Patent application number | Description | Published |
20090034440 | DISTRIBUTED NETWORK - Systems and methods for a distributed network are provided. In some embodiments, a method includes automatically transmitting a page message for a mobile station to access points in a paging group associated with a first access point, the page message having been received at the first access point, the first access point being associated with the most recent location update of the mobile station, and establishing a security agreement between the first access point and the other access points prior to receiving the page message. | 02-05-2009 |
20090088155 | WIRELESS CONTROL OF ACCESS POINTS - A method including wirelessly receiving a communication from a wireless device at a receiving device where the communication designated for transmission through the receiving device, recognizing a non-address portion of the communication as indicative of a command for the receiving device, and terminating the communication at the receiving device. | 04-02-2009 |
20090116445 | ACTIVE HANDOFFS IN A NETWORK - Techniques for transferring a communication connection for a client device from a source network device to a target network device include receiving first and second sequence numbers and applying a first processing technique to data segments associated with sequence numbers that succeed the first and the second sequence numbers. | 05-07-2009 |
20090156165 | Attracting Access Terminals - Disclosed is a method that includes determining an identifier of an access terminal authorized to use an access point, and transmitting a service redirection message including the identifier. The method also includes transmitting a parameter that instructs the access terminal to wake up during the particular time slot in the repeating interval. | 06-18-2009 |
20090164547 | PROVIDING ZONE INDICATIONS FOR WIRELESS NETWORKING - Methods and systems for communicating over a wireless network are described. A private access point sends indication information to a mobile station that includes available services provided by the private access point. | 06-25-2009 |
20090168766 | Inter-Technology Bridging Over Access Points - A radio node bridges a first communication session from an access terminal using a first communication protocol to a network using a second communication protocol, and requests that a second communication session between the access terminal and the network be established, the second communication session using the first communication protocol. The radio node receives instructions for the access terminal to join the second session and instructs the access terminal to transfer an active call from the first session to the second session. | 07-02-2009 |
20090170475 | Secure Mobile Base Station Connections - In addition to other aspects disclosed, through a non-secure network, one or more bidirectional secure logical connections are established between a mobile base station and a secure network interface. | 07-02-2009 |
20090172169 | SECURE PROXIES FOR FLAT NETWORKS - A proxy is in communication with an internet protocol network and a mobile operator network. The proxy receives first communications from access points via the internet protocol network, transmits content from the first communications to the mobile operator network, receives second communications from the mobile operator network, and transmits content from the second communications to the access points via the internet protocol network. The proxy may perform operations based on the first and second communications received from either the access points, or from the mobile operator network. The operations performed by the proxy may include modifying the communications, saving certain information regarding the communications, performing authentication, encryption, or decryption of the communications, determining a destination for the communications, or sending the communications to a destination. | 07-02-2009 |
20090172397 | IMS Security for Femtocells - A mobile station can be authenticated by, for example, sending a challenge to a mobile station, and receiving a first authentication response from the mobile station through a wireless link, the first authentication response being generated based on the challenge and an authentication key stored at the mobile station. A second authentication response is generated based on the first authentication response. The second authentication response is provided to an IMS network for authenticating the mobile station to enable the mobile station to access the IMS network. In some examples, an authentication response of the mobile station is carried in an SIP message sent from the femtocell to a server that can authenticate the mobile station or forward the authentication response to another server that can authenticate the mobile station. Authentication of the mobile station can be performed as an integrated part of or separate from a registration process. | 07-02-2009 |
20100054219 | Private Access Point Beacon Signals In Wireless Networks - This patent application relates to private access point beacon signals in wireless networks. | 03-04-2010 |
20100157941 | ACCESS TERMINAL HAND-OFF METHODS IN WIRELESS NETWORKS - This description relates to access terminal hand-off methods in wireless networks. | 06-24-2010 |
20100167742 | GEOGRAPHY AWARE PEER-TO-PEER OVERLAY CREATION - In general, a first private access point detects a neighboring private access point. An address of the neighboring private access point is identified, and a peer-to-peer network that includes the first private access point and the neighboring private access points is formed. The peer-to-peer network is maintained between the first private access point and the neighboring private access points. | 07-01-2010 |
20100202362 | Network-Initiated Session Recovery - Techniques for network-initiated session recovery are described. A relationship is maintained between two identifiers both associated with a session between a first device and an access terminal in a wireless network. The first identifier is associated with the first device, and the second identifier is associated with a second device in communication with the first device. After a breach of the session, communications associated with the session are preserved based on the relationship between the first and second identifiers. | 08-12-2010 |
20100284370 | WIRELESS NETWORK INTER-TECHNOLOGY HANDOFFS - In general, a method is described for handing off a communication session associated with a mobile device from a first network running a first technology to a second network running a second technology different from the first technology, the method comprising: establishing a communication channel with the mobile device through the first network; and enabling, through the communication channel, a handoff of the communication session associated with the mobile device from the first network to the second network. | 11-11-2010 |
20120178415 | Secure Mobile Base Station Connections - In addition to other aspects disclosed, through a non-secure network, one or more bidirectional secure logical connections are established between a mobile base station and a secure network interface. | 07-12-2012 |
20130136104 | ACTIVE HANDOFFS IN A NETWORK - Techniques for transferring a communication connection for a client device from a source network device to a target network device include receiving first and second sequence numbers and applying a first processing technique to data segments associated with sequence numbers that succeed the first and the second sequence numbers. | 05-30-2013 |