |
US6879574B2 (en) * | 2002-06-24 | 2005-04-12 | Nokia Corporation | Mobile mesh Ad-Hoc networking |
US20040203787A1 (en) * | 2002-06-28 | 2004-10-14 | Siamak Naghian | System and method for reverse handover in mobile mesh Ad-Hoc networks |
US20040001442A1 (en) * | 2002-06-28 | 2004-01-01 | Rayment Stephen G. | Integrated wireless distribution and mesh backhaul networks |
US6735417B2 (en) * | 2002-08-15 | 2004-05-11 | Motorola, Inc. | Method and apparatus for relaying information in an AD-HOC network |
US20060007863A1 (en) * | 2002-09-05 | 2006-01-12 | Siamak Naghian | Signal propagation delay routing |
US7519071B2 (en) * | 2002-09-20 | 2009-04-14 | Cisco Technology, Inc. | Arrangement in a gateway for registering mobile routers of a mobile AD HOC network to respective home agents |
US20040068668A1 (en) * | 2002-10-08 | 2004-04-08 | Broadcom Corporation | Enterprise wireless local area network switching system |
US7420952B2 (en) * | 2002-10-28 | 2008-09-02 | Mesh Dynamics, Inc. | High performance wireless networks using distributed control |
US7003117B2 (en) * | 2003-02-05 | 2006-02-21 | Voltage Security, Inc. | Identity-based encryption system for secure data distribution |
US7552234B2 (en) * | 2003-02-11 | 2009-06-23 | Cisco Technology, Inc. | Arrangement for establishing a bidirectional tunnel between a mobile router and a correspondent node |
US20040174822A1 (en) * | 2003-03-05 | 2004-09-09 | Bui Thomas T. | Systems and methods for providing collaboration between systems |
US7266374B2 (en) * | 2003-07-22 | 2007-09-04 | Samsung Electronics Co., Ltd. | Communication system and method in wireless infrastructure network environments |
US7394826B2 (en) * | 2003-09-09 | 2008-07-01 | Harris Corporation | Mobile ad hoc network (MANET) providing quality-of-service (QoS) based unicast and multicast features |
US20050053005A1 (en) * | 2003-09-09 | 2005-03-10 | Harris Corporation | Mobile ad hoc network (MANET) providing connectivity enhancement features and related methods |
US20060217062A1 (en) * | 2003-09-23 | 2006-09-28 | Saffre Fabrice T P | Decentralized channel selection in a self-organizing adhoc network |
US20070223408A1 (en) * | 2003-10-06 | 2007-09-27 | Broadbeam Corporation | Method and Apparatus for Intelligent Seamless Network Switching |
US20070110009A1 (en) * | 2003-11-12 | 2007-05-17 | Matsushita Electric Industrial Co., Ltd. | Contex transfer in a communication network comprising plural heterogeneous access networks |
US20050108527A1 (en) * | 2003-11-13 | 2005-05-19 | Boris Ginzburg | Method and apparatus to provide secured link |
US7496363B2 (en) * | 2003-12-17 | 2009-02-24 | Motorola, Inc. | Method of changing access point for a mobile node in a wireless access network |
US20050136834A1 (en) * | 2003-12-19 | 2005-06-23 | Motorola, Inc. | Communication system with adopted remote identity |
US20050138671A1 (en) * | 2003-12-22 | 2005-06-23 | Love Robert T. | Apparatus and method for adaptive broadcast transmission |
US20060114850A1 (en) * | 2004-01-13 | 2006-06-01 | Joshi Avinash | System and method for achieving continuous connectivity to an access point or gateway in a wireless network following an on-demand routing protocol, and to perform smooth handoff of mobile terminals between fixed terminals in the network |
US7046647B2 (en) * | 2004-01-22 | 2006-05-16 | Toshiba America Research, Inc. | Mobility architecture using pre-authentication, pre-configuration and/or virtual soft-handoff |
US20050197098A1 (en) * | 2004-03-02 | 2005-09-08 | Nokia Corporation | Method and apparatus to provide charging for ad-hoc service provisioning between trusted parties and between untrusted parties |
US7486651B2 (en) * | 2004-03-02 | 2009-02-03 | Ntt Docomo, Inc. | Mobile node, an ad hoc network routing controlling method and an ad hoc network system |
US7362731B2 (en) * | 2004-03-23 | 2008-04-22 | Nokia Corporation | Selection of network access entity in a communication system |
US20070111705A1 (en) * | 2004-04-30 | 2007-05-17 | Wenlin Zhang | Method for implementing roaming charging and system thereof |
US20070149139A1 (en) * | 2004-06-10 | 2007-06-28 | Jean-Louis Gauvreau | Wireless Network System with Energy Management |
US20080069105A1 (en) * | 2004-06-24 | 2008-03-20 | Telecom Italia S.P.A. | Method and System for Controlling Access to Communication Networks, Related Network and Computer Program Therefor |
US20090172391A1 (en) * | 2004-06-30 | 2009-07-02 | Matsushita Electric Industrial Co., Ltd. | Communication handover method, communication message processing method, and communication control method |
US20060005008A1 (en) * | 2004-07-02 | 2006-01-05 | Wen-Hung Kao | Security gateway utilizing ssl protocol protection and related method |
US20060056368A1 (en) * | 2004-09-10 | 2006-03-16 | Nivis, Llc | System and method for a wireless mesh network of configurable signage |
US20060064589A1 (en) * | 2004-09-17 | 2006-03-23 | Fujitsu Limited | Setting information distribution apparatus, method, program, medium, and setting information reception program |
US20060101400A1 (en) * | 2004-10-14 | 2006-05-11 | International Business Machines Corporation | Apparatus and methods for performing computer system maintenance and notification activities in an opportunistic manner |
US20060092939A1 (en) * | 2004-10-29 | 2006-05-04 | Samsung Electronics Co., Ltd. | Apparatus and method for extending mobility in a mobile ad hoc network |
US7680079B2 (en) * | 2004-11-04 | 2010-03-16 | Samsung Electronics Co., Ltd. | Method of signaling QoS information at hand-over between access networks in an IP-based core network |
US8717931B2 (en) * | 2004-11-05 | 2014-05-06 | Toshiba America Research, Inc. | Network discovery mechanisms |
US20060098598A1 (en) * | 2004-11-10 | 2006-05-11 | Michael Gallagher | Seamless transitions of active calls between enterprise telecommunications networks and licensed public telecommunications networks |
US7933247B2 (en) * | 2004-11-18 | 2011-04-26 | Sanjay M. Gidwani | Real-time scalable wireless switching network |
US20060215576A1 (en) * | 2005-01-05 | 2006-09-28 | International Business Machines Corporation | Switching between two communicaiton modes in a WLAN |
US7363050B2 (en) * | 2005-02-01 | 2008-04-22 | Fujitsu Limited | Mobile station, base station, and wireless communication system |
US8014368B2 (en) * | 2005-02-01 | 2011-09-06 | Samsung Electronics Co., Ltd. | Gateway for interconnecting ad-hoc network and infrastructure network, and methods for discovering and registering service provider using gateway |
US20060176852A1 (en) * | 2005-02-04 | 2006-08-10 | Industrial Technology Research Institute | System and method for connection handover in a virtual private network |
US20060178149A1 (en) * | 2005-02-04 | 2006-08-10 | Kamat Sandip D | Systems and methods for wireless cellular telephone routers |
US7266383B2 (en) * | 2005-02-14 | 2007-09-04 | Scenera Technologies, Llc | Group interaction modes for mobile devices |
US20070008902A1 (en) * | 2005-07-11 | 2007-01-11 | Saritha Yaramada | Managing negotiations of quality of service parameters in wireless networks |
US20070016262A1 (en) * | 2005-07-13 | 2007-01-18 | Betastim, Ltd. | Gi and pancreatic device for treating obesity and diabetes |
US20070042769A1 (en) * | 2005-08-17 | 2007-02-22 | Freescale Semiconductor, Inc. | Communications security management |
US20070076875A1 (en) * | 2005-10-05 | 2007-04-05 | Canon Kabushiki Kaisha | Wireless communication system and authentication method and communication control method in wireless communication system |
US7339915B2 (en) * | 2005-10-11 | 2008-03-04 | Cisco Technology, Inc. | Virtual LAN override in a multiple BSSID mode of operation |
US20070206527A1 (en) * | 2006-03-01 | 2007-09-06 | Yuan-Chang Lo | Virtual access point for configuration of a LAN |
US7903817B2 (en) * | 2006-03-02 | 2011-03-08 | Cisco Technology, Inc. | System and method for wireless network profile provisioning |
US20070220219A1 (en) * | 2006-03-16 | 2007-09-20 | International Business Machines Corporation | System and method for optimizing data in value-based storage system |
US20070253376A1 (en) * | 2006-04-28 | 2007-11-01 | Motorola, Inc. | Method and system for providing cellular assisted secure communications of a plurality of ad hoc devices |
US7881474B2 (en) * | 2006-07-17 | 2011-02-01 | Nortel Networks Limited | System and method for secure wireless multi-hop network formation |
US20080040481A1 (en) * | 2006-08-11 | 2008-02-14 | Motorola, Inc. | Method and system for compensation in ad hoc networks |
US20080049689A1 (en) * | 2006-08-23 | 2008-02-28 | Motorola, Inc. | Tunneling data to multiple wireless networks from device without connectivity through employment of device with connectivity |
US7929460B2 (en) * | 2006-09-14 | 2011-04-19 | Vanu, Inc. | Communication network topology determination |
US20080080387A1 (en) * | 2006-10-02 | 2008-04-03 | Tropos Networks, Inc. | Probe response determination |
US20080089288A1 (en) * | 2006-10-12 | 2008-04-17 | Bellsouth Intellectual Property Corporation | Methods, systems, and computer program products for providing advertising and/or information services over mobile ad hoc cooperative networks using electronic billboards and related devices |
US20080095134A1 (en) * | 2006-10-23 | 2008-04-24 | Wai Chen | Roadside network unit and method of organizing, managing and maintaining local network using local peer groups as network groups |
US20080112355A1 (en) * | 2006-11-09 | 2008-05-15 | Avaya Technology Llc | Multi-Hop Ad-hoc Wireless Networks That Support Non-Multi-Hop Wireless Terminals |
US20080112362A1 (en) * | 2006-11-10 | 2008-05-15 | Motorola, Inc. | Ip layer-handoff using mobility domains and ip caching |
US20080139239A1 (en) * | 2006-12-11 | 2008-06-12 | O'connor Dennis M | Techniques to share multimedia and enable cellular phone conference calling using ad-hoc wireless networks |
US20080146232A1 (en) * | 2006-12-19 | 2008-06-19 | Douglas Norman Knisely | Neighbor list provision in a communication network |
US20080165735A1 (en) * | 2007-01-05 | 2008-07-10 | Jen-Jee Chen | Handoff method of mobile device utilizing dynamic tunnel |
US20080192666A1 (en) * | 2007-02-12 | 2008-08-14 | Motorola, Inc. | Method and system for dynamically utilizing a peer network to extend battery life |
US20090046644A1 (en) * | 2007-08-17 | 2009-02-19 | Qualcomm Incorporated | Service set manager for ad hoc mobile service provider |
US20090046598A1 (en) * | 2007-08-17 | 2009-02-19 | Qualcomm Incorporated | System and method for acquiring or distributing information related to one or more alternate ad hoc service providers |
US20090047966A1 (en) * | 2007-08-17 | 2009-02-19 | Qualcomm Incorporated | Method for a heterogeneous wireless ad hoc mobile internet access service |
US20110039566A1 (en) * | 2007-08-27 | 2011-02-17 | Telefonaktiebolaget Lm Ericsson (Publ) | method and a network control node for bandwidth and access control in femto cells of a wireless system |
US20110183685A1 (en) * | 2010-01-20 | 2011-07-28 | Airpatrol Corporation | Multi-band radio frequency detection and location system |
Non-Patent Citations (1)
Title |
---|
Steiner et al. "Kerberos: An Authentication Service for Open Network Systems", January 12, 1988 * |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8644206B2 (en) | 2007-08-17 | 2014-02-04 | Qualcomm Incorporated | Ad hoc service provider configuration for broadcasting service information |
US20090049158A1 (en) * | 2007-08-17 | 2009-02-19 | Qualcomm Incorporated | Ad hoc service provider topology |
US20090046591A1 (en) * | 2007-08-17 | 2009-02-19 | Qualcomm Incorporated | Ad hoc service provider's ability to provide service for a wireless network |
US20090046658A1 (en) * | 2007-08-17 | 2009-02-19 | Qualcomm Incorporated | Handoff at an ad-hoc mobile service provider |
US20090046598A1 (en) * | 2007-08-17 | 2009-02-19 | Qualcomm Incorporated | System and method for acquiring or distributing information related to one or more alternate ad hoc service providers |
US20090073943A1 (en) * | 2007-08-17 | 2009-03-19 | Qualcomm Incorporated | Heterogeneous wireless ad hoc network |
US20090046676A1 (en) * | 2007-08-17 | 2009-02-19 | Qualcomm Incorporated | Ad hoc service provider configuration for broadcasting service information |
US9398453B2 (en) | 2007-08-17 | 2016-07-19 | Qualcomm Incorporated | Ad hoc service provider's ability to provide service for a wireless network |
US9392445B2 (en) | 2007-08-17 | 2016-07-12 | Qualcomm Incorporated | Handoff at an ad-hoc mobile service provider |
US9167426B2 (en) | 2007-08-17 | 2015-10-20 | Qualcomm Incorporated | Ad hoc service provider's ability to provide service for a wireless network |
US20110019627A1 (en) * | 2009-05-26 | 2011-01-27 | Qualcomm Incorporated | Maximizing Service Provider Utility in a Heterogeneous Wireless Ad-Hoc Network |
US9179367B2 (en) | 2009-05-26 | 2015-11-03 | Qualcomm Incorporated | Maximizing service provider utility in a heterogeneous wireless ad-hoc network |
US8458353B2 (en) | 2009-08-13 | 2013-06-04 | Qualcomm Incorporated | Method and apparatus for link aggregation in a heterogeneous communication system |
US20110040888A1 (en) * | 2009-08-13 | 2011-02-17 | Qualcomm Incorporated | Method and apparatus for link aggregation in a heterogeneous communication system |
US20120331165A1 (en) * | 2010-03-08 | 2012-12-27 | Nobuhiko Arashin | Server device for transmitting and receiving data to and from client device through access point |
US9087185B2 (en) * | 2010-03-08 | 2015-07-21 | Panasonic Intellectual Property Management Co., Ltd. | Server device for transmitting and receiving data to and from client device through access point |
US20140219164A1 (en) * | 2013-02-07 | 2014-08-07 | David Sanders | Hardware-Based Private Network Using WiMAX |
US9215075B1 (en) | 2013-03-15 | 2015-12-15 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
US9942051B1 (en) | 2013-03-15 | 2018-04-10 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
US10305695B1 (en) | 2013-03-15 | 2019-05-28 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
US10841104B2 (en) | 2013-03-15 | 2020-11-17 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
US11588650B2 (en) | 2013-03-15 | 2023-02-21 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
US11930126B2 (en) | 2013-03-15 | 2024-03-12 | Piltorak Technologies LLC | System and method for secure relayed communications from an implantable medical device |
US20150113618A1 (en) * | 2013-10-23 | 2015-04-23 | Microsoft Corporation | Verifying the security of a remote server |
US9998438B2 (en) * | 2013-10-23 | 2018-06-12 | Microsoft Technology Licensing, Llc | Verifying the security of a remote server |
EP4192117A4 (en) * | 2020-07-31 | 2023-10-11 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Method for device access authentication, terminal device, and cloud platform |
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20090046861A1 (en) | Security for a heterogeneous ad hoc mobile broadband network | |
US9392445B2 (en) | Handoff at an ad-hoc mobile service provider | |
US20090073943A1 (en) | Heterogeneous wireless ad hoc network | |
US20090046644A1 (en) | Service set manager for ad hoc mobile service provider | |
US20090047966A1 (en) | Method for a heterogeneous wireless ad hoc mobile internet access service | |
US20090047930A1 (en) | Method for a heterogeneous wireless ad hoc mobile service provider | |
EP2031919B1 (en) | Ad hoc service provider's ability to provide service for a wireless network | |
EP2031925B1 (en) | Ad hoc service provider configuration for broadcasting service information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: QUALCOMM INCORPORATED, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KRISHNASWAMY, DILIP;REEL/FRAME:021627/0782 Effective date: 20080917 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |