Patent application number | Description | Published |
20080253322 | WiMAX Multicast Broadcast Network System Architecture - Techniques and system architectures for supporting Multicast Broadcast Services (MCBCS) over a WiMAX network. | 10-16-2008 |
20100034130 | Dynamic Discovery of Multicast Broadcast Services controller and Synchronization in Wireless Communication Systems - Systems, apparatuses, and techniques for wireless communications can include operating an access service network to provide wireless communications to wireless devices based on an orthogonal frequency-division multiplexing air interface and can include receiving a service profile associated with a wireless device from a connectivity service network which is configured to determine whether the wireless device has privilege to access a multicast broadcast controller. A service profile can include access information to facilitate communications between the wireless device and the multicast broadcast controller. Systems, apparatuses, and techniques can include storing the access information in a network node configured to transact messages based on a Dynamic Host Configuration Protocol (DHCP) with wireless devices and can include operating the network node, based on the access information in response to a DHCP message sent by the wireless device, to provide address information to enable the wireless device to communicate with the multicast broadcast controller. | 02-11-2010 |
20100046410 | MCBCS System Initialization and Establishment Over Wireless Broadband Network - Systems, apparatuses, and techniques for wireless communications can include receiving an access profile associated with a wireless device from a connectivity service network which is operable to determine whether the wireless device has privilege to a data feed provided by a multicast-broadcast service controller; operating a proxy, which is in communication with the multicast-broadcast service controller, based on the access profile to obtain service parameter information associated with the data feed and to use a first multicast-broadcast service data path between the proxy and the multicast-broadcast service controller to receive the data feed; and operating a base station to deliver the data feed to the wireless device in accordance with the service parameter information, the base station operable to use a second, different multicast-broadcast service data path between the proxy and the base station to receive the data feed. | 02-25-2010 |
20100130212 | Femto Cell Handover In Wireless Communications - Techniques, apparatuses, and systems can include determining one or more handover base station candidates for a specific mobile station associated with a serving base station based at least on respective one or more proximities of the one or more handover base station candidates to the serving base station and one or more base station access privileges associated with the mobile station. | 05-27-2010 |
20100284369 | Optimization method of multiple service flows operation for WiMAX system - An optimization method of multiple service flows operation for a WiMAX system includes: adding a resource combination indication to a hand-off request message, a path pre-registration request message and a path registration request message; hand-off request processing: when multiple service flows are handed off by a mobile station from a current serving network to a target network, determining whether the mobile station is allowed to hand off to a target network according to the resource combination indication in the hand-off request message and whether the handoff of the multiple service flows is accepted by the target network; path pre-establishment processing and path establishment processing: when the mobile station is allowed to hand off multiple service flows from the current serving network to the target network, determining whether data paths between the target network and the network where a data management unit is located can be pre-established/established according to the resource combination indication in the path pre-registration request message and the path registration request message and whether the data path pre-registration/registration of the multiple service flows can be established. | 11-11-2010 |
20110212727 | METHOD FOR PROCESSING HANDOFF CONFIRM MESSAGES - The present invention provides a method for processing handoff confirm messages. The method includes the following steps: step S | 09-01-2011 |
20120208504 | FEMTO ACCESS POINT INITIALIZATION AND AUTHENTICATION - A method and apparatus is provided for implementing initial network entry procedures by a Femto access point which is required to be authenticated by the WiMAX network prior to becoming active and operational. The method includes implementing a DNS query to discover an associated server and gateway in an associated Femto network service provider domain and obtaining an IP address for the server and an IP address for the gateway. The method also includes authenticating the Femto access point with the associated Femto network service provider and establishing a secure IP tunnel between the Femto access point and the gateway. The method further includes interacting with a default self organizing network server to perform location authorization, wherein the self organizing network server is configured to auto configured the Femto access point with preliminary radio parameters. The method also includes executing registration with a Femto gateway. The apparatus includes associated components for implementing the method described above. | 08-16-2012 |
20120282909 | WIMAX FEMTO NETWORK SUPPORT FOR WIMAX FEMTO CONFIGURATION MANAGEMENT - Embodiments of the present invention relate to wireless communication and, more specifically, to network support for configuration management in a Worldwide Interoperability Microwave Access Femto Network. In one exemplary embodiment, offline and/or updated configuration information is obtained by a WiMAX Femto Access Point from a management server whether the WiMAX Femto Access Point is active or inactive and before or after initial network entry. Configuration information synchronization may also be performed before or after initial network entry. | 11-08-2012 |
20120322408 | WIMAX FEMTO AND MACRO IDLE MODE AND PAGING SUPPORT FOR RE-ENTRY - A base station determines if the mobile station seeking re-entry into the network is a member of a closed-subscriber group associated with the base station. If the mobile station is not a member of the closed subscriber group associated with the base station, the base station redirects the mobile station to another base station. | 12-20-2012 |
20130014220 | Method and system for processing authenticator relocation request - The disclosure provides a method and a system for processing an authenticator relocation request. When detecting that initial authentication, re-authentication or authenticator relocation is being performed for a terminal, a network side refuses a new authenticator relocation request from the terminal. When detecting that no initial authentication, re-authentication or authenticator relocation is being performed for the terminal, the network side accepts the new authenticator relocation request from the terminal. Further, when detecting that the initial authentication, the re-authentication or the authenticator relocation is being performed for the terminal, the network side refuses a new re-authentication request from the terminal. According to the technical solution of the disclosure, the complexity of network element processing is reduced and potential safety hazard is avoided. | 01-10-2013 |
20130014231 | Anchor authenticator relocation method and system - The disclosure provides an anchor authenticator relocation method and system. The method includes: after an old authenticator accepts an anchor authenticator relocation request of a Mobile Station (MS), a new authenticator sends an authenticator relocation request to an AAA server; when the AAA server's verification on the new authenticator is passed and the old authenticator confirms that the new authenticator is trusted, the anchor authenticator is relocated to the new authenticator. The disclosure provides a detailed solution to perform anchor authenticator relocation without re-authentication. | 01-10-2013 |