Patent application number | Description | Published |
20080267407 | Method and Apparatus for New Key Derivation Upon Handoff in Wireless Networks - A novel key management approach is provided for securing communication handoffs between an access terminal and two access points. As an access terminal moves from a current access point to a new access point, the access terminal sends a short handoff request to the new access point. The short handoff request may include the access terminal ID; it does not include the access point ID. The new access point may then send its identifier and the access terminal's identifier to the authenticator. Using a previously generated master transient key, the access point identifier and the access terminal identifier, an authenticator may generate a master session key. The master session key may then be sent to the access point by the authenticator. The access terminal independently generates the same new security key with which it can securely communicate with the new access point. | 10-30-2008 |
20090327391 | METHODS AND APPARATUS FOR SECURELY ADVERTISING IDENTIFICATION AND/OR DISCOVERY INFORMATION - Methods and apparatus related to a peer to peer wireless communications system supporting secure advertisement of identification and/or discovery information e.g., upper layer discovery information, are described. Air interface timing and/or other information received from a third device, e.g., a beacon or GPS transmitter is incorporated in the computation of identification/discovery information which is communicated from a first device to a second device. The second device stores some identification/discovery credentials corresponding to the first device, which have been communicated out of band from the first device to the second device. Upon receipt of a identifier from a first device, the second device determines if the stored information corresponds to the device that transmitted the identifier. Various embodiments facilitate secure advertisement of identification and/or discovery information and discovery, e.g., selective discovery by trusted peers. | 12-31-2009 |
20100069067 | TICKET-BASED CONFIGURATION PARAMETERS VALIDATION - Aspects describe spectrum authorization, access control, and configuration parameters validation. Devices in an ad-hoc or peer-to-peer configuration can utilize a licensed spectrum if the devices are authorized to use the spectrum, which can be determined automatically. Aspects relate to distribution of authorization tickets by an authorization server as a result of validating a device's credentials and services to which the device is entitled. An exchange and verification of authorization tickets can be performed by devices as a condition for enabling a validated wireless link using the spectrum. | 03-18-2010 |
20100070760 | TICKET-BASED SPECTRUM AUTHORIZATION AND ACCESS CONTROL - Aspects describe spectrum authorization, access control, and configuration parameters validation. Devices in an ad-hoc or peer-to-peer configuration can utilize a licensed spectrum if the devices are authorized to use the spectrum, which can be determined automatically. Aspects relate to distribution of authorization tickets by an authorization server as a result of validating a device's credentials and services to which the device is entitled. An exchange and verification of authorization tickets can be performed by devices as a condition for enabling a validated wireless link using the spectrum. | 03-18-2010 |
20100124331 | SPECTRUM AUTHORIZATION AND RELATED COMMUNICATIONS METHODS AND APPARATUS - Various embodiments relate to wireless communications, and more particularly, to methods and apparatus for authorizing use of spectrum, e.g., through the issuance of spectrum access keys, and/or preventing or discouraging the unauthorized use of licensed spectrum. Peer to peer wireless communications between authorized users of licensed spectrum may involve scrambling/descrambling of information communicated between authorized devices. In some embodiments air interface timing and/or other information received from a second device, e.g., a beacon or GPS transmitter, is incorporated into a computation of a pseudo-random bit sequence which is also computed based on a spectrum access key communicated to authorized spectrum users. In some embodiments authorized peer to peer devices scramble communicated information based on the generated pseudo random bit sequence thereby preventing or discouraging communication with devices which are not authorized to use the spectrum and lack a spectrum access key used to generate the pseudo random bit sequence. | 05-20-2010 |
20100190469 | CERTIFIED DEVICE-BASED ACCOUNTING - Providing for secure tracking and reporting of wireless resources utilized by a mobile device is described herein. By way of example, resources utilized in conjunction with network-facilitated or peer-to-peer wireless data exchange can be tracked in secure, tamper-resistant components of the mobile device. Further, a report can be compiled from the tracked information and digitally signed with a secret data/material specific to the mobile device. The signed report can be submitted to a network server in conjunction with accounting, billing or like functions. By validating the signature of a mobile device, the network server can trust that information collected and submitted by user devices has not been tampered with or spoofed with an ID of another such device. | 07-29-2010 |
20100260101 | ROUTE OPTIMIZATION FOR DIRECTLY CONNECTED PEERS - Aspects relate to allowing peer nodes that establish a communication through a home agent to move that session to a directly connected link. Thus, the directly connected nodes can exchange packets natively without encapsulation. Further aspects allow a node that does not have any home agent entity to switch from a local network to a global network without losing ongoing sessions. | 10-14-2010 |
20100318795 | BLOOM FILTER BASED DEVICE DISCOVERY - Aspects describe enabling two peers that have already paired together under some circumstances to re-identify themselves under different circumstances so that the peers can bypass performing another pairing only to discover that they are already paired. A Bloom filter is constructed from an available pool of locally selected identifiers and is sent to a peer node in a first message. Upon receiving the message with the Bloom filter, peer node checks all its known identifiers. If peer node finds that one of its identifiers is a member of the Bloom filter, peer node sends a reply in order to achieve a mutual identification. | 12-16-2010 |
20120167184 | ALLOCATION OF APPLICATION IDENTIFIERS - An apparatus, a method, and a computer program product of a wireless device are provided in which a first device identifier of a wireless device is provided. An allocation record is received that includes an expression used for discovery, a second device identifier, and at least one of a digital signature of a first server that delegates the expression or a digital signature of a second server that manages the expression. The allocation record is verified. An apparatus, a method, and a computer program product of a first server are provided in which a device identifier is received from a wireless device. An allocation record is generated that includes an expression used for discovery, the device identifier, and at least one of a digital signature of the first server or a digital signature of a second server that manages the expression. The allocation record is sent. | 06-28-2012 |
20120173623 | METHODS AND APPARATUS FOR ENHANCED SYSTEM ACCESS CONTROL FOR PEER-TO-PEER WIRELESS COMMUNICATION NETWORKS - An apparatus, a method, and a computer program product are provided in which an information block is generated to include an expression encoded based on at least one of a peer discovery resource identifier or an area identifier. The information block is sent for broadcasting. An apparatus, a method, and a computer program product are provided in which an information block is received that includes an expression encoded based on at least one of a peer discovery resource identifier or an area identifier. The information block is decoded based on said at least one of the peer discovery resource identifier or the area identifier to obtain the expression. | 07-05-2012 |
20120185924 | RECORD CREATION FOR RESOLUTION OF APPLICATION IDENTIFIER TO CONNECTIVITY IDENTIFIER - A method of creating a DNS record in a DNS is provided. The method includes receiving one of an allocation record or information for obtaining the allocation record from a wireless device. The allocation record includes an expression. In addition, the method includes creating a DNS record for the expression. Furthermore, the method includes associating the DNS record with a credential. | 07-19-2012 |
20130060631 | AD CACHE MAINTENANCE METHODS AND APPARATUS - Methods and apparatus relating to ad cache maintenance, e.g., determining when ad cache replenishment should occur, replenishing ad cache content and/or updating the content of an ad cache, on a device which supports the presentation of advertisements (ads) are described. Signals are received by a first device including an ad cache. The signals are received from other devices, e.g., devices in the direct wireless communications range of the first device. Received signals are processed and provide context information, e.g., information about the surrounding, services available, stores in the region, etc., in which the first device receiving the signals is at a given point in time. Context information is stored. As new context information is generated from received signals the newly generated set of context information is compared to a previously generated set of context information. Changes in context information are detected and used in performing ad cache maintenance operations. | 03-07-2013 |
20130060702 | METHODS AND APPARATUS FOR DEMOGRAPHICS INFORMATION COLLECTION - Various embodiments are directed to methods and apparatus which can be used to implement a system for collecting demographic information of users and/or devices in real-time or near real-time. Methods and apparatus directed to communicating and collecting demographic information via wireless signals, e.g., discovery signals, transmitted by one or more wireless devices, e.g., wireless communications devices supporting a peer to peer signaling protocol, are described. In various embodiments, at least some of the demographic information is transmitted in a secure manner. | 03-07-2013 |
20130182795 | SYSTEMS AND METHODS FOR PEER-TO-PEER COMMUNICATION - Methods, devices, and computer program products for peer-to-peer communication are described herein. In one aspect, an apparatus includes a receiver and processor. The receiver is configured to receive a first data unit from a first device. The first data unit includes a Media Access Control (MAC) address of the first device and data. The processor is configured to generate a device address of the processor and a device address of the first device, and provide the generated device address of the processor, the generated device address of the first device, and the data of the first data unit to an application executable on the processor. | 07-18-2013 |
20130196631 | METHODS AND APPARATUS FOR PROVIDING NETWORK-ASSISTED END-TO-END PAGING BETWEEN LTE DEVICES TRACKED BY DIFFERENT MOBILITY MANAGEMENT ENTITIES - A method, an apparatus, and a computer program product for wireless communication are provided. The apparatus may be an initiator UE, a target UE, an MME of an initiator UE, or an MME of a target UE. In one configuration, the apparatus is a target UE. The target UE broadcasts information for identifying an MME serving the target UE along with a target expression of the target UE, receives, from the MME serving the target UE, parameters and a key for communicating with an initiator UE, and communicates securely with the initiator UE based on the key. | 08-01-2013 |
20130196693 | METHODS AND APPARATUS FOR PROVIDING NETWORK-ASSISTED PAGING OF LTE DEVICES VIA A COMMON ENTITY - A method, an apparatus, and a computer program product for wireless communication are provided. In one configuration, the apparatus is a target UE. The target UE communicates an expression of the target UE to a serving entity, receives a page initiated from the serving entity for communicating with an initiator UE, and communicates securely with the initiator UE based at least on the page. In one configuration, the apparatus is a serving entity. The serving entity receives a first expression from a target UE, receives a second expression from an initiator UE, and sends a page to the target UE upon determining that the second expression matches the first expression. | 08-01-2013 |
20130196694 | METHODS AND APPARATUS FOR PROVIDING NETWORK-ASSISTED END-TO-END PAGING BETWEEN LTE DEVICES - A method, an apparatus, and a computer program product for wireless communication are provided. The apparatus may be a target UE, an initiator UE, or an MME. In one configuration, the apparatus is an initiator UE. The initiator UE determines a network address of a target UE based on a target expression, sends a connection request including information associated with the initiator UE to the target UE at the determined network address, sends information associated with the target UE to an MME serving the initiator UE, and receives, from the MME serving the initiator UE, one or more parameters for communicating with the target UE. Further, the initiator UE communicates with the target UE based on the one or more parameters. | 08-01-2013 |
20130227655 | TICKET-BASED CONFIGURATION PARAMETERS VALIDATION - Aspects describe spectrum authorization, access control, and configuration parameters validation. Devices in an ad-hoc or peer-to-peer configuration can utilize a licensed spectrum if the devices are authorized to use the spectrum, which can be determined automatically. Aspects relate to distribution of authorization tickets by an authorization server as a result of validating a device's credentials and services to which the device is entitled. An exchange and verification of authorization tickets can be performed by devices as a condition for enabling a validated wireless link using the spectrum. | 08-29-2013 |
20130272193 | METHODS AND APPARATUS FOR MULTIPLEXING APPLICATION IDENTIFIERS FOR PEER-TO-PEER DISCOVERY SYSTEMS - A method, a computer program product, and an apparatus are provided. The apparatus may be equipped to obtain one or more application identifiers from one or more applications on a wireless device, generate a super identifier (SID) having elements corresponding to the one or more applications and a base that identifies one or more common properties of the one or more applications, and broadcast the SID during one or more peer discovery slots allocated for the wireless device. In another example, a UE may be equipped to receive the SID broadcast by another UE, determine a match between at least one of the one or more common properties in the base, and determine whether an element associated with one or more applications is present in the SID. | 10-17-2013 |
20140022986 | WAN ASSISTED MONITORING AND COMMUNICATIONS METHODS AND APPARATUS FOR COMMUNICATIONS DEVICES - Methods and apparatus for improved monitoring and tracking of communications devices, e.g., peer to peer devices, using assistance from WAN elements such as base stations, are described. In some embodiments, a wireless terminal requests peer to peer communications discovery assistance from one or more base stations. In some embodiments, the request includes information identifying peer communications discovery information the wireless terminal is seeking to detect. In some embodiments, upon receiving the request, nearby base stations listen to the common discovery channel and upon detecting the specified discovery information, send a response indicating the detection of the discovery information and a proximate location of the announcing peer device, to the wireless terminal. The wireless terminal can use the received information to locate and page the announcing peer via the base station serving the announcing peer. Location tracking of peer devices is facilitated and peer-to-peer communication setup time may be reduced. | 01-23-2014 |
20140024378 | METHOD OF USING UE DISCOVERY FOR PAGING OPTIMIZATION - Methods and apparatus are described for refining, e.g., reducing, a paging area corresponding to a user equipment device, e.g., a cellular inactive UE device. Various embodiments are well suited for communications systems in which user equipment devices participate in peer to peer communications networks in which direct user device to user device communications are employed. A user equipment device participating in a peer to peer network transmits discovery signals. A femto base station and/or a cellular active UE device in the local vicinity of the UE device transmitting the peer to peer discovery signal eavesdrops on the peer discovery signaling and detects the presence of the cellular inactive UE device. The detection of the cellular inactive UE device is reported to a MME. The MME determines a paging area corresponding to the detected UE device based on the reported information and the location of the reporting device. | 01-23-2014 |
20140112258 | METHODS AND APPARATUS FOR EXPRESSION USE DURING D2D COMMUNICATIONS IN A LTE BASED WWAN - A method, an apparatus, and a computer program product for wireless communication are provided in connection with use of expressions with D2D communications in a LTE based WWAN. In one example, a MME is equipped to receive a request from a first UE to establish a communication link with a second UE based on a first expression pair, determine whether the UEs can use a first context associated with previously used expression pair, and provide information associated with the first context to the first UE. In another example, a UE is equipped to send a connection request, to its MME, to establish a communication link with a second UE based on a first expression pair, receive at least a portion of information associated with a first context between the UEs based on a previously used expression pair, and establish the communication link with the second UE using the received information. | 04-24-2014 |
20140112474 | METHODS AND APPARATUS FOR PROVIDING NETWORK-ASSISTED KEY AGREEMENT FOR D2D COMMUNICATIONS - A method, an apparatus, and a computer program product for wireless communication are provided in connection with facilitating secure D2D communications in a LTE based WWAN. In one example, a UE is equipped to send a shared key request using a first non-access stratum (NAS) message to a MME, calculate a first UE key based on a MME-first UE key, an uplink count value, and at least a portion of contextual information, receive a second NAS message from the MME, and calculate a final UE key based at least on the first UE key. In another example, a MME is equipped to receive a NAS message such as the message send by the first UE, calculate a first UE key, receive a message at least indicating successful contact with the second UE, and send a second NAS message to the first UE indicating the successful contact. | 04-24-2014 |
20140112475 | METHODS AND APPARATUS FOR PROVIDING ADDITIONAL SECURITY FOR COMMUNICATION OF SENSITIVE INFORMATION - A method, an apparatus, and a computer program product for wireless communication are provided in connection with providing additional security for communication of sensitive information within a LTE based WWAN. In one example, a communications device is equipped to generate a keystream based on a mobility management entity-user equipment (MME-UE) key, a non-access stratum (NAS) message count value, and a contextual string associated with an informational element, and the contextual information, and cryptographically process the informational element using the generated keystream. In such an example, the communications device may be a UE, a MME, etc. | 04-24-2014 |
20140165214 | METHODS AND APPARATUS FOR PROVIDING PRIVATE EXPRESSION PROTECTION AGAINST IMPERSONATION RISKS - A method, an apparatus, and a computer program product for wireless communication are provided in connection with providing private expression protection in a wireless communications network. In one example, a UE is equipped to internally receive a request (e.g., from an application running on the UE) to announce a private expression and/or at least a reference to an expression-code associated with the private expression, and determine whether the reference to the expression-code and/or the expression-code matches a stored instance of the expression-code. In an aspect, the UE may be equipped to announce the at least one of the private expression or the expression-code when stored instance of the expression-code corresponds to the expression-code received with the request. In another aspect, the UE may be equipped to prohibit announcement of any information associated with the private expression when stored expression-code does not correspond to the expression-code received with the request. | 06-12-2014 |
20140198719 | METHODS AND APPARATUS FOR PROVIDING LOCATION INFORMATION WITH PRIVATE EXPRESSIONS - A method, an apparatus, and a computer program product for wireless communication are provided in connection with providing location information with expression information announced in a wireless network. In one example, a UE is equipped with applications that can request announcement of an expression. In an aspect, the expression may be associated with expression information to be announced over the air. In an aspect, the request indicates to provide location information with the expression information during announcement. Further, the UE may be equipped to generate Peer-Discovery (PD) data including the expression information and the location information. In an aspect, the location information may be included along with the expression information in a data section of the announced PD data. Still further, the UE may be equipped to announce the PD data. | 07-17-2014 |
20140310782 | TICKET-BASED SPECTRUM AUTHORIZATION AND ACCESS CONTROL - Aspects describe spectrum authorization, access control, and configuration parameters validation. Devices in an ad-hoc or peer-to-peer configuration can utilize a licensed spectrum if the devices are authorized to use the spectrum, which can be determined automatically. Aspects relate to distribution of authorization tickets by an authorization server as a result of validating a device's credentials and services to which the device is entitled. An exchange and verification of authorization tickets can be performed by devices as a condition for enabling a validated wireless link using the spectrum. | 10-16-2014 |
20140329494 | METHOD FOR POLICY CONTROL AND CHARGING FOR D2D SERVICES - Systems and methods are provided for providing policy control and charging for device to device (D2D) services. A network entity transmits, to at least one mobile entity, configuration data including device-to-device data, and receives, from the at least one mobile entity, an accounting report associated with device-to-device communication. The network entity transmits, to a charging function entity, a charging report based on the accounting report received from the at least one mobile entity. A policy control function entity performs a policy control and enforcement based at least on the accounting report received from the at least one mobile entity. | 11-06-2014 |