Patent application number | Description | Published |
20090054036 | GROUP AUTHENTICATION METHOD - A group authentication method adaptable to a communication system is disclosed. The communication system includes a user group, a serving network, and a home network. The user group includes at least one mobile station. The home network pre-distributes a group authentication key to itself and all the mobile stations in the same user group and generates a mobile station authentication key for each mobile station. The home network generates a group list for recording related information of the user group. The home network has a database for recording the group list. The serving network has a database for recording the group list and a group authentication data received from the home network. The group authentication method includes following steps. The serving network performs an identification action to a mobile station. The communication system performs a full authentication action or a local authentication action according to the result of the identification action. | 02-26-2009 |
20100110963 | SYSTEM AND METHOD FOR MULTICAST/ BROADCAST SERVICE ZONE BOUNDARY DETECTION - A wireless communication method for providing zone boundary detection performed by a controller managing communications within a multicast/broadcast service (MBS) zone. The method includes assigning to a boundary paging group a first base station communicating within the MBS zone and near a boundary of the MBS zone. The method further includes transmitting, through a second base station which covers a mobile station, to the mobile station information indicating that the boundary paging group corresponds to locations near the boundary of the MBS zone. | 05-06-2010 |
20100260071 | ROUTING METHOD AND ROUTING PATH RECOVERY MECHANISM IN WIRELESS SENSOR NETWORK ENVIRONMENT - The present invention discloses an asymmetric routing method and routing path recovery mechanism. The wireless sensor network environment includes at least a management unit, at least a gateway, and mobile nodes. When joining, each mobile node obtains an unique ID code and, additionally, a depth as the gradient to the management unit. Accordingly, a mobile node sends an uplink packet via a nearby node with lower depth to the management unit; while the management unit transmits a downlink packet to a mobile node by utilizing the source route method. When the parent node of a mobile node is damaged or moves to another position or said mobile node with its sub-tree descendants changes their position together, the uplink routing path is recovered via selecting a nearby node of the sub-tree as relay node and the downlink routing path is recovered via sending a control message to the management unit. | 10-14-2010 |
20110047382 | FAST AUTHENTICATION BETWEEN HETEROGENEOUS WIRELESS NETWORKS - A method for preparing for handover of an apparatus from a first wireless network to a second, different wireless network, a master session key (MSK) having been generated during establishment of a connectivity of the apparatus to the first wireless network includes detecting signals of the second wireless network. In response thereto, establishing a connectivity of the apparatus to the second wireless network, using a pairwise master key (PMK) derived from the MSK generated during establishment of the connectivity to the first wireless network, one or more encryption keys being derivable from the PMK to support secure communication over the second wireless network. | 02-24-2011 |
20110051644 | POWER-EFFICIENT BACKBONE-ORIENTED WIRELESS SENSOR NETWORK, METHOD FOR CONSTRUCTING THE SAME AND METHOD FOR REPAIRING THE SAME - The present invention discloses a power-efficient backbone-oriented wireless sensor network, a method for constructing the same and a method for repairing the same, wherein energy-rich nodes are used to form backbones linking to a server, and wherein regular nodes having limited energy storage link to the backbones. When one energy-rich node malfunctions, the energy-rich node, which is posterior to the malfunctioning energy-rich node, searches for and links to a linkable neighboring energy-rich node on the backbone. If there is none linkable neighboring energy-rich node, the regular nodes are used to form a temporary tunnel until the malfunctioning energy-rich node has been repaired. The present invention can relieve the influence of hot spots, increase the robustness of the wireless sensor network, and prolong the service life of the wireless sensor network. | 03-03-2011 |
20110320802 | AUTHENTICATION METHOD, KEY DISTRIBUTION METHOD AND AUTHENTICATION AND KEY DISTRIBUTION METHOD - An authentication method, and a key distribution method, and an authentication and key distribution method are provided. The authentication method is adapted for a machine type communication involved with a wireless communication system, and includes the following steps. At least a user equipment (UE) transmits an application request including at least a first security material to a network application function (NAF), where the at least a first security material is not a key directly obtained through a bootstrapping procedure of a generic bootstrapping architecture. The NAF generates a second security material, which is not the key, either. The NAF replies the UE an application answer with the at least a second security material. In addition, the NAF authenticates the UE by the second security material, or the UE authenticates the NAF by the second security material. | 12-29-2011 |
20120044865 | Apparatus And Method For Coupling An M2M Device To A Wireless Network - Apparatus for coupling one or more machine-to-machine (M2M) devices to a wireless network, including: a first network interface controller (NIC) module configured to communicate with the M2M devices; an M2M controller unit coupled to the first NIC module, the M2M controller unit including a database and a controller, the controller being configured to store information regarding the M2M devices in the database and to retrieve information regarding the M2M devices from the database; and a second NIC module coupled to the M2M controller unit, the second NIC module including an M2M enable unit configured to send the information retrieved by the controller to the wireless network. | 02-23-2012 |
20130286963 | RESOURCE MANAGEMENT METHOD AND APPARATUSES FOR DEVICE TO DEVICE COMMUNICATIONS - The present disclosure proposes a method for device to device communication and apparatuses using the same. More particularly, the present disclosure proposes a method and apparatuses to manage device to device (D2D) network resources based on maintain a user equipment (UE) network topology. The proposal includes a equipment (UE) requesting an authorization from the network for D2D communication in a licensed frequency spectrum, the UE would then receive through a control node or through another non-mobile UE the authorization which includes an identification (ID) information which allows the UE to engage in D2D communication in the license spectrum even when the UE is outside the range of the serving base station. | 10-31-2013 |
20130315393 | AUTHENTICATION SYSTEM FOR DEVICE-TO-DEVICE COMMUNICATION AND AUTHENTICATION METHOD THEREFOR - An authentication system for device-to-device (D2D) communication and an authentication method thereof are provided. The authentication system further includes first user equipment (UE) and an authentication server. The authentication server is located within a communication range of the first UE. When the first UE sends a connection request to the authentication server, the authentication server performs a routine authentication procedure on the first UE and provides key generation information to the first UE. The authentication server generates a server key according to the key generation information and a key derivation procedure. The first UE generates an equipment key according to the key generation information and the key derivation procedure to obtain authentication for D2D communication, such that the first user equipment and a second UE obtaining the authentication for D2D communication directly perform the D2D communication without performing the D2D communication through the authentication server. | 11-28-2013 |
20140047008 | MULTILAYER NETWORK CONNECTION COMMUNICATION SYSTEM, SMART TERMINAL DEVICE, AND COMMUNICATION METHOD THERETO - A multilayer network connection communication system includes a mobile device, a smart terminal device, a service server, a first layer network, and a second layer network. The mobile device sends at least one inquiry message through the first layer network to inquire the smart terminal device whether the smart terminal device supports at least one first application. Among the at least one first application, the smart terminal device supports at least one second application including a third application. The smart terminal device requests the mobile device through the first layer network to start up the at least one second application, where the third application is started up to respond to the at least one startup message. The smart terminal device receives a user data from the mobile device through the first layer network and transmits the user data to the service server through the second layer network. | 02-13-2014 |
Patent application number | Description | Published |
20090028069 | METHOD AND SYSTEM FOR NETWORK DATA TRANSMITTING - A method and system for network data transmitting in a communication system includes transmitting a data from at least one transmission node to at least one receiving node of a transmission-receiving group among the plurality of communication nodes by utilizing a node ID, the node ID of communication node in the group is being assigned by a N-carry operation of a determined number N. | 01-29-2009 |
20090068986 | METHODS AND DEVICES FOR ESTABLISHING SECURITY ASSOCIATIONS AND PERFORMING HANDOFF AUTHENTICATION IN COMMUNICATIONS SYSTEMS - A method of providing secure communications between a base station, a relay station, and a mobile station in a communication network includes receiving, by the relay station, an unsolicited security key from the base station; receiving, by the relay station, a signaling message from the mobile station; and authenticating, by the relay station, the mobile station using the security key. A method of providing secure communications between a base station, a relay station, and a mobile station in a communication network includes receiving, by the relay station, a signaling message from the mobile station; transmitting, by the relay station, subsequent to receiving the signaling message, a security key request to the base station; receiving, by the relay station, a security key from the base station in response to the previously sent security key request; and authenticating, by the relay station, the mobile station using the received security key. | 03-12-2009 |
20090271626 | METHODS AND DEVICES FOR ESTABLISHING SECURITY ASSOCIATIONS IN COMMUNICATIONS SYSTEMS - A method of providing secure communications between a base station, a relay station, and a mobile station in a communication network includes authenticating the mobile station over the communication network; generating, by the base station, security material, wherein the security material comprises at least one of a traffic encryption key (TEK) and a message authentication code key (MACK); transmitting, by the base station, the security material to the mobile station; and transmitting, by the base station, the security material to the relay station. | 10-29-2009 |
20120189124 | Methods and Devices for Establishing Security Associations and Performing Handoff Authentication in Communications Systems - A method of providing secure communications between a base station, a relay station, and a mobile station in a communication network includes receiving, by the relay station, an unsolicited security key from the base station; receiving, by the relay station, a signaling message from the mobile station; and authenticating, by the relay station, the mobile station using the security key. A method of providing secure communications between a base station, a relay station, and a mobile station in a communication network includes receiving, by the relay station, a signaling message from the mobile station; transmitting, by the relay station, subsequent to receiving the signaling message, a security key request to the base station; receiving, by the relay station, a security key from the base station in response to the previously sent security key request; and authenticating, by the relay station, the mobile station using the received security key. | 07-26-2012 |