CN101243717B - System selection and acquisition for WWAN and WLAN systems - Google Patents

System selection and acquisition for WWAN and WLAN systems Download PDF

Info

Publication number
CN101243717B
CN101243717B CN200680029895.5A CN200680029895A CN101243717B CN 101243717 B CN101243717 B CN 101243717B CN 200680029895 A CN200680029895 A CN 200680029895A CN 101243717 B CN101243717 B CN 101243717B
Authority
CN
China
Prior art keywords
wlan
profile
wlan system
record
prl
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN200680029895.5A
Other languages
Chinese (zh)
Other versions
CN101243717A (en
Inventor
迪帕克·坎德尔瓦尔
塞尔瓦拉杰·贾伊库马尔
内田信行
罗泰姆·库珀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qualcomm Inc
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/217,925 external-priority patent/US7593730B2/en
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Publication of CN101243717A publication Critical patent/CN101243717A/en
Application granted granted Critical
Publication of CN101243717B publication Critical patent/CN101243717B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

A preferred roaming list (PRL) carries system and acquisition records for wireless wide area network (WWAN) systems and wireless local area network (WLAN) systems. New system and acquisition records may be defined for WLAN. The PRL and system and acquisition records may be defined to be backward compatible with TIA-683-C. System and acquisition information for WLAN systems may be stored in the new system and acquisition records, respectively. Information used to perform encryption and/or authentication for WLAN systems may be stored in a separate WLAN authentication profile table. The system record for each WLAN system indicates a acquisition record and a profile record for that WLAN system. A network identifier table may also carry system records and profile records for WLAN systems. The system records carry information used for WLAN system selection and acquisition. The profile records carry information used to perform encryption and/or authentication for WLAN systems.

Description

The system that is used for WWAN and wlan system selects and obtains
Advocate priority according to 35U.S.C § 119
Present application for patent was advocated based on the 60/691st of being entitled as of application on June 17th, 2005 " Addition of WLAN Systeminformation in the PRL (Preferred Roaming List) and user ' s private WLAN system list toenact ", the priority of No. 947 provisional application cases, it is incorporated herein by reference clearly.
Technical field
The present invention relates generally to communication, and more particularly relate to the technology of selecting and obtaining for by the wireless device implementation system.
Background technology
Wireless communication system is widely used in to be provided such as voice, bag data etc. various communication services.Described system can support multi-address system with a plurality of telex networks by sharing free system resources.The example of this multi-address system comprises code division multiple access (CDMA) system, time division multiple access (TDMA) system, reaches frequency division multiple access (FDMA) system.Cdma system can be implemented one or more CDMA standards known in the technique, for example IS-2000 and IS-95 (be commonly referred to " 1x-EV-DV " or only be " 1x "), IS-856 (being commonly referred to " 1x-EV-DO ") etc.
Support the wireless device (for example, cellular phone) of 1x and/or 1x-EV-DO usually to keep optimum roaming list (PRL).This PRL contains to help the described wireless device information that (especially when described wireless device is being roamed) implementation system is selected and obtained in 1x and 1x-EV-DO system.Described PRL identifies " being under an embargo " system that " through license " system that described wireless device should use and (optionally) described wireless device should not use.
Set forth described PRL form for 1x among the document TIA/EIA/IS-683-A that can openly obtain that be entitled as in June, 1998 " Over-the-Air Service Provisioning of Mobile Stations in SpreadSpectrum Standards, ".Set forth described PRL form for 1x-EV-DO among the document TIA-683-C that can openly obtain equally that be entitled as in March, 2003 " Over-the-Air Service Provisioning of Mobile Stations inSpread Spectrum Standards, ".TIA-683-C definition (1) can transmit the PRL form of the expansion of 1x and both PRL information of 1x-EV-DO system based on IS-683-A and PRL form and (2) that can transmit the PRL information of 1x system.TIA-683-C is compatible with IS-683-A backward.
1x and 1x-EV-DO system can be selected and obtain to the wireless device of the PRL of Memory Extension.Yet other system that is not covered by TIA-683-C can not be selected and obtain to described wireless device.
Summary of the invention
This paper sets forth the technology of selecting and obtaining for implementing radio wide area network (WWAN) system and WLAN (WLAN) system of systems.Described WWAN system can be the system of 1x system, 1xEV-DO and/or some other type.Described wlan system can be the system of EEE 802.11 systems and/or some other type.
In one aspect, PRL carries the system log (SYSLOG) of WWAN and wlan system and obtains record.Can define for WLAN the record that obtains of the system log (SYSLOG) of one or more newtypes and one or more newtypes.Described PRL and new system and obtain record can be through definition with compatible with TIA-683-C backward.The system of wlan system and obtaining information are stored in discriminably and are included in the new system among the described PRL and obtain in the record.Described PRL may be programmed in the wireless device and/or can the normal mode wireless transmission.Can be stored in independent WLAN checking profile in order to the encryption of implementing wlan system and/or checking with security-related information.The system log (SYSLOG) of each wlan system can indicate can be applicable to described wlan system obtain the record and the profile record.
In yet another aspect, system of systems record and the profile record of network identifier table storage wlan system and possible other type.Described system log (SYSLOG) carries the information of selecting and obtaining for system.System log (SYSLOG) in the described network identifier table does not need backward compatible with TIA-683-C and can carry relevant information with effective means through definition.Described profile record carries for the encryption of implementing wlan system and/or the information of checking.
Hereinafter will further elaborate various aspect of the present invention and embodiment.
Description of drawings
Read by reference to the accompanying drawings the detailed description of above enumerating, will be easier to understand feature of the present invention and character, in all are graphic, identical assembly corresponding to reference symbol identification.
Fig. 1 shows the deployment about WWAN and wlan system.
Fig. 2 shows the PRL that has for the structure of IS-683-A and TIA-683-C.
Fig. 3 shows the PRL by the expansion of TIA-683-C definition.
Fig. 4 A shows the system log (SYSLOG) of the expansion that is used for WLAN.
Fig. 4 B and 4C show the record that obtains of two expansions that are used for WLAN.
Fig. 5 shows the checking profile that is used for WLAN.
Fig. 6 A and 6B show two checking profiles that are used for WLAN.
Fig. 7 shows the network identifier table that is used for WLAN.
Fig. 8 shows the process that is used for the implementation system selection and obtains.
The calcspar of Fig. 9 display radio device.
Embodiment
In this article, ' exemplary ' word is used for meaning ' separating as example, example or example '.In this article, the embodiment of any being called ' exemplary ' or design all may not be considered as better or favourable than other embodiment or design.
Fig. 1 shows the deployment about WWAN 100 and WLAN 102.WWAN 100 provides large geographic area (for example, a city, a state etc.) communication overlay.WLAN 102 provides the communication overlay to less geographic area (for example, a commercial street, a campus, a shop etc.).The overlay area of WWAN 100 can or can be not and the covering area overlapping of WLAN 102.
WWAN 100 can be the network of 1x network, 1xEV-DO network or some other type.WWAN 100 comprises that one or more systems and each system comprise one or more less networks.By each system in system identification (SID) the value identification 1x network, and pass through each less network that Network Recognition (NID) value is identified each 1x system.Use system and network in sub-network-ID identification 1xEV-DO network, described sub-network-ID can be that the IPv6 presentation format term " network " described in the upper and RFC2460 that follows as being entitled as in December, 1998 " Internet Protocol; Version 6 (IPv6) Specification, " long to 128 is used interchangeably sometimes with " system ".
WWAN 100 generally includes many supports to the base station 110 of the communication of the wireless device 120 in the overlay area of described WWAN.For for purpose of brevity, only show three base stations 110 of WWAN 100 among Fig. 1.The base station normally can with the fixed station of wireless device, and also can be called base transceiver station (BTS) (1x term), access point B (1xEV-DO term) or some other term.Wireless device 120 spreads all over the overlay area of WWAN 100.Wireless device also can be described as travelling carriage (1x term), user/access terminal (1xEV-DO term), subscriber equipment (UE), mobile device (ME), subscriber unit or some other term.Wireless device can be cellular phone, personal digital assistant (PDA), radio modem, mobile phone etc.Mobile switching centre (MSC) 130 provides coordination and the control to the base station 110 among the WWAN100.
WLAN 102 can be the network of IEEE 802.11 networks or some other type.WLAN 102 can implement one or more standards known in the technique, for example IEEE Std 802.11a-1999 (being commonly referred to " 802.11a "), IEEE Std 802.11b-1999 (being commonly referred to " 802.11b "), IEEE Std 802.11g-2003 (being commonly referred to " 802.11g ") etc.According to the deployment size of WLAN 102, described WLAN can comprise one or more systems.By going up to 32 long services set identifier (SSID) identifications.WLAN 102 comprises that one or more supports are to the access point 112 of the communication of the wireless terminal 122 in the overlay area of described WLAN (for example, laptop computer) and wireless device 120.For simplicity's sake, three access points 112 that in Fig. 1, only show WLAN 102.For centralized architecture, system controller 132 provides coordination and the control to the access point 112 among the WLAN 102.
For 1x and 1xEV-DO, wireless device is kept the optimum roaming list (PRL) of selecting and obtaining for system.Between manufacturing or active period, described wireless device can have described PRL via serial or USB interface programming.But described wireless device is the described PRL of wireless downloading and/or obtain described PRL from the removable module that is inserted in the described wireless device also.Described wireless device is stored in described PRL in the nonvolatile memory, and described nonvolatile memory can be in described wireless device or removable module.
Fig. 2 shows the PRL200 that has for the structure of IS-683-A and TIA-683-C.PRL200 comprises system table 210 and obtains table 250.System table 210 comprise row by geographic area (GEO) tissue through permitting and the system/network that is under an embargo.For the purpose of clear, Fig. 2 shows each geographic area that represents by each flag table.Each flag table comprises the section 220 of optimum decision system/network that described wireless device should access and the section 230 of the system/network that is under an embargo that described wireless device should not access.
For 1x and 1xEV-DO, described system table and obtain table and have a different-format.Fig. 2 shows the PRL form that is used for 1x.The label table of each geographic area comprises that one or more records of one or more system/networks in (1) described geographic area reach the field of the relevant information of (2) a plurality of each record.Described field comprises system field, selects precedence field, roams indication field and obtains index field.For each record, described system field storage assignment gives (SID, the NTD) of the system/network that is associated with described record right.Described selection precedence field indication all priority through associated system/network described in licensing system/network in described same geographical area.Virtual network operator is the described priority of regulation usually.Described roaming indication field regulation is when should how described roaming designator being shown on the described wireless device when the described system/network that is associated receives the roaming designator.The described index field storage index value that obtains, described index value point to the specific record that obtains the parameter that contains to obtain described associated system/network in the table 250.Obtain table 250 and comprise a record for each unique index value.Each obtains and records a plurality of fields that comprise for the various parameters of system acquisition.For dissimilar system, the described record that obtains has different forms.
Fig. 2 shows the diagram of the PRL that is used for 1x.The PRL that is used for 1xEV-DO has different-format.Local 1x and 1xEV-DO both, described PRL information is stored as a file usually.
Fig. 3 shows the file 300 of the PRL that contains expansion, and it is the PRL that is the PRL form of the defined expansion of TIA-683-C.The PRL of described expansion contains many fields, and all described fields are shown among Fig. 3.Table 1 provides the cutline to each field among the PRL of described expansion.
The PRL of table 1-expansion
Figure 2006800298955A00800011
Figure 2006800298955A00800021
Conventionally, the PRL of described expansion contains the system log (SYSLOG) of the expansion that is useful on 1x and/or 1xEV-DO system, the record that obtains of expansion reaches shared sub-network record.Store the wireless device of the PRL of this expansion and only can select and obtain 1x and 1xEV-DO system.
In one aspect, define a kind of PRL of enhancing, the PRL of described enhancing can carry the system log (SYSLOG) of the expansion of WLAN and WWAN system, the record that obtains of expansion reaches shared sub-network record.In one embodiment, the PRL of described enhancing has the form shown in the table 1, comprises all described fields of the PRL of described expansion, and compatible with TIA-683-C backward.Support the wireless device (it is called old wireless device) of TIA-683-C can extract from the PRL of described enhancing the record that is used for 1x and 1xEV-DO system and the record of ignoring or abandon wlan system.Support the new wireless device of the PRL of described enhancing can extract the record of wlan system and use described record to carry out the automatic selection of described wlan system and obtain.
The system log (SYSLOG) of the expansion that TIA-683-C definition row are two types: one type is used for the 1x system and another kind of type is used for the 1xEV-DO system.Can define for wlan system the system log (SYSLOG) of the expansion of newtype.
Fig. 4 A shows the system log (SYSLOG) 410 of the expansion of WLAN.As shown in Figure 3, the system log (SYSLOG) 410 of expansion can be the one in the system log (SYSLOG) of the expansion in the system table of expansion in the PRL of described enhancing.The system log (SYSLOG) 410 of expansion contains all fields and (2) the new PROFILE_ID field in the system log (SYSLOG) of the defined expansion of (1) TIA-683-C.
Contain the information of the SSID that is assigned to wlan system through the system log (SYSLOG) of WLAN expansion, it can be the access point of a group.Described SSID is ASCII string (for example, " ABC "), described ASCII string can go up to 32 long and append to all that send in the described wlan system and wrap to identify the bag that belongs to described system.Described system log (SYSLOG) through the WLAN expansion can contain the SSID of described wlan system or point to the position that shares the described SSID of storage in the sub-network table.
Table 2 is listed the field through the system log (SYSLOG) 410 of WLAN expansion.Provide a cutline of each field in the table 2, and hereinafter provide being described in more detail of some relevant field.
Table 2-is used for the system log (SYSLOG) of the expansion of WLAN
Figure 2006800298955A00800022
Figure 2006800298955A00800031
Described type particular system ID through the system log (SYSLOG) 410 of WLAN expansion comprises the various field relevant with WLAN.If described record just as the prefix of SSID, then is set as " 1 " with the PREFIX field.WLAN disposes can have many systems, and described system can be assigned similar SSID, for example " ABC1 ", " ABC2 ", " ABC3 " etc.If described PREFIX field is set as " 1 " and described ssid field is set as " ABC ", then wireless device can anyly have the wlan system of " ABC " SSID prefix (for example " ABC1 ", " ABC2 ", " ABC3 " etc.).It is described in the system log (SYSLOG) of WLAN expansion or in the described shared sub-network table that the SUBNET_COMMON_INCLUDED field indicates described SSID to be stored in.If SUBNET_COMMON_INCLUDED=" 0 " then described SSID are stored in the described ssid field, and omit SUBNET_COMMON_OFFSET.On the contrary, if SUBNET_COMMON_INCLUDED=" 1 " then omits described ssid field, and described SSID is stored in the described shared sub-network table by the indicated position of SUBNET_COMMON_OFFSET field.Each shared sub-network record can be stored 15 (or a plurality of eight bit bytes).Thereby, 15 of first of described SSID are stored in by in the indicated shared sub-network record of SUBNET_COMMON_OFFSET field, and 15 of the next ones of described SSID (if existence) are stored in next shared sub-network record, and described SSID last two (if existence) are stored in subsequently the shared sub-network record.The SUBNET_COMMON_OFFSET field that in the described shared sub-network table described first shares the sub-network record is zero.Described SSID_LENGTH field is indicated the length (with eight bit byte) of described SSID.Described SSID_LENGTH field is set as 0 with indication wildcard SSID, and described wildcard SSID meaning can be obtained the wlan system with any SSID.
A plurality of WWAN in the set geographic area and/or wlan system can be associated together and be assigned a connective marker unique concerning described geographic area.For instance, 1x system, 1xEV-DO and/or the wlan system in same geographical area can be associated together.Wireless device can attempt obtaining the 1x system when switching on for the first time, then identifies the wlan system that joins with the 1x System Dependent that obtains, and then attempts obtaining the wlan system that is associated.The described wireless device of related permission more promptly obtains wlan system based on the 1x system.
Described PROFILE_ID field is pointed to and the described checking profile that is associated through the system log (SYSLOG) of WLAN expansion.For WLAN, described checking profile contains security related information as mentioned below.For 1x and 1xEV-DO, described checking profile can contain the information such as secret that access identifier (NAT) and specified point-p-some agreement/checking, authorize and keep accounts (PPP/AAA) checking and use in accordance with regulations according to TIA-683-C such as particular network in simple IP or Mobile IP profile.Conventional wireless devices can after described DATA_ASSOCIATION field, stop described expansion system log (SYSLOG) processing and will skip described PROFILE_ID field.New wireless device will continue to process described PROFILE_ID field.Another is chosen as, and described PROFILE_ID field can be included in the described type particular system ID record.
TIA-683-C defined 12 types expansion obtain record.Can for WLAN define two kinds of newtypes expansion obtain record: a kind of newtype is used for wlan system and obtains (use channel) record and another kind of newtype and be used for general wlan system and obtain record.
Fig. 4 B shows that wlan system obtains (use channel) record 420.As shown in Figure 3, obtain the one in the record obtained of obtaining expansion in the table that record 420 can be expansion in the PRL of described enhancing.Obtain record 420 and can be used for obtaining the wlan system that uses particular channel.
Table 3 provides the cutline to each field of obtaining record 420, obtains the one or many appearance that record 420 can comprise the CHAN field.Each CHAN field indication is used for the particular channel of described wlan system.Each channel is corresponding to the characteristic frequency in the set frequency band.For instance, 802.11 pairs of 2.4GHz frequency bands of IEEE have defined 14 channels that are in 14 different frequencies.Described NUM_CHANS and CHAN field are respectively that 5 and 11 are long, employed NUM_CHANS and CHAN field among this coupling TIA-683-C.Hereinafter set forth other field of obtaining table 420.
Table 3-WLAN system acquisition (use channel) record
Figure 2006800298955A00800041
Figure 2006800298955A00800052
Figure 2006800298955A00800053
Fig. 4 C shows that general wlan system obtains record 430.As shown in Figure 3, obtain record 430 can be in the PRL of described enhancing expansion obtain the one in the record obtained of expanding in the table.Obtain the wlan system that record 430 can be used for obtaining the specific WLAN frequency band that uses management organization's defined.Table 4 provides the cutline of each field of obtaining record 430.
The general wlan system of table 4. obtains record
Figure 2006800298955A00800054
Table 5 is listed the band type of an exemplary set of described WLAN_BAND_CLASS field.Each band type with by cura specialis mechanism the defined certain specification of special frequency band (for example, to through-put power) is associated.The wireless device foundation is by the indicated standardized operation that is associated with described band type of the WLAN_BAND_CLASS field of obtaining record of described expansion.Table 5 is also listed the type of skill of an exemplary set, and wherein A, B and G refer to 802.11a, 802.11b and 802.11g respectively.Wireless device is according to indicated technical operations in the WLAN_TECHNOLOGY field of obtaining record of described expansion.
Table 5
Figure 2006800298955A00800056
Figure 2006800298955A00800061
Fig. 3 shows system's selection and PRL and the system that obtains and the specific embodiment that obtains record of supporting wlan system to 4C and table 1 to 5.In general, for the selection that can be used for wlan system of any type and the information of obtaining, described PRL and system and obtain record and can comprise any amount of field.
Fig. 5 shows the WLAN checking profile 500 of storage WLAN checking profile.The cutline that provides each field of profile 500 is provided table 6.
Table 6-WLAN checking profile
The definition of WLAN checking profile will be for encryption and/or the checking (if existence) of wlan system.Described WLAN checking profile contains security related information, the type (if existence) of the type of the encryption that for example will use (if existence), the checking that will use and be correlated with and verify and encryption parameter.
Table 7 is listed the embodiment of the possible field of WLAN checking profile.The PROFILE_ID field contains the profile ID value of described WLAN checking profile.Be that 0 profile ID value can be assigned to default WLAN checking profile, described default WLAN checking profile can be used for listing among wlan system unlisted among (1) described PRL and/or the described PRL but without the WLAN of WLAN checking profile.The indication of MOBILE_IP_PROFILE_ID field will be verified the Mobile IP profile that profile is used together with described WLAN.The authorization information of described Mobile IP profile storing mobile IP.The hexadecimal value of the 0xFF of MOBILE_IP_PROFILE_ID field can be indicated the use (if existence) of effective Mobile IP profile.Hereinafter set forth other field of described WLAN checking profile.
Table 7-is used for the field of WLAN checking profile
Figure 2006800298955A00800071
Figure 2006800298955A00800072
Various encryptions and proof scheme can be used for WLAN.For encrypting, have the Wired Equivalent Privacy (WEP) of 40 and 104 cipher key size, the temporary transient complete agreement of key (TKIP), Advanced Encryption Standard (AES), some other encryption or can be used for WLAN without encryption.Concerning checking, can be used for WLAN based on the checking of WEP, extensible authentication protocol (EAP), the protected access of Wi-Fi (WPA), some other checking or without checking.EAP comprises a plurality of different embodiments, for example EAP-TLS (Transport Layer Security) and EAP-MD5 (Message Digest 5 5).EAP-TLS utilizes the secure communication with radius authentication server.Described various encryption and proof scheme are known in technique.Set forth the checking that in 3GPP2, is used for WLAN among the document 3GPP2X.S0028 of " Wireless Local Area Network (WLAN) Interworking, " in being entitled as of can openly obtaining.
Table 8 has been listed the encryption type of an exemplary set and the Authentication-Type of an exemplary set, and described encryption type and Authentication-Type can be supported WLAN.Wireless device is implemented to encrypt and further implement checking based on (if existence) proof scheme indicated in the described AUTHENTICATION_TYPE field according to (if existence) encipherment scheme indicated in the described ENCRYPTION_TYPE field.The use of WEP checking means enabling of WEP encryption.802.1X_TLS indication is by the IEEE 802.1X/EAP of TLS, the 802.1X_MD5 indication is by the IEEE802.1X/EAP of MD5, and WKEY indication WLAN long term keys (it is set forth among the 3GPP2X.S0028).Checking means via radius server enforcement checking " to pass through RADIUS "." by certificate ID " checking means by the key certificate that obtains from the safety certificate mandate implements checking.
Table 8
Figure 2006800298955A00800081
Each Authentication-Type can be associated with the field of a particular group of relevant parameter.Table 9 has been listed the field of each given in the table 8 Authentication-Type.For each Authentication-Type, " x " of set Authentication-Type specific fields means that described field is included in the WLAN checking profile of described Authentication-Type.
Table 9-is used for the Authentication-Type specific fields of WLAN
Figure 2006800298955A00800082
Fig. 6 A shows the WLAN checking profile 610 (AUTHENTICATION_TYPE=1) that is used for the WEP checking.For checking profile 610, WEP_KEY_ID1 contains 4 safe keys that are used for WEP to the WEP_KEY_ID4 field.It is default key that described DEFAULT_WEP_KEY_ID field is indicated which one in described 4 WEP safe keys.For 64 WEP, the size of each is 5 eight bit bytes in described 4 wep encryption key fields, and for 128 WEP, is 13 eight bit bytes.For each wep encryption key field, key [0] contains the least significant bit of wep encryption key, and the described least significant bit of key [0] contains the least significant bit of described wep encryption key.
Fig. 6 B shows the WLAN checking profile 620 (AUTHENTICATION_TYPE=4) that is used for based on the 802.1X checking of the MD5 with RADIUS.For checking profile 620, the length of 802.1X_ED_LEN field indication 802.1X_ID field, its can be upper to 72 long.Described 802.1X_ID field contains the ID that is useful on based on the process of RADIUS, and it is by having the form of user realm.The size of described 802.1X_PASSWORD_LEN field indication 802.1X password field, its can be upper to 31 long.Described 802.1X_PASSWORD field store is used for the MD-5 shared secret based on the 802.1X checking of RADIUS.
Can form based on table 7 and 9 the WLAN checking profile of other Authentication-Type.For AUTHENTICATION_TYPE=2, the 802.1X_PASSWORD field store is used for the 802.1X password of WPA in the family/small office/home office that does not use RADIUS to verify.This password is used for initial TKIP encryption program.
Fig. 5,6A and 6B and table 7,8 and 9 show the specific embodiment of WLAN checking profile and different WLAN checking profile.In general, described profile and profile can comprise and can be used for encrypting, verify and/or any amount of field of the information of any type of other purpose.For instance, can support encryption and the checking of other type, and in described profile, can be formed for by these other type of encryption and verify the different field of employed different parameters.
For above-described embodiment, the PRL of expansion contains the record that obtains of the system log (SYSLOG) of expansion of WWAN and wlan system and expansion, and WLAN checking profile contains the WLAN checking profile of described wlan system.The PRL of described expansion produces to realize that by Virtual network operator required system uses usually, for example wireless device is directed to the system and/or the described Virtual network operator that are operated by described Virtual network operator and has the system of cross license.Described WLAN checking profile contains to be useful on to be encrypted and the security related information of checking and can being stored in the file that the file with the PRL of described expansion separates.
The PRL of expansion can be associated with specific WLAN checking profile.This is because the PROFILE_ID in the system log (SYSLOG) of the expansion in the PRL of described expansion points to the certain profiles record in the described WLAN checking profile.Virtual network operator can produce not the PRL of expansion on the same group and WLAN checking profile (for example) to be used for different service plans.Then, each wireless device can be stored PRL and the WLAN checking profile of one group of expansion of institute's booking service scheme.
In the above-described embodiments, be used for the information that wlan system is selected and obtained to store with the form of TIA-683-C compatibility backward.Describedly select and the information obtained can more effectively be stored in the file that need not backward with the TIA-683-C compatibility for wlan system.
Fig. 7 demonstration contains network identifier (NT) table 700 that is useful on the selection and obtains the information of wlan system.Network identifier table 700 can be by the keeper of wireless user, WLAN, Virtual network operator and/or some other entity set-up of WWAN.Network identifier table 700 can customize and can maybe need to make amendment by hope for each wireless device.For instance, described wireless user can stipulate each SSID and associated parameter thereof and described SSID can be stored in the described network identifier table.Table 10 provides the cutline to each field in the network identifier table 700.
Table 10-network identifier table
Figure 2006800298955A00800091
The first system record (system log (SYSLOG) 0) in the described system table can be used for storing the wlan system information of being keyed in by the user.When the user manually typed in system information, this information was initially stored in the system log (SYSLOG) 0.If the user wishes for good and all to preserve described system information, then described information is stored as another system log (SYSLOG) in the described system table.
The first profile in the described profile (have be 0 profile ID value) can be used for storing the profile information of manually being keyed in by the user.If the user wishes for good and all to preserve described profile information, then described information is stored as another profile in the described profile.Correspondingly, upgrade the PROFILE_ID field of each system log (SYSLOG) that uses this profile.
Fig. 7 goes back the system log (SYSLOG) 710 in the system table in the display network identifier list 700.Table 11 provides the cutline to each field of system log (SYSLOG) 710.
Table 11-is used for the system log (SYSLOG) of network identifier table
Figure 2006800298955A00800092
Described WLAN_BAND_CLASS field is indicated the band class of described wlan system and can as shown in table 5ly be encoded.Described WLAN_TECHNOLOGY field is indicated the technology of described wlan system and also can as shown in table 5ly be encoded.Another is chosen as, and 802.11a, 802.11b and 802.11g are associated with the position 0,1 and 2 of described WLAN_TECHNOLOGY field discriminably and each can be set as " 1 " with the described technology of indication support.For instance, for 802.11a is supported in the hexadecimal value indication of 0x01, be 0x02802.11b, be that 802.11g is supported in the value indication of 0x4, for the value indication of 0x06 is supported 802.11b and 802.11g and supported 802.11a, 802.11b and 802.11g for the value indication of 0x07.
Described CHANNEL field is indicated described channel and can is from 1 to 14 for 802.11b/g.Be that 0 channel can mean it is arbitrary channel.In the described GROUP MASK field each can represent different groups.Being set as " 1 " by the institute's rheme with arbitrary set group can be associated system log (SYSLOG) with described group.
For the embodiment shown in the table 11, SSID, the WLAN_MODE of the system log (SYSLOG) that wireless device can be from the described network identifier table of arbitrary coupling and the wlan system of GROUP_MASK field obtain service.For this embodiment, there is not priority between the wlan system in same geographical area.In other embodiments, described system log (SYSLOG) can comprise indicating other field of priority.
Can be for the dissimilar system log (SYSLOG) of different technologies (for example 802.11,1x, 1xEV-DO etc.) definition, and can be included in the network identifier table 700.Different system record type can be associated from different technology specific fields.Other system of systems record that this allows network identifier table 700 storage wlan system and utilizes other technology.
Fig. 3 to 7 and table 1 show the PRL of expansion of the information that the system can store to implement wlan system selects, obtains, encrypts and verifies and the specific embodiment of network identifier file to 11.In general, described information can be stored in (1) arbitrary schedule of quantities, arbitrary quantity record and the arbitrary amount field, and (2) use table, record and the field of arbitrary form to store.Described system and obtaining information can be stored in independent system and obtain in the record (as shown in Figure 3) or described system log (SYSLOG) in (as shown in Figure 7).Be used for to encrypt and the information of checking can be stored in independent profile record (as shown in Figure 7) or can combined with described system log (SYSLOG) (not showing) in any described diagram.
Fig. 8 display radio device is to carry out the embodiment that the process 800 of implementing was selected and obtained in system.At first, the PRL (square 810) that contains the information of WWAN and wlan system from the acquisition of (for example) nonvolatile memory.Described PRL is used for system and selects and obtain (square 820).For the embodiment of the square 820 shown in Fig. 8, obtain one or more records (square 822) that obtain from described PRL.Obtain record searching and obtain WWAN and/or wlan system (square 824) based on described.Obtain record with one at every turn and attempt obtaining, and select the record that obtains among the described PRL with predesigned order (for example, continuous).Can (for example) obtain wlan system based on described technology indicated in the record, band class and/or the channel of obtaining.After obtaining at least one system, obtain the system that has obtained and be in WWAN the same geographical area and/or the system log (SYSLOG) (square 826) of wlan system from described PRL.Select WWAN system or wlan system (square 828) in the described geographic area based on the priority of WWAN described in (for example) described geographic area and wlan system.As shown in table 2 and Fig. 4 A, described priority can be by the PRI field in the described system log (SYSLOG), PREFIX field and/or the indication of other field.If not yet obtain selected system, then obtain record based on it and implement obtaining of selected system.Can implement repeatedly described system selects and obtains in order to obtain service from retrievable most preferred system.
In another embodiment, initial obtaining record searching and obtaining the 1x system based on 1x system among the described PRL.If obtained the 1x system, the wlan system that then joins based on the definite and described 1x System Dependent of the system log (SYSLOG) among the described PRL.Can attempt one or more obtain in the described wlan system thereafter.Can also the embodied in other system select and obtain.
If selected system is wlan system (as determining in the square 830), then obtain the profile record (square 832) of described wlan system from WLAN checking profile.The profile record is indicated as described, can implement to encrypt and/or checking (square 834) for described wlan system.For instance, described profile record can be indicated and will be used which encipherment scheme (if existence) and will use which proof scheme (if existence), and can further contain the relevant information of described encryption and/or proof scheme.Then, will be according to described encipherment scheme and further based on the information pointer that is associated in the described profile record described wlan system is implemented to encrypt.Similarly, can be according to described proof scheme and further based on the information pointer that is associated in the described profile record described wlan system is implemented checking.
Also can select and obtain based on the system that the network identifier table shown in Fig. 7 and the table 10 is implemented wlan system.Can by described network identifier table with from select by the different mode implementation system of described PRL.For instance, when using described network identifier table, can be based on technology, band class, channel, WLAN pattern and/or other Standard Selection wlan system.(if existence) and checking (if existence) are selected, obtained, encrypt to Information Availability in the described network identifier table in system.
The calcspar of Fig. 9 display radio device 120x.On transmission path, to also further contain modulator (MOD) 914 processing (for example modulating, expand/channelizing, reach scramble) by encoder 912 processing (for example formaing, encode, reach staggered) by business datum and the signaling of wireless device 120x transmission, with acquisition data laminar flow.Then transmitter unit (TMTR) 922 regulates (for example, being converted to analog signal, filtering, amplification and up-conversion) described data laminar flow to produce up-conversion signal, and it is by antenna 924 transmission.On RX path, the down link signal that is transmitted by the base station 110 among the WWAN 100 and/or the access point 112 among the WLAN 102 receives and is provided to receiver unit (RCVR) 926 by antenna 924.Receiver unit 926 is regulated (for example filtering, amplification, and down-conversion) received signal and further will be signal digitalized through what regulate, to obtain data sample.Demodulator (Demod) 916 is processed (for example separate scramble, de-spread/channelizing, reach and separate modulation) described sample to obtain symbol.Decoder 918 is further processed (for example release of an interleave and decoding) described symbol to obtain through decoded data.Encoder 912, modulator 914, demodulator 916 and decoder 918 can be implemented by a modem processor 910.Described unit is implemented to process according to the WWAN that is communicated with it by wireless device 120 or the employed technology of wlan system.
The operation of unit in processor/controller 930 guiding wireless device 120x.Processor/controller 930 can implement to be used among Fig. 8 the process 800 that system selects and obtains.Procedure code and data that memory cell 932 storages are used by processor/controller 930 and other unit.Memory cell 932 can be stored network identifier (NT) table of the profile of PRL, wlan system of WWAN and wlan system and/or wlan system and possible other system.As indicated above, described PRL, profile and/or NT table can be used for system's selection and obtain.Removable module 934 comprises the nonvolatile memory that can be stored in described PRL, described profile and/or described NI table.Removable module 934 can be dismountable subscriber identification module (R-UIM) (being used for cdma2000), subscriber's identification module (SIM) (being used for W-CDMA and GSM), general subscriber identification module (USIM) (also being used for W-CDMA and GSM) etc.
PRL server 150 supports to use SMS message wireless programming PRL.PRL server 150 can form the PRL that has for the record of WWAN and wlan system, produces the data block that is used for described PRL, and described data block is forwarded to Short Message Service (SMS) service centre 140.Center 140 is compressed in described data block in one or more SMS message.MSC 130 receives described SMS message and described message is forwarded to base station 110x, base station 110x with described message wireless forwarding to the described wireless device in its overlay area.Wireless service preparatory function (OTAF) (not showing among Fig. 9) is also supported wireless programming PPvL.Described OTAF can form the PRL that has for the record of WWAN and wlan system, produces the data block that is used for described PRL, and described data block is compressed in one or more message.MSC 130 receives described message and described message is forwarded to base station 110x to be transferred to described wireless device from described OTAF.
At wireless device 120x place, processor/controller 930 can receive have the PRL that sent by PRL center 150 or described OTAF through decoded data block and described PRL can be stored in memory cell 932 and/or the removable module 934.Processor/controller 930 also can receive system and/or the security related information that is used for wlan system and described information can be stored in memory cell 932 and/or removable module 934 from the user.
Technology described herein can be implemented by various means.For instance, described technology may be implemented in hardware, software or its combination.For the hardware implementation scheme, be used for that implementation system is selected and each processing unit of obtaining may be implemented in one or more application-specific integrated circuit (ASIC)s (ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), processor, controller, microcontroller, microprocessor, other is designed for electronic unit or its combination of implementing function described herein.
For the implement software scheme, can use the module (for example program, function etc.) that to implement function described herein to implement described technology.Software code can be stored in the memory cell and carry out in (for example memory cell among Fig. 9 932) and by processor (for example processor 930).It is outside that described memory cell may be implemented in the inner or described processor of described processor.
Provide above-mentioned explaination to announcement embodiment to be intended to make arbitrary person of ordinary skill in the field can make or use the present invention.The person of ordinary skill in the field will be easy to draw the various modifications of described embodiment, and the General Principle that this paper defines is also applicable to other embodiment, and this does not deviate from the spirit or scope of the present invention.Therefore, this paper wishes the present invention is defined in embodiment illustrated herein, and wants to give its consistent with principle disclosed herein and novel feature broad range.

Claims (36)

1. one kind is used for the implementation system selection of radio wide area network WWAN system and WLAN wlan system and the method for obtaining, and it comprises:
Obtain the optimum roaming list (PRL) of at least one radio wide area network (WWAN) system and at least one WLAN (WLAN) system, wherein said PRL comprises
Each wlan system obtain record, wherein each obtains record and indicates the separately frequency band kind of wlan system; And
Point to the profile identifier of profile, described profile is corresponding to described at least one wlan system, and described profile carries the information for checking and the encryption of described at least one wlan system at least;
Wherein, described PRL and described profile comprise in a plurality of different PRL groups one group and the profile selected according to service program; And
Using described PRL to carry out system selects and obtains.
2. the method for claim 1, the described PRL of wherein said use carries out system and selects and obtain to comprise:
Obtain at least one from described PRL and obtain record;
Based on described at least one obtain record and obtain at least one system;
From described PRL obtain described at least one system that obtains of institute and and described at least one system that obtains be in WWAN in the same geographical area and the system log (SYSLOG) of wlan system; And
Select system in the described geographic area based on described system log (SYSLOG).
3. the method for claim 1, it further comprises:
Obtain the profile record of selected wlan system;
Determining based on described profile record will be for the proof scheme of described selected wlan system;
Obtain the security related information of described selected wlan system from described profile record; And
According to described proof scheme and further based on the checking of described security related information enforcement to described selected wlan system.
4. the method for claim 1, it further comprises:
Obtain the profile record of selected wlan system;
Determining based on described profile record will be for the encipherment scheme of described selected wlan system;
Obtain the security related information of described selected wlan system from described profile record; And
According to described encipherment scheme and further implement to encrypt for described selected wlan system based on described security related information.
5. the method for claim 1, wherein said PRL comprises a system log (SYSLOG) of each wlan system, and wherein the indication of each system log (SYSLOG) be associated the services set identifier (SSID) of wlan system, obtain record, profile record, priority, prefix or its combination individually.
6. the method for claim 1, wherein said PRL comprises of each wlan system and obtains record, and wherein each obtains further be associated technology, channel or its combination of wlan system of indication of record.
7. the method for claim 1, wherein said profile comprises a profile record of each wlan system, and wherein each profile records proof scheme, encipherment scheme, safe key, password, user identifier or its combination of indicating the wlan system that is associated.
8. the method for claim 1, it further comprises the described profile that acquisition further is comprised of at least one profile record, and wherein each profile record storage by the information of the definite particular type of the profile type of described profile record.
9. method as claimed in claim 8, wherein said at least one wlan system is assigned predetermined profile types value.
10. the method for claim 1, wherein said PRL backward with the TIA-683-C operating such.
11. one kind is used for the implementation system selection of radio wide area network WWAN system and WLAN wlan system and the equipment that obtains, it comprises:
The device that is used for the optimum roaming list (PRL) of acquisition at least one radio wide area network (WWAN) system and at least one WLAN (WLAN) system,
Wherein said PRL comprises
Each wlan system obtain record, wherein each obtains record and indicates the separately frequency band kind of wlan system; And
Point to the profile identifier of profile, described profile is corresponding to described at least one wlan system, and described profile carries the information for checking and the encryption of described at least one wlan system at least;
Wherein, described PRL and described profile comprise in a plurality of different PRL groups one group and the profile selected according to service program; And
Be used for using described PRL to carry out the device that system selects and obtains.
12. equipment as claimed in claim 11 is wherein said be used to using described PRL to carry out that system is selected and the device that obtains comprises:
Be used for obtaining the device that at least one obtains record from described PRL;
Be used for based on described at least one obtain the device that record obtains at least one system;
Be used for from described PRL obtain described at least one system that obtains of institute and and described at least one system that obtains be in the device of the system log (SYSLOG) of WWAN in the same geographical area and wlan system; And
Be used for selecting based on described system log (SYSLOG) the device of the system of described geographic area.
13. equipment as claimed in claim 11, it further comprises:
Device for the profile record that obtains selected wlan system;
Being used for determining based on described profile record will be for the device of the proof scheme of described selected wlan system;
Be used for obtaining from described profile record the device of the security related information of described selected wlan system; And
Be used for according to described proof scheme and further based on the device of described security related information enforcement to the checking of described selected wlan system.
14. equipment as claimed in claim 11, it further comprises:
Device for the profile record that obtains selected wlan system;
Being used for determining based on described profile record will be for the device of the encipherment scheme of described selected wlan system;
Be used for obtaining from described profile record the device of the security related information of described selected wlan system; And
Be used for according to described encipherment scheme and further based on the device of described security related information for described selected wlan system enforcement encryption.
15. equipment as claimed in claim 11, wherein said PRL comprises a system log (SYSLOG) of each wlan system, and wherein the indication of each system log (SYSLOG) be associated wlan system services set identifier (SSID), obtain record, profile record, priority, prefix or its combination.
Obtain record 16. equipment as claimed in claim 11, wherein said PRL comprise of each wlan system, and wherein each obtains record indication be associated technology, band class, channel or its combination of wlan system.
17. equipment as claimed in claim 11, wherein said profile comprises a profile record of each wlan system, and wherein each profile records proof scheme, encipherment scheme, safe key, password, user identifier or its combination of indicating the wlan system that is associated.
18. equipment as claimed in claim 11, it further comprises the device for the described profile that obtains to be comprised of at least one profile record, and wherein each profile records the information of storing the particular type of being determined by the profile type of described profile record.
19. equipment as claimed in claim 18, wherein said at least one wlan system is assigned predetermined profile types value.
20. equipment as claimed in claim 11, wherein said PRL backward with the TIA-683-C operating such.
21. one kind is used for the implementation system selection of radio wide area network WWAN system and WLAN wlan system and the method for obtaining, it comprises:
Acquisition contains at least one file of at least one WLAN (WLAN) system of systems and security related information,
Wherein said at least one file including: at least one system log (SYSLOG) of at least one wlan system, wherein each system log (SYSLOG) is indicated the separately frequency band kind of wlan system; And at least one profile, it carries the information for checking and the encryption of described at least one wlan system at least;
Wherein, described system log (SYSLOG) and described profile comprise in a plurality of different system record groups one group and the profile selected according to service program;
Wherein wireless device is used for system's selection of described at least one wlan system with described at least one file and obtains; And
Obtain and the choose WLAN system with described at least one file.
22. carrying out system, method as claimed in claim 21, described at least one file of wherein said use select and obtain to comprise:
Obtain at least one system log (SYSLOG) of described at least one wlan system from described at least one file;
Based on the one in described at least one wlan system of described at least one system log (SYSLOG) selection; And
Obtain selected wlan system based on the associated system record.
23. method as claimed in claim 21, it further comprises:
Obtain the profile record of selected wlan system from described at least one file;
Determine proof scheme based on described profile record;
If determined proof scheme for described selected wlan system, then according to the checking of the proof scheme enforcement of determining to described selected wlan system;
Determine encipherment scheme based on described profile record; And
If determined encipherment scheme for described selected wlan system, then according to the encipherment scheme of determining described selected wlan system is implemented to encrypt.
24. method as claimed in claim 21, at least one system log (SYSLOG) of described at least one wlan system of wherein said at least one file including, and wherein be associated technology, band class, channel, pattern, services set identifier (SSID) or its combination of wlan system of each system log (SYSLOG) indication.
25. method as claimed in claim 21, at least one profile record of described at least one wlan system of wherein said at least one file including, and wherein each profile records proof scheme, encipherment scheme, safe key, password, user identifier or its combination of indicating the wlan system that is associated.
26. method as claimed in claim 21, at least one other system log (SYSLOG) of at least one other system of the technology that at least one system log (SYSLOG) of described at least one wlan system of wherein said at least one file including and utilization are different from the technology of described at least one wlan system.
27. method as claimed in claim 21, it further comprises described system and both Single documents of security related information that obtains to contain described at least one wireless wlan system.
28. method as claimed in claim 21, it further comprises the first file of storing the described system information that contains described at least one wireless wlan system and the second file that contains the described security related information of described at least one wireless wlan system.
29. one kind is used for the implementation system selection of radio wide area network WWAN system and WLAN wlan system and the equipment that obtains, it comprises:
Be used for the device that acquisition contains at least one file of at least one WLAN (WLAN) system of systems and security related information,
Wherein said at least one file including: at least one system log (SYSLOG) of at least one wlan system, wherein each system log (SYSLOG) is indicated the separately frequency band kind of wlan system; And at least one profile, it carries the information for checking and the encryption of described at least one wlan system at least;
Wherein, described system log (SYSLOG) and described profile comprise in a plurality of different system record groups one group and the profile selected according to service program;
Wherein wireless device is used for system's selection of described at least one wlan system with described at least one file and obtains; And
Be used for obtaining and the device of choose WLAN system with described at least one file.
30. equipment as claimed in claim 29 is wherein said be used to using described at least one file to carry out that system is selected and the device that obtains comprises:
Be used for obtaining from described at least one file the device of at least one system log (SYSLOG) of described at least one wlan system;
Be used for selecting based on described at least one system log (SYSLOG) the device of the one of described at least one wlan system; And
Be used for obtaining based on the associated system record device of selected wlan system.
31. equipment as claimed in claim 29, it further comprises:
Be used for obtaining from described at least one file the device of the profile record of selected wlan system;
Be used for determining based on described profile record the device of proof scheme;
If be used for having determined proof scheme for described selected wlan system, then according to the device of the proof scheme enforcement of determining to the checking of described selected wlan system;
Be used for determining based on described profile record the device of encipherment scheme; And
If be used for having determined encipherment scheme for described selected wlan system, then according to the encipherment scheme of determining described selected wlan system is implemented the device of encryption.
32. equipment as claimed in claim 29, at least one system log (SYSLOG) of described at least one wlan system of wherein said at least one file including, and wherein be associated technology, band class, channel, pattern, services set identifier (SSID) or its combination of wlan system of each system log (SYSLOG) indication.
33. equipment as claimed in claim 29, at least one profile record of described at least one wlan system of wherein said at least one file including, and wherein each profile records proof scheme, encipherment scheme, safe key, password, user identifier or its combination of indicating the wlan system that is associated.
34. equipment as claimed in claim 29, at least one other system log (SYSLOG) of at least one other system of the technology that at least one system log (SYSLOG) of described at least one wlan system of wherein said at least one file including and utilization are different from the technology of described at least one wlan system.
35. equipment as claimed in claim 29, it further comprises for obtaining to contain the described system of described at least one wireless wlan system and the device of both Single documents of security related information.
36. equipment as claimed in claim 29, its further comprise for storage contain described at least one wireless wlan system described system information the first file and contain the device of the second file of the described security related information of described at least one wireless wlan system.
CN200680029895.5A 2005-06-17 2006-06-13 System selection and acquisition for WWAN and WLAN systems Expired - Fee Related CN101243717B (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US69194705P 2005-06-17 2005-06-17
US60/691,947 2005-06-17
US11/217,925 2005-08-31
US11/217,925 US7593730B2 (en) 2005-06-17 2005-08-31 System selection and acquisition for WWAN and WLAN systems
PCT/US2006/023096 WO2006138338A2 (en) 2005-06-17 2006-06-13 System selection and acquisition for wwan and wlan systems

Publications (2)

Publication Number Publication Date
CN101243717A CN101243717A (en) 2008-08-13
CN101243717B true CN101243717B (en) 2013-02-06

Family

ID=39933964

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200680029895.5A Expired - Fee Related CN101243717B (en) 2005-06-17 2006-06-13 System selection and acquisition for WWAN and WLAN systems

Country Status (2)

Country Link
CN (1) CN101243717B (en)
RU (1) RU2526024C2 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8886756B2 (en) * 2011-05-13 2014-11-11 Qualcomm Incorporated Exchanging data between a user equipment and an application server
US8590023B2 (en) 2011-06-30 2013-11-19 Intel Corporation Mobile device and method for automatic connectivity, data offloading and roaming between networks
EP3110207B8 (en) 2013-02-05 2021-09-08 Intel Corporation Online signup provisioning techniques for hotspot connections
RU2595939C2 (en) * 2014-09-16 2016-08-27 Игорь Александрович Ступак Automated system for collecting data on consumption of energy resources and electric energy counter

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1542400A2 (en) * 2003-12-12 2005-06-15 Kabushiki Kaisha Toshiba Selecting a wireless LAN access point based on a communication profile
CN1628481A (en) * 2002-02-04 2005-06-15 高通股份有限公司 Method and apparatus for configurable selection and acquisition of a wireless communications system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5999811A (en) * 1996-02-16 1999-12-07 Ericsson, Inc. Mobile telephone for roaming using dual mode/band equipment including SIM cards
US7120129B2 (en) * 2001-03-13 2006-10-10 Microsoft Corporation System and method for achieving zero-configuration wireless computing and computing device incorporating same

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1628481A (en) * 2002-02-04 2005-06-15 高通股份有限公司 Method and apparatus for configurable selection and acquisition of a wireless communications system
EP1542400A2 (en) * 2003-12-12 2005-06-15 Kabushiki Kaisha Toshiba Selecting a wireless LAN access point based on a communication profile

Also Published As

Publication number Publication date
RU2526024C2 (en) 2014-08-20
RU2009145889A (en) 2011-06-20
CN101243717A (en) 2008-08-13

Similar Documents

Publication Publication Date Title
JP4718604B2 (en) System selection and acquisition for WWAN and WLAN systems
AU2002334329B2 (en) Method and system for providing access via a first network to a service of a second network
US7945777B2 (en) Identification information protection method in WLAN inter-working
EP2979401B1 (en) System and method for indicating a service set identifier
CN100366007C (en) System, apparatus and method for SIM-based authentication and encryption in wireless local area network access
Willassen Forensics and the GSM mobile telephone system
CN101300861B (en) Method for connecting a second communication network having a connection node to a first communication network having a contact node
EP1146692A2 (en) Apparatus, and associated method, for facilitating authentication of communication stations in a mobile communication system
US20210084489A1 (en) Terminal information transfer method and relevant products
KR20050075025A (en) Method for operating terminals of a mobile radio communication system
TW201127099A (en) Apparatus and method for over-the-air (OTA) provisioning of authentication and key agreement (AKA) credentials between two access systems
EP3213545B1 (en) Identification of a wireless device in a wireless communication environment
US20040133806A1 (en) Integration of a Wireless Local Area Network and a Packet Data Network
CN101243717B (en) System selection and acquisition for WWAN and WLAN systems
EP2277298A1 (en) User-type handling in a wireless access network
CN117812574A (en) Communication method and communication device
US20140105163A1 (en) Communication Method and Apparatus
KR100582553B1 (en) Connection authentication method of public wireless-LAN and mobile internet using cipher key generated in 3G authentication
Lawson-Body et al. The Decision Making Process of Integrating Wireless Technology into Organizations

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130206

CF01 Termination of patent right due to non-payment of annual fee