RU2526024C2 - System selection and connection for wwan and wlan systems - Google Patents

System selection and connection for wwan and wlan systems Download PDF

Info

Publication number
RU2526024C2
RU2526024C2 RU2009145889/07A RU2009145889A RU2526024C2 RU 2526024 C2 RU2526024 C2 RU 2526024C2 RU 2009145889/07 A RU2009145889/07 A RU 2009145889/07A RU 2009145889 A RU2009145889 A RU 2009145889A RU 2526024 C2 RU2526024 C2 RU 2526024C2
Authority
RU
Russia
Prior art keywords
system
wlan
wlan system
file
authentication
Prior art date
Application number
RU2009145889/07A
Other languages
Russian (ru)
Other versions
RU2009145889A (en
Inventor
Дипэк ХАНДЕЛВАЛ
Селварадж ДЖЭЙКЬЮМАР
Нобуюки Утида
Ротэм КУПЕР
Original Assignee
Квэлкомм Инкорпорейтед
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US69194705P priority Critical
Priority to US60/691,947 priority
Application filed by Квэлкомм Инкорпорейтед filed Critical Квэлкомм Инкорпорейтед
Publication of RU2009145889A publication Critical patent/RU2009145889A/en
Application granted granted Critical
Publication of RU2526024C2 publication Critical patent/RU2526024C2/en

Links

Images

Abstract

FIELD: physics, communications.
SUBSTANCE: invention relates to communication engineering. A preferred roaming list (PRL) carries system and connection records for wireless wide area network (WWAN) systems and wireless local area network (WLAN) systems. Connection information for WLAN systems is stored in new system and connection records. Information used to perform encryption and/or authentication for WLAN systems is stored in a separate WLAN authentication profile table. The system record for a WLAN system indicates a connection record and a profile record for that WLAN system. A network identifier table carries system records and profile records for WLAN systems. The system records carry information used for WLAN system selection and connection. The profile records carry information used to perform encryption and/or authentication for WLAN systems.
EFFECT: enabling selection and connection of both WWAN and WLAN systems.
15 cl, 11 tbl 12 dwg

Description

FIELD OF THE INVENTION

The present disclosure relates, in general, to the transmission of information, and more specifically, to the technique of selecting and connecting a system to a wireless device.

State of the art

Wireless communication systems are widely used to provide various communication services, such as voice, packet data, etc. These wireless systems may be multiple access systems capable of communicating with many users by sharing available system resources. Examples of such multiple access systems include code division multiple access (CDMA) systems, time division multiple access (TDMA) systems, and frequency division multiple access (FDMA) systems. A CDMA system may use one or more CDMA standards, such as IS-2000 and IS-95 (commonly referred to as “lx-EV-DV”, or simply “lx”), IS-856 (commonly referred to as “lx-EV-DO” ), etc., which are known in the art.

A wireless device (such as a cell phone) that supports 1x and / or lx-EV-DO typically supports a preferred roaming list (PRL, PRL). This DSS contains information to help the wireless device select and connect the system to the lx and lx-EV-DO systems, especially when the wireless device is constantly moving. The DSS identifies the “allowed” systems that the wireless devices should use and (optionally) the “forbidden” systems that the wireless device should not use.

The DSS format for 1x is described in document TIA / EIA / IS-683-A, entitled “Providing Wireless Service for Mobile Stations in Extended Spectrum Standards”, June 1998, which is freely available. The DSS format for lx-EV-DO is described in TIA-683-C, entitled “Providing Wireless Service for Mobile Stations in Extended Spectrum Standards”, March 2003, which is also in the public domain. TIA-683-C defines (1) the DSS format, which is based on IS-683-A and can transmit DSS information for 1 systems and (2) the advanced DSS format, which can transmit DSS information for lx and 1x EV-DO systems. TIA-683-C is backward compatible with IS-683-A.

A wireless device that stores advanced DSS is able to select and connect 1x and lx-EV-DO systems. However, the wireless device was not able to select and connect other systems not covered by the TIA-683-C.

SUMMARY OF THE INVENTION

Techniques for making system selection and connection for wireless wide area network (WWAN) systems, as well as wireless local area network (WLAN) systems, are described here. WWAN systems can be 1x systems, lx EV-DO systems. and / or systems of some other types. WLAN systems may be IEEE 802.11 systems and / or some other types of systems.

On the one hand, the DSS contains system and connection records for WWAN and WLAN systems. One or more new types of system entries and one or more new types of connection entries can be defined for the WLAN. DSS and new entries for systems and connections can be defined so that they are backward compatible with the TIA-683-C. System and connection information for WLAN systems can be stored in new entries for systems and connections, respectively, which are included in the DSS. The DSS can be programmed in a wireless device and / or can be sent over the radio in the usual way. Security-related information used to perform encryption and / or authentication for WLAN systems can be stored in a separate table of WLAN authentication profiles. The system entry for each WLAN system may indicate the connection entry and profile entry applicable to that WLAN system.

On the other hand, the network identifier table stores system and profile entries for WLAN systems and possibly other types of systems. System records contain information used to select and connect the system. System entries in the network identifier table do not need backward compatibility with the TIA-683-C and can be defined so that they carry related information in the most efficient way. The profile contains information used to perform encryption and / or authentication for the WLAN.

Various aspects and embodiments of the invention are described below.

Brief Description of the Drawings

The features and essence of the present invention will become more apparent from the detailed description set forth below, when considered in conjunction with the drawings, in which such conventions respectively coincide.

Figure 1 - use with WWAN and WLAN systems.

Figure 2 - SPR having the structure used in IS-683-A and TIA-683-C.

Figure 3 is an expanded DSS defined by TIA-683-C.

4A is an extended system entry for a WLAN.

4B and 4C are two extended connection entries for a WLAN.

5 is a table of authentication profiles for a WLAN.

6A and 6B are two authentication profiles for a WLAN.

7 is a table of network identifiers for a WLAN.

8 is a process for making a selection and connecting a system.

Fig.9 is a structural diagram of a wireless device.

Detailed description

The word "exemplary" is used here to mean "serving as an example or illustration." Any embodiment or design described herein as “exemplary” need not be construed as being preferred or advantageous among other embodiments or designs.

1 shows use with WWAN 100 and WLAN 102. WWAN 100 provides communication coverage for a large geographic area, such as a city, state, and the like. WLAN 102 provides communications coverage for a smaller geographic area, such as a shopping mall, university grounds, warehouse, etc. The WWAN 100 coverage area may or may not overlap the coverage area of WLAN 102.

WWAN 100 can be 1x network, lx EV-DO network or any other type of network. WWAN 100 includes one or more systems, and each system includes one or more smaller networks. Each system in 1x network is identified by a system identifier (SID) value, and each smaller network of each 1x system is identified by a network identifier (NID) value. Systems and networks in an lx EV-DO network are identified using a subnet identifier that can be up to 128 bits long and follows the IPv6 format, as described in RFC2460, entitled “Internet Protocol Version 6 (IPv6) Specification,” December 1998. Terms “Network” and “system” are sometimes used interchangeably.

WWAN 100 typically includes many base stations 110 that support communications for wireless devices 120 in a WWAN coverage area. For simplicity, only three base stations 110 are shown in FIG. 1 for WWAN 100. A base station is a fixed station that communicates with a wireless device and may also be called a base transceiver station (BTS) (1x terminology), access point (lx EV- DO terminology) or other terminology. Wireless devices 120 are located in all WWAN 100 service areas. A wireless device can also be called a mobile station (1x terminology), user / access terminal (lx EV-DO terminology), subscriber equipment (AA), mobile equipment (software), subscriber device or other terminology. The wireless device may be a cell phone, personal digital assistant (PDA), wireless modem, handset, etc. The Mobile Switching Center (MSC) 130 provides coordination and control for base stations 110 in the WWAN 100.

WLAN 102 may be an IEEE 802.11 network or some other type of network. WLAN 102 can enforce one or more standards, such as IEEE Std 802.11a-1999 (commonly called "802.11a"), IEEE Std 802.11b-1999 (usually called "802.11b"), IEEE Std 802.11g-2003 (usually called "802.11g"), and the like, which are known in the art. WLAN 102 may include one or more systems depending on the size of the WLAN deployment. Each system is identified by a Service Set Identifier (SSID), which can be up to 32 bytes long. WLAN 102 includes one or more access points 112 that support communication for wireless terminals 122 (e.g., laptop computers) and wireless devices 120 within the WLAN coverage area. For simplicity, only three access points 112 are shown in FIG. 1 for WLAN 102. For a centralized architecture, system controller 132 provides coordination and control for access points 112 in WLAN 102.

For 1x and lx EV-DO, the wireless device supports the Preferred Roaming List (DSS) for selecting and connecting the system. A wireless device can be programmed with DSS via a serial or USB interface, for example, during manufacture or activation. The wireless device may also download LSS via radio and / or may receive LSS from a removable module inserted into the wireless device. The wireless device stores the DSS in non-volatile memory, which may be in the wireless device or removable module.

FIG. 2 shows a DSS 200 having the structure used in IS-683-A and TIA-683-C. DSS 200 includes a system table 210 and a connection table 250. The system table 210 includes a list of allowed and prohibited systems / networks that are ordered by geographic area (GEOs). For clarity, FIG. 2 shows each geographical area represented by an appropriately labeled table. Each tabulated table includes a section 220 for preferred systems / networks that the wireless device should access, and a section 230 for prohibited systems / networks that the wireless device should not access.

The system table and the connection table have different formats for 1x and 1x EV-DO. Figure 2 shows the SPR format for 1x. The marked-up table for each geographical area includes (1) one or more records for one or more systems / networks in the geographical area and (2) many fields for related information for each record. These fields include a system field, a preferred selection field, a roaming indication field, and a connection indicator field. For each record, the system field stores (SID, NID) the pair assigned to the system / network associated with this record. The preferred selection field indicates the preference for the associated system / network among all allowed systems / networks in the same geographical area. The network operator usually sets preferences. The roaming indication field defines how the roaming indicator on the wireless device should be displayed when receiving a signal from a connected system / network. The connection pointer field stores a pointer value that points to a specific entry in the connection table 250 containing the parameters used to connect to the connected system / network. The connection table 250 includes one entry for each unique pointer value. Each connection entry includes many fields for various parameters used to connect the system. Connection records for various types of systems have various formats.

Figure 2 shows a graphical representation of the DSS for 1x. DSS for lx EV-DO has a different format. For 1x and lx EV-DO, DSS information is usually saved as a file.

Fig.3. shows a file 300 containing the extensions of the DSS, which is the DSS in the extended DSS format defined by TIA-683-C. Advanced DSS contains a number of fields, each of which is shown in Figure 3. Table 1 provides a brief description of the fields in the advanced DSS.

Table 1
Advanced SPR
Field Length
(bit)
Description
PR_LIST_SIZE 16 Indicates the total size of the extended DSS in octets. PR_L1ST_ID 16 Contains the identifier assigned to the extended DSS. CUR_SSPR_P_REV 8 Specifies the protocol version for the procedure that defines the parsing rules for the extended DSS. PREF_ONLY one Indicates whether to work only on preferred systems. DEF_ROAM_IND 8 Indicates the default roaming indicator. NUM_ACQ_RECS 9 Indicates the number of extended connection entries in the extended DSS. NUM_COMMON_SUBNET_RECS 9 Indicates the number of shared subnet entries in the extended DSS. NUM_SYS_RECS fourteen Indicates the number of extended system records in the extended DSS. RESERVED 7 Contains pad bits to an integer number of octets. EXTACQTABLE variable Contains advanced connection entries. COMMON_SUBNET_TABLE variable Contains shared subnet entries. EXT_SYS_TABLE variable Contains advanced system entries. RESERVED 0 to 7 Contains pad bits to an integer number of octets. PR_LIST_CRC 16 Contains a 16-bit CRC value for extended DSS.

Conditionally, an extended DSS contains advanced system entries, advanced connection entries, and general subnet entries for 1x and / or 1x EV-DO systems. The wireless device that stores this advanced DSS is only able to select and connect 1x and lx-EV-DO systems.

On the one hand, advanced DSS is defined so that it can contain extended system entries, extended connection entries, and general subnet entries for WLAN and WWAN systems. In one embodiment, the enhanced DSS has the format shown in Table 1, includes all fields of the enhanced DSS, and is backward compatible with TIA-683-C. A wireless device that supports the TIA-683-C (which is called a traditional wireless device) is capable of retrieving entries for 1x EV-DO systems from the advanced DSS and ignores or deletes entries for WLAN systems. A new wireless device that supports advanced DSS is able to retrieve entries for WLAN systems and use these entries to automatically select and connect WLAN systems.

TIA-683-C defines two types of extended system records - one type for 1x systems and another type for lx EV-DO systems. A new type of extended system entry can be defined for WLAN systems.

4A shows an extended system entry 410 for a WLAN. The expanded system record 410 may be one of the expanded system records in the expanded system table of enhanced DSS, as shown in FIG. 3. Extended system record 410 contains (1) all fields of the extended system record defined by TIA-683-C and (2) a new field PROFILE_ID.

A WLAN extended system record contains information for an SSID that is assigned to a WLAN system, which may be a group of access points. The SSID is an ASCII string (for example, “ABC”), which can be up to 32 bytes long, and is attached to all packets sent to the WLAN system to identify these packets as belonging to this system. A WLAN extended system entry may contain an SSID for a WLAN system or may indicate a location in a shared subnet table in which the SSID is stored. Table 2 lists the WLAN fields of the extended system record 410. A brief description of each field is given in Table 2, and a more detailed description for some of the related fields is given below.

table 2
Extended system entry for WLAN
Field Length
(bit)
Description
SYS_RECORD_LENGTH 5 Specifies the length of the extended system record in octets. SYS_RECORD_TYPE four Set to '0011' for WLAN extended system recording. PREF_NEG one Indicates if WLAN operation is allowed ('1') or disabled ('0'). Geo one Indicates the geographic area of the WLAN system. PRI one Indicates preference for a WLAN system. ACQ_INDEX 9 Indicates an extended connection entry for a WLAN system. Type-specific system identification record : RESERVED 3 Reserve for future use. Prefix one Set to '1' if the entry is a prefix for the SSID. SUBNET COMMON INCLUDED 6 Set to '0' if the SSID is included in the extended system entry, and to '1' if the SSID is stored in a shared subnet table. SSIDLENGTH 5 Indicates the length of the SSID in octets. SSID variable Contains the SSID for the WLAN system. SUBNET COMMON OFFSET 0 to 13 Indicates the first entry in the shared subnet table that stores the SSID. ROAM_IND 0 or 8 Indicates the roaming indicator. ASSOCIATION_INC one Indicates whether the system record contains the following three fields. ASSOCIATIONTAG 0 or 8 Contains a tie tag. PN_ASSOCIATION 0 or 1 Identifies systems with the same PN assignment. DATA_ASSOCIATION 0 or 1 Identifies systems with the same IP gateway. PROFILE_ID 8 Indicates an authentication profile for a WLAN system. RESERVED variable Contains pad bits.

The type-specific system identification entry for the WLAN of the extended system entry 410 includes various fields that are associated with the WLAN. The PREFIX field is set to '1' if the entry is used as a prefix for the SSID. A WLAN application can have many systems that can be assigned similar SSIDs, for example, "ABC1", "ABC2", "ABC3", etc. If the PREFIX field is set to '1' and the SSID field is set to “ABC”, then the wireless device can connect to any WLAN system with the SSID prefix “ABC”, for example, “ABC1”, “ABC2” or “ABC3”. The SUBNET_COMMON_INCLUDED field indicates whether the SSID is stored in the WLAN of the extended system record or shared subnet table. If SUBNET_COMMON_INCLUDED = '0', then the SSID is stored in the SSID field and SUBNET_COMMON_OFFSET is skipped. Conversely, if SUBNET_COMMON_INCLUDED = '1', then the SSID field is omitted and the SSID is stored in the shared subnet table at the location indicated in the SUBNET_COMMON_OFFSET field. Each shared subnet entry can store 15 bytes (or an octet). Thus, the first 15 bytes of the SSID are stored in the shared subnet entry specified in the SUBNET_COMMON_OFFSET field, the next 15 bytes of the SSID (if any) are stored in the next shared subnet entry, and the last two bytes of the SSID (if any) are stored in the next shared subnet record . The SUBNET_COMMON_OFFSET field is zero for the first shared subnet entry in the shared subnet table. The SSID_LENGTH field indicates the length of the SSID (in octets). The SSID_LENGTH field is set to '0' to indicate a group SSID, which means that a WLAN system with any SSID can be connected.

Many WWAN and / or WLAN systems in a given geographic area can be associated with each other and assigned a tie tag that is unique to that geographic area. For example, 1x systems, lx EV-DOs and / or WLAN systems in the same geographical area can be connected to each other. The wireless device may try to connect to the 1x system when it is first turned on, then identify the WLAN systems associated with the connected 1x system, and then connect to the connected WLAN system. This connection allows the wireless device to quickly connect to WLAN systems based on 1 system.

The PROFILE_ID field indicates the authentication profile associated with the extended WLAN system entry. For a WLAN, the authentication profile contains security-related information, as described below. For 1x and lx EV-DO, the authentication profile may contain information such as an individual Network Access Identifier (NAI) and individual authentication for the Point-to-Point Transfer Protocol / Authentication, Authorization and Accounting (PPP / AAA) and keys for use, as set Simple IP or Mobile IP profiles according to TIA-683-C. A legacy wireless device should finish processing the extended system record after the DATA_ASSOCIATION field and should skip the PROFILE_ID field. The new wireless device should continue processing the PROFILE_ID field. Alternatively, the PROFILE_ID field may be included in a type-dependent system identification record.

TLV683-C defines 12 types of extended connection entries. Two new types of extended connection entries can be defined for WLANs — one new type for connection entries (using channels) of the WLAN system and another new type for generalized entries for the connected WLAN system.

4B shows a connection record 420 (using channels) of a WLAN system. Connection entry 420 may be one of the extended connection entries in the extended connection table in the enhanced DSS, as shown in FIG. Connection entry 420 can be used to connect a WLAN system using specific channels.

Table 3 provides a brief description for the fields of the connection entry 420, which may include one or more occurrences of the CHAN field. Each CHAN field indicates a specific channel for the WLAN system. Each channel corresponds to a special frequency in a given frequency range. For example, IEEE 802.11 defines 14 channels at 14 different frequencies for the 2.4 GHz band. The NUM_CHANS and CHAN fields are 5 bit and 11 bit, respectively, in length, which corresponds to the length of the NUM_CHANS and CHAN fields used in the TIA-683-C. Other fields of connection entry 420 are described below.

Table 3
Record connection (using channels) WLAN system
Field Length
(bit)
Description
ACQ_TYPE 8 Set to '00001111' to record the connection (using channels) of the WLAN system Length 8 Indicates the length of the record in octets. WLAN_BAND_CLASS 8 Indicates the WLAN range class of the system WLAN_TECHNOLOGY 8 Indicates WLAN system technology NUM_CHANS 5 Indicates the number of channels in the record. NUM_CHANS occurrences of the following fields: Chan eleven Indicates a channel RESERVED variable Contains Complementary Bits

4C shows a generalized WLAN connection record 430 of a system. The connection record 430 may be one of the extended connection records in the extended connection table of the enhanced DSS, as shown in FIG. 3. A connection record 430 can be used to connect a WLAN system using a special WLAN frequency range, as established by the regulatory body. Table 4 provides a brief description for the connection record fields 430.

Table 4
Generalized WLAN Connection Recording System
Field Length
(bit)
Description
ACQ_TYPE 8 Set to '00010000' for a generalized record of the WLAN connection of the system. Length 8 Indicates the length of the record in octets. WLAN_BAND_CLASS 8 Indicates the WLAN range class of the system. WLAN_TECHNOLOGY 8 Indicates the technology of the WLAN system.

Table 5 lists an example set of frequency band types for the WLAN_BAND_CLASS field. Each type of frequency range is associated with certain specifications (for example, for transmit power) defined by specific regulatory authorities for a particular frequency range. The wireless device operates in accordance with specifications related to the type of frequency range indicated by the WLAN_BAND_CLASS field of the extended connection entry. Table 5 also lists an example set of technology types in which A, B, and G are associated with 802.11a, 802.11b, and 802.11g, respectively. The wireless device operates in accordance with the technology specified in the WLAN_TECHNOLOGY field of the extended connection entry.

Table 5 WLAN_BAND_CLASS WLAN_TECHNOLOGY Type of frequency range Value Type of technology Value 802.11_2400MHZ_US 00000000 BUT 00000000 802.11_2400MHZ_EUROPE 00000001 AT 00000001 802.11 2400MHZ FRANCE 00000010 Only g 00000010 802.11_2400MHZ_SPAIN 00000011 G 00000011 802.11_2400MHZ_JAPAN 00000100 Any 11111111 802.11_5000MHZ_US 00000101 Reserved other meanings 802.11 5000mhz EUROPE 00000110 802.11_5000MHZ_ FRANCE 00000111 802.11 5000mhz spain 00001000 802.11_5000MHZ_JAPAN 00001001 Any range class 00011111 Reserved Other values

Figs. 3 through 4C and tables 1 through 5 show specific embodiments of the LSS and entries for systems and connections that support system selection and connection for WLAN systems. In general, DSS and records for systems and connections can include any number of fields for any type of information that can be used to select and connect WLAN systems.

5 shows a table 500 of WLAN authentication profiles that stores WLAN authentication profiles. Table 6 provides a brief description for the fields in the table 500 profiles.

Table 6
WLAN Authentication Profile Table
Field Length
(bit)
Description
Length 16 Indicates the length of the profile table in octets. ID 16 Contains a unique identifier assigned to the profile table. REV_ID 8 Indicates the version number of the profile table. MIN_SOFTWARE_VER 8 Specifies the smallest version of the program that can process the profile table. NUM_PROFILES 8 Indicates the number of profiles in the profile table. PROFILES variable Contains profiles. RESERVED variable Reserve for future use. CRC 16 Contains 16-bit CRC values for the profile table.

The WLAN authentication profile defines the encryption and / or authentication (if any) used for the WLAN system. The WLAN authentication profile contains information related to access restriction, such as the type of encryption used (if any), the type of authentication used (if any), and the associated authentication and encryption parameters.

Table 7 lists an embodiment of the possible fields of the WLAN authentication profile. The PROFILE_ID field contains the profile identifier value for the WLAN authentication profile. The profile identifier value 0 can be assigned to the default WLAN authentication profile, which can be used for (1) WLAN systems that are not listed in the LSS, and / or (2) WLANs that are listed in the LSS, but without a WLAN authentication profile. The MOBILE_IP_PROFILE_ID field indicates the mobile IP profile for use with the WLAN authentication profile. A mobile IP profile stores authentication information for mobile IP. The hexadecimal value 0xFF for the MOBILE_IP_PROFILE_ID field may indicate the use of the current mobile IP profile (if defined). Other fields of the WLAN authentication profile are described below.

Table 7
Fields for WLAN Authentication Profile
Field Length
(bit)
Description
Length 8 Indicates the length of the profile in octets. PROFILE_ID 8 Contains the profile identifier value for the profile. PROFILE_TYPE 8 Indicates the type of profile. Set to '1' for WLAN ENCRYPTION_TYPE 8 Specifies the type of encryption. AUTHENTICATION_TYPE 8 Specifies the type of authentication. MOBILE_IP_PROFILE_ID 8 Indicates a mobile IP profile for use with this WLAN authorization. Authentication type fields: DEFAULT WEP KEY ID 8 Specifies the default key for WEP. WEP_KEY_ID1 variable Contains the first WEP encryption key. WEP_KEY_ID2 variable Contains a second WEP encryption key. WEP_KEY_ID3 variable Contains the third WEP encryption key. WEP_KEY_ID4 variable Contains the fourth WEP encryption key. 802.1X_ID_LEN 8 Specifies the size of the 802.1X identifier. 802.1X_ID variable Contains the identifier 802.1X. 802.1X_PASSWORD_LEN 8 Specifies the size of the 802.1X password. 802.1X_PASSWORD variable Contains an 802.1X password. CERTIFICATE_ID 8 Indicates a certificate in the certificate table. RESERVED variable Reserve for future use.

Various encryption and authentication schemes can be used for WLAN. For encryption, Wireless Encryption Protocol (WEP) with a key size of 40 and 104 bits, Temporary Key Integrity Protocol (TKIP), Advanced Encryption Standard (AES), some other encryption or without encryption can be used for WLAN. For authentication, WEP-based authentication, Extensible Authentication Protocol (EAP), Wireless Security Protocol (WAP), some other authentication or without authentication can be used for WLAN. EAP includes many different implementations, such as EAP-TLS (secure data transfer) and EAP-MD5 ("Fingerprint" messages, algorithm 5). EAP-TLS uses secure network communications with a RADIUS authentication server. These various encryption and authentication schemes are known in the art. Authentication for WLANs in 3GPP2 is described in 3GPP2 X.S0028, entitled “Wireless LAN Interconnectivity”, which is freely available.

Table 8 lists an example set of encryption types and an example set of authentication types that can be supported for a WLAN. The wireless device performs encryption in accordance with the encryption scheme (if any) specified in the ENCRYPTIONTYPE field and then performs authentication in accordance with the authentication scheme (if any) specified in the AUTHENTICATIONJTYPE field. Using WEP authentication assumes that WEP encryption is enabled. 802.1X_TLS means IEEE 802.1X / EAP with TLS, 802.1X_MD5 means IEEE 802.1X / EAP with MD5, and WKEY means a long-term WLAN key (which is described in 3GPP2 X.S0028). Authentication with RADIUS means that authentication is performed through a RADIUS server. Authentication with a certificate identifier means that authentication is performed with a cryptographic certificate received from a secure certificate authority.

Table 8 ENCRYPTION_TYPE Value AUTHENTICATIONJTYPE Value No encryption 0 No authentication 0 64-bit WEP (40-bit key) one WEP authentication one 128-bit WEP (104-bit key) 2 Based on 802.1X Password 2 Tkip 3 802. 1X TLS with RADIUS 3 AES four 802.1X_MD5 with RADIUS four 802.1X TLS with RADIUS with configured WKEY. 5 802.1X_TLS with certificate identifier 6

Each type of authentication can be associated with a special set of fields for related parameters. Table 9 lists the fields for each authentication type given in Table 8. For each authentication type, 'x' for a given authentication type field means that the field is included in the WLAN authentication profile for this type of authentication.

Table 9
Authentication Type Fields for WLAN
Authentication Type Field AUTHENTICATION_TYPE one 2 3 four 5 6 DEFAULT_WEP_KEY_ID X WEP_KEY_ID1 X WEP_KEY_ID2 X WEP_KEY_ID3 X WEP_KEY_ID4 X 802.1X_ID_LEN X X X X 802.1X_ID X X X X 802.1X_PASSWORD_LEN X X 802.1X_PASSWORD X X CERTIFICATE_ID X

6A shows a WLAN authentication profile 610 for WEP authentication (AUTHENTICATION_TYPE - 1). For authentication profile 610, fields WEP_KEY_ID1 through WEP_KEY_ID4 contain four security keys used for WEP. The DEFAULT_WEP_KEY_ID field indicates which of the four WEP security keys is the default key. The size of each of the four WEP key fields is 5 octets for 64-bit WEP and 13 octets for 128-bit WEP. For each WEP key field, key [0] contains the least significant byte of the WEP key, and the least significant bit of key [0] contains the least significant bit of the WEP key.

6B shows a WLAN authentication profile 620 for 802.IX authentication based on MD5 with RADIUS (AUTHENTICATION_TYPE = 4). For authentication profile 620, the 802.1X_ID_LEN field indicates the size of the 802.1X_ID field, which can be up to 72 bytes long. The 802.1X_ID field contains the identifier used for RADIUS-based procedures, which typically take the form user @ country. The 802.1X_PASSWORD_LEN field indicates the length of the 802.1X_PASSWORD field, which can be up to 31 bytes long. The 802.1X_PASSWORD field holds the MD-5 public key for RADIUS-based authentication.

WLAN authentication profiles for other types of authentication can be generated based on tables 7 and 9. For AUTHENTICATIONJTYPE = 2, the 802.1X_PASSWORD field stores the 802.1X password for WPA in a home / small office environment where RADIUS is not used for authentication. This password is used as the starting point for the TKIP encryption program.

5, 6A and 6B and tables 7, 8 and 9 show specific embodiments of a table of WLAN authentication profiles and various WLAN authentication profiles. In general, the profile table and profiles can include any number of fields for any type of information that can be used for encryption, authentication, and / or other purposes. For example, other types of encryption and authentication may be supported, and various fields can be created in the profile for various parameters used by these other types of encryption and authentication.

For the embodiment described above, the extended DSS contains an extended system entry and an extended connection entry for WWAN and WLAN systems, and the WLAN authentication profile table contains WLAN authentication profiles for WLAN systems. An extended DSS is typically created by a network operator to achieve the use of the desired system, for example, to address wireless devices to systems managed by the network operator and / or to systems for which the network operator is cross-licensed. The WLAN authentication profile table contains security-related information used for encryption and authentication, and can be stored in a file that is separate from the file for extended SPS.

Advanced DSS can be associated with a specific WLAN authentication profile table. This is possible because the PROFILE_ID field in the extended system extension record of the extended LSP indicates specific profile entries in the WLAN authentication profile table. The network operator can create various sets of advanced DSSs and WLAN authentication profile tables, for example, for different tariff plans. Each wireless device can then store one set of advanced DSS and WLAN authentication profile tables for the selected data plan.

In the embodiment described above, the information used to select and connect the WLAN system is stored in a format that is backward compatible with the TIA-683-C. Information used to select and connect a WLAN system can be stored more efficiently in a file that does not require backward compatibility with TIA-683-C.

7 shows a network identifier (NI) table 700 that contains information for selecting and connecting WLAN systems. The network identifier table 700 may be created by a wireless user, an administrator for a WLAN, a network operator for a WWAN, and / or some other entity. The network identifier table 700 may be configured for each wireless device and may be changed as required or necessary. For example, a wireless user may specify each SSID and its associated parameters, and may store the SSID in a network identifier table. Table 10 provides a brief description for the fields of the network identifier table 700.

Table 10
Network Identifier Table
Field Length
(bit)
Description
Length 16 Indicates the length of the NI table in octets. ID 16 Contains a unique identifier assigned to the NI table. REV_ID 8 Indicates the version number of the NI table. MIN_SOFTWARE_VER 8 Specifies the minimum version of a program that can interpret the NI table. NUM_SYS_RECS 16 Indicates the number of system entries in the system table. SYSTEM_TABLE variable Contains system entries. NUM_PROFILES 16 Indicates the number of profiles in the profile table. PROFILE_TABLE variable Contains profiles. RESERVED variable Reserve for future use.

The first system record in the system table, system record 0, can be used to store information about the WLAN system entered by the user. Each time a user manually enters system information, this information is initially stored in system record 0. If the user wants to permanently save system information, then the information is saved as another system record in the system table.

The first profile in the profile table, with a profile identifier value of 0, can be used to store information manually entered by the user. If the user wants to save profile information for a long time, then the information is saved as another profile in the profile table. The PROFILE_ID field of each system record using this profile is updated accordingly.

7 also shows a system record 710 in a system table in a network identifier table 700. Table 11 provides a brief description for the fields of the system record 710.

Table 11
System Record for Network Identifier Table
Field Length
(bit)
Description
RECORDLENGTH 8 Specifies the record length in 4 octet units RECORDJTYPE 8 Indicates the type of record. Set to '1' for WLAN WLAN_BAND_CLASS 8 Indicates the WLAN range class of the system WLANJTECHNOLOGY 8 Indicates WLAN system technology CHANNEL 16 Indicates a channel GROUP_MASK 16 Used to group system records WLAN_MODE 8 Indicates WLAN mode:
0x01 = AD-HOC, 0x02 = INFRA, 0x03 = any
PROFILEJD 8 Specifies the profile associated with the system record and stored in the profile table SSID_LENGTH 8 Indicates the length of the SSID SSID variable Contains the SSID specified by the user

The WLAN_BAND_CLASS field indicates the range class of the WLAN system and can be encoded as shown in table 5. The WLAN_TECHNOLOGY field indicates WLAN technology and can also be encoded as shown in table 5. Alternatively, 802.11a, 802.11b, and 802.11g can be associated with bits 0, 1, and 2 are respectively WLANJTECHNOLOGY fields, and each bit can be set to '1' to indicate support for this technology. For example, the hexadecimal value 0x01 indicates support for 802.11a, the value 0x02 indicates support for 802.11b, the value 0x4 indicates support for 802.11g, the value 0x06 indicates support for 802.11b and 802.11g, and the value 0x07 indicates support for 802.11a, 802.11b and 802.11g.

The CHANNEL field indicates the channel and can be from 1 to 14 for 802.11b / g. Channel 0 can mean any channel. Each bit in the GROUP_MASK field can represent a different group. A system record can be associated with any given group by setting the bit for this group to '1'.

For the embodiment shown in Table 11, the wireless device can receive service from any WLAN system for which the SSID, WLAN_MODE, and GROUP_MASK fields of the system entries in the network identifier table match. For this embodiment, there is no preference among WLAN systems within a geographic area. In other embodiments, a system recording may include other fields used to indicate preferences.

Different types of system records can be defined for different technologies (eg, 802.11, lx, lxEV-DO, etc.) and are included in the network identifier table 700. Different system records may be associated with different technology-dependent fields. This allows the network identifier table 700 to store system entries for WLAN systems, as well as other systems using other technologies.

Figures 3-7 and tables 1-11 show specific embodiments of an extended DSS and a network identifier file that can store information used to perform system selection, connectivity, encryption and authentication for WLAN systems. In general, information can be stored (1) in any number of tables, any number of records and any number of fields and (2) using any format of tables, records and fields. System and connection information can be stored in separate entries for systems and connections (as shown in FIG. 3) or in a system record (as shown in FIG. 7). Information for encryption and authentication can be stored in a separate profile entry (as shown in FIG. 7) or can be combined with a system record (not shown in any FIG.).

FIG. 8 shows an embodiment of a process 800 performed by a wireless device for selecting and connecting a system. Initially, the DSS contains information for the WWAN and receives the WLAN of the system, for example, from non-volatile memory (block 810). A DSS is used to select and connect a system (block 820).) For the embodiment shown in FIG. 8 for a block 820, one or more connection records are obtained from the DSS (block 822). WWAN and / or WLAN systems are found and connected based on the connection record (s) (block 824). A connection attempt can be made only for one connection record at a time, and connection records in the LSS can be selected in a predetermined (for example, sequential) order. A WLAN system can be connected, for example, based on the technology, range class and / or channel specified in the connection record. After connecting at least one system, the system record for the systems (s) that has been connected, as well as WWAN and / or WLAN systems that belong to the same geographical area, are obtained from the DSS (block 826). A WWAN system or a WLAN system in this geographical area is selected based on preferences for WWAN and WLAN systems in this geographical area (block 828). This preference may be indicated by the PRI field, the PREFIX field, and / or other fields in the system records, as shown in Table 2 and FIG. 4A. If the selected system has not been connected, then the selected system is connected based on its connection record. The selection and connection of the system can be repeated, so that the service is obtained from the most preferred system that can be connected.

In another embodiment, a 1x system is initially searched and connected based on connection records for 1x systems in the DSS. If a 1x system is connected, then the WLAN systems associated with this 1x system are determined based on system entries in the DSS. Subsequently, an attempt can be made to connect to one or more of these WLAN systems. System selection and connection can also be accomplished in other ways.

If the selected system is a WLAN system, as defined in block 830, then the profile entry for the WLAN system is obtained from the WLAN authentication profile table (block 832). Encryption and / or authentication can be performed for the WLAN system, as indicated in the profile entry (block 834).

For example, a profile entry may indicate which encryption scheme (if any) is used and which authentication scheme (if any) is used and may additionally contain related information for encryption and / or authentication schemes.

The encryption is then performed for the WLAN system in accordance with the encryption scheme and additionally based on the associated information in the profile entry. Similarly, authentication can be performed for a WLAN system in accordance with an authentication scheme and additionally based on related information in a profile entry.

The selection and connection of the system for WLAN systems can also be made based on the table of network identifiers shown in Fig.7 and table 10. The selection of the system can be performed in other ways from the table of network identifiers than from the table SPR. For example, WLAN systems can be selected based on technology, band class, channel, WLAN mode, and / or other criteria when a network identifier table is used.

The information in the network identifier table can be used to select a system, connect, encrypt (if any) and authenticate (if any).

9 shows a block diagram of a wireless device 120x. In the transmission path, traffic data and signals intended for transmission by the wireless device 120x are processed (e.g., formatted, encoded and interleaved) by an encoder 912 and then processed (e.g., modulated, scaled, formed into channels, and scrambled) by a modulator (MOD) 914 to obtain a stream of fragmented data (chip data). The transmitter module (TMTR) 922 then prepares (for example, converts to analog form, filters, amplifies, and upconverts) the fragmented data stream to transmit the uplink signal, which is transmitted through the antenna 924. In the receive path, downlink signals, transmitted by base stations 110 in WWAN 100 and / or access points 112 in WLAN 102, are received by antenna 924 and provided to receiver module (RCVR) 926. Receiver module 926 prepares (for example, filters, amplifies and converts with p by lowering the frequency) the received signal and then digitizes the prepared signal to obtain data samples. A demodulator (DEMOD) 916 processes (for example, reconstructs the scrambled signal, narrows the spectrum, channels and demodulates) data samples to obtain symbols. Decoder 918 further processes (e.g., performs deinterleaving and decodes) the symbols to obtain decoded data. Encoder 912, modulator 914, demodulator 916, and decoder 918 may be implemented in a modem processor 910. These modules process in accordance with the technology used by the WWAN or WLAN system with which the wireless device 120x communicates.

A processor / controller 930 controls the operation of various modules of the wireless device 120x. The processor / controller 930 may perform the process 800 of FIG. 8 to select and connect a system. A memory module 932 stores program code and data used by a processor / controller 930 and other modules. The memory module 932 may store DSS for WWAN and WLAN systems, a profile table for WLAN systems and / or a network identifier (NI) table for WLAN systems and possibly other systems. A DSS, a profile table, and / or an NI table can be used to select and connect a system as described above. The removable module 934 includes a non-volatile memory module that can store a DSS, a profile table, and / or an NI table. The removable module 934 can be a removable user identification module (R-UIM) (used for cdma2000), a subscriber identity module (SIM) (used for W-CDMA and GSM), a universal subscriber identity module (USIM) (also used for W-CDMA and GSM), etc.

SPR server 150 supports wireless programming of SPR using SMS messages. The DSS server 150 may generate DSS with records for WWAN and WLAN systems, generate data blocks for the DSS, and forward the data blocks to the short message service (SMS) service center 140. Center 140 includes a data unit in one or more SMS messages. The MSC 130 receives SMS messages and forwards messages to the base station 110x, which transmits messages over the air to wireless devices in its coverage area. The Wireless Function Support Service (OTAF) (not shown in FIG. 9) also supports wireless programming of the DSS. OTAF can create DSS with records for WWAN and WLAN systems, generate data blocks for DSS and include a data block in one or more messages. The MSC 130 receives the message (s) from the OTAF and forwards the message (s) to the base station 110x for transmission to the wireless device.

The wireless device 120x, processor / controller 930 may receive a decoded DSS data unit sent by the DSS center 150 or OTAF, and may store the DSS in memory module 932 and / or removable module 934. The processor / controller 930 may also receive system and security related information from the user for WLAN systems and can store information in the memory module 932 and / or the removable module 934.

The techniques described here can be implemented in various ways. For example, these techniques may be implemented in hardware, software, or a combination thereof. For hardware implementation, the processing modules used to select and connect the system can be implemented through one or more application-oriented integrated circuits (ASICs), digital signal processors (DSPs), programmable logic devices (PLDs), programmable gate arrays (FPGAs), processors , controllers, microcontrollers, microprocessors, electronic devices, other electronic modules designed to perform the functions described here or their combination.

For software implementation, the techniques may be implemented by modules (eg, procedures, functions, etc.) that perform the functions described herein. The program code may be stored in a memory module (eg, memory module 932 in FIG. 9) and executed by a processor (eg, processor 930). The memory module may be implemented inside the processor or outside the processor.

The previous description of the disclosed embodiments allows any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the general principles defined herein can be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited by the embodiments shown here, but is in accordance with the broadest scope consistent with the principles and new features disclosed herein.

Claims (15)

1. A wireless device comprising
a memory module configured to store at least one file containing system and security related information for at least one wireless local area network (WLAN) system, wherein at least one file is used by a wireless device to select and connect a system for at least at least one WLAN system; and
a processor configured to use at least one file to connect and select a WLAN system,
wherein said at least one file comprises a tie tag that is unique to a geographical area and assigned to a plurality of wireless wide area network (WWAN) systems and / or WLANs within said geographical area.
2. The wireless device according to claim 1, in which the processor is configured to obtain from at least one file of at least one system entry for at least one WLAN system, select one of at least one WLAN system based on at least one system record and connection of the selected WLAN system based on the associated system record.
3. The wireless device of claim 1, wherein the processor is configured to obtain from at least one file a profile entry for the selected WLAN system, determine an authentication scheme based on the profile entry, and perform authentication on the selected WLAN system in accordance with the authentication scheme, if it exists specific to the selected WLAN system.
4. The wireless device according to claim 1, wherein the processor is configured to obtain from at least one file a profile entry for the selected WLAN system, determine an encryption scheme based on the profile entry, and perform encryption for the selected WLAN system in accordance with the encryption scheme, if it exists specific to the selected WLAN system.
5. The wireless device according to claim 1, in which at least one file contains at least one system entry for at least one WLAN system, and each system entry indicates a technology, range class, channel, mode, service set identifier (SSID) or a combination thereof for a connected WLAN system.
6. The wireless device according to claim 1, in which at least one file contains at least one profile entry for at least one WLAN system, and each profile entry indicates an authentication scheme, encryption scheme, encryption scheme, security key, password, identifier user or combination thereof for a connected WLAN system.
7. The wireless device according to claim 1, in which at least one file contains at least one system entry for at least one WLAN system and at least one other system entry for at least one other system using technology other than from technology to at least one WLAN system.
8. The wireless device according to claim 1, in which the memory module is configured to store a single file containing both system and security information for at least one WLAN system.
9. The wireless device according to claim 1, wherein the memory module is configured to store a first file containing system information for the at least one WLAN system and a second file containing security information for the at least one WLAN system.
10. A method for making a selection and connecting a system, comprising the steps of:
receiving at least one file containing system and security related information for at least one wireless local area network (WLAN) system, wherein at least one file is used by a wireless device to select and connect a system for at least one WLAN system; and
at least one file is used to connect and select a WLAN system, said at least one file containing a tie tag that is unique to a geographical area and assigned to a plurality of wireless wide area network (WWAN) and / or WLAN systems within said geographical area.
11. The method according to claim 10, in which the use of at least one file for selecting and connecting the system comprises the steps of
get from at least one file at least one system record for at least one WLAN system,
selecting one of at least one WLAN system based on at least one system record, and
connect the selected WLAN system based on the associated system record.
12. The method according to claim 10, further comprising stages, in which
receive from at least one file a profile entry for the selected WLAN system;
determining an authentication scheme based on the profile entry;
perform authentication in the selected WLAN system in accordance with the authentication scheme, if it exists, defined for the selected WLAN system;
determining an encryption scheme based on the profile entry;
perform encryption for the selected WLAN system in accordance with the encryption scheme, if it exists, defined for the selected WLAN system;
13. A communication device comprising
means for obtaining at least one file containing system and security related information for at least one wireless local area network (WLAN) system, wherein at least one file is used by a wireless device to select and connect a system for at least one WLAN system ; and
means for using at least one file for connecting and selecting a WLAN system,
wherein said at least one file comprises a tie tag that is unique to a geographical area and assigned to a plurality of wireless wide area network (WWAN) and / or WLAN systems within said geographical area.
14. The device according to item 13, in which the means for using at least one file to select and connect the system contains
means for obtaining from at least one file of at least one system record for at least one WLAN system,
means for selecting one of at least one WLAN system based on at least one system record, and
means for connecting the selected WLAN system based on the associated system record.
15. The device according to item 13, further comprising
means for obtaining from at least one file a profile entry for the selected WLAN system;
means for determining an authentication scheme based on a profile entry;
means for performing authentication in the selected WLAN system in accordance with the authentication scheme, if one exists, defined for the selected WLAN system;
means for determining an encryption scheme based on a profile entry; and
means for performing encryption for the selected WLAN system in accordance with the encryption scheme, if one exists, defined for the selected WLAN system.
RU2009145889/07A 2005-06-17 2009-12-10 System selection and connection for wwan and wlan systems RU2526024C2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US69194705P true 2005-06-17 2005-06-17
US60/691,947 2005-06-17

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
RU2008101780/09A Division RU2388182C2 (en) 2005-06-17 2006-06-13 Selection and connection of wwan system and wlan systems

Publications (2)

Publication Number Publication Date
RU2009145889A RU2009145889A (en) 2011-06-20
RU2526024C2 true RU2526024C2 (en) 2014-08-20

Family

ID=39933964

Family Applications (1)

Application Number Title Priority Date Filing Date
RU2009145889/07A RU2526024C2 (en) 2005-06-17 2009-12-10 System selection and connection for wwan and wlan systems

Country Status (2)

Country Link
CN (1) CN101243717B (en)
RU (1) RU2526024C2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2595939C2 (en) * 2014-09-16 2016-08-27 Игорь Александрович Ступак Automated system for collecting data on consumption of energy resources and electric energy counter

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8886756B2 (en) * 2011-05-13 2014-11-11 Qualcomm Incorporated Exchanging data between a user equipment and an application server
US8590023B2 (en) * 2011-06-30 2013-11-19 Intel Corporation Mobile device and method for automatic connectivity, data offloading and roaming between networks
EP2954728A4 (en) 2013-02-05 2016-09-14 Intel Corp Online signup provisioning techniques for hotspot connections

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2160975C2 (en) * 1996-02-16 2000-12-20 Эрикссон Инк. Method and device for roaming with use of two-mode/two- range hardware with boards of subscriber identification modules
EP1241838A2 (en) * 2001-03-13 2002-09-18 Microsoft Corporation System and method for wireless connecting a computing device without configuration and computing device therefore
EP1542400A2 (en) * 2003-12-12 2005-06-15 Kabushiki Kaisha Toshiba Selecting a wireless LAN access point based on a communication profile

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6934544B2 (en) 2002-02-04 2005-08-23 Qualcomm Incorporated Method and apparatus for configurable selection and acquisition of a wireless communications system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2160975C2 (en) * 1996-02-16 2000-12-20 Эрикссон Инк. Method and device for roaming with use of two-mode/two- range hardware with boards of subscriber identification modules
EP1241838A2 (en) * 2001-03-13 2002-09-18 Microsoft Corporation System and method for wireless connecting a computing device without configuration and computing device therefore
EP1542400A2 (en) * 2003-12-12 2005-06-15 Kabushiki Kaisha Toshiba Selecting a wireless LAN access point based on a communication profile

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2595939C2 (en) * 2014-09-16 2016-08-27 Игорь Александрович Ступак Automated system for collecting data on consumption of energy resources and electric energy counter

Also Published As

Publication number Publication date
CN101243717B (en) 2013-02-06
RU2009145889A (en) 2011-06-20
CN101243717A (en) 2008-08-13

Similar Documents

Publication Publication Date Title
Buddhikot et al. Design and implementation of a WLAN/CDMA2000 interworking architecture
JP4194046B2 (en) SIM-based authentication and encryption system, apparatus and method for wireless local area network access
CA2490131C (en) Key generation in a communication system
KR101589423B1 (en) Mobile device and method for automatic connectivity, data offloading and roaming between networks
US7707415B2 (en) Tunneling security association messages through a mesh network
DE60103861T2 (en) Method and device for mobility support in a telecommunications system
FI107486B (en) Authentication and encryption organizing mobile communication system
US6940844B2 (en) Method and apparatus for reporting WLAN capabilities of a dual mode GPRS/WLAN or UMTS/WLAN WTRU
US7430604B2 (en) Method and equipment for accessing a telecommunication network
US7646745B2 (en) System and method for operating a mobile device, such as providing an out of box connection system for UMA type mobile devices
US8064904B2 (en) Internetworking between a first network and a second network
US7793104B2 (en) Security authentication and key management within an infrastructure-based wireless multi-hop network
CA2881157C (en) Access terminal configuration and access control
US7519363B2 (en) Roaming method between wireless local area network and cellular network
RU2628207C2 (en) Method and device for accelerated line installation
US20140056293A1 (en) Peer-to-peer communication in ad hoc wireless network
JP4335918B2 (en) An interconnection method for a user terminal to select a mobile communication network to be accessed at high speed in a WLAN interworking network
US20040139201A1 (en) Method and system for transparently and securely interconnecting a WLAN radio access network into a GPRS/GSM core network
US9826397B2 (en) System and method for transferring wireless network access passwords
JP5123302B2 (en) Radio interface selection for terminals
CN101902802B (en) Network selection in GAN environment
CN1279722C (en) Method for rapid accessing attached networks of user terminal in wireless LAN
US20050097356A1 (en) Mapping wireless proximity identificator to subscriber identity for hotspot based wireless services for mobile terminals
US8184603B2 (en) Communication system having a community wireless local area network for voice and high speed data communication
US7096014B2 (en) Roaming arrangement