Patent application number | Description | Published |
20080220740 | Blacklisting of unlicensed mobile access (UMA) users via AAA policy database - In one embodiment, while being connected to the network, a security issue may be detected and associated with the device. The device may be placed on a blacklist for the security issue. The blacklist is a list that is used to deny service for the device when it attempts to connect. Thus, the device is disconnected from the network. Identification information for the device is added to the blacklist at the authentication server. If the device attempts to reconnect to the network, the request is received at the authentication server. The authentication server can then check the blacklist and deny the request for access to the network if the identification information is on the blacklist. This denial is determined without sending the request to the HLR. Accordingly, the HLR is protected in that requests from a device that may be considered a security issue are not sent to the HLR. | 09-11-2008 |
20080225760 | System and Method for Intelligent Paging of an Idle Mobile Device - An access gateway comprises a processor. The processor is operable to determine a message type of a received packet. The processor is further operable to apply a paging rule. The paging rule is related at least in part to the message type of the received packet. The processor is further operable to determine whether to send a request to transition the mobile device to an active state based on the paging rule. The processor is further operable to send a request, when appropriate, to transition the mobile device to an active state. | 09-18-2008 |
20080229403 | Method and apparatus for providing wireless services to mobile subscribers using existing broadband infrastructure - Techniques for providing wireless services to mobile subscribers using existing broadband network infrastructures are described herein. In one embodiment, in response to a request received at a gateway device from a mobile subscriber over a radio access network (RAN) for accessing a service provider network, the gateway device authenticates the mobile subscriber for accessing the RAN, where the gateway device interfaces the RAN and the existing broadband network. Upon successfully authenticating the mobile subscriber for accessing RAN, the gateway device accesses a network service provider over the existing network to acquire a network address on behalf of the mobile subscriber optionally using at least a portion of credentials derived from the authentication, where the network address allows the mobile subscriber to access the service provider network. Other methods and apparatuses are also described. | 09-18-2008 |
20080235783 | P-GANC OFFLOAD OF URR DISCOVERY MESSAGES TO A SECURITY GATEWAY - In one embodiment, a security gateway receives an IPSec Initiation (IPSec INIT) request from a client. The security gateway may communicate with a AAA server to authenticate the client. After authentication, the security gateway intercepts a URR Discovery request from the client. The security gateway determines registration information for a response to the registration request. The registration information may be information on where the client can locate a D-GANC. A response is generated using the determined information and sent to the client. The response to the discovery request is performed without communicating with a P-GANC. Accordingly, a security gateway is used to authenticate the client and also to respond to the discovery request. This does not require that a P-GANC function be deployed in a network. Thus, cost and processing power may be saved. | 09-25-2008 |
20080240053 | Quality of service (QoS) negotiation between network nodes in a Mobile IP network - Techniques for negotiating QoS between a foreign agent and a home agent of a Mobile IP network are described herein. According to one embodiment, quality of service (QoS) parameters are extracted from a registration reply message received from a home agent of a home network in response to a registration request message originated from a mobile node coupled to a foreign network. Thereafter, network traffics between the mobile node of the foreign network and the home agent of the home network associated with the mobile node are routed according to at least a portion of the QoS parameters. Other methods and apparatuses are also described. | 10-02-2008 |
20080247308 | PROVIDING SESSION REDUNDANCY USING PRIORITY DURING A SYNCING PROCESS - In one embodiment, sessions are synced from an active device to a standby device according to a priority. One or more attributes are determined for a plurality of sessions that need to be synced between an active device and a standby device. The attributes may be used to determine a value of syncing a session. A priority for syncing the sessions based on the attributes is then determined. The sessions are then synced based on the priority. For example, a portion of sessions considered to be of a higher priority may be synced before a portion of sessions considered to be of a lower priority. Because the sessions considered of a higher priority are synced first, if a double failure occurs where the active device fails during the syncing process, at least the higher priority sessions have been synced with the standby device and the standby device can take over these sessions. | 10-09-2008 |
20090007239 | Mobile IP Bulk Registration Revocation - Techniques for Mobile IP bulk registration revocation are described herein. According to one embodiment, a first mobile agent of a mobile IP network sends a registration revocation message to a second mobile agent of the mobile IP network. The registration revocation message includes information identifying multiple home IP addresses of multiple mobile nodes whose registrations are to be revoked. In response to the registration revocation, the second mobile agent terminates bindings of services associated with multiple mobile nodes identified by the multiple home IP addresses and sends an acknowledgement message to the first mobile agent. Other methods and apparatuses are also described. | 01-01-2009 |
20090133102 | Optimized security association database management on home/foreign agent - Techniques for security association management on a home agent and a foreign agent are described herein. In one embodiment, in response to a first mobile network registration request from a mobile node, a remote authentication facility is accessed to retrieve a security association for the mobile node for authenticating and providing a first network connectivity to the mobile node, wherein the security association is associated with a lifespan. The security association is inserted in a local security association database to create a security association entry, wherein the security association entry includes the lifespan. A second mobile network registration request from the mobile node after the first network connectivity has been terminated is received and the security association entry in the local security association database that corresponds to the mobile node is used to provide authentication of the mobile node without having to access the remote authentication facility again if the lifespan associated with the security association entry is valid. Other methods and apparatuses are also described. | 05-21-2009 |
20130115963 | DECOUPLING RADIO RESOURCE MANAGEMENT FROM AN ACCESS GATEWAY - Particular embodiments provide an access gateway that facilitates communication between a plurality of access technologies. The access gateway facilitates data communication with an access terminal through a bearer path. A radio resource manager is configured to provide radio resource management functions for the communications. The radio resource manager is decoupled from the bearer path and provides control of radio transmission characteristics for the bearer path to the gateway. Because the radio resource manager is not in the bearer path, the access gateway may be access technology agnostic. Thus, the access gateway does not need to have access-specific modules based on the radio technology for each bearer path. | 05-09-2013 |