WO2002093811A2 - Access to plmn networks for non-plmn devices - Google Patents

Access to plmn networks for non-plmn devices Download PDF

Info

Publication number
WO2002093811A2
WO2002093811A2 PCT/IL2002/000382 IL0200382W WO02093811A2 WO 2002093811 A2 WO2002093811 A2 WO 2002093811A2 IL 0200382 W IL0200382 W IL 0200382W WO 02093811 A2 WO02093811 A2 WO 02093811A2
Authority
WO
WIPO (PCT)
Prior art keywords
network
plmn
authenticatable
mobile
communication
Prior art date
Application number
PCT/IL2002/000382
Other languages
French (fr)
Other versions
WO2002093811A3 (en
Inventor
Eyal Katz
Stuart Jeffery
Ilan Zorman
Dan Kolkowitz
Yair Karmi
Gil Ben-Noon
Original Assignee
Adjungo Networks Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/990,875 external-priority patent/US20030061503A1/en
Application filed by Adjungo Networks Ltd. filed Critical Adjungo Networks Ltd.
Priority to AU2002302956A priority Critical patent/AU2002302956A1/en
Priority to US10/502,791 priority patent/US8086855B2/en
Priority to TW091134023A priority patent/TWI262005B/en
Publication of WO2002093811A2 publication Critical patent/WO2002093811A2/en
Publication of WO2002093811A3 publication Critical patent/WO2002093811A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/04Protocols specially adapted for terminals or networks with limited capabilities; specially adapted for terminal portability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/062Pre-authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface
    • H04W36/142Reselecting a network or an air interface over the same radio air interface technology
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/02Inter-networking arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/042Public Land Mobile systems, e.g. cellular systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/16Gateway arrangements

Definitions

  • PLMN devices and to issues arising in interfaces in general between PLMN and non- PLMN networks.
  • Unlicensed radio is becoming very popular and very affordable of obtaining high speed wireless access. Unlicensed radio operates in the ISM (Industrial, Scientific and Medical) Bands and is limited to very low power, which means the frequencies can be reused many times over.
  • IEEE 802.1 lb is one example of unlicensed technology that is very affordable and very capable, offering speeds of up to 10,000 Kbps.
  • An 802.1 lb Wireless Local Area Network (LAN) covering a small home or office and supporting 3 computers can be purchased for about $500.00 and the equipment is becoming a standard feature of many computer product lines including Dell and Apple.
  • 802.1 lb is but one of several Wireless LAN technologies. Others include HomeRF, 802.1 lx, Bluetooth, etc. While these technologies were originally developed for Wireless Local Area
  • WLAN Wireless Local Area Networks
  • High speed unlicensed and licensed wireless access technologies are now available that will support speeds of 700 Kbps to 10 Mbps and even higher.
  • wireless access technologies include Bluetooth and Wireless LANs such as 802.1 l(x). These networks have sufficiently high speed to support rich media services such as videophones, streaming videos, etc.
  • non-PLMN Access Networks AN
  • AN non-PLMN Access Networks
  • the non-PLMN Access network may be carrying a substantial amount of rich media that is local to the venue.
  • An example would be a sports arena where the predominate rich media source would be near real time playback of game highlights. While this rich media could be delivered via communication through the PLMN, keeping this rich media traffic out of the core network will reduce the burden on that network.
  • PLMN type networks are designed to ensure that the only users of the network are devices that can prove that they are authorized holders of unique telephone numbers.
  • the purpose of such design is to ensure that billing can be carried out reliably and correctly, that impersonation of other uses is not possible and that unauthorized access to the network is not in general possible.
  • SIM subscriber identity module
  • the cellular telephony devices are either provided with a subscriber identity module (SIM) which is a security chip having secure keys and algorithms to identify the device to the PLMN and which in addition carries out data encryption and decryption, depending on the configuration of the specific network; or they have stored identity data that the system uses in order to authenticate them to the network.
  • SIM subscriber identity module
  • SIMs are physical devices that are secure from duplication and internal inspection, meaning that the data can not be externally read and can not be recovered by dissecting the part.
  • the SIM is typically in the physical possession of the subscriber and is installed by the subscriber in the device, typically the cellular telephone, that is used for access to the network.
  • the access device has a SIM card carrier and reader.
  • the SIM concept is widely used and furthermore allows the subscriber to exchange the device being used to access the network whilst keeping the same identity and telephone number, by simply removing his SIM from the existing device and placing it in the new device
  • SIM based authentication is appropriate for cellular devices connecting directly to the PLMN.
  • users connect to a local non-PLMN network such as a Bluetooth network and from there connect via the cellular network.
  • the local non-PLMN network is generally compatible with a wide range of devices, such as portable computers, PDA type devices and the like which are not conventional cellular devices and which are not typically equipped with a cellular identity, SIM or even a SIM card carrier and reader. These devices are collectively designated "non-SIM devices". It is desirable to provide an infrastructure for allowing such non-SIM devices to connect via the local network to the cellular network, or at least to approve their access to other networks e.g. Internet based on their cellular identity.
  • local non-PLMN networks are by their nature very localized.
  • a user may wish to move whilst using one and may easily find himself out of range of any convenient access point.
  • mobile users within a small or confined area may get service from a local Access Point (AP) using any technology suitable for short ranges in the order of 10 to 100 meters.
  • AP local Access Point
  • Each such AP supports a network of local mobile users.
  • the communication conditions between each user and the AP may vary within a large range as a result of variable propagation path loss, available transmission power, interference level and network loading.
  • T e problem is to determine whether such an alternative AP is available and get the user to connect to that alternate AP.
  • Handoff ' a range of available procedures known collectively as "handoff '.
  • a different problem occurs when a user is equipped with a dual technology terminal, e.g. cellular and Wireless LAN, cellular and wireline Internet access, etc, and the connection needs to be exchanged from an access point using one technology to an access point using another technology.
  • the logic usually associated - with handoff does not apply; rather, a different approach is required in order to make optimal use of the available communication resources.
  • an interface device for interfacing between a PLMN network and a non-PLMN network, said PLMN network being configured to recognize cellular base stations as nodes thereof through which to mediate connections to cellular mobile devices, said non-PLMN networks each comprising a plurality of access points for mediating connections to network compatible mobile devices, said network compatible mobile devices not being required to be cellular devices, said interface device being configured as a node of said PLMN network to appear to said PLMN network as a base station thereof and comprising functionality to make non-cellular devices connecting to said non-PLMN network and attempting to access said PLMN network therethrough appear as cellular devices to said PLMN network.
  • the device preferably comprises a circuit-switched interface for telephony and a packet interface for data and control.
  • said PLMN network is a GSM network having an A interface or a
  • circuit-switched interface is operable to use said A interface and said packet interface is operable to use said Gb interface.
  • said PLMN network is a UMTS network having an IuCS interface and an IuPS interface and wherein said circuit switch interface is operable to use said IuCS interface and said packet interface is operable to use said IuPS interface.
  • the device preferably comprises a simulated cellular identity gateway associated with a security layer of said non-PLMN network and operable to determine that a connecting device has been authenticated by said non-PLMN network, and to respond to a PLMN network authentication query to indicate that said authentication has been successful.
  • said simulated cellular identity gateway is a simulated SIM gateway and said PLMN network is a GSM network.
  • said simulated cellular identity gateway is a simulated ESN gateway and said PLMN network is a CDMA network.
  • said non-PLMN security layer is one of a group comprising SSL, Ipsec, TLS, SRP, and SSH, and wherein an authentication of said one of said group is required to permit said simulated SIM gateway to provide said authentication response to said PLMN network.
  • the security layer is configurable to set a desired security level, for example by setting a key length.
  • the device preferably comprises a vocoder for receiving voice signals from said non-PLMN network for vocoding, and receiving vocoded voice signals from said PLMN network for decoding.
  • the device preferably comprises a vocoder for receiving partly vocoded signals from said non-PLMN network for vocoding, and receiving vocoded voice signals from said PLMN network for part decoding.
  • the device is configured to appear to said PLMN network as both a serving GPRS support node (SGSN) for packet data and as a base station for circuit switched data.
  • SGSN serving GPRS support node
  • functionality is provided to authenticate a device connecting to said non-PLMN network.
  • the device preferably comprises functionality to register a device connecting to said non-PLMN network.
  • the device preferably comprises functionality to update the location of a device connecting to said non-PLMN network.
  • the device preferably comprises support functionality for allowing a device connecting to said non-PLMN network to generate service requests.
  • the device preferably comprises functionality to provide said PLMN network with connection control data formatted for said PLMN network to be able to integrate corresponding activity into a consolidated bill.
  • the device is preferably configured to operate together with a connection management unit of said non-PLMN network, thereby to obtain from said non-PLMN network details of connecting parties and quantity of data exchanged.
  • the device preferably comprises functionality to format said details obtained into a PLMN compatible format.
  • the device preferably comprises a cellular identity module associated therewith for providing PLMN security functionality, thereby to allow access via said wireless LAN to a PLMN network.
  • cellular identity module is mounted on said access card.
  • said cellular identity module is reversibly mounted on said access card.
  • said cellular identity module is a SIM.
  • the device preferably comprises both a SIM carrier and a SIM reader.
  • said cellular identity module is a virtual cellular identity module.
  • said virtual cellular identity module is a virtual module comprising
  • the device preferably comprises functionality to exchange authentication signals with a LAN gateway, thereby to achieve network authorization.
  • said authentication signals are formatted to be transferable between said LAN gateway and said PLMN network, thereby to obtain PLMN authorization.
  • a method of accessing a PLMN network via a non-PLMN network using a non-PLMN device comprising: providing said non-PLMN device with an access card suitable for said non PLMN network, providing said access card with a cellular identification module, providing said non-PLMN network with gateway functionality to relay cellular identification signals between said non-PLMN device and said PLMN network.
  • a method of accessing a PLMN network via a non-PLMN network using a non-PLMN device comprising: providing said non-PLMN network with a secure authentication unit for authentication of said non-PLMN device, providing said non-PLMN network with gateway functionality, associated with said secure authentication unit, to operate said authentication unit and to relay cellular identification signals to said PLMN network in response to authentication of said non-PLMN device.
  • a method of operating a secure gateway between a PLMN network and a non-PLMN network such that a non-PLMN device is authenticatable for a PLMN connection comprising: authenticating said non-PLMN network via a first authentication protocol, and exchanging signals with said PLMN network via a cellular authentication protocol, comprising indicating device authentication following authentication via said first protocol.
  • a method of operating a secure gateway between a PLMN network and a non PLMN network, such that a non-PLMN device is authenticatable for a PLMN connection comprising: exchanging signals with said PLMN network via a cellular authentication protocol thereby to authorize said non-PLMN network to connect to said device.
  • a handoff manager for managing handoff of a mobile unit communicating using an identifiable session between a first mobile network access point and a second mobile network access point, wherein said first access point belongs to a first network, and said second access point belongs to a second network, said manager being commonly accessible to each network and comprising a mobile unit matcher for performing matching between mobile units having disconnected from one network and mobile units having connected to other networks, and a session maintainer associated with said mobile unit matcher for transferring sessions between units thus matched, thereby to handoff between networks.
  • the handoff manager preferably comprises a unit at a single location.
  • the handoff manager preferably comprises distributed functionality located at a plurality of intra-network or inter-network nodes.
  • one of said networks is a PLMN network.
  • one of said networks is a wireless LAN network.
  • one of said networks is a wireless LAN network.
  • the handoff manager preferably comprises a session active management unit for determining from a currently used network when connection quality threshold is not being met, for instructing said mobile unit to search for surrounding networks and determine connection parameters thereof, to identify from said parameters a best network and to instruct said mobile unit to connect to said best network.
  • said session active management unit is associated with said mobile unit matcher, thereby to use said instruction to assist with said matching.
  • said session active management unit is operable to determine whether said instructed match has succeeded and, in the absence of a successful connection, is operable to instruct said mobile unit to connect to a next best network.
  • said session active management unit is operable to continue to instruct said mobile unit to connect to a next best unit until a successful connection is indicated.
  • the handoff manager preferably comprises a session passive management unit for determining from said mobile unit when connection quality threshold is not being met, for instructing said mobile unit to search for surrounding networks and determine connection parameters thereof, to identify from said parameters a best network and to instruct said mobile unit to connect to said best network.
  • the handoff manager is preferably operable to instruct said mobile unit to disconnect from a first network and subsequently to connect to a best network.
  • the handoff manager is preferably operable to instruct said mobile unit to connect to a best network and subsequently to disconnect from a current network.
  • the handoff manager is preferably operable to reduce a connection quality level at a current network, thereby to force said mobile unit to disconnect therefrom and find another network.
  • the handoff manager is preferably operable, following a selection of to a best network for reconnection, to reduce a connection quality at a current network, and to send an instruction to said mobile unit to connect to said selected best network.
  • the handoff manager is preferably operable to provide to said mobile unit identification of potentially available networks.
  • the handoff manager is preferably operable to provide to said mobile unit network parameters of a potentially available network.
  • said parameters include any one of a group comprising: preferred access channels for a respective PLMN network, identity of proxy IP's for Internet access which are capable of supporting a better distributed SCC architecture, loading conditions of said potentially available networks, general availability parameters of said potentially available networks, network access numbers for Internet access, and information on expected loading conditions of said potentially available network.
  • said first mobile network and said second mobile network are respectively wireless LANs of a single hotspot.
  • said first and said second networks are overlapping networks and a mobile unit for handoff is located at a point of overlap between said networks.
  • said first and said second networks respectively use a same network protocol.
  • said first and said second networks respectively use a different network protocol.
  • said first and said second networks are non-overlapping.
  • said first network and said second network are respectively of different Hot Spots.
  • said different hotspots have a region of overlap and where a mobile device for handoff is located in said region of overlap.
  • said hotspots utilize a single communication protocol.
  • said hotspots utilize respectively different communication protocols.
  • said first network and said second network are respectively PLMN networks.
  • said first PLMN and said second PLMN network utilize a single communication protocol.
  • said first and said second PLMN network utilize respectively different communication protocols.
  • said first and said second communication network have a region of overlap and wherein a mobile device for handoff is located in said region of overlap.
  • said first network is a wireless local network and said second network is a PLMN network.
  • said wireless local network is located within a region of coverage of said PLMN network.
  • the handoff manager preferably comprises a priority unit for setting said wireless local network as a higher priority than said PLMN network such that a mobile unit is automatically handed off to said wireless local network when in range thereof.
  • a seventh aspect of the present invention there is provided a method of handoff of a mobile device, communicating in a communication session, said handoff being between access points of a first and a second wireless network respectively, the method comprising: providing a control point at a location common to both said networks, at said control point determining identities of mobile devices whose connections have been terminated and obtaining data of respective sessions thereof, at said control point determining identities of new connections formed with mobile devices, at said control point matching said identities, thereby to match an existing session with a mobile device that has terminated its connection at a first access point and has reconnected at a second access point.
  • an authentication apparatus comprising: a communicator for communicating with an authenticatable mobile device, a verifier associated with said authenticatable mobile device to verify that the communication is with an intended one of authenticatable devices, and an associator for associating the verification with an activity request via a non authenticatable device, thereby to authenticate the activity request of the non- authenticatable device.
  • said authenticable device is a GSM device and said authenticatable link is a GSM link.
  • said authenticatable device is a CDMA device and said authenticatable link is a CDMA link.
  • said authenticatable device is a PDC device and said authenticatable link is a PDC link.
  • said authenticatable device is an EDGE device and said authenticatable link is an EDGE link.
  • said authenticatable device is a WCDMA device and said authenticatable link is a WCDMA link.
  • said authenticatable device is a GPRS device and said authenticatable link is a GPRS link.
  • said authenticatable device is an Iridium device and said authenticatable link is an Iridium link.
  • said secure link involves a subscriber identity module located at said secure mobile device.
  • said authenticatable link is a secure link utilizing a subscriber identity module located at said authenticatable device.
  • said authenticatable device is a mobile telephone.
  • said communication comprises an electronic data communication.
  • said electronic data communication comprises electronic messaging.
  • said electronic messaging comprises SMS messaging.
  • said electronic messaging comprises WAP.
  • said electronic messaging comprises email.
  • said electronic messaging comprises EMS.
  • said electronic messaging comprises MMS.
  • said communicator comprises functionality to initiate said communication by sending an initial message to said authenticatable device and functionality to receive a reply to said initial message from said authenticatable device, therewith to authorize said activity request.
  • said communicator comprises functionality to receive an initializing communication from either one of said authenticatable device and said non-authenticatable device, and functionality to send a reply to said initial message, therewith to authorize said activity request.
  • said communicator comprises functionality to receive an initializing communication from an external device and functionality to establish a link between said authenticatable device and said non-authenticatable device, therewith to authorize said activity request.
  • said communicator involves functionality to receive a message from said authenticatable device and functionality to complete said communication by sending a response thereto to said secure authenticatable device, thereby to authorize said activity request.
  • said communicator comprises functionality to insert an identifier into said reply for a requesting party to enter via said non-authenticatable device, and wherein said verifier further comprises functionality to determine whether said identifier have been received via said non-authenticatable device.
  • said communicator is operable to use an automatic voice for communicating with said authenticatable device.
  • said authenticatable device is associated with a payment account, said apparatus further comprising functionality to charge said requested activity to said payment account.
  • said requested activity is an Internet browsing activity or a point of sale activity.
  • said requested activity is access to a network.
  • the apparatus is operable to connect to said non-authenticable device via Bluetooth access points.
  • the apparatus is operable to connect to said non-authenticatable device via at least one WLAN access point.
  • the apparatus is connectable to said non-authenticatable device via a TCP/IP link.
  • said communicator is operable to obtain a telephone number for communicating with said authenticatable device, from said non-authenticatable device.
  • said communicator is operable to obtain identification data, from said non-authenticable device, for forming said association.
  • said non-authenticatable device is any one of a group comprising a credit card, a smart card, an infra-red device, a Bluetooth device, a PDA, a mobile computer, a fixed computer, and a network of computers.
  • the apparatus comprises a counter for timing said communication to fail said authorization if said communication is not completed by a predetermined time limit.
  • the apparatus comprises a log-in functionality for logging in the non-authenticatable device.
  • said associator is connected to an authenticator for indicating that said activity request is approved.
  • said authentication communicator is operable to communicate said authentication to an external gateway associated with said non-authenticatable device.
  • said authentication communicator is operable to communicate said authentication to a server associated with said requested activity.
  • said authentication communicator is operable to communicate said authentication by applying a change to a routing table on a router.
  • a personal transaction card compatible with ATM machines comprising, in ATM readable format, an ATM routing number and a mobile telephone number, said mobile telephone number being associated with an owner of said personal transaction card.
  • said numbers are stored on a magnetic strip.
  • said numbers are stored in an internal integrated circuit.
  • an authentication method comprising: communicating via a secure link with an authenticatable device, verifying that the communication is with an intended one of authenticatable devices, and associating the verification with an activity request via a non-authenticatable device, thereby to authenticate the activity request of the non-authenticatable device.
  • said authenticatable device is a GSM device and said authenticatable link is a GSM link.
  • said authenticatable device is a CDMA device and said authenticatable link is a CDMA link.
  • said authenticatable device is a PDC device and said authenticatable link is a PDC link.
  • said authenticatable device is an edge device and said authenticatable link is an edge link.
  • said authenticatable device is a WCDMA device and said authenticatable link is a WCDMA link.
  • said authenticatable device is a GPRS device and said authenticatable link is a GPRS link.
  • said authenticatable device is an Iridium device and said authenticatable link is Iridium link.
  • said authenticatable link comprises a secure link involving a subscriber identity module located at said authenticatable device.
  • said secure link involves a subscriber identity module located at said authenticatable device.
  • said authenticatable device is a mobile telephone.
  • said communication comprises electronic data communication.
  • said electronic data communication comprises electronic messaging or SMS messaging.
  • the method comprises initiating said communication by sending an initial message to said authenticatable device and functionality to receive a reply to said initial message from said authenticatable device, therewith to authorize said activity request.
  • said communicating involves receiving a message from said authenticatable device and completing said communication by sending a response thereto to said authenticatable device, thereby to authorize said activity request.
  • the method comprises inserting a password into said reply for a requesting party to enter via said non-authenticatable device, and determining whether said password has been received via said non-authenticatable device.
  • the method comprises using an automatic voice for communicating with said authenticatable device.
  • said authenticatable device is associated with a payment account, said method further comprising charging said requested activity to said payment account.
  • said requested activity is one of a group comprising an Internet browsing activity, a point of sale activity and accessing a network.
  • the method comprises using one of infra-red and bluetooth.
  • the non-authenticatable device may be a TCP/IP link.
  • the method comprises obtaining a telephone number for communicating with said authenticatable device, from said non-authenticatable device.
  • said non-authenticatable device is any one of a group comprising a credit card, a smart card, an infra-red device, a Bluetooth device, a PDA, a mobile computer, a fixed computer, and a network of computers.
  • the method comprises timing said communication to fail said authorization if said communication is not completed by a predetermined time limit.
  • the method comprises a logging in procedure for logging in the non-authenticatable device.
  • the method comprises outputting an indication that said activity request is approved.
  • said indication is output to an external gateway associated with said non-authenticatable device.
  • said indication is output to a server associated with said requested activity.
  • said indication is output by applying a change to a routing table on a router.
  • SIM-less devices may be authenticated either by using simulated SIM gateway (SSG), or by using a virtual SIM.
  • SSG simulated SIM gateway
  • the virtual SIM can be initialized after a verifier verifies that the communication is with an intended authenticable device.
  • An associator then assoicates the activity request from an unauthenticated device, equipped with a virtual SIM with the initial verification in other words with the virtual SIM initialization.
  • Fig. 1 is a simplified representation of a SIM
  • Fig. 2 is a simplified block diagram showing functional operation of a SIM
  • Fig. 3 is a simplified schematic diagram showing a client device connecting to a non-PLMN network and from there to a PLMN network via a virtual SIM gateway according to a first embodiment of the present invention
  • Fig. 4A is a simplified block diagram showing the embodiment of Fig. 3 in greater detail including sub-systems of a simulated SIM gateway
  • Fig. 4B is a simplified comparative diagram showing an alternative solution to providing PLMN service over a non-PLMN network, the service compared to the prior art
  • Fig. 5 is a simplified flow chart showing a process of connecting a non-SIM device via a non-PLMN network to a PLMN network via a virtual SIM gateway, according to an embodiment of the present invention
  • Fig. 6 is a schematic diagram showing a typical PLMN network architecture
  • Fig. 7 is a schematic diagram showing the use of a virtual base station controller as an interface to the PLMN network, according to an embodiment of the present invention
  • Fig. 8 is a schematic diagram showing protocol layers and packet data authentication between a wireless LAN and a PLMN network according to a preferred embodiment of the present invention
  • Fig. 9 is a schematic diagram showing protocol layers and circuit switched data authentication between a LAN and a PLMN network according to a preferred embodiment of the present invention.
  • Fig. 10 is a schematic diagram showing protocol layers involved in connections between GPRS and a a wireless LAN according to a preferred embodiment of the present invention
  • Fig. 11 is a schematic diagram showing protocol layers involved in the provision of circuit switched bearer services over PLMN and wireless networks, according to a preferred embodiment of the present invention
  • Fig. 12 is a simplified schematic diagram showing a virtual SGSN+ used as an interface between a wireless LAN and a PLMN network according to a preferred embodiment of the present invention
  • Fig. 13 is a schematic diagram showing protocol layers and packet data authentication between a wireless LAN and a PLMN network according to a preferred embodiment of the present invention
  • Fig. 14 is a schematic diagram showing protocol layers for the provision of packet bearer services between a wireless LAN and a PLMN network according to a preferred embodiment of the present invention
  • Fig. 15 is schematic diagram showing protocol layers for the provision of circuit switched bearer services between a wireless LAN and a PLMN network according to a preferred embodiment of the present invention
  • Fig. 16 is a schematic diagram showing protocol layers for the provision of packet data traffic management between a wireless LAN and a PLMN, according to a preferred embodiment of the present invention
  • Fig. 17 is a schematic diagram showing two wireless networks that cover common area and are jointly connected to a hot spot central point that can be used to co-ordinate handovers between the network in accordance with a preferred embodiment of the present invention
  • Fig. 18 is a schematic diagram showing a wireless LAN lying inside coverage area of a cellular or PLMN network in accordance with a preferred embodiment of the present invention
  • Fig. 19 is a generalized flow diagram showing an overall scheme for handoff between two networks in accordance with a preferred embodiment of the present invention.
  • Fig. 20 is a generalized flow diagram illustrating handoff from the point of view of the mobile unit in accordance with a preferred embodiment of the present invention
  • Fig. 21 is a generalized flow diagram showing an alternative embodiment of a handoff procedure in accordance with a preferred embodiment of the present invention
  • Fig. 22 is a simplified schematic diagram illustrating two non-overlapping
  • WLANs having a common central point
  • Fig. 23 is a simplified schematic diagram illustrating two overlapping WLANs each being part of a different hotspot and having a common central point beyond the realm of the hotspots
  • Fig.24 is a variation of the scenario of Fig. 23 in which the hotspots do not overlap
  • Fig. 25 illustrates two overlapping PLMN networks
  • Fig.26 illustrates two non-overlapping PLMN networks
  • Fig. 27 is a simplified block diagram showing an authentication mechanism according to a further preferred embodiment of the present invention.
  • Fig. 28 is a simplified pictorial diagram showing a device for use in the secure link of Fig. 27,
  • Fig. 29 is a simplified pictorial diagram showing a device for use in the insecure link of Fig. 27,
  • Fig. 30 is a simplified block diagram showing another embodiment of an authentication mechanism according to the present invention, specifically for allowing controlled access to a wired or wireless LAN, and
  • Fig. 31 is a simplified flow chart showing operation of the authentication mechanism of Fig. 27, where the setup may start from any device, secure or unsecured, including setup from a different device.
  • the present embodiments provide connectivity for a non-PLMN network to interface to a PLMN network.
  • the inventions described hereunder provide interfaces between the non-PLMN network and the PLMN network that make the PLMN perceive units accessing through the non-PLMN network appear as if they were accessing the PLMN network directly, same as those units that access the PLMN through the radio access network of the PLMN. Therefore, the PLMN network perceives non-PLMN network servicing the supported access devices as simply a part of the PLMN network.
  • the present embodiments comprise a set of components, that interact together as a system that enables its users to access the various resources from a non-PLMN or a PLMN, be authenticated by and charged by the PLMN system, without having a device that is capable of physically interfacing with the PLMN (e.g. a cellular phone).
  • Some of the components described here are installed on the device that is accessing the PLMN or the non-PLMN network, and some within gateways between the non- PLMN and PLMN networks.
  • Some of the embodiments use a token that proves the identity of the cellular user, as issued by the cellular operator (e.g.
  • the embodiments do not require any modification to the PLMN infrastructure; they require addition of new entities that enable seamless access between the non-PLMN and PLMN.
  • a system that allows access from non-PLMN to PLMN must be able to execute at least the following two actions:
  • Authenticate the user i.e. prove to the PLMN that the user requesting access to its resources or other resources to be billed to the PLMN account, is an authorized user of the PLMN . In some cases this authentication includes, beyond proof of identify, approval of privileges to access specific services.
  • the PLMN must not be able to distinguish between accesses originating from a non- PLMN and between accesses through the PLMN own access network, whether a radio or other physical communication infrastructure. This must be done since the PLMN must be assured that the access request is really associated with a valid account for the specific requested services.
  • PLMN must not distinguish between traffic originating from or destined to a non-PLMN and traffic to and from users within the PLMN own access network.
  • All the embodiments contribute to the authentication and traffic security of the access device accessing the non-PLMN, where the service is bi liable to a PLMN account associated with this access device at the time of the access.
  • Two embodiments describe entities that are responsible for making the PLMN perceive the access as if it were done through standard cellular nodes; the characterized entities are thus designated simulated cellular nodes. These nodes are connected to both a non-PLMN and a PLMN; they may reside within the PLMN infrastructure in the same way as the nodes they are emulating.
  • the VBSC Virtual Base Station Controller
  • the VSGSN+ appears to the PLMN as a cellular switching node, i.e. an SGSN for packet switch data or an MSC for circuit switch data.
  • the VBSC and the VSGSN+ are able to execute the above two functionalities. They participate in the authentication of the non-PLMN access device to the PLMN network; and they are able to forward traffic from the non-PLMN network to the PLMN network.
  • the authentication relies on a token that was provided to the user by the PLMN operator (same identity parameters the PLMN operator provides to its subscribers accessing the PLMN own access network, for example those contained within a SIM for a GSM PLMN or typically stored directly in a cellular phone).
  • identity parameters the PLMN operator provides to its subscribers accessing the PLMN own access network, for example those contained within a SIM for a GSM PLMN or typically stored directly in a cellular phone.
  • the token is replace by a virtual token, which is a software package that simulates the token.
  • the virtual token is installed in the gateway (either VBSC or VSGSN+), in the former embodiment the software packet is installed in the non- PLMN access device.
  • the system supports several alternative methods of authentication.
  • the simulated cellular nodes (VBSC or VSGSN+) play an essential role in each one of the authentication methods.
  • a physical SIM can be installed in the device, it can be installed on the access card, on a special dedicated card, or on another card integrated with some other peripheral (e.g. flush disk).
  • the simulated cellular nodes (either the VBSC or the VSGSN+) get the cellular authentication information from the end user access device, and verify it against the authentication data it has stored in its data base, or against authentication data it retrieves from the PLMN infrastructure.
  • Mixed Network Authentication is one way to associate or initialize the simulated cellular node data base with verified and authenticated authentication data 2.
  • Simulator Gateway that resides within the entity simulating the PLMN infrastructure node, e.g. a cellular node) -
  • a Simulated SIM Gateway receives the PLMN authentication data and makes the cellular network think that the device has a real physical token/ cellular identity and responds like any cellular phone.
  • the Gateway actually authenticates the device using a different authentication protocol, typically Internet style.
  • the non- PLMN Gateway takes the identity of a node with the privileges the cellular network provides to such a node.
  • PLMN provides a one time access code every time the user requests access to the non-PLMN. This solution requires simultaneous availability of communication to both networks as well as manual intervention of the user ii. Automated one time access code.
  • the non-PLMN device has a client that automates the procedure, which may be extended even to automated transfer of the access code from the PLMN device (cellular phone) to the client in the non-PLMN access device iii.
  • Initialization of a Virtual SIM In this scheme, a one-time association between the PLMN device and the non-PLMN device is used to initialize the non-PLMN device either with a Virtual SIM or with authentication data for another authentication scheme (possibly used by the SSG). Then the user may be authenticated by and access the PLMN through the non-
  • One aspect of the present embodiments provides a virtual SIM gateway that can be used to interface between a non-PLMN network and a PLMN network.
  • the gateway performs authentication adequate for its communication link with the access device, such as typical Internet Protocol environment authentication over the non- PLMN network; after it is satisfied that it has authenticated a connecting device, then it authenticates itself on behalf of the access device to the PLMN network as if there is a SIM on a device (including the equivalent cellular identity in those networks that do not use SIM) .
  • these two stages may be integrated, with interim stages of one authentication dependent on interim stages of the other authentication.
  • the gateway may translate requests, queries and responses from one link into the other.
  • the gateway encrypts it in a way that makes it look as though it originated in the device with the SIM (or the equivalent cellular identity).
  • a SIM to the non-SIM device, preferably by incorporating the SIM into the connection card of the device, so that there are provided various types of WLAN and other connection cards incorporating SIMs.
  • another scheme employing a different authentication option exists: to equip the connecting device with a virtual SIM.
  • the virtual SIM can be stored within other access device resources with its algorithms implemented by a processor within the access device, i.e. a software implementation with no special hardware.
  • the virtual SIM can be initialized in several ways.
  • a device equipped with a virtual SIM is authenticated by either a VBSC or a VSGSN, as described in detail below, which preferably resides between the non-PLMN network and the PLMN network, and is able to create pseudo- triplets (rand, sres, k c ) for virtual SIMs or their equivalent (MIN, ESN) in other networks, or other authentication data e.g.
  • the Simulated SIM Gateway may be authenticated by the Simulated SIM Gateway and provide to the network the same or equivalent data the emulated node would exchange with the PLMN receive if a subscriber would be accessing through the PLMN access network and the emulated node.
  • the PLMN does not directly authenticate the user (i.e. does not verify that it has the SIM or equivalent cellular identity in his possession), but rather it relies on the gateway.
  • the gateway may then proceed to provide charging information to the PLMN. It is pointed out that when a virtual SIM is used in the access device then the simulated PLMN gateway preferably has functionality to authenticate a virtual SIM.
  • Another aspect of the present embodiments provides a virtual base station controller which provides interface functionality so that the non-PLMN network appears, to the PLMN network, as a cellular basestation controller.
  • the concept may be extended to even emulate a cellular base station, so the PLMN network appears as one or more cellular base stations..
  • An extension to the virtual base station controller allows peer to peer connections within the non-PLMN network, peer to server connections within the non-PLMN network and connections leading out of the network to be managed together from the PLMN network.
  • Another aspect of the present invention provides for the cellular network to approve the access through the association of a non-cellular device connecting via a different route, to the cellular telephone.
  • the concept of allowing the devices associated with the cellular devices to connect via the local network to the cellular network is extended in a similar way to networks with cellular telephones equipped with cellular identification modules or the like other than SIMs.
  • Another aspect of the present invention provides methods for maintaining seamless connectivity for the mobile user independent of the different communication networks it may be accessing and whether it is moving from one connection type to another.
  • Fig. 1 is a simplified diagram showing a typical SIM for application to a cellular telephony device.
  • the SIM 10 is a small module which is inserted into a SIM card carrier and reader 12 within cellular telephony device 14.
  • the SIM provides the telephony device with its identity, and allows it to connect securely to the cellular telephone network.
  • the SIM 10 comprises an authentication subsystem 16 for carrying out secure identification to assure the network that it is the legitimate carrier of the telephone number, and an encryption subsystem 18, which encrypts voice and data communication from the cellular device and which decrypts incoming voice and data communication from the network, using an algorithm known as A5.
  • A5 an algorithm known as A5.
  • Encryption and decryption are carried out using a key which is supplied at authentication by the network. The exact forms of authentication and encryption that are used are network dependent.
  • RAND random number
  • SRES a previous attempt, made by the system, to apply RAND to A3. If the response matches SRES then the connecting device is authenticated.
  • Fig. 3 is a schematic diagram showing a remote device connecting to a cellular or PLMN network via a local network.
  • Device 20 which need not be a cellular device and may not have a SIM, nevertheless has processing power that allows it to identify itself, albeit in ways incompatible with the requirements of the PLMN networks. Such a device is referred to herein as a non- PLMN device.
  • Device 20 connects to non-PLMN network 22, which may typically be a LAN network having wireless access points.
  • the LAN typically uses TCP-IP as a communication protocol.
  • the LAN is connected via a Simulated SIM Gateway 24 to the PLMN or cellular network 26.
  • the Simulated SIM gateway 24 provides a bridge between TCP-IP authentication and encryption protocols and the PLMN protocols and thus allows device 20 to be securely recognized by the PLMN network even though it does not have a SIM.
  • the connection between the device 20 and the gateway 24 is secured using any standard TCP/IP security protocol, e.g. secure socket link (SSL), TLS, Ipsec, that is any secure encryption and authentication technology typical to the IP network.
  • SSL secure socket link
  • TLS TLS
  • Ipsec secure encryption and authentication technology typical to the IP network.
  • SSL secure socket link
  • the security technology is used for the device 20 to identify itself unambiguously to the gateway.
  • IPSec may be used for this purpose.
  • SSL refers to other protocols e.g.
  • IPsec IPsec that may also be used for this purpose; that is to say the term SSL as used in this explanation refers collectively to any security protocol that is being used to protect the data transferred between the device and the gateway, including those that operate at lower layers and do not use a socket.
  • the gateway having determined the identity of the connecting device, then carries out a SIM compatible identification procedure with the PLMN network, in which the gateway indicates to the PLMN that it has authenticated the connecting device.
  • the authorization procedures are considered in greater detail below with respect to Fig. 5.
  • Fig. 4A is a simplified diagram showing in greater detail the embodiment of Fig. 3, and in particular showing internal subsystems of the gateway 24.
  • the simulated SIM gateway 24 comprises a database subsystem 28, an access subsystem 30, an interworking subsystem 32 and a PLMN subsystem 34.
  • the various subsystems may be implemented over a plurality of servers or the entire gateway may be implemented on a single server, depending on the scale of the operation required.
  • the gateway is preferably located in a secure place so as to guard against attempts to break physically into the system. As will be explained below, however, the gateway does not store any information that would compromise SIM security.
  • the access subsystem 28 generally comprises standard LAN security, typically to establish an SSL socket to the connecting device 20.
  • the access subsystem identifies the device and informs the PLMN subsystem 34.
  • the PLMN subsystem 34 communicates to the PLMN network 26 that a connection is required.
  • the gateway is configured to look like a standard cellular base station, or for that matter a standard SGSN, a standard base station controller or a standard MSC to the PLMN network which sends standard SIM identification data to the PLMN subsystem.
  • the subsystem does not pass on any of the identification data to the device as the device does not have a SIM. Instead, it simply checks that the SSL or other TCP/IP-based authentication protocol was successful and sends a standard SIM acknowledgement to the PLMN network. If traffic forwarding from the end user access device to the PLMN is required then the PLMN subsystem 34 may also carry out encryption of outgoing data and voice and decryption of incoming data and voice as necessary to provide compatibility with the PLMN network
  • the internetworking subsystem provides a bridge between the IP based access subsystem and the cellular protocols of the PLMN system being used.
  • the database subsystem contains data of the users of the LAN so that individual users can be authenticated and given access to the appropriate services.
  • Fig. 4B is a simplified comparative diagram showing an alternative embodiment for allowing non-PLMN devices access to a PLMN network.
  • the non-PLMN devices are required by the PLMN network to do the following;
  • the PLMN sends a random number (RAND) to the access unit.
  • RAND random number
  • SRES correct number
  • the access device determines SRES by inputting the RAND to the SIM, where the secret A3 algorithm processes it and the SRES is the output.
  • SRES is sent back toward the PLMN where it is compared to the expected value, and.
  • the access unit provides MIN and ESN in a first access, TMSI and ESN later on, in order to be similarly authenticated by the PLMN.
  • Data or voice encryption - Digital bearer information (voice or data) sent from the access device to the PLMN is encrypted to prevent eavesdropping.
  • the SIM encrypts the data stream using the A5 algorithm and an internally generated encryption key that is derived from RAND. Different algorithms for the same purpose are defined for CDMA and other networks.
  • Both of the above-mentioned requirements may be performed by providing access to a SIM (or equivalent cellular identity data) from the non-PLMN device, and this may be accomplished by incorporating the SIM into the user terminal.
  • the SIM may be inco ⁇ orated into the device itself, into a separate access card or module or a SIM carrier and reader may be part of the network access card.
  • the cellular identity data may be stored in the user terminal, in a special smart card or in the access card.
  • Access cards in use by non-PLMN devices use a wide variety of access technologies including Bluetooth, Wireless LAN (802.1 IX) and wired 10/100 Based Ethernet.
  • the format for these cards includes standard PCMCIA, CompactFlash and other formats.
  • the access card may often be built in. More likely thoughit may be provided with an add on card, for example a CompactFlash (or PCMCIA) add on card.
  • a CompactFlash (or PCMCIA) add on card for example a CompactFlash (or PCMCIA) add on card.
  • a prototype that has been built comprises a Bluetooth Card in CompactFlash format. The card is modified to include a SIM carrier and the Bluetooth driver software is modified to include the SIM reader and control.
  • the SIM carrier and reader may likewise be added to Wireless LAN cards such as 802.1 lb in either CompactFlash or PCMCIA format.
  • a prototype has also been constructed of an 802.1 lb card in a PCMCIA format.
  • Figure 4 is based on the GSM/ GPRS network. The upper portion of the figure shows the current standard approach where GPRS is used throughout.
  • the SIM card and control software is normally mounted on the GPRS Access Card.
  • the GPRS Access card is installed in the User Device, which may typically be a PDA, Laptop or Mobile phone.
  • the principle of the solution is shown in Fig.4B. In Fig.
  • Bluetooth access card 38 The control software is installed on this same card.
  • the Bluetooth Access card is installed in the User Device and communicates over the Bluetooth network. GPRS messaging is transported over Bluetooth and at the edge of the network, Bluetooth transport is replaced by standard GPRS transport as shown in the figure.
  • the advantages of the above solution, as opposed to that of Fig 4A, are that the above SIM is included in an access card device. Specialization is restricted to a special card, which is to say that the solution can be implemented simply on the basis of providing SIMs in the non-PLMN devices and substantially no additional functionality has to be provided to any of the networks involved.
  • the subscriber is provided with access to full network services. All access and encryption uses standard and completely unmodified PLMN techniques. The carrier is protected from fraud because he is relying on his own security system. The access network operator islikewise protected from fraud by the same tried and tested PLMN system.
  • Fig. 5 is a simplified flow chart of the process of obtaining access to the cellular or PLMN network by a non SIM device connecting via a LAN.
  • the diagram refers to the embodiment of Fig. 4A.
  • the device of Fig. 4B connects in a completely standard manner.
  • the device connects to the LAN in an initial step SI and then an SSL socket is established in a subsequent step S2.
  • the connection to the LAN is preferably carried out using a standard web browser, which is perfectly capable of supporting an SSL socket or other TCP/IP authentication protocol.
  • the socket is standard and may typically use 64, 128 bit keys or other agreed upon key string to encrypt communications, thereby rendering the communication safe from eavesdropping.
  • the socket once established, is used in a two-stage authentication operation, including a first stage S3, in which the server authenticates itself to the connecting client.
  • Server authentication is generally achieved using a system of signed certificates, for example the X.509 standard server certificate, to reassure the connecting device that it is communicating with a recognized and if need be traceable server.
  • stage S4 Once the server has authenticated itself to the device then the user is generally asked, stage S4, to provide a user name and password. This is preferably carried out using a standard dialog box.
  • the username and password are compared with the server database and the server can then determine the connection privileges that the connecting device is entitled to. If stages 3 and 4 are negotiated successfully between the gateway and the device then the gateway notifies the PLMN that a connection is required, -stage S5.
  • the PLMN responds in stage S6 by providing a SIM security triplet, a random number RAND, an expected response SRES from the SIM to the random triplet and a encryption key Kc.
  • RAND is sent to the SIM, where it is used as the input to a one-way function.
  • the SIM sends back the function output, which the base station compares with SRES. If the response matches SRES then the connecting device is authenticated.
  • the connecting device is not a SIM device. Instead the PLMN subsystem 34, in stage S7, simply checks that the connecting device was successfully authenticated in stages 3 and 4 and then sends out an authorization response to the PLMN.
  • the gateway takes on responsibility for encryption of data and voice in the subsequent communication using the key Kc, in stage S8.
  • Voice is preferably always decrypted from the SSL at the gateway and may be subsequently re-encrypted using the A5 algorithm and the Kc key, according to the requirements of the PLMN network.
  • the subscriber attains all of the security supplied by a standard PLMN but can use a low cost device to connect or simply a device that happens to be conveniently available at the time, without needing any special hardware accessories.
  • the LAN operator he is able to provide a full set of connectivity services based on his own TCP/IP authentication technology.
  • the embodiments provide a means by which the subscriber connecting through the LAN can be provided with a full set of services, assured that responsibility will be accepted by the LAN operator.
  • the non-PLMN network may typically be a wired LAN, Bluetooth, 802.1 l(x) wireless LAN or the like.
  • An example of the above would be a PDA using an 802.1 1 access card connecting to an 802.1 1 LAN, through which it is connected to the GSM or GPRS cellular network. According to the above embodiments, such a connection may be achieved without providing the PDA with a GSM compatible SIM.
  • fig 4C is a simplified comparative diagram showing an alternative embodiment for allowing non-PLMN devices access to a PLMN network.
  • the approach is suitable when connection to the PLMN is only required for authentication and accounting pu ⁇ oses, but no user traffic is exchanged between the access device and the PLMN.
  • the end user access device is equipped with a virtual SIM.
  • the simulated cellular node (either VBSC or VSGSN+) has an authentication database, where all the authentication information of subscribers with Virtual SIM (or other means simulating authentication tokens for cellular identities) is stored.
  • the virtual SIM can be initialized or used with information where at least part of it is only valid for one access or access attempt, in several ways. Specifically, Mixed Network
  • Authentication can be used to authenticate the initialization of the virtual SIM installed on the remote connecting device, and to associate the cellular identity with the authentication data stored in the simulated cellular node's database.
  • a device equipped with a virtual SIM is authenticated by either a VBSC or a VSGSN, as described in detail below, which preferably resides between the non-PLMN network, and the PLMN network, and is able to create pseudo- triplets (rand, sres, k c ) for virtual SIMs or their equivalent (MIN, ESN) in other networks.
  • the PLMN does not directly authenticate the user (i.e.
  • the gateway may then proceed to provide accounting information to the PLMN, or the accounting may depend on the non-PLMN, or both.
  • the virtual SIM approach can be used for access devices when there is preference that they not include SIMs or other hardware based identifiers (smart card or equivalent), for non-PLMN to PLMN connectivity; or they may be used for non- PLMN to PLMN connectivity where the PLMN does not support integrated SIM based authentication- e.g. CDMA.
  • a virtual (usually software) SIM is installed on the remote device.
  • the remote device does not have a SIM.
  • the SSG is replaced with a designated gateway that issues pseudo-triplets to the remote device.
  • the gateway and the remote device share the virtual SIM secret key (which is stored in the simulated cellular node authentication database).
  • the gateway uses it to generate the triplet (RAND, SRES, KC), and to issue GSM-like challenges to the remote device (i.e. RAND).
  • the triplet can be generated by the same algorithm used by the GSM authentication protocol (i.e. A3 and A8), but is can also be generated by other algorithms (e.g. HMAC-SHA-1 or HMAC-MD5).
  • the remote device uses the virtual SIM to respond to the challenge, and sends SRES to the simulated cellular node (through the non-PLNM network).
  • Kc a key
  • the end user access device and the simulated cellular node can use this key to encrypt traffic flowing between them. How ever this key cannot be used to encrypt traffic destined to the PLNM network, since the PLNM network doesn't have this key.
  • SIM or USIM can be implemented in this method.
  • a software SIM can be cloned, so the authentication protocols that use virtual SIM include cloning detection mechanisms.
  • VBSC Virtual Base Station Controller
  • FIG. 6 is a simplified block diagram of a standard GSM network arrangement.
  • a base station system (BSS) 40 supports remotely located mobile devices 42. It is connected via an MSC 44 to a circuit switched network, in this case the PSTN, and is connected via an SGSN 46 to a packet switched network, such as the Internet.
  • the key point to observe is that the base station BSS interfaces to the MSC via the A interface for Circuit Switched connections and via the Gb interface for packet connections. These interfaces may be used, as will be described in detail below, by the VBSC so as to appear to the PLMN as any other BSS in the GPS network.
  • Fig. 7 is a simplified block diagram showing a non-PLMN network 48, interfaced by a virtual base station controller VBSC 50 to the GSM network of Fig. 6. Parts that are the same as those in previous figures are given the same reference numerals and are not referred to again except as necessary for an understanding of the present embodiment.
  • the non-PLMN network 48 connects remote devices 52 via a series of access points 54 and has its own network servers in the way of any typical network.
  • a SIM server 56 is shown providing a simulated SIM gateway, or a virtual SIM server authentication, of the kind described above.
  • the VBSC 50 uses the A interface for reaching circuit switched networks such as the PSTN and the Gb network for reaching packet switched networks.
  • the VBSC (Virtual Base Station Controller), is functionally a Proxy Gateway between the non- PLMN Access Network (Bluetooth, 802.11, etc) and the PLMN.
  • the VBSC connects to the PLMN over the A and Gb interfaces. These are the interfaces that the PLMN uses to communicate to a BSC and thus the VBSC appears to the PLMN as a BSC.
  • the VBSC 62 communicates with an access device 52, for example a PDA, or laptop using the non-PLMN network.
  • the communication is made to a client application installed on the access device or on a network server, and is carried out using a communication tunnel based on TCP/IP or any other suitable standard protocol. Communication may be required by the VBSC to the SIM Server discussed above for authentication and encryption services.
  • the end user access device might have a virtual SIM installed in it, and the SIM server can be a either a virtual SIM verifier, or it can be a simulated SIM gateway, as discussed above.
  • the VBSC preferably also communicates with a packet data or circuit switched software client on the access device. The client is used by the subscriber to obtain the specific services that are requested such as Co ⁇ orate VPN, Internet access, Access to Servers within the Cellular Network or Voice interconnection.
  • the access device client application is typically a downloadable software only application, particularly when the access device is a PDA or Laptop computer.
  • the VBSC 50 serves as an interface between the accessing, non-PLMN, network and the PLMN and preferably supports a wide range of functions that may be communicated over the A and Gb interfaces respectively.
  • the VBSC initiates and responds to messages to and from the PLMN, and interacts with elements within the access network to perform these functions. Discussion of selected functions follows below.
  • FIGs. 8 and 9 are respectively figures that show a simplified signaling plane for SIM services to the Gb interface, and a simplified signaling plane for SIM services to the A interface.
  • the correct interfacing of security features between the PLMN and the non-PLMN network is a part of making the interface look like a PLMN base station (BTS) or base station subsystem (BSS).
  • Figure 8 shows a series of mobile devices 52 connected via access points 54 to a wireless LAN network 60.
  • the wireless LAN uses its own protocols, RF-based protocols including MAC for the client to LAN connections and other network protocols for the client to VBSC connection and within the network.
  • VBSC 62 acts as a relay between the network protocol signaling and the PLMN signaling.
  • Obtaining the correct signaling content requires either that the mobile components have internal SIMs or that a simulated SIM gateway of the kind discussed above is used.
  • the Gb interface 64 is used to transfer the signal between the VBSC and serving GPRS support node SGSN 66, from which standard access is obtained to the cellular infrastructure: authentication with the HLR over Gr, data tunneling to GGSN over Gn, accounting data to CGF over Ga, etc.
  • a Gs interface 68 is used to transfer data with a mobile switching center MSC.
  • the VSGSN+ preferably always has a packet data interface towards the mobile interface; however towards the network it may use packet or circuit. That is to say, specifically the VSGSN enables the non PLMN Access Network to appear as both a SGSN for packet data and BSC for circuit switched data.
  • Fig. 8 only addresses the cellular protocol, therefore the Internet connection that may be used as the transport therefor.
  • the SGSN 66 preferably serves as a relay between the Gb and Gs interfaces. It is noted that the MSC is concerned only with circuit switched data. Its equivalent for packet switched data is the SGSN.
  • Fig. 9 shows the authentication plane for circuit switched data. Parts that are the same as those in previous figures are given the same reference numerals and are not referred to again except as necessary for an understanding of the present embodiment.
  • Fig.9 is identical to Fig. 8 except that the SGSN stage is omitted and the A protocol 70 is used to communicate directly between the VBSC 62 and the MSC 68.
  • Fig. 10 is a simplified diagram showing a communication protocol plane for packet switched bearer services. Parts that are the same as those in previous figures are given the same reference numerals and are not referred to again except as necessary for an understanding of the present embodiment.
  • a GPRS network server 72 is connected via the Gn interface 74 to the SGSN 66. For each element of the figure, the different available protocol layers are shown.
  • a data access client runs GPRS applications, typically including such things as WAP browsers.
  • the communication path that is used is the same as in Fig. 8 above.
  • applications can obtain access outside the PLMN GPRS network via the gateway GPRS support node GGSN 76 shown in Fig. 6.
  • the data access client as downloaded to the access device, may typically be assembled from standard GPRS software protocol elements, and may communicate via the TCP/IP tunnel to the VBSC.
  • the transport layer is preferably replaced with BSSGP (BSS GPRS Protocol) to achieve compatibility with the SGSN.
  • BSSGPRS Protocol BSS GPRS Protocol
  • the Radio Link Control layer message is preferably supported as required by the BSSGP.
  • Fig. 1 1 is a simplified protocol block diagram showing the protocols involved at different elements in providing circuit switched services.
  • the communication path is substantially that shown in Fig. 7 and parts that are the same as those in previous figures are given the same reference numerals and are not referred to again except as necessary for an understanding of the present embodiment.
  • Fig. 1 1 illustrates the connection path for circuit switched services, with specific discussion of voice.
  • fax and HS data are handled in an analogous manner.
  • the connecting device 52 preferably comprises a telephone keypad and display and supporting audio servers. If the device 54 is itself a telephone unit, such as a Bluetooth cordless telephone, then these features are inherent in the device and the client need only supply access to the data tunnel. If the device is a standard PDA or Laptop, then the client preferably includes a soft telephone keypad and display and preferably also includes audio support. Such features are standard today in IP telephone clients.
  • Speech is preferably vocoded with AMR (Adaptive Multi-Rate), the currently adopted standard in GSM PLMN.
  • AMR Adaptive Multi-Rate
  • Such vocoding may be carried out either in the client or at the VBSC, each possibility having advantages and disadvantages as follows:
  • AMR vocoding in the access device has the advantage of lowering the LAN voice bandwidth, at the expense of significant processing demands on the access device to perform the vocoding and a time delay associated with re-frame synchronizing of the AMR packets at the VBSC.
  • the Wireless LAN transport channel may generally be expected to cause the time delay that leads to the need for resynchronizing. Packets passing through the channel may experience fragmentation, but due to the vocoding, only when the full frame has been received and reconstructed can the VBSC send it to the MSC over the A interface.
  • Vocoder at the VBSC An alternate technique is to use at the client a so-called lighter weight vocoding technique of the type already in use for Voice over IP. At the VBSC the lighter weight coding is then preferably transcoded into AMR.
  • vocoding may be dispensed with altogether at the client. This is because the Bluetooth Wireless LAN protocol supports a circuit switched channel that has been specifically designed for voice. It supports both 32 Kbps ADPCM and 64 Kbps PCM. If the Bluetooth voice channel is used, then the only vocoding that is required is at the VBSC.
  • a disadvantage with the schemes that place the Vocoder at the VBSC is that the Wireless LAN ends up carrying a significantly higher rate voice channel. This results in a loss of channel capacity, especially since this capacity must be guaranteed to maintain its real time characteristics.
  • the VBSC 62 is installed at the LAN. It may however alternatively be installed alongside PLMN facilities, typically the carrier switching center.
  • the advantage of the former method is that a VBSC failure may affect just one LAN.
  • the latter case allows a single VBSC to serve numerous LANs, with consequent savings in cost, but a higher level of reliability is advised.
  • the VBSC provides a protocol bridge between the LAN and the cellular network, allowing the two to work together as an integrated whole.
  • carriers can use non-PLMN networks (Bluetooth, 802.1 lb, etc) to offer subscribers 3G services that are not otherwise available, whether for reasons of available bandwidth or because the receiving devices do not have the sophistication to receive them.
  • non-PLMN networks Bluetooth, 802.1 lb, etc
  • Subscribers may be offered a higher speed, richer experience from the non-PLMN networks themselves whilst at the same time having full access to standard voice and data services.
  • Subscribers may additionally be provided with consolidated billing and service profiles with the standard PLMN network Carriers obtain a lower cost access network that allows them to lower price to their subscribers. Subscribers may be offered communications privacy over the network, in an integrated security mechanism such as the SIM gateway. Likewise simultaneous Voice and Data communication is provided. Virtual VSGSN Plus
  • VSGSN+ is provided to support Peer to Peer, Peer to Local Server and Peer to Off Network communications while interconnected with a PLMN network as if were an integral part of that network.
  • VSGSN enables the non PLMN Access Network to appear as both a serving GPRS support node (SGSN) for packet data and BSC for circuit switched data.
  • SGSN serving GPRS support node
  • a standard serving GPRS support node is responsible for the delivery of data packets from and to the mobile stations within its geographical service area. Its tasks include packet routing and transfer, mobility management (attach/detach and location management), logical link management, and authentication and charging functions.
  • the location register of the SGSN stores location information (e.g., current cell, current VLR) and user profiles (e.g., IMSI, address(es) used in the packet data network) of all GPRS users registered with the SGSN.
  • the Plus in the name refers to the function that supports Circuit Switched Communication, which is not normally part of GPRS and thus not supported by a standard SGSN.
  • the interface is required to provide inter alia the following services:
  • the Virtual Base Station Controller (VBSC), as described above, enables the above services, but does not in itself enable Peer-to-Peer, Peer to Server and Peer to Off Network communication.
  • the VSGSN+ incorporates all of the VBSC functions with the addition of supporting Peer to Peer, Peer to Sever and Peer to Off Network connections.
  • the BSS 40 interfaces to the MSC via the A interface for Circuit Switched connections.
  • the SGSN 46 interfaces to the MSC/VLR 44 via the Gs, the AuC/HLR 78 via the Gr and the rest of the network elements via the Gn interface. These interfaces are used by the VSGSN+ so that it appears to the PLMN as both a standard BSS and a standard SGSN that would normally constitute part of the PLMN network.
  • FIG.12 is a simplified block diagram showing an overview of the VSGSN+ and how it fits into the network environment. Parts that are the same as those in previous figures are given the same reference numerals and are not referred to again except as necessary for an understanding of the present embodiment.
  • a wireless LAN 48 has a SIM server 56 as before but additionally has a connection manager 80 and a local server 82, which latter carries media rich data specific to the LAN.
  • the network is connected to a VSGSN+ unit 84 which interfaces between the LAN and the PLMN network in much the same way as the VBSC of previous figures.
  • the VSGSN+ 84 interconnects with the PLMN as if it were a standard SGSN; it may use an auxiliary A interface.
  • the Gs and Gr and Ga interfaces are used to communicate to the MSC/VLR 44 and HLR 78 and CGF (not shown in picture) for such general PLMN network functions as Authentication, Registration, Service Profiles and traffic measurement including accounting, for example over the Ga interface to the CGF.
  • bearer data traffic flows over the Gn interface, to and from the carrier's IP cloud. While the different Gx interfaces are functionally different, they are physically located on the same transport media. Circuit switched voice control, and the respective bearer signal, is communicated, again through the VSGSN+, but via the A interface.
  • the non PLMN local network is equipped with Connection Manager 80, as mentioned above, to establish Peer-to-Peer and Peer-to-Local Server as well as peer- to-off network Servers.
  • the Connection Manager 80 achieves these connections by supplying the VSGSN with the identification of the connected parties and the amount of data moved between the parties.
  • the information is used by the VSGSN to format a Call Detail Record input.
  • the format is one that the PLMN expects from a standard SGSN, and the Call Detail Record is required by the PLMN in order to perform its call management functions.
  • Fig. 13 is a simplified block diagram showing the protocols available at different parts of the LAN PLMN interface, particularly for use in authentication.
  • the figure is the same as Fig. 8 except that the Gb interface is replaced by the Gs interface 86.
  • the VBSC 62 is replaced by the VSGSN+ 84, which operates similarly as a bridge between the LAN protocols and the PLMN network protocols. More particularly, the figure shows the protocols involved when the VSGSN+ 84 interfaces between the PLMN's MSC/ VLR 68 and the LAN SSG for registration.
  • Fig.13 concentrates on the packet switched side, i.e.
  • Fig. 14 is a simplified diagram showing the network and protocol environment of a data bearer PLMN server 90.
  • the VSGSN+ interfaces between the LAN and the PLMN as for Fig.12 above.
  • the access client 52 runs standard GPRS applications, which may typically include access to services on the cellular IP network for special email, video streaming, etc.,. Communication is via the data and protocol path shown in Fig. 14. Although not shown, applications can obtain access outside the PLMN GPRS network via the GGSN.
  • the data access client can be assembled from standard GPRS software protocol elements and may communicate over TCP/IP to the VSGSN+.
  • Fig. 15 is a simplified diagram showing the circuit switched bearer services protocol and network environment. Again the VSGSN+ acts as an interface between the LAN 60 and the PLMN, this time connecting to the MSC 44 via the A interface. Issues of voice compression and vocoding are the same as described in respect of the VBSC above.
  • Fig. 16 is a simplified schematic diagram showing the network protocol environment and illustrating packet data traffic management. As discussed above, the VSGSN+ 84 is intended to support non-PLMN Access Networks that can provide connection types including Peer-to-Peer, Peer to Server and Peer to Off Network.
  • connection manager 80 All of these connection types are preferably established and managed by the Connection Manager 80.
  • the VSGSN+ obtains traffic management information from the connection manager node and formats it into message sets that are compatible with the PLMN format. As a minimum, Call Detail Records (CDRs), which have been mentioned above, are generated in this manner.
  • CDRs Call Detail Records
  • Fig. 16 shows the message flow for Packet Data services. Circuit Switched communication is handled in an analogous manner with the A interface replacing the Gs interface.
  • the VSGSN+ can be installed at the Wireless LAN location or at the carrier-switching center.
  • a trade off between cost and reliability applies as above. If a centralized VSGSN+ is used it should preferably have a high level of availability. In the case where multiple non-PLMN Access Networks are in close geographical proximity, a centralized VSGSN+ will most likely be the preferred approach.
  • the VSGSN+ provides support for Peer to Peer, Peer to Server and Peer to Off Network communications, without loss of visibility or control by the PLMN.
  • the VSGSN+ carries out the following tasks:
  • Handoff adds the concept of handoff to the control of communication in multiple wireless networks not presently having this capability. Effective handoff allows the user to obtain all of the benefits of a wireless LAN when he is within range but still to be mobile, in that the connection is retained when he moves out of range, either by connecting to another wireless LAN or by connecting directly to the PLMN network if he has a suitable client.
  • Inter wireless wide area network PLMN handoff a) Between overlapping PLMNs operating with different technology b) Between non-overlapping PLMNs operating with different technology 4. Handoff between wireless local and wide area networks a) Handoff from local to wide area network b) Handoff from wide to local area network
  • Handoff may be commanded by a Network Controller entity or initiated by the User unit 2.
  • the network maintains a strong session logic that takes into account handoff and temporary drops in communication.
  • the session may be continued after communication is established on the new network.
  • the system is able to determine that the user has dropped from one network and joined another one and is then able to resume the session that was interrupted. Alternatively, the user unit informs the network that it is resuming an interrupted session
  • Hard handoff or soft handoff may be supported. In the case of soft handoff there is no interruption, and connection with the new network is established while communication is still in effect with the original network
  • Hand off may be dealt with by the AP communication protocol (the medium access control or MAC). This may require modification of the existing protocols. If this option is not available, system logic may support controls outside the MAC to initiate communication with another AP and then re-establish the session. Although neither AP knows that a handoff has occurred, the AP that has been supporting communication up till now preferably reacts as if the user has dropped off the network. At the same time the AP to which communication has been transferred preferably reacts as if a new user (and new session) has accessed its network.
  • the AP communication protocol the medium access control or MAC
  • the logic preferably supports all or a subset of a system including:
  • Hot Spots may comprise one or several APs.
  • Hot Spots may operate using the same or different local area technologies or connection protocols, e.g. 802.1 lb, Bluetooth, etc.and one or more wide area technologies or communication protocols e.g. GPRS, CDMA2000, Reflex
  • the logic preferably determines a priority order of search to determine when handoff is required between APs of the same technology
  • the mobile unit preferably connects through a logic entity designated the Service Controller that is responsible for the maintenance of the mobile communication sessions.
  • These sessions are independent communication entities between the mobile and another party or service, defined as the remote or far end of the session (the mobile being defined as the near end).
  • the Service Controller may support services that from the remote end may seem to be circuit switched or packet switched, voice/ data voice over data, real and non real time. The pu ⁇ ose of the handoff is thus to ensure the continuity of these sessions when the mobile changes its access channel.
  • the session is defined within any protocol, standard or non-standard, that is common to the mobile unit and to the Service Controller, including but not limited to IP-based protocols.
  • the session is implemented as a layer above the communication between the mobile unit and the access channel it is presently using, be it a wireless Wide Area Network (WWAN), a Wireless Local Area Network (WLAN), Internet, intranets, PSTN, etc.
  • WWAN wireless Wide Area Network
  • WLAN Wireless Local Area Network
  • the networks addressed within the present embodiments include among others PLMNs (including GPRS, EDGE and CDMA cellular data), the various 802.1 1 WLANs, Bluetooth, ISDN, X.25, Frame Relay, etc.
  • each definition addresses a specific case, e.g. handoff between WLAN and WWAN.
  • a complex handoff logic including one or more of the methods defined above, may be operated within the same mobile unit and activated as the need arises. For example, a mobile losing communication within a WLAN may be trying to perform handoff to another Wireless Network within the same WLAN Hot Spot as well as looking for a possible handoff to a WWAN, so when more than one course of action is feasible, the mobile, its Service Controller or even the Hot Spot Controller is able to select for use the handoff with the highest priority or benefit.
  • Fig. 17 is a simplified schematic diagram showing two local wireless networks WNl and WN2 overlapping in their coverage area, and both being controlled from the same Hot Spot Central Point 100.
  • the first Wireless Network, WNl comprises an Access Point API which controls four subscriber units SU1 - SU4.
  • the second wireless network WN2 has an Access Point AP2 which controls two subscriber units SU5 - SU6.
  • Mobile subscriber (MS) unit SU4 is currently being served by API, i.e. it is part of WNl.
  • MS Mobile subscriber
  • SU4 is currently being served by API, i.e. it is part of WNl.
  • Fig. 18 is a simplified schematic diagram showing a local wireless network 110 operating within the coverage area of a wide area network 1 12.
  • the local Wireless Network 110 comprises an access point (AP) 114 from which it is assumed to be controlled, although, in the alternative, it may be controlled from a Hot Spot Central Point as depicted in Fig. 17.
  • the Wide Area Network 1 12 is controlled from a WAN Center 1 16.
  • subscriber units SU operate within each network.
  • a specific subscriber unit SU5 is transitioning between the two network, i.e. it has been operating within the WAN 112 and transfers to the WN 1 10 or vice versa.
  • Several solutions are proposed for the implementation of this handoff while maintaining the sessions of the wireless subscribers operating within the networks.
  • the solutions are intended to support a wide range of mobile and network capabilities. It is pointed out that the solutions hereindescribed, whether they address hard or soft handoff, may be implemented on a time division basis, supporting sharing of resources to reduce cost of hardware and thereby to minimize interference typical of the implementation of more than one radio within a single mobile unit.
  • Fig.19 is a simplified flow chart showing the handoff between interlapping wireless networks which use the same technology.
  • the respective party drops the communication.
  • the user device may just drop and switch to another wireless network, or the AP may comprise a stopping service which actively drops the user.
  • the MS attempts to join another network, in this case WN2.
  • the Central Point logic determines that there is a pending (waiting or interrupted) session with the user device and the pending session is automatically re-joined.
  • distributed Central Point logic CP logic within the AP
  • the AP controlling the accepting wireless network is informed of the pending session of this MS by either one of push or pull logic.
  • the AP of the previous serving wireless network takes the initiative of informing the AP of the receiving wireless network ( and potentially other neighbor wireless networks) of the pending session; the pull case means the AP of the receiving wireless network requests information on the pending sessions of the MS that joined the new network.
  • Fig. 20 is a simplified flow chart showing how handoff is carried out without assistance from the mobile devices.
  • secondary receivers within neighbor wireless networks measure reception from the user that may require to be handed off.
  • the secondary receiver may be a separate receiver or may simply comprise some time slots allocated for this pu ⁇ ose within the regular AP receiver work plan.
  • the decision to hand off the mobile from one WN to another is now determined by the CP, in case of the centralized logic, or by the servicing AP and the APs of the candidate receiving WNs. If this logic determines one of the candidate receiving WNs may provide improved communication service, per its measured mobile to AP communication characteristics and its loading conditions (either one or both), the handoff takes place.
  • the mobile is handed off from the servicing WN to the receiving WN in one of two ways: a) If the mobile is capable of accepting wireless network selection controls, it is commanded to hand off to the selected (receiving) WN, including if possible transfer of the WN communication parameters to speed up the hand off process; b) If the mobile is not capable of accepting wireless network selection controls, it is dropped off the servicing WN by refusing service; then the mobile tries to log onto another WN, and only the selected (receiving) WN accepts its attempts to join the network
  • the local wireless mobile searches additional channels to measure and determine communication conditions of other networks and sends this information to the AP.
  • the network architecture may be either centralized or distributed, the AP accordingly either maintaining the information locally or sending it to the CP.
  • the local wireless mobile searches additional channels when any one of the following conditions are met: a) The mobile is programmed to perform the search at regular intervals and the end of the interval is reached. The search interval may be preprogrammed or controlled through AP transmissions. b) The mobile is commanded by the AP to search additional channels. This will typically occur when the AP determines a handoff may be required. c) The mobile is commanded by the CP or distributed CP logic to search additional channels. This search may be required to support analysis of current Hot Spot communication conditions, and allowing reallocation of WNs if necessary or for testing pu ⁇ oses.
  • the CP (or distributed CP logic within the AP) then determines which is the best WN the mobile may be handed off to. This decision is based on the reported communication conditions, the loading conditions of the WNs and the services required by the mobile. The AP controlling the WN is then notified.
  • the mobile is handed off from the servicing WN to the receiving WN in one of the two ways discussed with reference to Fig. 20: a) If the mobile is capable of accepting wireless network selection controls, it is commanded to hand off to the selected (receiving) WN, including if possible transfer of the WN communication parameters to speed up the hand off process; b) If the mobile is not capable of accepting wireless network selection controls, it is dropped off the servicing WN by refusing service; then the mobile tries to log onto another WN, and only the selected (receiving) WN accepts its attempts to join the network
  • the local wireless mobile searches additional channels when (i) the quality of service it is getting is not satisfactory, or (ii) when it receives a command to hand-off to a better channel in a different WN.
  • the mobile then performs the search and measurement of all wireless networks it can receive and determines which is the best one to switch to.
  • the criteria to determine best WN to switch to may include measuring of communication characteristics as well as network loading.
  • the mobile then drops off the WN that has been servicing it. The option is retained for the mobile to send a notification before dropping off the WN in order to speed up the handoff process.
  • the mobile After dropping off from the current servicing WN, the mobile attempts to join the WN it has selected for handoff.
  • the system may identify that the mobile has been handed off from its current servicing WN to a new one and ensures that it resumes its session or sessions through the new WN.
  • Network assistance may be provided for any of the following:
  • identification of acceptable neighbor WNs i.e. provision of their communication parameters, for example to prevent attempts to log into WNs that belong to other systems;
  • FIG. 21 is a simplified flow chart showing a method for implementation when the network control, either residing in the CP or in the AP, determines that the servicing WN cannot support the mobile service communication conditions.
  • Network control may or may not determine potential neighbor networks that have the capability to support service; if this capability is determined, network control (through the AP communications) sends information on the communication parameters of available WNs to the local wireless mobile.
  • the mobile searches for other WNs that may support its service requirements.
  • the mobile unit time multiplexes its search of neighboring networks with its communication within the service WN, thus minimizing the handoff service impact.
  • an optional embodiment is retained wherein the mobile drops servicing network access and searches for neighbor WNs. In both embodiments the mobile may use data previously provided by the network or engage in a blind search.
  • the mobile determines which WN it will hand off to and attempts to access this WN. If the mobile does not succeed in accessing the selected WN, the mobile attempts to access the next best WN according to its search results, and so on.
  • network control After access is successfully completed, network control recognizes that this is a resumption of a previous session or sessions ensuring continuity of the session.
  • soft handoff refers to maintaining seamless continuity of communication when transitioning from one WN to another, with no impact whatsoever on the sessions active within the local wireless mobile including those that depend on time bounded continuity of communication.
  • Soft handoff as supported by the present embodiments may be implemented by establishing communication between the mobile unit and the second AP before dropping it from the presently serving AP. As an alternative it may be achieved by switching WNs fast enough so there is no discontinuity in session communication. Soft handoff may for example be achieved if the secondary AP uses a slot designated for outward transmission in which it in fact listens to the present mobile unit. In the reverse case in which the mobile unit is taking the initiative, the mobile may use slots designated for it to transmit to listen to an active neighbor system.
  • secondary receivers within neighbor wireless networks measure reception from the user that may require to be handed off.
  • the secondary receiver may be a separate receiver or some time slots allocated for this pu ⁇ ose within the regular AP receiver work plan.
  • Network control provides accurate parameters of the new serving AP to the mobile and handoff controls to the new serving WN so there is no interruption in service.
  • the local wireless mobile searches additional channels to measure and determines communication conditions of other networks and sends this information to the AP, which depending on the centralized or distributed architecture maintains the information locally or sends it to the CP.
  • the HS network control (centralized or distributed) now selects the new serving WN based on the information provided by the mobile and the operational status of its WNs. Network control provides accurate parameters of the new serving AP to the mobile and handoff controls to the new serving WN.
  • the mobile now establishes communication within the new serving WN without disconnecting its old WN communication. Once communication is established, the mobile drops off the WN that has been servicing it. A variation allows the mobile to send a notification before dropping off the WN. c) Mobile controlled soft handoff.
  • the local wireless mobile searches additional channels when (i) the quality of service it is getting is not satisfactory, or (ii) when it receives a command to hand-off to a better channel in a different WN.
  • the mobile then performs the search and measurement of all wireless networks it can receive and determines which is the best one to switch to.
  • the criteria to determine best WN to switch to may include measured communication characteristics as well as network loading (either/ or).
  • the mobile then notifies Network Control as to which WN it selected for the handoff and waits either for an acknowledgment or a time out to expire, upon which it establishes communication with the new WN without disconnecting from the present WN. After communication is established, the mobile drops off the WN that has been servicing it. The option is retained for the mobile to send a notification before dropping off the WN. d) Network commanded, mobile controlled soft handoff
  • Network Control either residing in the CP or in the AP, determines that the servicing WN cannot support the mobile service communication conditions.
  • Network control may or may not determine potential neighbor networks that have the capability to support service; if this capability is determined, network control (through the AP communications) sends information on the communication parameters of available WNs to the local wireless mobile.
  • Fig. 22 is a simplified schematic diagram depicting two non-overlapping WNs within the same Hot Spot, and connected to a single central point 100.
  • the Hot Spot may include additional WNs.
  • the logical communication of the unit may be held off or frozen.
  • the time out may be defined differently for circuit switched communication and for packet communication, or for voice and data.
  • the communication with the unit mayl be assumed to be lost.
  • the Hot Spot control preferably immediately treats it as in the first handoff case defined above (brute force switching of wireless network communication with continuity at the session level).
  • a further embodiment is also described by Fig. 22, the difference being that in this case the WNs are operating with different technologies, e.g. 802.1 1 b WLAN (Wi- Fi) and Bluetooth respectively. Since different technologies are involved, it makes no difference whether the WNs are overlapping or not; the assumption is that the unit hands off communication from one WN before establishing communication within the other WN. Preferably,handoff is carried out in much the same way as between overlapping WNs operating with the same technology and as described in detail above.
  • different technologies e.g. 802.1 1 b WLAN (Wi- Fi) and Bluetooth respectively. Since different technologies are involved, it makes no difference whether the WNs are overlapping or not; the assumption is that the unit hands off communication from one WN before establishing communication within the other WN. Preferably,handoff is carried out in much the same way as between overlapping WNs operating with the same technology and as described in detail above.
  • the unit is not treated as if it has dropped off from the network. Rather, for the duration of a time out that is either constant or configurable, the logical communication of the unit is held off or frozen, that is the session is held pending.
  • the time out may be defined differently for circuit switched communication and for packet communication, or for voice and data. Upon expiration of the time out, the communication with the unit is assumed to be lost.
  • the communication is by definition lost and a new communication is re- established.
  • the Hot Spot controller or any connection logic above it, checks the pending session of the user unit establishing communication. If the Hot Spot connection logic succeeds in associating the mobile unit with a communication (one or more sessions) that is being held, the Hot Spot control immediately treats it as in the handoff case defined above for brute force switching of wireless network communication with continuity at the session level, and the session or sessions are reestablished within a short time without data loss.
  • the hand-off embodiments defined above may be expanded to include scenarios in which the mobile unit, rather than accessing a new WN controlled by the same Hot Spot, accesses a WN belonging to a different Hot Spot, as depicted in Fig. 23 for overlapping WNs and Fig. 24 for non-overlapping WNs.
  • FIG. 24 shows a hot spot controller 110 and two non-overlapping hot spots HS1 and HS2. Inside each hot spot is a wireless LAN, respectively WNl and WN2.
  • the hot spots may use the same or different technologies.
  • the embodiment operates in a similar manner to the case of non-overlapping WNs within the same Hot Spot, as discussed abov e in respect of Fig. 23, and is characterized by a temporary loss of communication when the unit is out of coverage of any WN.
  • the Hot Spot controller 1 which is any entity controlling both Hot Spots, or at least exchanging information between the Hot Spots, ensures that the mobile unit sessions remain frozen, that is to say pending, but not lost. Alternatively, the Hot Spot that last serviced the mobile unit maintains the sessions in a frozen state. Maintaining the session open may be performed by not providing indications that the communication with the mobile is lost. Other parts within the system may ensure that as long as no such information is provided, and at least for the duration of the required timeout, the sessions may actually be maintained in this frozen state.
  • Fig. 24 it is assumed that the mobile M was last serviced within wireless network WN 1 , which is located within Hot Spot 1. After the mobile M loses communication or service within WNl , then when it subsequently comes within the coverage of WN2 in Hot Spot 2 it establishes communication within this wireless network. The information regarding this communication establishment is sent to the Hot Spot Controller 1 10, whether the controller is implemented as centralized or distributed processing. A search is then performed to determine whether there are frozen sessions for the mobile M. If a frozen session is found, it is re-established ensuring no loss in communication. The optional communication techniques supporting this handoff process are the same as for the case of the handoff between WNs of the same Hot Spots.
  • the present embodiment thus ensures that the transfer between WNs of the same Hot Spot or between different Hot Spots maintains the same seamless properties.
  • Fig. 25 is a simplified schematic diagram illustrating handoff between overlapping PLMNs, which is to say two cellular networks.
  • PLMN1, 120 and PLMN2, 122 overlap.
  • Each has a an access point 124 and 126 respectively, and the access points lead eventually to a common logic controller 128.
  • FIG. 25 addresses a way of improvement in providing service to a mobile unit that is capable of reception from two PLMNs covering the area where it is presently located. That is either that the two PLMNs use the same technology or the mobile unit is capable of connecting using two technologies.
  • the mobile M using data communication (including voice over IP VoIP) is currently being serviced by PLMNl, 120.
  • the quality of service becomes unacceptable, and the mobile is instructed to search, or searches on its own, for an alternative service.
  • the result of the search indicates it may be serviced by PLMN2, 122.
  • the mobile unit is preferably serviced by Service Controller 128.
  • the Service Controller is typically operated by a different service than the PLMNs, although in some cases it may actually belong to one of the PLMN carriers.
  • embodiments are provided both for immediate continuity of service if the mobile, which is possible provided that the mobile unit is equipped to maintain simultaneous communication with both PLMNs, and for the simpler case where the mobile drops communication with PLMNl and subsequently establishes communication with PLMN2.
  • the Service Controller freezes the mobile ongoing sessions to a maximum duration of a pre-set time out that may be constant or configurable.
  • the logical communication of the unit is thus retained or frozen while physical communication is not operational or is being re-established.
  • the time out may be defined differently for voice and different types of data.
  • Communication drop by the Service Controller is preferably either by sending a control signal to the mobile unit or by disrupting the session flow to the point at which it causes the mobile unit to determine that communication must be switched.
  • the mobile unit may then just drop communication and look for another PLMN to switch to, or the PLMNl stopping service effectively drops the mobile unit.
  • the mobile unit finds that another PLMN is active in the area and attempts to join its network, in this case PLMN2.
  • the Service Controller identifies that there are one or more pending sessions with the reconnecting mobile unit and the session (or sessions) thus identified is automatically re-joined.
  • An alternative embodiment utilizes Service Control logic residing within the
  • the PLMN accepting the mobile finds out by contacting PLMNs operating within the area whether the mobile has been serviced lately and there are pending (frozen) sessions; alternatively, a PLMN maintaining an open session may inform neighbor PLMNs.
  • the mobile searches for and identifies the operation of another acceptable PLMN before dropping the PLMN where it is presently connected or active.
  • the mobile then sends this information to the Service Controller or to another entity controlling the logic of its physical communication. This entity then instructs the mobile to switch to the new PLMN if it is determined to be acceptable per defined logical criteria (business relationship, loading conditions, mobile subscription contract, etc.)
  • the local wireless mobile unit searches for coverage by another PLMN when any one of the following conditions are met: a) The mobile unit is programmed to perform the search regularly. The search interval may be pre-programmed or controlled through Service Controller or Communication Logic controller commands. b) The mobile is commanded by the Service Controller or Communication Logic Controller to search additional channels. This may typically occur when the latter determines that a handoff may be required.
  • the Service Logic may then determine whether the mobile unit is in condition to actually be handed off to another PLMN. Such a decision is based on the reported communication conditions, the loading conditions of the candidate PLMN and the services required by the mobile. The PLMN may be notified if such a handoff is deemed worthwhile.
  • the mobile is preferably handed over from the servicing WN to the receiving WN in one of two ways as follows: a) If the mobile is capable of accepting wireless network selection controls, it is commanded to hand over to the selected (receiving) PLMN. Such a handoff preferably includes transfer of the PLMN communication parameters to speed up the hand over process; b) If the mobile is not capable of accepting wireless network selection controls, it is dropped off the servicing PLMN as a result of the network refusing it service. The mobile then tries to log onto another PLMN, and only the selected network accepts it.
  • the mobile when it receives from the Service Controller 128 or similar communication control logic a command to hand-over to a better communication service.
  • the mobile then performs the search and measurement of all PLMNs it can detect and determines which is the best one to switch to. Possible criteria for determining which is the best PLMN to switch to may include measured communication characteristics or any other relevant parameters that may be provided by the particular PLMN.
  • the mobile drops away from the PLMN that is currently servicing it. In a preferred embodiment the mobile unit sends a notification before dropping off the PLMN in order to speed up the handoff process.
  • the Service Controller 128 identifies that the mobile unit has been handed off from its previous servicing PLMN to a new one, typically by matching it to a pending session as before, and resumes its session or sessions through the new PLMN.
  • Network assistance may be provided typically for any of the following:
  • a further embodiment encompasses a hard handoff that is network commanded but controlled by the mobile unit.
  • the embodiment is implemented when the session control, either residing in the Service Controller 128 or other communication control logic, determines that the servicing PLMN cannot support the mobile service communication conditions.
  • Network control may or may not determine potential availability of neighboring networks that have the capability to support service. If such a capability is identified, then the network control preferably sends information regarding communication parameters of candidate PLMNs to the local wireless mobile unit. The mobile then searches for other PLMNs that may support its service requirements.
  • the mobile unit time multiplexes its search of neighbor networks along with communication within the servicing PLMN, thus minimizing the handoff service impact.
  • an option is for the mobile unit to drop servicing PLMN access and search instead for neighbor PLMNs.
  • the mobile may use data previously provided by the Service Controller network or it may engage in a blind search.
  • the mobile determines whether it may perform handoff to another PLMN and attempts to access this PLMN. If the mobile does not succeed in accessing the selected PLMN, the mobile attempts to access the next best PLMN as indicated by its search results, and so on.
  • the Service Controller After access has been successfully completed, the Service Controller recognizes that the connection is in fact a resumption of a previous session or sessions, and is thereby able to ensure continuity of the session.
  • Soft handoff Three of the previous four embodiments described above that use hard handoff may also be implemented using soft handoff.
  • soft handoff refers to maintaining seamless continuity of communication when transitioning from one PLMN to another, with no impact whatsoever on the sessions active within the local wireless mobile, including those that depend on time bounded continuity ofcommunication. That is to say, there are time bounded communication limitations e.g. tcp and time bounded applications e.g. streaming. The point about soft handoff is that no sessions are frozen, therefore no degradation in service is perceived.
  • Soft handoff as supported by the present embodiments may be implemented by establishing mobile unit communication with the second PLMN before dropping communication with the current serving PLMN.
  • the Service Controller 128 may advance data to the mobile unit.
  • the advance data may be buffered to maintain the service during handoff.
  • Mobile logic may also switch to a degraded mode that requires less data, extending the time supported by the buffer for continuous service as perceived by the user of the mobile unit.
  • the handoff may be soft if common service is available among both PLMN networks, at least in the direction of transition of the mobile, so that the candidate PLMN may use its own resources to listen to the mobile unit before the handoff actually occurs; or conversely, when the mobile is taking charge of the soft handoff, then the mobile unit is able to use its own resources to monitor the neighboring PLMN whilst still connected to the first PLMN.
  • secondary receivers within the neighbor (candidate) PLMN measure reception from the mobile after it has been notified by the Service Controller of that mobile that it may require to be handed over.
  • the secondary receiver may be a dedicated receiver, may comprise temporarily available resources or simply some time slots allocated for this pu ⁇ ose within the PLMN work plan.
  • the Service Controller provides parameters of the new PLMN to the mobile unit so there is no interruption in service.
  • a further embodiment comprises a soft handoff from PLMN to another with assistance from the mobile unit.
  • the mobile searches additional channels to measure and determine communication conditions of other PLMNs and sends the information to the Service Controller or similar Communication Control logic.
  • the Service Controller or similar Communication Control logic now selects the new serving PLMN, based on the information provided by the mobile unit and the operational status of the PLMNs.
  • the PLMNs provide such status information to the Service Controller/ Communication Logic supporting the mobile.
  • the Service Controller then provides parameters of the new serving PLMN to the mobile. Additionally, the service controller provides handoff controls/ indications to the new serving PLMN, if the latter is capable of accepting them.
  • the mobile unit now establishes communication within the new serving PLMN without disconnecting its old PLMN communication. Once communication is established, the mobile drops off the old PLMN. In a variation, the mobile unit sends a notification before dropping off the PLMN. c) Mobile controlled soft handoff.
  • a further embodiment involves soft handoff from one PLMN to another under full control of the mobile unit, by contrast to the previous embodiment which was merely mobile assisted.
  • the mobile unit itself searches for channels of additional PLMNs when
  • the mobile receives a command to hand-off to another PLMN.
  • the mobile then performs the search and which involved making a measurement of all wireless networks it can receive. From the measurements it determines which is the best network to switch to.
  • the criteria to determine the best PLMN to switch to may include measured communication characteristics as well as network loading, if broadcast or available from the Service Controller.
  • the mobile then notifies the Service Controller/ Communication Logic 128 which PLMN it has selected for the handoff and waits either for an acknowledgment or a time out to expire, at which point it establishes communication with the new PLMN without disconnecting from the present PLMN. After communication is established, the mobile unit drops off the PLMN that has been servicing it. In a variation, the mobile sends a notification before dropping off the PLMN. d) Network commanded, mobile controlled soft handoff
  • a further embodiment encompasses a network commanded handoff which, once commanded by the network is fully implemented under control of the mobile unit.
  • the method is implemented when the mobile Service Control/ Communication Logic Controller determines that the servicing PLMN cannot support the mobile service communication conditions.
  • Service Control may or may not determine potential neighbor PLMN networks that have the capability to support service. If a capability is determined, then the Service Control sends information on the communication parameters of available PLMN to the local wireless mobile.
  • PLMN concepts may be expanded to any type of wireless wide area network (WWAN). Such expansion is contemplated within the scope of the present invention.
  • WWAN wireless wide area network
  • Fig. 26 is a simplified schematic diagram illustrating two non-overlapping PLMN networks having a common service/communication logic controller.
  • Two networks, PLMN 1, 130 and PLMN2, 132 each have respective access points 134 and 136.
  • a mobile unit 138 is at the edge of PLMNl coverage, and PLMN2 has coverage within the vicinity but without any actual overlapping. For practical purposes it could be that the PLMNs have overlapping coverage within some area that does not include the present MS location, but this does not affect operation as far as mobile unit 138 is concerned.
  • Logic controller 140 is located at a point accessible from both PLMN networks.
  • the embodiment for dealing with handoff in the case of Fig. 26 is a particular case of the overlapping PLMN handoff.
  • the Service Controller 140 freezes the ongoing mobile sessions for up to a preselected maximum duration.
  • the maximum duration may be defined differently for voice and different types of data.
  • PLMN PLMN2
  • PLMN2 PLMN2
  • the mobile communication is routed to its Service Controller 140.
  • this may be implemented automatically within the PLMN, however within the preferred embodiment the mobile unit provides the address of its Service Controller 140 after joining the PLMN network.
  • the handoff process is thus implemented in the present case at the session level, without involving the PLMN.
  • the mobile unit re-establishes communication with the Service Controller 140, the latter looks up any sessions that are still pending for the mobile, i.e. those sessions whose time out has not expired and were not disconnected by the party with which they were held. Those sessions are now allowed to continue, and there is preferably no loss of data in either direction.
  • the session handoff is applicable to numerous data communication protocols; which may be IP-based or may use any other basis that is common between the mobile and its Service Controller. The only requirement is that the mobile be able to achieve communication with the Service Controller through the PLMN that it is presently communicating through.
  • FIG. 18 The respective scenario is as illustrated in Fig. 18.
  • the mobile unit connects through a logical entity designated Service Controller that is responsible for maintenance of the mobile communication sessions.
  • the pu ⁇ ose of the handoff in this case is to support the best communication for the mobile, per defined system service criteria subject to the limitations of the WWAN and the WLAN.
  • Typical service system criteria are best quality of service and lowest cost, however other criteria may be implemented within the entities that control the communication flow: the mobile client, the Service Controller and the communication networks (the WWAN and the WLAN).
  • the hotspot is entirely within the purview of the WWAN the question of service quality falling below a threshold does not really apply.
  • the logic used in the presently preferred embodiment operates simply by automatically associating a higher priority with the WLAN connection. This means that whenever Hot Spot connectivity and PLMN connectivity are available, the Hot Spot connection is preferred.
  • a mobile unit is connected to a PLMN when it detects the presence of a WLAN. As the WLAN service has priority the mobile unit attempts to connect to the WLAN. The methods by which the mobile unit verifies that the WLAN is valid for it and establishes communication with its Service Controller through the WLAN are as described above and are not repeated in the present connection.
  • the mobile unit connects with the new network and establishes communication once again with the Service Controller.
  • the Service Controller establishes communication with the mobile.
  • the open cellular session is maintained as long as is necessary, and at least until the reconnecting mobile is identified or until a timeout is reached.
  • Maintaining the session in the case of a cellular data service means that the cellular data protocol is used and user data is actually tunneled through whatever access channels are being used, e.g. in the WLAN. This ensures that the cellular service is unaffected even though a non-cellular channel is being used for mobile access.
  • the access channel actually being used can in fact be any conceivable type of channel that the particular local LAN may be using.
  • a subscriber of a GPRS network may access its cellular services through one of the gateways discussed hereinabove, by implementing an IP tunnel through its Service Controller.
  • the Service Controller in this case may be implemented within the GPRS gateway or as a separate entity.
  • the mobile uses the WLAN access as long as its quality of service is acceptable, per criteria that are defined within the mobile client, the Service Controller or both.
  • the mobile detects that its quality of service within the WLAN Hot Spot is unacceptable, or when so indicated by its Service Controller, it preferably starts searching for WWAN access. If communication is still available with the WLAN network, the mobile may notify its Service Controller of the need for handoff and its search for a different access route, including the WWAN access.
  • a different embodiment has the Service Controller indicating to the mobile that it should hand off to the WWAN. This may be either as a general command or may specifically be a WWAN access which is expected to be operational within the area where the mobile is located.
  • Handoff from the wireless local back to the wireless wide area network therefore takes place always, or almost always, when the mobile's WLAN connection is severely degraded or even lost and the mobile detects availability of the WWAN (e.g PLMN, GPRS). Generally that means that the mobile unit is simply moving out of range of the WLAN.
  • WWAN e.g PLMN, GPRS
  • An alternative embodiment of the invention concerns a case in which Service Control logic resides within the WLAN Hot Spot.
  • the Service Controller within the WWAN finds out by contacting the WLAN controller whether the mobile has been serviced lately and thereby that there are pending (frozen) sessions.
  • the mobile searches for and identifies the operation of an acceptable WWAN before dropping the degrading service of the WLAN where it is still connected or active, albeit at an unacceptable quality of service.
  • the mobile then sends the details of the identification it has made to the Service Controller or to another entity that controls the logic of the physical communication.
  • the entity then instructs or enables the mobile to switch to the WWAN if it is determined to be acceptable per defined logical criteria (roaming agreements, loading conditions, mobile subscription contract, etc.)
  • the mobile is handed off from the servicing WLAN to the receiving WWAN in one of two ways: a) If the mobile is capable of accepting wireless network selection controls, it is commanded to hand off to the WWAN.
  • transfer includes the WWAN communication parameters, thereby to speed up the hand off process; b) If the mobile is not capable of accepting wireless network selection controls, it is simply dropped off the servicing WLAN by discontinuing service; at which point the mobile unit tries to log into the WWAN and reach its Service Control logic.
  • the mobile unit searches for WWAN coverage when
  • the mobile then performs a search involving measurement of one or more WWANs it can detect and determines which is the best one to switch to. Preference is typically granted to its home service provider, but specific logic within the mobile client or controls from the Service Controller may modify this priority.
  • the mobile then drops off the WLAN that has been servicing it, if it has not already been disconnected.
  • the mobile sends a notification before dropping off the WLAN in order to speed up the handoff process and improve system and session control.
  • the Service Controller preferably determines that the mobile unit has been handed off from its previous servicing WLAN to the WWAN, identifies the corresponding sessions and allows the session or sessions to be resumed through the new connection.
  • Network assistance may be provided for any of the following:
  • identification of acceptable neighboring WWANs i.e. provision of their communication parameters, for example to prevent attempts to log into WWANs known to be operational within the area but not acceptable due to other conditions;
  • a further embodiment relates to a network commanded handoff. Following the command, the handoff itself is controlled by the mobile unit.
  • the method is implemented when the session control, either residing in the Service Controller or other communication control logic, determines that the servicing WLAN cannot support mobile service communication conditions.
  • Network control may be used to determine potential availability of WWANs within the service area, but this is not essential. If such availability is determined, network control sends information regarding communication parameters of candidate WWANs to the mobile unit
  • the mobile unit now searches for any WWANs that may support its service requirements.
  • the mobile unit time multiplexes its search of WWANs while still trying to maintain communication with the WLAN to provide its user with a predetermined level of service, thus minimizing the handoff service impact.
  • a variation allows the mobile drop to drop the WLAN access and only search for WWAN service.
  • the mobile may use data previously provided by the Service Controller network or engage in a blind search.
  • the mobile determines whether it is in a position to perform handoff to the WWAN, and, if so, it attempts to access the WWAN. If the mobile does not succeed in accessing the first WWAN attempted, then it may attempt to access the next best WWAN in its search results, and so on.
  • the Service Controller After access is successfully completed, the Service Controller recognizes that this is a resumption of a previous session or sessions ensuring continuity of the session.
  • soft handoff refers to maintaining seamless continuity of communication when transitioning from the WLAN to the WWAN, with no impact whatsoever on the sessions active within the local wireless mobile including those that depend on time bounded continuity ofcommunication. The difference is that no sessions are frozen, and therefore no degradation in service is perceived.
  • Soft handoff as supported by the present embodiments may be implemented, either by establishing mobile unit communication with the WWAN before dropping communication with the serving WLAN, or by joining the WWAN quickly enough upon dropping the WLAN so that there is no discontinuity in session communication.
  • the Service Controller may advance data to the mobile.
  • the advanced data may be buffered to maintain service during handoff.
  • Mobile logic may also switch to a degraded mode that requires less data, extending the time supported by the buffer for continuous service as perceived by the user of the mobile unit.
  • a variation of the soft handoff embodiments concerns the mobile unit being capable of joining the WWAN before dropping off the WLAN and effecting the handoff.
  • Soft handoff may be network controlled or mobile controlled. a) Network controlled soft handoff.
  • the mobile unit searches per its own logic, or per instruction from the Service/ Communication Control WWAN channels, to measure and determine their communication availability. Availability information is then passed on to the Service Controller or similar Communication Control logic, which, as discussed above may be centralized or distributed.
  • the Service Controller or similar Communication Control logic may now select the new serving WWAN based on the information provided by the mobile unit and the operational status of the WWANs.
  • the latter may be implemented by the WWANs providing such status information to the Service Controller/ Communication Logic supporting the mobile.
  • the Service Controller may provide parameters of the new serving WWAN to the mobile or handoff controls/ indications to the selected WWAN.
  • the mobile unit preferably establishes communication within the WWAN before disconnecting its WLAN connection. Once communication is established, the mobile drops away from the WLAN. In a variation, the mobile sends a notification before dropping off the WLAN.
  • Mobile controlled soft handoff In the mobile controlled implementation, the mobile unit searches for channels of active WWANs when
  • the mobile then preferably performs a search involving measurement of all applicable wireless networks that it is currently able to receive and determines which is the best one to switch to.
  • the criteria to determine which is the best WWAN to switch to may include measured communication characteristics as well as network loading, if broadcast or available from the Service Controller.
  • the mobile then notifies the Service Controller/ Communication Logic which WWAN it has selected for the handoff and waits either for an acknowledgment or a time out to expire (minimum timeout may be zero), upon which it establishes communication with the WWAN without disconnecting from the WLAN. After communication is established, the mobile drops off the WLAN that has been servicing it. In a variation, the mobile sends a notification before dropping off the WLAN.
  • the handoff reverse process, from the WWAN to the WLAN is similar. However, as mentioned above, in this case handoff is not necessarily triggered by drop in quality of service from the WWAN.
  • the mobile is required to check periodically, per its defined logic, for availability of a WLAN. This is due to the partial WLAN coverage within the WWAN service area.
  • a Hot Spot itself may include the means to detect local mobile transmission, automatically leading to the issuance of commands to the mobile unit to look for the WLAN. Handoff from the WWAN to the WLAN seldom requires loss of WWAN communication.
  • the handoff techniques discussed cover the cases where the mobile joins the WLAN and establishes communication through the WLAN with its Service Controller before disconnecting the WWAN (the ultimate soft handoff) as well as the case where the mobile loses WWAN connection and only some time later succeeds in establishing communication with the WLAN and re-establishing its sessions.
  • Embodiments are included in which handoff between WLAN and WWAN requires additional supportive actions beyond establishment of regular communication protocols of the medium to which the mobile unit is handed off.
  • An example of these supportive actions may be a WWAN registration or a different security process, since the acceptance of the mobile by the WWAN may depend on authentication and security that cannot be transferred from the WLAN communication processes.
  • the concept of handoff is expanded to cases where a WWAN -equipped mobile, e.g. a GPRS unit, may at some time access the WWAN Service Controller as well as WWAN services through the Internet or other wireline network.
  • the embodiments include simultaneous connection to both WWAN and Internet networks as well as to the case where one connection is made after another one has been dropped.
  • logic installed within the mobile client or within the Service/ Communication Controller may provide priority of connectivity when both WWAN and Internet links are available.
  • the Internet connection is preferred and the WWAN traffic is in this case tunneled to the Service/ Controller through the Internet.
  • the handoff techniques suitable for switching between the two networks include the following:
  • the mobile unit establishes communication through both networks without taking control over session routing.
  • the Service Controller may control a drop in service level through the lower priority network, thereby forcing the mobile to try and establish service through the higher priority network.
  • the Service Controller then notifies the mobile of its decision, and a number of variations are possible for what follows.
  • the decision to hand off the mobile from one network to another is thus only dependent on the Service Controller.
  • the mobile is handed off from one network connection to the other in one of two ways: a) If the mobile is capable of accepting network selection controls from its Service/ Communication Controller, it may be commanded to hand off to the selected (receiving) network. It may additionally be sent communication parameters to speed up the hand off process; b) If the mobile is not capable of accepting wireless network selection controls, it is simply dropped off the servicing network by refusing service; forcing it to try and log onto the other network.
  • the local wireless mobile searches for alternative service possibilities and determines communication conditions within the alternate network. It then sends the information gathered to the Service/ Communication Controller (SCC) 128 or 140.
  • SCC Service/ Communication Controller
  • the mobile unit searches for the alternate network when any one of the following conditions are met: a) The mobile unit is programmed to perform the search at regular intervals. The search interval may be pre-programmed or controlled through commands from the SCC 128. b) A hardware indication is provided to signal that an alternate service may be available. One example may be a hardware identification of 100BaseT availability. c) The mobile is commanded by the SCC 128 to search for an alternate network. This may typically occur when an external service determines that there is a possibility of such availability per information provided by the mobile
  • the mobile is handed off from its previous servicing network to the selected network in one of two ways: a) If the mobile is capable of accepting SCC controls, it is commanded to hand off to the selected network, including if possible transfer of the communication parameters to speed up the hand off process; b) If the mobile is not capable of accepting wireless network selection controls, it is dropped off the servicing network by discontinuing service. In such a case the mobile tries to connect through the other network until it reaches the SCC and sessions are re-established.
  • Mobile controlled hard handoff In mobile controlled hard handoff, the mobile searches for an alternate network connection when
  • the mobile unit performs the search and obtains measurements of alternate network availability, from which it determines handoff priority. In one example of this measurement, the mobile may ping a defined IP and measure the delay in response. The mobile then drops off the network that has been servicing it and connects through the selected alternate network. In a variation, the mobile sends a notification before dropping off its present servicing network in order to speed up the handoff process.
  • the system determines that the mobile has been handed off from its previous servicing network to the new one and wishes to resume its existing session or sessions, which it is able to identify.
  • Network assistance may be provided for any of the following: (i) identification of potentially available networks or network parameters, including preferred access channels for the WWAN and proxy IP's for Internet access that may support a better distributed SCC architecture.
  • Network commanded mobile controlled hard handoff is implemented when the SCC 128 or 140 either finds communication conditions unacceptable or has logic that requires periodic checks for higher priority connectivity. Network control may or may not determine potential alternate networks that have the capability to support service. If such capability is determined, the SCC 128 sends information on the communication parameters of available networks or network accesses to the mobile unit.
  • the mobile searches for networks that may support its service requirements.
  • the mobile searches for alternate networks without disrupting its present connection, thus minimizing the handoff service impact.
  • An example would be to dial several Internet access numbers to determine availability before dropping off a wireless GPRS connection.
  • an option provides that the mobile first drops its servicing network access and only then searches for alternate networks.
  • the mobile may use data previously provided by the network or engage in a blind search.
  • the mobile determines which network to hand off to and attempts to access this network.
  • the mobile may attempt to access the next best network according to its search results, and so on.
  • Such initial and subsequent access attempts are preferably controlled by programmable or pre-programmed timers.
  • the SCC recognizes that the new connection is a resumption of a previous session or sessions, preferably in one of the ways hereinbefore described, thereby ensuring continuity of the session.
  • soft handoff refers to maintaining seamless continuity of communication when transitioning from one network access to another, with no impact whatsoever on the sessions active within the local wireless mobile including those that depend on time bounded continuity ofcommunication.
  • Soft handoff as supported by the present embodiments may be implemented by establishing mobile communication with the SCC 128, 140 through a new serving network before dropping it from the presently serving network.
  • soft handoff may be achieved by switching network connection fast enough so there is no discontinuity in session communication.
  • the local wireless mobile searches for the alternate network and determines communication conditions. It then sends availability information to the SCC 128, 140.
  • the SCC subsequently makes the decision as to which network, and when, to perform the handoff. It provides the handoff parameters to the mobile; and optionally may provide handoff controls to a proxy IP node or to control entities within the WWAN. The latter may be required if there is advanced data suggesting that the connection is about to be lost, either due to identification of a deterioration in conditions or there is information that one of the entities supporting the communication is about to be taken down, thereby to ensure continuous communication.
  • the mobile preferably now establishes communication within the new serving network without disconnecting its current network communication. Once communication with the new network is established all the way to the SCC 128, 140, the mobile drops off the network that has been servicing it. In a variation, the mobile sends a notification before dropping off this network.
  • the mobile searches additional channels when (i) a higher priority network condition is detected;
  • the mobile unit itself performs a search in the course of which it carries out measurements of alternate networks per pre-defined or programmable priorities and rates them per determined priority to select a preferred network to switch to.
  • the mobile need not search all possible alternate networks, but only the top n out of m available networks.
  • m l.
  • the criteria to determine the best network to switch to may include measured communication characteristics as well as network loading.
  • the mobile unit notifies the SCC as to which network has been selected for the handoff and waits either for an acknowledgment or a time out to expire, upon which it establishes communication with the new network without disconnecting from the present serving network. After communication is established, the mobile drops off the network that has been servicing it. In a variant, the mobile sends a notification before dropping off its current serving network. c) Network commanded, mobile controlled soft handoff
  • a further embodiment comprises a soft handoff that is network commanded but subsequently mobile controlled.
  • the handoff is carried out when the SCC determines that the servicing network cannot support the mobile service communication conditions.
  • the SCC may or may not identify potential alternate networks that currently have the capability to support communication service to the mobile. If such capability is identified, the SCC then sends information on the communication parameters of the thus identified networks to the mobile unit.
  • the soft handoff solutions have the potential to provide smoother continuous service, however since all solutions are packet based at the mobile end, continuous service may be attained with both soft and hard handoff embodiments.
  • Mobile communication provides a high degree of personalization.
  • GSM phones provide a SIM card which provides each user with personalized communication associated with his/her account with his/her mobile telephone service provider.
  • CDMA based mobile also entails similar personalization.
  • a user is enabled to set up a transaction over any unsecured or secured means at his disposal, following which the transaction is confirmed or authorized via his/her mobile telephone.
  • Authorization may for example be via an SMS message sent to his mobile telephone to which he sends a simple reply.
  • the user may send an SMS message from his own mobile telephone to a number indicated to him. The transaction may then be charged to the mobile telephone account.
  • the advantage of charging to a mobile telephone account is that, unlike credit card and like other accounts, the telephone account is uniquely set up for charging small amounts at a time.
  • the embodiments thus provide a means of providing low cost products and services on the Internet, previously made difficult because of minimum charges by credit card companies.
  • the embodiment can also be used to provide binding between a non- authenticatable and an authenticatable device. Once the non-authenticatable device has been authorized, secret authentication data can be installed in it. This authentication data may be further used to prove the linkage between the non- authenticatable device, and the PLMN authenticatable device. This method can be used to initialize a virtual SIM (see above)
  • Fig. 27 is a simplified block diagram showing an authentication mechanism according to a first preferred embodiment of the present invention.
  • a communicator 110 typically part of a cellular Internet portal including an SMS portal.
  • this Internet portal may include a WAP portal, in addition to or instead of the SMS portal.
  • the communicator is able to communicate with a first personalized device 1 12 via an authenticatable link 1 14 such as a GSM or CDMA link as well as any extension thereof (GPRS, UMTS, etc.).
  • GSM etc, links provide not only authentication but also encryption, which is preferred but is not a requirement of the present invention.
  • a basic embodiment requires only authentication and non -repudiation of the transmission.
  • the communication is a digital communication such as an SMS or GPRS data message, although, as will be explained below, voice can also be used.
  • the communication preferably takes advantage of user authentication, which is a feature of GSM or CDMA. Additional authentication can be provided by a link 1 14 and the device 112, additionally supporting encryption.
  • the personalization preferably enables the first personalized device to be positively identified.
  • an associator 116 which is able to carry out the positive identification of the first personalized device 1 12 and to associate the authentication with a separate activity or request for activity received by a server 1 18 or like device through an non-authenticatable link 120 from a requesting device 122.
  • a non-authenticatable link is a link through which users or requesting devices cannot be positively identified, and particularly includes general Internet connections.
  • the inability to identify the requesting device may be due to there being no strong authentication mechanism such a SIM card, or because the link itself is insecure, allowing eavesdropping and impersonation or for any other reason.
  • the mechanism of Fig. 27 thus solves the problem of the insecure link by requiring an extra leg of communication via an authenticable link.
  • mobile telephone devices are authenticatable personalized devices, and by requiring an extra leg of the communication via a mobile telephone link, a provider can determine that a request is genuine.
  • the mobile telephone is associated with a charging account, and provision is made to allow for billing to be directed to the customer thus identified.
  • the authenticatable link leg of the communication may precede or follow the non-authenticatable leg, as long as the two legs can be successfully associated, and a non-exhaustive list of alternative procedures is described hereinbelow.
  • several non-authenticatable legs can be associated with a single authenticatable leg.
  • the invention is not limited to mobile telephones and any securely personalized device that communicates over a secure link such that it cannot be impersonated may be used.
  • the associator 116 is preferably connected to an authentication communicator 123 for indicating to the server 118 that a given activity request is approved.
  • the authentication communicator 123 may communicate the authentication to an external proxy server or gateway associated with the non- authenticatable device.
  • the authentication communicator may communicate the authentication to any device or network node responsible for managing the activity which is the subject of the request.
  • the authentication communicator 123 may communicate the authentication by applying a change to a routing table on a router.
  • CDMA In addition to GSM and CDMA, a non-exhaustive list of other systems currently available that provide secure links includes IS-136, PDC, EDGE, WCDMA, GPRS, Iridium, and GlobalStar.
  • CDMA covers the IS-95 standard and the 2.5 and 3G versions thereof are known respectively as 1XRTT and 3XRTT.
  • Fig. 28 is a simplified diagram showing a GSM device 124 such as a mobile telephone.
  • the GSM device comprises a SIM which consists of one or more integrated circuits where at least one of those contains personalized data that supports authentication, encryption and decryption for the secure link 1 14.
  • the SIM both identifies the mobile telephone and makes it impossible for other devices to impersonate that telephone, thus providing authentication and secure access to a charge account corresponding to the respective mobile telephone user.
  • the secure link 114 is also secure for voice communication and it is possible to provide automatic voice message construction functionality at the communicator 110 to construct messages from pre- recorded message sections. Additionally it is possible to provide an artificial voice. Either way a voice message may be sent to the personalized device over the secure link.
  • the voice message may for example identify the transaction and may request that the user presses one of the keys by way of an affirmative reply.
  • a device corresponding to a potential user of a service requests the service via the insecure link 120.
  • the insecure link 120 may be any kind of network, particularly an open network such as the Internet, or other digital or analogue networks, and may include a LAN, a Wireless LAN (WLAN), in particular any WLAN corresponding to the IEEE 802.1 1 standards, including 802.11, 802.11b, 802.11 a... g, etc.
  • WLAN Wireless LAN
  • the log-in process identifies its secure link, for example by giving an associated mobile telephone number.
  • the identification may be retrieved from storage or entered manually by the user.
  • the associator 116 receives the identification (e.g. mobile telephone number).
  • the associator 116 uses the communicator 10 to contact the mobile telephone in any appropriate way.
  • a timer 123 is operated, giving the owner of the mobile telephone a fixed time to reply and confirm the identity of the user.
  • a failure counter 124 counts unsuccessful attempts to establish the authentication, stopping the authentication operation when a predetermined threshold is reached.
  • the operation is initiated both at the non- authenticatable device 122, which makes contact with the server 18 and at the personalized device 112, which makes contact with the communicator 1 10.
  • the associator 116 makes a link between the two communications, and the service to the non-authenticatable device is authorized.
  • One way of assuring that the authorization by the user was not inadvertent is to provide a password in the reply to the authenticatable device 112.
  • the password is then entered by the user at the non- authenticatable device 122, thus making clear that the user of the non-authenticatable device 122 is the same as the user of the authenticatable device and that this action is intentional.
  • the authenticating link is preferably encrypted, so as not to reveal the password.
  • the password may only be used a limited number of times, for example only once, in which case the authenticating link need not be encrypted.
  • the log-on name used by the non- authenticatable device is the MSISDN, that is to say the mobile telephone number
  • MSISDN the log-on name used by the non- authenticatable device
  • Such probes may cause the mobile phone to receive a request for service and, if the user is not vigilant, the user could inadvertently authorize service for these fraudulent users.
  • the problem may be reduced by requiring the non-secure device to use a password, in addition to the MSISDN.
  • An alternative solution starts the authentication sequence from the Mobile Unit: The user sends an SMS to the communicator, which in turn responds to the mobile with a temporary password for the session.
  • the user uses the PDA or other non-authenticatable device to connect, via the Internet, to the server 118, and enters his user name (MSISDN) and the temporary password.
  • MSISDN user name
  • the communicator provides a temporary identifier and password pair, to ensure user anonymity and the user enters this temporary identifier and password pair.
  • Transfer of the identifiers from the authenticatable device to the non- authenticatable device may be manual or through some local wired or wireless communication link.
  • the associator or communicator recognize the access data provided, such as the temporary password and identity, as associated with the MSISDN and service is authorized.
  • SMS transmissions are completed prior to the logon sequence of the mobile terminal (PDA, laptop, etc.) being started.
  • the SMS may comprise a quasi-random number, which the user is required to copy or that is otherwise transferred into his non-authenticatable device to complete the authentication, thereby reducing the risk of inadvertent authentication .
  • the requested activity may be an Internet browsing activity. Use of the secure link, which is associated with a charging account, allows for small amounts to be charged, hitherto a problem with Internet browsing which has tended to rely on credit cards.
  • the requested activity may be the browsing itself, or it may include activities associated with browsing such as purchasing, using pay services, etc. Thus the user may arrive at an Internet bookstore or the like and make a purchase by entering his mobile telephone number rather than his credit card number. He then receives a message on his mobile telephone and replies to that message to complete the transaction.
  • the Internet activity may additionally be ftp type activity or an activity that does not involve browsing, such as streaming data based applications, email, etc.
  • the non-authenticatable device 122 may be a credit card or a smart card and the requested activity may be a point of sale activity such as use of an ATM.
  • Fig. 29 is a simplified diagram showing a card 128, such as a smart card or credit card, with a memory unit 130.
  • the memory unit 130 may be part of an integrated circuit as with a smart card, or it may be a magnetic strip as with a conventional credit card.
  • the memory unit 130 comprises the standard transaction information such as an ATM number, and in addition a further number that allows for identification of the mobile telephone number.
  • the number encoded on the card is the mobile telephone number, however this has the disadvantage that a false telephone number could be entered.
  • the further number is an encoded version of the mobile telephone number.
  • the encoded version could be an enciphered version, in which a function is available to decipher the telephone number.
  • a code could be used, which is simply an entry in a lookup table. The latter version is particularly secure since a hacker can only substitute a different telephone number if he knows its code in the lookup table.
  • the user enters his card into the ATM in the normal way.
  • the card transfers the user's telephone number, or a code related to it, which is used to generate a call to the user's mobile telephone.
  • the user completes the transaction by replying to the mobile telephone or by entering into the ATM a uniquely generated PIN number provided in the communication. In a preferred embodiment, the user both replies and enters the PIN number.
  • the requested activity may for example be access to a network, that is to say the user requests access to a LAN or to the Internet or the like. It thus enables the provision of roaming Internet, the ability to log on to the Internet using local resources when traveling and not in the proximity of one's own Internet provider.
  • the network to which access may be requested may be a network accessed via Wireless LAN access points or infra-red access points or via Bluetooth access points.
  • the idea of Wireless LAN or infra-red or Bluetooth is to provide flexible network access to all devices in proximity of the access points and the present embodiments allow for potential users to be identified and charged for the service.
  • the number or the password can be used multiple times to authorize an activity. Since multiple transmissions of the number or password are exposed to replay attacks, the multiple authorization can use the quasi-number/password as a seed key to a challenge-response protocol. For example - if a virtual SIM is installed in the non-authenticable device, then Ki of the virtual SIM (see above in the SIM description) can be set to be the quasi- number/password (Ki is used in the generation of SRES and Kc from RAND).
  • the communicator preferably obtains a telephone number, in either plaintext, or as an encoded or enciphered version of the telephone number from the non-authenticatable device.
  • the number is preferably used for establishing a communication with the secure mobile device.
  • the telephone number is preferably used to associate the secured and non-authenticatable links that have already been established.
  • the non-authenticatable device may be a credit card, a smart card, an infra-red device, a Bluetooth device, a PDA, a wearable computer, a mobile computer, a fixed computer, and a network of computers or any other device that is able to establish a communication using infra-red or Bluetooth or
  • Wireless LAN or HomeRF or wired or any other type of communication any other type of communication.
  • FIG. 30 is a simplified block diagram showing a further embodiment of verification apparatus according to the invention, with component parts shown in greater detail.
  • a non-authenticatable device such as a PDA 130 communicates wirelessly via network access points 132, to a LAN/WAN 134, which itself may be wired or wireless.
  • the LAN may be connected directly (or indirectly) to a cellular Internet authentication portal 136, and may be a means of providing the user with access to the Internet or any other data network or services.
  • the portal 136 preferably appears to the PDA 130 as a standard Internet authentication device to which it logs in as normal.
  • the login process can be carried out manually or can be automated as desired.
  • the number of the user's mobile telephone may be supplied as the login username or as a separate part of the login procedure.
  • the portal begins to run a timer to timeout the authentication after a predetermined time limit.
  • the portal may also set up a counter to limit the number of login attempts to reduce the risk of hacking.
  • the portal is connected directly or indirectly to a short message service center SMS-C 138, the network element that manages SMS messaging.
  • the SMS-C 138 sends an SMS message via MSC 140, BSC 142 and cellular base stations 144 to SIM protected mobile telephone 146.
  • the user thus receives a request telling him to press reply in order to activate his network connection.
  • the user may be asked to provide a password.
  • the SMS itself is usually encrypted and the SIM supports authentication to make it clear that it is only the intended mobile telephone that is replying.
  • the SMS message as sent may be provided with a telephone number of the authenticator to allow a reply to reach the authenticator.
  • the user is then authorized to access the Internet or other data network via the LAN and his use of the LAN may then be charged to his mobile telephone.
  • Fig. 31 is a simplified flow chart showing verification of a non-authenticatable channel via an authenticatable channel according to an embodiment of the present invention.
  • authenticating the link comprises steps of communicating via an authenticatable link with an authenticatable device, verifying, using the authentication procedures of the link, that the communication is with an intended mobile device, setting up a second link via a non- authenticable second channel or link.
  • a stage follows of binding or associating the verification with an activity request via a non-authenticatable device. Once the two channels or links have been bound then the authentication on the one link may be used to allow the request on the other link, as explained above, thereby to permit the activity request of the non-authenticatable device.
  • the step of binding may be carried out by use of an identifying telephone number provided by the non-authenticatable device.
  • the step of authenticating preferably includes sending a message to the authenticatable mobile device, to which a reply is expected as explained above.
  • communication starts with the non-authenticable device.
  • the system sends a message to the related authenticatable device requesting approval.
  • the device user sends back his approval and either the authentication is completed at that point or the system sends a password to the authenticatable device.
  • the user receives the password and enters or copies or otherwise transfers the password to the non-authenticatable device, thus to complete the authentication.
  • a communication request originates from the authenticatable device.
  • the system sends a password or temporary username and password to the authenticable device.
  • the password, or username and password, is copied or transferred to the non-authenticatable device, and the non-authenticable device relays the password etc. back to the system to establish the authentication.
  • the above procedures are only used on initial communication establishment, or in a particularly preferred embodiment only on an initiating communication.
  • a secure communication channel is established between the system and the non- authenticatable device using additional identity/ identities provided to access the system the next time(s).
  • the system adds additional identities/ passwords, with optional notification to the authenticatable device.
  • Such a preferred embodiment saves the delay needed to set up the authenticable channel with the authenticatable device, after the first communication.
  • the authentication method does not require any special hardware or software to be installed on the PDA 130.
  • the PDA works with a standard browser and standard network interface units.
  • software is installed to support the defined processes and assist in or save manual user actions such as entry of addresses and transfer of data between the authenticatable and non-authenticatable units.
  • MSISDN mobile phone number
  • the mobile terminal 46 is a standard authenticable unit.
  • the terminal may be voice only, SMS only, WAP only, GPRS only, 3G only, any other data communication standard or a combination.
  • Authorization for the requested service requires possession of the user specific SIM or USIM or similar device., thus binding the service to the SIM or USIM or similar device.
  • the service need not be provided with any special provisioning database.
  • the user identification is the MSISDN or similar identifier (such as IMSI). No new passwords are required to be provided for or memorized by the user.
  • an alternative embodiment requires provision of data bases, for example when used with a RADIUS Server.
  • a RADIUS server is a server used to authenticate users who access a communication system, which authentication is based on the RADIUS or remote authentication dial-in user server protocol.
  • a single network server 122 may be used to support many carriers.
  • an authentication system which comprises the use of a mobile telephone secure channel to securely transfer an authorization code that may be used to authorize some other service.
  • Non-cellular enabled units are enabled to connect to the wireless LAN and to have access to the cellular environment via the LAN.

Abstract

Interface device (fig. 4a) for interfacing between a PLMN network (26) and a non-PLMN network, the PLMN network (26) being configured to recognize cellular base stations as nodes thereof through which to mediate connections to cellular mobile devices, the non-PLMN networks (22) each comprising a plurality of access points (AP) for mediating connections to network compatible mobile devices (20), and for which the network compatible mobile devices (20) are not required to be cellular devices. The interface device (24) is configured as a node of the PLMN network to appear to the PLMN network (26) as a standard cellular base station, and comprises functionality to make non-cellular devices (20) connecting to the non-PLMN network (22) and attempting to access the PLMN network (26) through the non-PLMN network appear as cellular devices to the PLMN network (26).

Description

Access to PLMN networks for non-PLMN devices, and to issues arising in interfaces in general between PLMN and non-PLM networks
Field of the Invention The present invention relates to providing access to PLMN networks for non-
PLMN devices and to issues arising in interfaces in general between PLMN and non- PLMN networks.
Background of the Invention The demand for high-speed data access is growing rapidly. In the late 90's
28Kbps was considered fast for wired service. Now even 56 Kpbs is considered slow for wired service with 384 Kpbs considered the norm. With these higher speeds, downloading complex web pages and "rich media" such as streaming video are now practical. Wireless operators are struggling to offer their customer a wireline type experience on wireless. Today, cellular operators offer their subscribes only limited data and no "rich media" services because they have a limited amount of licensed radio bandwidth. Typical data rates on wireless today are 9.6 Kbps. GPRS will soon raise that to 50 to 80 Kbps (115 Kbps theoretical), but even this is slow compared to wireline's 384 Kbps.
To address this issue, carriers are aggressively trying to obtain additional licensed spectrum and are aggressively pushing the engineering community to find more efficient ways of using the current and anticipated radio allocations. But the results of these actions are several years off and will cost substantial amounts of money.
Unlicensed radio is becoming very popular and very affordable of obtaining high speed wireless access. Unlicensed radio operates in the ISM (Industrial, Scientific and Medical) Bands and is limited to very low power, which means the frequencies can be reused many times over. IEEE 802.1 lb is one example of unlicensed technology that is very affordable and very capable, offering speeds of up to 10,000 Kbps. An 802.1 lb Wireless Local Area Network (LAN) covering a small home or office and supporting 3 computers can be purchased for about $500.00 and the equipment is becoming a standard feature of many computer product lines including Dell and Apple. 802.1 lb is but one of several Wireless LAN technologies. Others include HomeRF, 802.1 lx, Bluetooth, etc. While these technologies were originally developed for Wireless Local Area
Networks (WLAN) for office and homes, a new class of service operators are emerging using this technology.
For a fee, these operators are offering public access via 802.1 lb networks. These networks are being installed at airports, coffee shops, etc and other places where people will use computers for an extended period of time. The present embodiments relate to the question of interfacing between the wireless LANs and the cellular or PLMN networks.
High speed unlicensed and licensed wireless access technologies are now available that will support speeds of 700 Kbps to 10 Mbps and even higher. Examples of these wireless access technologies include Bluetooth and Wireless LANs such as 802.1 l(x). These networks have sufficiently high speed to support rich media services such as videophones, streaming videos, etc.
PLMN subscribes can use these non-PLMN Access Networks (AN) for highspeed access to rich media services. In some venues the non-PLMN Access network may be carrying a substantial amount of rich media that is local to the venue. An example would be a sports arena where the predominate rich media source would be near real time playback of game highlights. While this rich media could be delivered via communication through the PLMN, keeping this rich media traffic out of the core network will reduce the burden on that network.
In order to take advantage of such data but additionally be part of the larger, PLMN network, it is necessary to support, in an integrated manner, Peer-to-Peer, Peer to Local Sever and Peer to Off Network connection types in such a way that a single connecting client can take advantage of all of the connection types. This is because subscribes do not want to have multiple terminals, so supporting voice communication is also a key technical requirement.
One of the issues involved in providing such interfacing is in that PLMN type networks are designed to ensure that the only users of the network are devices that can prove that they are authorized holders of unique telephone numbers. The purpose of such design is to ensure that billing can be carried out reliably and correctly, that impersonation of other uses is not possible and that unauthorized access to the network is not in general possible. To this end the cellular telephony devices are either provided with a subscriber identity module (SIM) which is a security chip having secure keys and algorithms to identify the device to the PLMN and which in addition carries out data encryption and decryption, depending on the configuration of the specific network; or they have stored identity data that the system uses in order to authenticate them to the network.
SIMs are physical devices that are secure from duplication and internal inspection, meaning that the data can not be externally read and can not be recovered by dissecting the part.
The SIM is typically in the physical possession of the subscriber and is installed by the subscriber in the device, typically the cellular telephone, that is used for access to the network. This means the access device has a SIM card carrier and reader. The SIM concept is widely used and furthermore allows the subscriber to exchange the device being used to access the network whilst keeping the same identity and telephone number, by simply removing his SIM from the existing device and placing it in the new device
SIM based authentication is appropriate for cellular devices connecting directly to the PLMN. However it is also contemplated that users connect to a local non-PLMN network such as a Bluetooth network and from there connect via the cellular network. Furthermore the local non-PLMN network is generally compatible with a wide range of devices, such as portable computers, PDA type devices and the like which are not conventional cellular devices and which are not typically equipped with a cellular identity, SIM or even a SIM card carrier and reader. These devices are collectively designated "non-SIM devices". It is desirable to provide an infrastructure for allowing such non-SIM devices to connect via the local network to the cellular network, or at least to approve their access to other networks e.g. Internet based on their cellular identity. Furthermore local non-PLMN networks are by their nature very localized. A user may wish to move whilst using one and may easily find himself out of range of any convenient access point. More particularly, mobile users within a small or confined area may get service from a local Access Point (AP) using any technology suitable for short ranges in the order of 10 to 100 meters. Each such AP supports a network of local mobile users. The communication conditions between each user and the AP may vary within a large range as a result of variable propagation path loss, available transmission power, interference level and network loading.
If more than one AP is operational within the area, whether multiple APs are collocated within a single point or they are installed in proximity in separate locations, it may be that the user would be serviced with better communication conditions from a different AP than the one currently being used or considered. T e problem then is to determine whether such an alternative AP is available and get the user to connect to that alternate AP. Such a problem is solved by a range of available procedures known collectively as "handoff '.
A different problem occurs when a user is equipped with a dual technology terminal, e.g. cellular and Wireless LAN, cellular and wireline Internet access, etc, and the connection needs to be exchanged from an access point using one technology to an access point using another technology. In this case, the logic usually associated - with handoff does not apply; rather, a different approach is required in order to make optimal use of the available communication resources.
Multiple technologies have been proposed to provide network connectivity within a small, confined area. Best known within this group are the 802.11 Frequency Hopping and Direct Sequence Wireless LAN (WLAN) standards and Bluetooth. The standards for these technologies treat the network as stand alone. When a member or potential member of such a network cannot obtain satisfactory data rate from the network Access Point, be it because of deteriorating communication conditions or network loading, one of several negative outcomes may occur from the user standpoint: he may be put on hold, deactivated/ dropped from the network or supplied with an unacceptably low data rate. Existing solutions do not support searching for or transferring the user to another network operating in the area, i.e. there is no equivalent to the cellular handoff in which the mobile user is transferred to another Access Point that can satisfy its communication needs.
Furthermore, no standards have been proposed to control the transfer between technologies providing services to these confined areas and technologies associated with wide areas, primarily cellular; or between technologies covering wide areas through wireless and wired connectivity.
It is also necessary to consider authentication for remote connections, for example for authenticating remote transactions or for ensuring that the correct user is billed for remotely provided services, and interfacing is not complete between networks unless one network can be used to provide authentication to users connecting over channels, typically of other networks, which are not secure or over which a user cannot be positively identified.
Currently there are numerous circumstances in which transactions are carried out without the physical proximity of the transacting parties. Such circumstances include ATM transactions, credit card and other transactions made by telephone, and transactions made over the Internet. Generally, the identity of the purchasing party is not established to a high degree in such transactions. The transactions are carried out over unsecured and/or non-authenticatable connections and using communication techniques that are insecure and/or non-authenticatable, allowing users to be impersonated and credit card numbers to be stolen.
Currently, arrangements for electronic payment rely very heavily on credit cards, which make it difficult to levy small charges, such as time charges for use of a network, or small charges for downloading of data items. Currently there are numerous circumstances in which transactions are carried out without the physical proximity of the transacting parties. Such circumstances include ATM transactions, credit card and other transactions made by telephone, and transactions made over the Internet. Generally, the identity of the purchasing party is not established to a high degree in such transactions. The transactions are carried out over unsecured and/or non-authenticatable connections and using communication techniques that are insecure and/or non-authenticatable, allowing users to be impersonated and credit card numbers to be stolen.
Currently, arrangements for electronic payment rely very heavily on credit cards, which make it difficult to levy small charges, such as time charges for use of a network, or small charges for downloading of data items. Summary of the Invention
According to a first aspect of the present invention there is thus an interface device for interfacing between a PLMN network and a non-PLMN network, said PLMN network being configured to recognize cellular base stations as nodes thereof through which to mediate connections to cellular mobile devices, said non-PLMN networks each comprising a plurality of access points for mediating connections to network compatible mobile devices, said network compatible mobile devices not being required to be cellular devices, said interface device being configured as a node of said PLMN network to appear to said PLMN network as a base station thereof and comprising functionality to make non-cellular devices connecting to said non-PLMN network and attempting to access said PLMN network therethrough appear as cellular devices to said PLMN network.
The device preferably comprises a circuit-switched interface for telephony and a packet interface for data and control. Preferably, said PLMN network is a GSM network having an A interface or a
Gb interface and wherein said circuit-switched interface is operable to use said A interface and said packet interface is operable to use said Gb interface.
Preferably, said PLMN network is a UMTS network having an IuCS interface and an IuPS interface and wherein said circuit switch interface is operable to use said IuCS interface and said packet interface is operable to use said IuPS interface.
The device preferably comprises a simulated cellular identity gateway associated with a security layer of said non-PLMN network and operable to determine that a connecting device has been authenticated by said non-PLMN network, and to respond to a PLMN network authentication query to indicate that said authentication has been successful.
Preferably, said simulated cellular identity gateway is a simulated SIM gateway and said PLMN network is a GSM network.
Preferably, said simulated cellular identity gateway is a simulated ESN gateway and said PLMN network is a CDMA network. Preferably, said non-PLMN security layer is one of a group comprising SSL, Ipsec, TLS, SRP, and SSH, and wherein an authentication of said one of said group is required to permit said simulated SIM gateway to provide said authentication response to said PLMN network. Preferably, the security layer is configurable to set a desired security level, for example by setting a key length.
The device preferably comprises a vocoder for receiving voice signals from said non-PLMN network for vocoding, and receiving vocoded voice signals from said PLMN network for decoding. The device preferably comprises a vocoder for receiving partly vocoded signals from said non-PLMN network for vocoding, and receiving vocoded voice signals from said PLMN network for part decoding.
Preferably, the device is configured to appear to said PLMN network as both a serving GPRS support node (SGSN) for packet data and as a base station for circuit switched data.
Preferably, functionality is provided to authenticate a device connecting to said non-PLMN network.
The device preferably comprises functionality to register a device connecting to said non-PLMN network. The device preferably comprises functionality to update the location of a device connecting to said non-PLMN network.
The device preferably comprises support functionality for allowing a device connecting to said non-PLMN network to generate service requests.
The device preferably comprises functionality to provide said PLMN network with connection control data formatted for said PLMN network to be able to integrate corresponding activity into a consolidated bill.
The device is preferably configured to operate together with a connection management unit of said non-PLMN network, thereby to obtain from said non-PLMN network details of connecting parties and quantity of data exchanged. The device preferably comprises functionality to format said details obtained into a PLMN compatible format. The device preferably comprises a cellular identity module associated therewith for providing PLMN security functionality, thereby to allow access via said wireless LAN to a PLMN network.
Preferably, cellular identity module is mounted on said access card. Preferably, said cellular identity module is reversibly mounted on said access card.
Preferably, said cellular identity module is a SIM.
The device preferably comprises both a SIM carrier and a SIM reader.
Preferably, said cellular identity module is a virtual cellular identity module. Preferably, said virtual cellular identity module is a virtual module comprising
SIM functionality.
The device preferably comprises functionality to exchange authentication signals with a LAN gateway, thereby to achieve network authorization.
Preferably, said authentication signals are formatted to be transferable between said LAN gateway and said PLMN network, thereby to obtain PLMN authorization.
According to a second aspect of the present invention there is provided a method of accessing a PLMN network via a non-PLMN network using a non-PLMN device, comprising: providing said non-PLMN device with an access card suitable for said non PLMN network, providing said access card with a cellular identification module, providing said non-PLMN network with gateway functionality to relay cellular identification signals between said non-PLMN device and said PLMN network.
According to a third aspect of the present invention there is provided a method of accessing a PLMN network via a non-PLMN network using a non-PLMN device, comprising: providing said non-PLMN network with a secure authentication unit for authentication of said non-PLMN device, providing said non-PLMN network with gateway functionality, associated with said secure authentication unit, to operate said authentication unit and to relay cellular identification signals to said PLMN network in response to authentication of said non-PLMN device. According to a fourth aspect of the present invention there is provided a method of operating a secure gateway between a PLMN network and a non-PLMN network such that a non-PLMN device is authenticatable for a PLMN connection, the method comprising: authenticating said non-PLMN network via a first authentication protocol, and exchanging signals with said PLMN network via a cellular authentication protocol, comprising indicating device authentication following authentication via said first protocol.
According to a fifth aspect of the present invention there is provided a method of operating a secure gateway between a PLMN network and a non PLMN network, such that a non-PLMN device is authenticatable for a PLMN connection, the method comprising: exchanging signals with said PLMN network via a cellular authentication protocol thereby to authorize said non-PLMN network to connect to said device.
According to a sixth aspect of the present invention there is provided a handoff manager for managing handoff of a mobile unit communicating using an identifiable session between a first mobile network access point and a second mobile network access point, wherein said first access point belongs to a first network, and said second access point belongs to a second network, said manager being commonly accessible to each network and comprising a mobile unit matcher for performing matching between mobile units having disconnected from one network and mobile units having connected to other networks, and a session maintainer associated with said mobile unit matcher for transferring sessions between units thus matched, thereby to handoff between networks. The handoff manager preferably comprises a unit at a single location. The handoff manager preferably comprises distributed functionality located at a plurality of intra-network or inter-network nodes.
Preferably, one of said networks is a PLMN network.
Preferably, one of said networks is a wireless LAN network. Preferably, one of said networks is a wireless LAN network.
The handoff manager preferably comprises a session active management unit for determining from a currently used network when connection quality threshold is not being met, for instructing said mobile unit to search for surrounding networks and determine connection parameters thereof, to identify from said parameters a best network and to instruct said mobile unit to connect to said best network.
Preferably, said session active management unit is associated with said mobile unit matcher, thereby to use said instruction to assist with said matching.
Preferably, said session active management unit is operable to determine whether said instructed match has succeeded and, in the absence of a successful connection, is operable to instruct said mobile unit to connect to a next best network.
Preferably, said session active management unit is operable to continue to instruct said mobile unit to connect to a next best unit until a successful connection is indicated.
The handoff manager preferably comprises a session passive management unit for determining from said mobile unit when connection quality threshold is not being met, for instructing said mobile unit to search for surrounding networks and determine connection parameters thereof, to identify from said parameters a best network and to instruct said mobile unit to connect to said best network.
The handoff manager is preferably operable to instruct said mobile unit to disconnect from a first network and subsequently to connect to a best network.
The handoff manager is preferably operable to instruct said mobile unit to connect to a best network and subsequently to disconnect from a current network. The handoff manager is preferably operable to reduce a connection quality level at a current network, thereby to force said mobile unit to disconnect therefrom and find another network.
The handoff manager is preferably operable, following a selection of to a best network for reconnection, to reduce a connection quality at a current network, and to send an instruction to said mobile unit to connect to said selected best network.
The handoff manager is preferably operable to provide to said mobile unit identification of potentially available networks.
The handoff manager is preferably operable to provide to said mobile unit network parameters of a potentially available network.,
Preferably, said parameters include any one of a group comprising: preferred access channels for a respective PLMN network, identity of proxy IP's for Internet access which are capable of supporting a better distributed SCC architecture, loading conditions of said potentially available networks, general availability parameters of said potentially available networks, network access numbers for Internet access, and information on expected loading conditions of said potentially available network.
Preferably, said first mobile network and said second mobile network are respectively wireless LANs of a single hotspot.
Preferably, said first and said second networks are overlapping networks and a mobile unit for handoff is located at a point of overlap between said networks.
Preferably, said first and said second networks respectively use a same network protocol.
Preferably, said first and said second networks respectively use a different network protocol. Preferably, said first and said second networks are non-overlapping.
Preferably, said first network and said second network are respectively of different Hot Spots.
Preferably, said different hotspots have a region of overlap and where a mobile device for handoff is located in said region of overlap. Preferably, said hotspots utilize a single communication protocol.
Preferably, said hotspots utilize respectively different communication protocols.
Preferably, said first network and said second network are respectively PLMN networks. Preferably, said first PLMN and said second PLMN network utilize a single communication protocol.
Preferably, said first and said second PLMN network utilize respectively different communication protocols.
Preferably, said first and said second communication network have a region of overlap and wherein a mobile device for handoff is located in said region of overlap.
Preferably, said first network is a wireless local network and said second network is a PLMN network.
Preferably, said wireless local network is located within a region of coverage of said PLMN network. The handoff manager preferably comprises a priority unit for setting said wireless local network as a higher priority than said PLMN network such that a mobile unit is automatically handed off to said wireless local network when in range thereof.
According to a seventh aspect of the present invention there is provided a method of handoff of a mobile device, communicating in a communication session, said handoff being between access points of a first and a second wireless network respectively, the method comprising: providing a control point at a location common to both said networks, at said control point determining identities of mobile devices whose connections have been terminated and obtaining data of respective sessions thereof, at said control point determining identities of new connections formed with mobile devices, at said control point matching said identities, thereby to match an existing session with a mobile device that has terminated its connection at a first access point and has reconnected at a second access point. According to an eighth aspect of the present invention there is provided an authentication apparatus comprising: a communicator for communicating with an authenticatable mobile device, a verifier associated with said authenticatable mobile device to verify that the communication is with an intended one of authenticatable devices, and an associator for associating the verification with an activity request via a non authenticatable device, thereby to authenticate the activity request of the non- authenticatable device.
Preferably, said authenticable device is a GSM device and said authenticatable link is a GSM link.
Preferably, said authenticatable device is a CDMA device and said authenticatable link is a CDMA link.
Preferably, said authenticatable device is a PDC device and said authenticatable link is a PDC link. Preferably, said authenticatable device is an EDGE device and said authenticatable link is an EDGE link.
Preferably, said authenticatable device is a WCDMA device and said authenticatable link is a WCDMA link.
Preferably, said authenticatable device is a GPRS device and said authenticatable link is a GPRS link.
Preferably, said authenticatable device is an Iridium device and said authenticatable link is an Iridium link.
Preferably, said secure link involves a subscriber identity module located at said secure mobile device. Preferably, said authenticatable link is a secure link utilizing a subscriber identity module located at said authenticatable device.
Preferably, said authenticatable device is a mobile telephone.
Preferably, said communication comprises an electronic data communication. Preferably, said electronic data communication comprises electronic messaging.
Preferably, said electronic messaging comprises SMS messaging.
Preferably, said electronic messaging comprises WAP. Preferably, said electronic messaging comprises email.
Preferably, said electronic messaging comprises EMS.
Preferably, said electronic messaging comprises MMS.
Preferably, said communicator comprises functionality to initiate said communication by sending an initial message to said authenticatable device and functionality to receive a reply to said initial message from said authenticatable device, therewith to authorize said activity request.
Preferably, said communicator comprises functionality to receive an initializing communication from either one of said authenticatable device and said non-authenticatable device, and functionality to send a reply to said initial message, therewith to authorize said activity request.
Preferably, said communicator comprises functionality to receive an initializing communication from an external device and functionality to establish a link between said authenticatable device and said non-authenticatable device, therewith to authorize said activity request. Preferably, said communicator involves functionality to receive a message from said authenticatable device and functionality to complete said communication by sending a response thereto to said secure authenticatable device, thereby to authorize said activity request.
Preferably, said communicator comprises functionality to insert an identifier into said reply for a requesting party to enter via said non-authenticatable device, and wherein said verifier further comprises functionality to determine whether said identifier have been received via said non-authenticatable device.
Preferably, said communicator is operable to use an automatic voice for communicating with said authenticatable device. Preferably, said authenticatable device is associated with a payment account, said apparatus further comprising functionality to charge said requested activity to said payment account.
Preferably, said requested activity is an Internet browsing activity or a point of sale activity.
Preferably, said requested activity is access to a network.
Preferably, the apparatus is operable to connect to said non-authenticable device via Bluetooth access points.
Preferably, the apparatus is operable to connect to said non-authenticatable device via at least one WLAN access point.
Preferably, the apparatus is connectable to said non-authenticatable device via a TCP/IP link.
Preferably, said communicator is operable to obtain a telephone number for communicating with said authenticatable device, from said non-authenticatable device.
Preferably, said communicator is operable to obtain identification data, from said non-authenticable device, for forming said association.
Preferably, said non-authenticatable device is any one of a group comprising a credit card, a smart card, an infra-red device, a Bluetooth device, a PDA, a mobile computer, a fixed computer, and a network of computers.
Preferably, the apparatus comprises a counter for timing said communication to fail said authorization if said communication is not completed by a predetermined time limit.
Preferably, the apparatus comprises a log-in functionality for logging in the non-authenticatable device.
Preferably, said associator is connected to an authenticator for indicating that said activity request is approved.
Preferably, said authentication communicator is operable to communicate said authentication to an external gateway associated with said non-authenticatable device. Preferably, said authentication communicator is operable to communicate said authentication to a server associated with said requested activity.
Preferably, said authentication communicator is operable to communicate said authentication by applying a change to a routing table on a router. According to a ninth aspect of the present invention there is provided a personal transaction card compatible with ATM machines, comprising, in ATM readable format, an ATM routing number and a mobile telephone number, said mobile telephone number being associated with an owner of said personal transaction card. Preferably, said numbers are stored on a magnetic strip.
Preferably, said numbers are stored in an internal integrated circuit.
According to a tenth aspect of the present invention there is provided an authentication method comprising: communicating via a secure link with an authenticatable device, verifying that the communication is with an intended one of authenticatable devices, and associating the verification with an activity request via a non-authenticatable device, thereby to authenticate the activity request of the non-authenticatable device.
Preferably, said authenticatable device is a GSM device and said authenticatable link is a GSM link.
Preferably, said authenticatable device is a CDMA device and said authenticatable link is a CDMA link. Preferably, said authenticatable device is a PDC device and said authenticatable link is a PDC link.
Preferably, said authenticatable device is an edge device and said authenticatable link is an edge link.
Preferably, said authenticatable device is a WCDMA device and said authenticatable link is a WCDMA link. Preferably, said authenticatable device is a GPRS device and said authenticatable link is a GPRS link.
Preferably, said authenticatable device is an Iridium device and said authenticatable link is Iridium link. Preferably, said authenticatable link comprises a secure link involving a subscriber identity module located at said authenticatable device.
Preferably, said secure link involves a subscriber identity module located at said authenticatable device.
Preferably, said authenticatable device is a mobile telephone. Preferably, said communication comprises electronic data communication.
Preferably, said electronic data communication comprises electronic messaging or SMS messaging.
Preferably, the method comprises initiating said communication by sending an initial message to said authenticatable device and functionality to receive a reply to said initial message from said authenticatable device, therewith to authorize said activity request.
Preferably, said communicating involves receiving a message from said authenticatable device and completing said communication by sending a response thereto to said authenticatable device, thereby to authorize said activity request. Preferably, the method comprises inserting a password into said reply for a requesting party to enter via said non-authenticatable device, and determining whether said password has been received via said non-authenticatable device.
Preferably, the method comprises using an automatic voice for communicating with said authenticatable device. Preferably, said authenticatable device is associated with a payment account, said method further comprising charging said requested activity to said payment account.
Preferably, said requested activity is one of a group comprising an Internet browsing activity, a point of sale activity and accessing a network. Preferably, the method comprises using one of infra-red and bluetooth.
The non-authenticatable device may be a TCP/IP link.
Preferably, the method comprises obtaining a telephone number for communicating with said authenticatable device, from said non-authenticatable device.
Preferably, said non-authenticatable device is any one of a group comprising a credit card, a smart card, an infra-red device, a Bluetooth device, a PDA, a mobile computer, a fixed computer, and a network of computers.
Preferably, the method comprises timing said communication to fail said authorization if said communication is not completed by a predetermined time limit.
Preferably, the method comprises a logging in procedure for logging in the non-authenticatable device.
Preferably, the method comprises outputting an indication that said activity request is approved. Preferably, said indication is output to an external gateway associated with said non-authenticatable device.
Preferably, said indication is output to a server associated with said requested activity.
Preferably, said indication is output by applying a change to a routing table on a router.
The above provides authentication of SIM-based and SIM-less non-telephony devices. SIM-less devices may be authenticated either by using simulated SIM gateway (SSG), or by using a virtual SIM. The virtual SIM can be initialized after a verifier verifies that the communication is with an intended authenticable device. An associator then assoicates the activity request from an unauthenticated device, equipped with a virtual SIM with the initial verification in other words with the virtual SIM initialization.
Brief Description of the Drawings For a better understanding of the invention and to show how the same may be carried into effect, reference will now be made, purely by way of example, to the accompanying drawings.
With specific reference now to the drawings in detail, it is stressed that the particulars shown are by way of example and for purposes of illustrative discussion of the preferred embodiments of the present invention only, and are presented in the cause of providing what is believed to be the most useful and readily understood description of the principles and conceptual aspects of the invention. In this regard, no attempt is made to show structural details of the invention in more detail than is necessary for a fundamental understanding of the invention, the description taken with the drawings making apparent to those skilled in the art how the several forms of the invention may be embodied in practice. In the accompanying drawings
Fig. 1 is a simplified representation of a SIM,
Fig. 2 is a simplified block diagram showing functional operation of a SIM, Fig. 3 is a simplified schematic diagram showing a client device connecting to a non-PLMN network and from there to a PLMN network via a virtual SIM gateway according to a first embodiment of the present invention,
Fig. 4A is a simplified block diagram showing the embodiment of Fig. 3 in greater detail including sub-systems of a simulated SIM gateway, Fig. 4B is a simplified comparative diagram showing an alternative solution to providing PLMN service over a non-PLMN network, the service compared to the prior art,
Fig. 5 is a simplified flow chart showing a process of connecting a non-SIM device via a non-PLMN network to a PLMN network via a virtual SIM gateway, according to an embodiment of the present invention,
Fig. 6 is a schematic diagram showing a typical PLMN network architecture,
Fig. 7 is a schematic diagram showing the use of a virtual base station controller as an interface to the PLMN network, according to an embodiment of the present invention, Fig. 8 is a schematic diagram showing protocol layers and packet data authentication between a wireless LAN and a PLMN network according to a preferred embodiment of the present invention,
Fig. 9 is a schematic diagram showing protocol layers and circuit switched data authentication between a LAN and a PLMN network according to a preferred embodiment of the present invention,
Fig. 10 is a schematic diagram showing protocol layers involved in connections between GPRS and a a wireless LAN according to a preferred embodiment of the present invention, Fig. 11 is a schematic diagram showing protocol layers involved in the provision of circuit switched bearer services over PLMN and wireless networks, according to a preferred embodiment of the present invention,
Fig. 12 is a simplified schematic diagram showing a virtual SGSN+ used as an interface between a wireless LAN and a PLMN network according to a preferred embodiment of the present invention,
Fig. 13 is a schematic diagram showing protocol layers and packet data authentication between a wireless LAN and a PLMN network according to a preferred embodiment of the present invention,
Fig. 14 is a schematic diagram showing protocol layers for the provision of packet bearer services between a wireless LAN and a PLMN network according to a preferred embodiment of the present invention,
Fig. 15 is schematic diagram showing protocol layers for the provision of circuit switched bearer services between a wireless LAN and a PLMN network according to a preferred embodiment of the present invention, Fig. 16 is a schematic diagram showing protocol layers for the provision of packet data traffic management between a wireless LAN and a PLMN, according to a preferred embodiment of the present invention,
Fig. 17 is a schematic diagram showing two wireless networks that cover common area and are jointly connected to a hot spot central point that can be used to co-ordinate handovers between the network in accordance with a preferred embodiment of the present invention,
Fig. 18 is a schematic diagram showing a wireless LAN lying inside coverage area of a cellular or PLMN network in accordance with a preferred embodiment of the present invention,
Fig. 19 is a generalized flow diagram showing an overall scheme for handoff between two networks in accordance with a preferred embodiment of the present invention,
Fig. 20 is a generalized flow diagram illustrating handoff from the point of view of the mobile unit in accordance with a preferred embodiment of the present invention,
Fig. 21 is a generalized flow diagram showing an alternative embodiment of a handoff procedure in accordance with a preferred embodiment of the present invention, Fig. 22 is a simplified schematic diagram illustrating two non-overlapping
WLANs having a common central point,
Fig. 23 is a simplified schematic diagram illustrating two overlapping WLANs each being part of a different hotspot and having a common central point beyond the realm of the hotspots, Fig.24 is a variation of the scenario of Fig. 23 in which the hotspots do not overlap,
Fig. 25 illustrates two overlapping PLMN networks,
Fig.26 illustrates two non-overlapping PLMN networks,
Fig. 27 is a simplified block diagram showing an authentication mechanism according to a further preferred embodiment of the present invention,
Fig. 28 is a simplified pictorial diagram showing a device for use in the secure link of Fig. 27,
Fig. 29 is a simplified pictorial diagram showing a device for use in the insecure link of Fig. 27, Fig. 30 is a simplified block diagram showing another embodiment of an authentication mechanism according to the present invention, specifically for allowing controlled access to a wired or wireless LAN, and
Fig. 31 is a simplified flow chart showing operation of the authentication mechanism of Fig. 27, where the setup may start from any device, secure or unsecured, including setup from a different device.
Description of the Preferred Embodiments
The present embodiments provide connectivity for a non-PLMN network to interface to a PLMN network. The inventions described hereunder provide interfaces between the non-PLMN network and the PLMN network that make the PLMN perceive units accessing through the non-PLMN network appear as if they were accessing the PLMN network directly, same as those units that access the PLMN through the radio access network of the PLMN. Therefore, the PLMN network perceives non-PLMN network servicing the supported access devices as simply a part of the PLMN network.
The present embodiments comprise a set of components, that interact together as a system that enables its users to access the various resources from a non-PLMN or a PLMN, be authenticated by and charged by the PLMN system, without having a device that is capable of physically interfacing with the PLMN (e.g. a cellular phone). Some of the components described here are installed on the device that is accessing the PLMN or the non-PLMN network, and some within gateways between the non- PLMN and PLMN networks. Some of the embodiments use a token that proves the identity of the cellular user, as issued by the cellular operator (e.g. IMSI and Ki within a GSM SIM, or MIN and ESN within a CDMA device) - others do not make use of such a token. The embodiments do not require any modification to the PLMN infrastructure; they require addition of new entities that enable seamless access between the non-PLMN and PLMN.
A system that allows access from non-PLMN to PLMN must be able to execute at least the following two actions:
1. Authenticate the user, i.e. prove to the PLMN that the user requesting access to its resources or other resources to be billed to the PLMN account, is an authorized user of the PLMN . In some cases this authentication includes, beyond proof of identify, approval of privileges to access specific services. The PLMN must not be able to distinguish between accesses originating from a non- PLMN and between accesses through the PLMN own access network, whether a radio or other physical communication infrastructure. This must be done since the PLMN must be assured that the access request is really associated with a valid account for the specific requested services. 2. Enable transfer of user traffic between non-PLMN and PLMN. The
PLMN must not distinguish between traffic originating from or destined to a non-PLMN and traffic to and from users within the PLMN own access network.
All the embodiments contribute to the authentication and traffic security of the access device accessing the non-PLMN, where the service is bi liable to a PLMN account associated with this access device at the time of the access.
Two embodiments describe entities that are responsible for making the PLMN perceive the access as if it were done through standard cellular nodes; the characterized entities are thus designated simulated cellular nodes. These nodes are connected to both a non-PLMN and a PLMN; they may reside within the PLMN infrastructure in the same way as the nodes they are emulating. The VBSC (Virtual Base Station Controller) appears to the PLMN as a BSS; in this case the emulated node is a BSC. The VSGSN+ appears to the PLMN as a cellular switching node, i.e. an SGSN for packet switch data or an MSC for circuit switch data. The VBSC and the VSGSN+ are able to execute the above two functionalities. They participate in the authentication of the non-PLMN access device to the PLMN network; and they are able to forward traffic from the non-PLMN network to the PLMN network.
In two of the embodiments - Access device with SIM, and Mixed network authentication, the authentication relies on a token that was provided to the user by the PLMN operator (same identity parameters the PLMN operator provides to its subscribers accessing the PLMN own access network, for example those contained within a SIM for a GSM PLMN or typically stored directly in a cellular phone). In two other embodiments - SSG (Simulated SIM gateway) and Virtual SIM, the token is replace by a virtual token, which is a software package that simulates the token. In the first embodiment, the virtual token is installed in the gateway (either VBSC or VSGSN+), in the former embodiment the software packet is installed in the non- PLMN access device.
The system supports several alternative methods of authentication. The simulated cellular nodes (VBSC or VSGSN+) play an essential role in each one of the authentication methods. We classify the authentication methods (and respectively the embodiments) to the following classes 1. PLMN like authentication of the end user access device - in these authentication methods, the end user access device contains a SIM: the following contain embodiments where the SIM is a real SIM and embodiments where the SIM is virtual (i.e. SW SIM for GSM and stored cellular identity for non-GSM networks). A physical SIM can be installed in the device, it can be installed on the access card, on a special dedicated card, or on another card integrated with some other peripheral (e.g. flush disk). In these methods the simulated cellular nodes (either the VBSC or the VSGSN+) get the cellular authentication information from the end user access device, and verify it against the authentication data it has stored in its data base, or against authentication data it retrieves from the PLMN infrastructure. Mixed Network Authentication is one way to associate or initialize the simulated cellular node data base with verified and authenticated authentication data 2. Non-PLMN Authentication of Access Device, PLMN
Authentication by Simulator Gateway (that resides within the entity simulating the PLMN infrastructure node, e.g. a cellular node) - A Simulated SIM Gateway (SSG) receives the PLMN authentication data and makes the cellular network think that the device has a real physical token/ cellular identity and responds like any cellular phone. The Gateway actually authenticates the device using a different authentication protocol, typically Internet style. The non- PLMN Gateway takes the identity of a node with the privileges the cellular network provides to such a node.
3. Authentication involving the user PLMN device, e.g. cellular phone
- linking a non-authenticatable non-PLMN access device with an authenticatable PLMN access device, e.g.cellular device, by means of association between the two access devices. Mixed network authentication allows the user to access the non-PLMN based on its being an authenticated subscriber of the PLMN. It is assumed that there is a VBSC or VSGSN+ to provide access from non-PLMN to PLMN. For this authentication there are three cases: i. PLMN provides a one time access code every time the user requests access to the non-PLMN. This solution requires simultaneous availability of communication to both networks as well as manual intervention of the user ii. Automated one time access code. This is a solution where the non-PLMN device has a client that automates the procedure, which may be extended even to automated transfer of the access code from the PLMN device (cellular phone) to the client in the non-PLMN access device iii. Initialization of a Virtual SIM. In this scheme, a one-time association between the PLMN device and the non-PLMN device is used to initialize the non-PLMN device either with a Virtual SIM or with authentication data for another authentication scheme (possibly used by the SSG). Then the user may be authenticated by and access the PLMN through the non-
PLMN without being within the coverage of the PLMN. One aspect of the present embodiments provides a virtual SIM gateway that can be used to interface between a non-PLMN network and a PLMN network. The gateway performs authentication adequate for its communication link with the access device, such as typical Internet Protocol environment authentication over the non- PLMN network; after it is satisfied that it has authenticated a connecting device, then it authenticates itself on behalf of the access device to the PLMN network as if there is a SIM on a device (including the equivalent cellular identity in those networks that do not use SIM) . Alternatively, these two stages may be integrated, with interim stages of one authentication dependent on interim stages of the other authentication. For example, the gateway may translate requests, queries and responses from one link into the other. If traffic is forwarded to the PLMN, then the gateway encrypts it in a way that makes it look as though it originated in the device with the SIM (or the equivalent cellular identity). A further variation of this embodiment applies a SIM to the non-SIM device, preferably by incorporating the SIM into the connection card of the device, so that there are provided various types of WLAN and other connection cards incorporating SIMs. When it is preferred not to incorporate a SIM into the access device, then another scheme employing a different authentication option exists: to equip the connecting device with a virtual SIM. The virtual SIM can be stored within other access device resources with its algorithms implemented by a processor within the access device, i.e. a software implementation with no special hardware. The virtual SIM can be initialized in several ways. Specifically, Mixed Network Authentication, which is described herein below, can be used to authenticate the initialization of the virtual SIM installed on the remote connecting device. A device equipped with a virtual SIM is authenticated by either a VBSC or a VSGSN, as described in detail below, which preferably resides between the non-PLMN network and the PLMN network, and is able to create pseudo- triplets (rand, sres, kc) for virtual SIMs or their equivalent (MIN, ESN) in other networks, or other authentication data e.g. username and password that may be authenticated by the Simulated SIM Gateway and provide to the network the same or equivalent data the emulated node would exchange with the PLMN receive if a subscriber would be accessing through the PLMN access network and the emulated node. However, if this method is used, then the PLMN does not directly authenticate the user (i.e. does not verify that it has the SIM or equivalent cellular identity in his possession), but rather it relies on the gateway. The gateway may then proceed to provide charging information to the PLMN. It is pointed out that when a virtual SIM is used in the access device then the simulated PLMN gateway preferably has functionality to authenticate a virtual SIM.
Another aspect of the present embodiments provides a virtual base station controller which provides interface functionality so that the non-PLMN network appears, to the PLMN network, as a cellular basestation controller. The concept may be extended to even emulate a cellular base station, so the PLMN network appears as one or more cellular base stations.. In essence what is provided is a proxy server type arrangement. An extension to the virtual base station controller allows peer to peer connections within the non-PLMN network, peer to server connections within the non-PLMN network and connections leading out of the network to be managed together from the PLMN network.
Another aspect of the present invention provides for the cellular network to approve the access through the association of a non-cellular device connecting via a different route, to the cellular telephone. The concept of allowing the devices associated with the cellular devices to connect via the local network to the cellular network is extended in a similar way to networks with cellular telephones equipped with cellular identification modules or the like other than SIMs.
Another aspect of the present invention provides methods for maintaining seamless connectivity for the mobile user independent of the different communication networks it may be accessing and whether it is moving from one connection type to another.
Before explaining at least one embodiment of the invention in detail, it is to be understood that the invention is not limited in its application to the details of construction and the arrangement of the components set forth in the following description or illustrated in the drawings. The invention is applicable to other embodiments or of being practiced or carried out in various ways. Also, it is to be understood that the phraseology and terminology employed herein is for the purpose of description and should not be regarded as limiting. Simulated SIM gateway Reference is now made to Fig. 1, which is a simplified diagram showing a typical SIM for application to a cellular telephony device. The SIM 10 is a small module which is inserted into a SIM card carrier and reader 12 within cellular telephony device 14. The SIM provides the telephony device with its identity, and allows it to connect securely to the cellular telephone network.
Reference is now made to Fig. 2, which is a simplified block diagram showing the principle subsystems within SIM 10. The SIM 10 comprises an authentication subsystem 16 for carrying out secure identification to assure the network that it is the legitimate carrier of the telephone number, and an encryption subsystem 18, which encrypts voice and data communication from the cellular device and which decrypts incoming voice and data communication from the network, using an algorithm known as A5. Of course it will be appreciated that other encryption algorithms or for that matter entirely different encryption schemes may be used. Encryption and decryption are carried out using a key which is supplied at authentication by the network. The exact forms of authentication and encryption that are used are network dependent. In authentication a random number RAND is sent by the network to the SIM, where it is used as the input to a one-way function A3. The SIM sends back the function output, which the base station compares with SRES, a previous attempt, made by the system, to apply RAND to A3. If the response matches SRES then the connecting device is authenticated.
Reference is now made to Fig. 3, which is a schematic diagram showing a remote device connecting to a cellular or PLMN network via a local network. Device 20, which need not be a cellular device and may not have a SIM, nevertheless has processing power that allows it to identify itself, albeit in ways incompatible with the requirements of the PLMN networks. Such a device is referred to herein as a non- PLMN device. Device 20 connects to non-PLMN network 22, which may typically be a LAN network having wireless access points. The LAN typically uses TCP-IP as a communication protocol. The LAN is connected via a Simulated SIM Gateway 24 to the PLMN or cellular network 26. The Simulated SIM gateway 24 provides a bridge between TCP-IP authentication and encryption protocols and the PLMN protocols and thus allows device 20 to be securely recognized by the PLMN network even though it does not have a SIM. As shown in Fig. 3, the connection between the device 20 and the gateway 24 is secured using any standard TCP/IP security protocol, e.g. secure socket link (SSL), TLS, Ipsec, that is any secure encryption and authentication technology typical to the IP network. As will be explained in more detail below, The security technology is used for the device 20 to identify itself unambiguously to the gateway. Alternatively, other secure protocols, eg IPSec may be used for this purpose. The term SSL as used herein refers to other protocols e.g. IPsec that may also be used for this purpose; that is to say the term SSL as used in this explanation refers collectively to any security protocol that is being used to protect the data transferred between the device and the gateway, including those that operate at lower layers and do not use a socket. The gateway, having determined the identity of the connecting device, then carries out a SIM compatible identification procedure with the PLMN network, in which the gateway indicates to the PLMN that it has authenticated the connecting device. The authorization procedures are considered in greater detail below with respect to Fig. 5. Reference is now made to Fig. 4A, which is a simplified diagram showing in greater detail the embodiment of Fig. 3, and in particular showing internal subsystems of the gateway 24. Parts that are the same as those in previous figures are given the same reference numerals and are not referred to again except as necessary for an understanding of the present embodiment. The simulated SIM gateway 24 comprises a database subsystem 28, an access subsystem 30, an interworking subsystem 32 and a PLMN subsystem 34. The various subsystems may be implemented over a plurality of servers or the entire gateway may be implemented on a single server, depending on the scale of the operation required. The gateway is preferably located in a secure place so as to guard against attempts to break physically into the system. As will be explained below, however, the gateway does not store any information that would compromise SIM security.
The access subsystem 28 generally comprises standard LAN security, typically to establish an SSL socket to the connecting device 20. The access subsystem identifies the device and informs the PLMN subsystem 34. The PLMN subsystem 34 communicates to the PLMN network 26 that a connection is required. The gateway is configured to look like a standard cellular base station, or for that matter a standard SGSN, a standard base station controller or a standard MSC to the PLMN network which sends standard SIM identification data to the PLMN subsystem. The subsystem does not pass on any of the identification data to the device as the device does not have a SIM. Instead, it simply checks that the SSL or other TCP/IP-based authentication protocol was successful and sends a standard SIM acknowledgement to the PLMN network. If traffic forwarding from the end user access device to the PLMN is required then the PLMN subsystem 34 may also carry out encryption of outgoing data and voice and decryption of incoming data and voice as necessary to provide compatibility with the PLMN network.
The internetworking subsystem provides a bridge between the IP based access subsystem and the cellular protocols of the PLMN system being used.
The database subsystem contains data of the users of the LAN so that individual users can be authenticated and given access to the appropriate services.
Reference is now made to Fig. 4B, which is a simplified comparative diagram showing an alternative embodiment for allowing non-PLMN devices access to a PLMN network. As discussed above, the non-PLMN devices are required by the PLMN network to do the following;
1) Subscriber Authentication - The PLMN sends a random number (RAND) to the access unit. To be authenticated the access unit must respond with the correct number (SRES). The access device determines SRES by inputting the RAND to the SIM, where the secret A3 algorithm processes it and the SRES is the output. The
SRES is sent back toward the PLMN where it is compared to the expected value, and. In devices using an alternate cellular identity scheme, the access unit provides MIN and ESN in a first access, TMSI and ESN later on, in order to be similarly authenticated by the PLMN. 2) Data or voice encryption - Digital bearer information (voice or data) sent from the access device to the PLMN is encrypted to prevent eavesdropping. In the example of GSM networks, the SIM encrypts the data stream using the A5 algorithm and an internally generated encryption key that is derived from RAND. Different algorithms for the same purpose are defined for CDMA and other networks. Both of the above-mentioned requirements may be performed by providing access to a SIM (or equivalent cellular identity data) from the non-PLMN device, and this may be accomplished by incorporating the SIM into the user terminal. The SIM may be incoφorated into the device itself, into a separate access card or module or a SIM carrier and reader may be part of the network access card. For non-SIM based cellular networks, the cellular identity data may be stored in the user terminal, in a special smart card or in the access card. Access cards in use by non-PLMN devices use a wide variety of access technologies including Bluetooth, Wireless LAN (802.1 IX) and wired 10/100 Based Ethernet. The format for these cards includes standard PCMCIA, CompactFlash and other formats.
For PDAs and Laptop computers the access card may often be built in. More likely thoughit may be provided with an add on card, for example a CompactFlash (or PCMCIA) add on card. A prototype that has been built comprises a Bluetooth Card in CompactFlash format. The card is modified to include a SIM carrier and the Bluetooth driver software is modified to include the SIM reader and control.
The SIM carrier and reader may likewise be added to Wireless LAN cards such as 802.1 lb in either CompactFlash or PCMCIA format. A prototype has also been constructed of an 802.1 lb card in a PCMCIA format. Figure 4 is based on the GSM/ GPRS network. The upper portion of the figure shows the current standard approach where GPRS is used throughout. The SIM card and control software is normally mounted on the GPRS Access Card. The GPRS Access card is installed in the User Device, which may typically be a PDA, Laptop or Mobile phone. The principle of the solution is shown in Fig.4B. In Fig. 4B, a comparison is shown between the top half of the drawing in which standard GPRS is used, and SIM access is provided via a GPRS access card 36, and the bottom half of the drawing, in which an intermediate section of a non_PLMN network intercedes, and SIM access is provided via a Bluetooth access card 38. In the lower part of the figure, the GPRS Access card 36 is replaced by a
Bluetooth access card 38. The control software is installed on this same card. The Bluetooth Access card is installed in the User Device and communicates over the Bluetooth network. GPRS messaging is transported over Bluetooth and at the edge of the network, Bluetooth transport is replaced by standard GPRS transport as shown in the figure. The advantages of the above solution, as opposed to that of Fig 4A, are that the above SIM is included in an access card device. Specialization is restricted to a special card, which is to say that the solution can be implemented simply on the basis of providing SIMs in the non-PLMN devices and substantially no additional functionality has to be provided to any of the networks involved. The subscriber is provided with access to full network services. All access and encryption uses standard and completely unmodified PLMN techniques. The carrier is protected from fraud because he is relying on his own security system. The access network operator islikewise protected from fraud by the same tried and tested PLMN system.
Reference is now made to Fig. 5, which is a simplified flow chart of the process of obtaining access to the cellular or PLMN network by a non SIM device connecting via a LAN. The diagram refers to the embodiment of Fig. 4A. By contrast the device of Fig. 4B connects in a completely standard manner. According to Fig. 5 the device connects to the LAN in an initial step SI and then an SSL socket is established in a subsequent step S2. The connection to the LAN is preferably carried out using a standard web browser, which is perfectly capable of supporting an SSL socket or other TCP/IP authentication protocol. The socket is standard and may typically use 64, 128 bit keys or other agreed upon key string to encrypt communications, thereby rendering the communication safe from eavesdropping. The socket, once established, is used in a two-stage authentication operation, including a first stage S3, in which the server authenticates itself to the connecting client. Server authentication is generally achieved using a system of signed certificates, for example the X.509 standard server certificate, to reassure the connecting device that it is communicating with a recognized and if need be traceable server. Once the server has authenticated itself to the device then the user is generally asked, stage S4, to provide a user name and password. This is preferably carried out using a standard dialog box. The username and password are compared with the server database and the server can then determine the connection privileges that the connecting device is entitled to. If stages 3 and 4 are negotiated successfully between the gateway and the device then the gateway notifies the PLMN that a connection is required, -stage S5. The PLMN responds in stage S6 by providing a SIM security triplet, a random number RAND, an expected response SRES from the SIM to the random triplet and a encryption key Kc. In the normal case of a SIM device, RAND is sent to the SIM, where it is used as the input to a one-way function. The SIM sends back the function output, which the base station compares with SRES. If the response matches SRES then the connecting device is authenticated. However, in the present case the connecting device is not a SIM device. Instead the PLMN subsystem 34, in stage S7, simply checks that the connecting device was successfully authenticated in stages 3 and 4 and then sends out an authorization response to the PLMN. The gateway takes on responsibility for encryption of data and voice in the subsequent communication using the key Kc, in stage S8. Voice is preferably always decrypted from the SSL at the gateway and may be subsequently re-encrypted using the A5 algorithm and the Kc key, according to the requirements of the PLMN network.
Advantages of the above-described embodiments accrue to the subscriber, to the LAN operator and to the PLMN or cellular operator. The subscriber attains all of the security supplied by a standard PLMN but can use a low cost device to connect or simply a device that happens to be conveniently available at the time, without needing any special hardware accessories. For the LAN operator he is able to provide a full set of connectivity services based on his own TCP/IP authentication technology. Finally, for the PLMN operator the embodiments provide a means by which the subscriber connecting through the LAN can be provided with a full set of services, assured that responsibility will be accepted by the LAN operator. Although the above examples have been described with GSM in mind, using a standard A or Gb interface, the embodiments are applicable in addition to GPRS, EDGE, WBCDMA, UMTS, 3G, CDMAone, CDMA2000, 3GPP, 3GPP2, PDC and other PLM standards. The above list is not exhaustive and it is contemplated that additional protocols will be added in the course of time to the PLMN landscape. The non-PLMN network may typically be a wired LAN, Bluetooth, 802.1 l(x) wireless LAN or the like. Although the above has been described in respect of SIMs and GSM, the same solutions apply to any system for cellular identity and/or security, and particularly including MIN and ESN in CDMA networks.
Examples: An example of the above would be a PDA using an 802.1 1 access card connecting to an 802.1 1 LAN, through which it is connected to the GSM or GPRS cellular network. According to the above embodiments, such a connection may be achieved without providing the PDA with a GSM compatible SIM.
Virtual SIM Reference is now made to fig 4C, which is a simplified comparative diagram showing an alternative embodiment for allowing non-PLMN devices access to a PLMN network. The approach is suitable when connection to the PLMN is only required for authentication and accounting puφoses, but no user traffic is exchanged between the access device and the PLMN. As explained above, in this approach, the end user access device is equipped with a virtual SIM. The simulated cellular node (either VBSC or VSGSN+) has an authentication database, where all the authentication information of subscribers with Virtual SIM (or other means simulating authentication tokens for cellular identities) is stored. The virtual SIM can be initialized or used with information where at least part of it is only valid for one access or access attempt, in several ways. Specifically, Mixed Network
Authentication, which is described hereinbelow, can be used to authenticate the initialization of the virtual SIM installed on the remote connecting device, and to associate the cellular identity with the authentication data stored in the simulated cellular node's database. A device equipped with a virtual SIM is authenticated by either a VBSC or a VSGSN, as described in detail below, which preferably resides between the non-PLMN network, and the PLMN network, and is able to create pseudo- triplets (rand, sres, kc) for virtual SIMs or their equivalent (MIN, ESN) in other networks. However, if this method is used, then the PLMN does not directly authenticate the user (i.e. does not verify that he has the SIM or equivalent cellular identity in his possession), but rather relies on the gateway. The gateway may then proceed to provide accounting information to the PLMN, or the accounting may depend on the non-PLMN, or both. The virtual SIM approach can be used for access devices when there is preference that they not include SIMs or other hardware based identifiers (smart card or equivalent), for non-PLMN to PLMN connectivity; or they may be used for non- PLMN to PLMN connectivity where the PLMN does not support integrated SIM based authentication- e.g. CDMA.
In this approach, a virtual (usually software) SIM is installed on the remote device. The remote device does not have a SIM. The SSG is replaced with a designated gateway that issues pseudo-triplets to the remote device. The gateway and the remote device share the virtual SIM secret key (which is stored in the simulated cellular node authentication database). The gateway uses it to generate the triplet (RAND, SRES, KC), and to issue GSM-like challenges to the remote device (i.e. RAND). The triplet can be generated by the same algorithm used by the GSM authentication protocol (i.e. A3 and A8), but is can also be generated by other algorithms (e.g. HMAC-SHA-1 or HMAC-MD5). The requirement being that the same algorithms will be used by the virtual SIM and the simulated cellular node (VBSC or VSGSN+). The remote device in its turn uses the virtual SIM to respond to the challenge, and sends SRES to the simulated cellular node (through the non-PLNM network). When the authentication process is completed successfully, then the end user access device and the simulated cellular node share a key (Kc), which is not known to others, just like in the GSM system. The end user access device and the simulated cellular node can use this key to encrypt traffic flowing between them. How ever this key cannot be used to encrypt traffic destined to the PLNM network, since the PLNM network doesn't have this key.
SIM or USIM can be implemented in this method. Unlike SIM - a software SIM can be cloned, so the authentication protocols that use virtual SIM include cloning detection mechanisms.
Virtual Base Station Controller (VBSC)
Reference is now made to Fig. 6, which is a simplified block diagram of a standard GSM network arrangement. A base station system (BSS) 40 supports remotely located mobile devices 42. It is connected via an MSC 44 to a circuit switched network, in this case the PSTN, and is connected via an SGSN 46 to a packet switched network, such as the Internet. The key point to observe is that the base station BSS interfaces to the MSC via the A interface for Circuit Switched connections and via the Gb interface for packet connections. These interfaces may be used, as will be described in detail below, by the VBSC so as to appear to the PLMN as any other BSS in the GPS network.
Reference is now made to Fig. 7, which is a simplified block diagram showing a non-PLMN network 48, interfaced by a virtual base station controller VBSC 50 to the GSM network of Fig. 6. Parts that are the same as those in previous figures are given the same reference numerals and are not referred to again except as necessary for an understanding of the present embodiment. The non-PLMN network 48 connects remote devices 52 via a series of access points 54 and has its own network servers in the way of any typical network. A SIM server 56 is shown providing a simulated SIM gateway, or a virtual SIM server authentication, of the kind described above. As with the standard base station of Fig. 6, the VBSC 50 uses the A interface for reaching circuit switched networks such as the PSTN and the Gb network for reaching packet switched networks. The VBSC (Virtual Base Station Controller), is functionally a Proxy Gateway between the non- PLMN Access Network (Bluetooth, 802.11, etc) and the PLMN. The VBSC connects to the PLMN over the A and Gb interfaces. These are the interfaces that the PLMN uses to communicate to a BSC and thus the VBSC appears to the PLMN as a BSC.
The VBSC 62 communicates with an access device 52, for example a PDA, or laptop using the non-PLMN network. The communication is made to a client application installed on the access device or on a network server, and is carried out using a communication tunnel based on TCP/IP or any other suitable standard protocol. Communication may be required by the VBSC to the SIM Server discussed above for authentication and encryption services. The end user access device might have a virtual SIM installed in it, and the SIM server can be a either a virtual SIM verifier, or it can be a simulated SIM gateway, as discussed above. The VBSC preferably also communicates with a packet data or circuit switched software client on the access device. The client is used by the subscriber to obtain the specific services that are requested such as Coφorate VPN, Internet access, Access to Servers within the Cellular Network or Voice interconnection.
The access device client application is typically a downloadable software only application, particularly when the access device is a PDA or Laptop computer. The VBSC 50 serves as an interface between the accessing, non-PLMN, network and the PLMN and preferably supports a wide range of functions that may be communicated over the A and Gb interfaces respectively. The VBSC initiates and responds to messages to and from the PLMN, and interacts with elements within the access network to perform these functions. Discussion of selected functions follows below.
Reference is now made to Figs. 8 and 9, which are respectively figures that show a simplified signaling plane for SIM services to the Gb interface, and a simplified signaling plane for SIM services to the A interface. The correct interfacing of security features between the PLMN and the non-PLMN network is a part of making the interface look like a PLMN base station (BTS) or base station subsystem (BSS). Figure 8 shows a series of mobile devices 52 connected via access points 54 to a wireless LAN network 60. The wireless LAN uses its own protocols, RF-based protocols including MAC for the client to LAN connections and other network protocols for the client to VBSC connection and within the network. VBSC 62 acts as a relay between the network protocol signaling and the PLMN signaling. Obtaining the correct signaling content requires either that the mobile components have internal SIMs or that a simulated SIM gateway of the kind discussed above is used.
The Gb interface 64 is used to transfer the signal between the VBSC and serving GPRS support node SGSN 66, from which standard access is obtained to the cellular infrastructure: authentication with the HLR over Gr, data tunneling to GGSN over Gn, accounting data to CGF over Ga, etc. A Gs interface 68 is used to transfer data with a mobile switching center MSC. It is noted that the VSGSN+ preferably always has a packet data interface towards the mobile interface; however towards the network it may use packet or circuit. That is to say, specifically the VSGSN enables the non PLMN Access Network to appear as both a SGSN for packet data and BSC for circuit switched data. Note that Fig. 8 only addresses the cellular protocol, therefore the Internet connection that may be used as the transport therefor. The SGSN 66 preferably serves as a relay between the Gb and Gs interfaces. It is noted that the MSC is concerned only with circuit switched data. Its equivalent for packet switched data is the SGSN.
Fig. 9 shows the authentication plane for circuit switched data. Parts that are the same as those in previous figures are given the same reference numerals and are not referred to again except as necessary for an understanding of the present embodiment. Fig.9 is identical to Fig. 8 except that the SGSN stage is omitted and the A protocol 70 is used to communicate directly between the VBSC 62 and the MSC 68. Reference is now made to Fig. 10, which is a simplified diagram showing a communication protocol plane for packet switched bearer services. Parts that are the same as those in previous figures are given the same reference numerals and are not referred to again except as necessary for an understanding of the present embodiment. A GPRS network server 72 is connected via the Gn interface 74 to the SGSN 66. For each element of the figure, the different available protocol layers are shown.
A data access client runs GPRS applications, typically including such things as WAP browsers. The communication path that is used is the same as in Fig. 8 above. Although not shown, applications can obtain access outside the PLMN GPRS network via the gateway GPRS support node GGSN 76 shown in Fig. 6. The data access client, as downloaded to the access device, may typically be assembled from standard GPRS software protocol elements, and may communicate via the TCP/IP tunnel to the VBSC. At the VBSC the transport layer is preferably replaced with BSSGP (BSS GPRS Protocol) to achieve compatibility with the SGSN. Also at the VBSC the Radio Link Control layer message is preferably supported as required by the BSSGP.
Reference is now made to Fig. 1 1 which is a simplified protocol block diagram showing the protocols involved at different elements in providing circuit switched services. The communication path is substantially that shown in Fig. 7 and parts that are the same as those in previous figures are given the same reference numerals and are not referred to again except as necessary for an understanding of the present embodiment. As mentioned above, after the access device has been authenticated it may be used for Packet Data connections or Circuit Switched connections. Fig. 1 1 illustrates the connection path for circuit switched services, with specific discussion of voice. As the skilled person will appreciate, fax and HS data are handled in an analogous manner.
For voice access the connecting device 52 preferably comprises a telephone keypad and display and supporting audio servers. If the device 54 is itself a telephone unit, such as a Bluetooth cordless telephone, then these features are inherent in the device and the client need only supply access to the data tunnel. If the device is a standard PDA or Laptop, then the client preferably includes a soft telephone keypad and display and preferably also includes audio support. Such features are standard today in IP telephone clients.
Speech is preferably vocoded with AMR (Adaptive Multi-Rate), the currently adopted standard in GSM PLMN. Such vocoding may be carried out either in the client or at the VBSC, each possibility having advantages and disadvantages as follows:
1. Vocoder in the Mobile
AMR vocoding in the access device has the advantage of lowering the LAN voice bandwidth, at the expense of significant processing demands on the access device to perform the vocoding and a time delay associated with re-frame synchronizing of the AMR packets at the VBSC. The Wireless LAN transport channel may generally be expected to cause the time delay that leads to the need for resynchronizing. Packets passing through the channel may experience fragmentation, but due to the vocoding, only when the full frame has been received and reconstructed can the VBSC send it to the MSC over the A interface.
2. Vocoder at the VBSC An alternate technique is to use at the client a so-called lighter weight vocoding technique of the type already in use for Voice over IP. At the VBSC the lighter weight coding is then preferably transcoded into AMR.
In the case in which the wireless LAN is Bluetooth based, vocoding may be dispensed with altogether at the client. This is because the Bluetooth Wireless LAN protocol supports a circuit switched channel that has been specifically designed for voice. It supports both 32 Kbps ADPCM and 64 Kbps PCM. If the Bluetooth voice channel is used, then the only vocoding that is required is at the VBSC.
A disadvantage with the schemes that place the Vocoder at the VBSC is that the Wireless LAN ends up carrying a significantly higher rate voice channel. This results in a loss of channel capacity, especially since this capacity must be guaranteed to maintain its real time characteristics.
As shown in the above figures, the VBSC 62 is installed at the LAN. It may however alternatively be installed alongside PLMN facilities, typically the carrier switching center. The advantage of the former method is that a VBSC failure may affect just one LAN. The latter case allows a single VBSC to serve numerous LANs, with consequent savings in cost, but a higher level of reliability is advised.
The VBSC provides a protocol bridge between the LAN and the cellular network, allowing the two to work together as an integrated whole. Thus, carriers can use non-PLMN networks (Bluetooth, 802.1 lb, etc) to offer subscribers 3G services that are not otherwise available, whether for reasons of available bandwidth or because the receiving devices do not have the sophistication to receive them. Thus for example most mobile telephones cannot accept any but the simplest images, whereas even the most elementary PDA, which can connect to the LAN network, can accept relatively sophisticated images. Subscribers may be offered a higher speed, richer experience from the non-PLMN networks themselves whilst at the same time having full access to standard voice and data services. Subscribers may additionally be provided with consolidated billing and service profiles with the standard PLMN network Carriers obtain a lower cost access network that allows them to lower price to their subscribers. Subscribers may be offered communications privacy over the network, in an integrated security mechanism such as the SIM gateway. Likewise simultaneous Voice and Data communication is provided. Virtual VSGSN Plus
In order for the interface between the non-PLMN and the PLM networks to be effective and to allow the non-PLMN part of the network to provide its own contribution to the user's experience, a feature known as virtual SGSN Plus
(VSGSN+) is provided to support Peer to Peer, Peer to Local Server and Peer to Off Network communications while interconnected with a PLMN network as if were an integral part of that network. Specifically the VSGSN enables the non PLMN Access Network to appear as both a serving GPRS support node (SGSN) for packet data and BSC for circuit switched data.
A standard serving GPRS support node (SGSN) is responsible for the delivery of data packets from and to the mobile stations within its geographical service area. Its tasks include packet routing and transfer, mobility management (attach/detach and location management), logical link management, and authentication and charging functions. The location register of the SGSN stores location information (e.g., current cell, current VLR) and user profiles (e.g., IMSI, address(es) used in the packet data network) of all GPRS users registered with the SGSN. The Plus in the name refers to the function that supports Circuit Switched Communication, which is not normally part of GPRS and thus not supported by a standard SGSN. In order to provide for such integrated activity, the interface is required to provide inter alia the following services:
Authenticate and register the subscriber,
Update the location of the subscriber (to support inbound messages / calls), Support subscriber generated service requests, Integrate activity into a consolidated bill, and
Provide a range of other supporting functions.
The Virtual Base Station Controller (VBSC), as described above, enables the above services, but does not in itself enable Peer-to-Peer, Peer to Server and Peer to Off Network communication. The VSGSN+ incorporates all of the VBSC functions with the addition of supporting Peer to Peer, Peer to Sever and Peer to Off Network connections. Returning now to Fig.6 and a key point to observe is that the BSS 40 interfaces to the MSC via the A interface for Circuit Switched connections. The SGSN 46 interfaces to the MSC/VLR 44 via the Gs, the AuC/HLR 78 via the Gr and the rest of the network elements via the Gn interface. These interfaces are used by the VSGSN+ so that it appears to the PLMN as both a standard BSS and a standard SGSN that would normally constitute part of the PLMN network.
Reference is now made to Fig.12, which is a simplified block diagram showing an overview of the VSGSN+ and how it fits into the network environment. Parts that are the same as those in previous figures are given the same reference numerals and are not referred to again except as necessary for an understanding of the present embodiment. A wireless LAN 48 has a SIM server 56 as before but additionally has a connection manager 80 and a local server 82, which latter carries media rich data specific to the LAN. The network is connected to a VSGSN+ unit 84 which interfaces between the LAN and the PLMN network in much the same way as the VBSC of previous figures.
The VSGSN+ 84 interconnects with the PLMN as if it were a standard SGSN; it may use an auxiliary A interface. The Gs and Gr and Ga interfaces are used to communicate to the MSC/VLR 44 and HLR 78 and CGF (not shown in picture) for such general PLMN network functions as Authentication, Registration, Service Profiles and traffic measurement including accounting, for example over the Ga interface to the CGF. By contrast, bearer data traffic flows over the Gn interface, to and from the carrier's IP cloud. While the different Gx interfaces are functionally different, they are physically located on the same transport media. Circuit switched voice control, and the respective bearer signal, is communicated, again through the VSGSN+, but via the A interface.
The non PLMN local network is equipped with Connection Manager 80, as mentioned above, to establish Peer-to-Peer and Peer-to-Local Server as well as peer- to-off network Servers. The Connection Manager 80 achieves these connections by supplying the VSGSN with the identification of the connected parties and the amount of data moved between the parties. The information is used by the VSGSN to format a Call Detail Record input. The format is one that the PLMN expects from a standard SGSN, and the Call Detail Record is required by the PLMN in order to perform its call management functions.
The VSGSN+ initiates and responds to messages from the PLMN, and interacts with elements within the access network to perform these functions. Reference is now made to Fig. 13, which is a simplified block diagram showing the protocols available at different parts of the LAN PLMN interface, particularly for use in authentication. The figure is the same as Fig. 8 except that the Gb interface is replaced by the Gs interface 86. The VBSC 62 is replaced by the VSGSN+ 84, which operates similarly as a bridge between the LAN protocols and the PLMN network protocols. More particularly, the figure shows the protocols involved when the VSGSN+ 84 interfaces between the PLMN's MSC/ VLR 68 and the LAN SSG for registration. Fig.13 concentrates on the packet switched side, i.e. data transmission. For voice etc.the interaction with the MSC over the A interface is similar. Reference is now made to Fig. 14 which is a simplified diagram showing the network and protocol environment of a data bearer PLMN server 90. The VSGSN+ interfaces between the LAN and the PLMN as for Fig.12 above.
In addition to direct Internet connection, if available, the access client 52 runs standard GPRS applications, which may typically include access to services on the cellular IP network for special email, video streaming, etc.,. Communication is via the data and protocol path shown in Fig. 14. Although not shown, applications can obtain access outside the PLMN GPRS network via the GGSN.
The data access client can be assembled from standard GPRS software protocol elements and may communicate over TCP/IP to the VSGSN+. Reference is now made to Fig. 15, which is a simplified diagram showing the circuit switched bearer services protocol and network environment. Again the VSGSN+ acts as an interface between the LAN 60 and the PLMN, this time connecting to the MSC 44 via the A interface. Issues of voice compression and vocoding are the same as described in respect of the VBSC above. Reference is now made to Fig. 16, which is a simplified schematic diagram showing the network protocol environment and illustrating packet data traffic management. As discussed above, the VSGSN+ 84 is intended to support non-PLMN Access Networks that can provide connection types including Peer-to-Peer, Peer to Server and Peer to Off Network. All of these connection types are preferably established and managed by the Connection Manager 80. The VSGSN+ obtains traffic management information from the connection manager node and formats it into message sets that are compatible with the PLMN format. As a minimum, Call Detail Records (CDRs), which have been mentioned above, are generated in this manner.
Fig. 16, shows the message flow for Packet Data services. Circuit Switched communication is handled in an analogous manner with the A interface replacing the Gs interface.
As for the VBSC above, the VSGSN+ can be installed at the Wireless LAN location or at the carrier-switching center. A trade off between cost and reliability applies as above. If a centralized VSGSN+ is used it should preferably have a high level of availability. In the case where multiple non-PLMN Access Networks are in close geographical proximity, a centralized VSGSN+ will most likely be the preferred approach.
In addition to the advantages described above in respect of the VBSC, the VSGSN+ provides support for Peer to Peer, Peer to Server and Peer to Off Network communications, without loss of visibility or control by the PLMN.
VSGSN+ Summary
The VSGSN+ carries out the following tasks:
(1) authentication of the mobile using the appropriate means for the mobile in question, whether it has a SIM or not, using standard or proprietary means, which in some cases may require VSGSN+ to interface the HLR; this is what Gr is for; and
(2) impersonation of a standard mobile towards the network, going through the A or Gs interface if it is to connect to the MSC for circuit switched data, using Gb if it is to connect to a standard SGSN for packet data, even using Gn if it takes the role of SGSN and connects directly to a GGSN (the Gn interface, which is really a tunnel carrying whatever data the mobile is exchanging). It is noted that the VBSC is a particular case of the more general one of the VSGSN+.
Handoff The handoff aspect of the present invention adds the concept of handoff to the control of communication in multiple wireless networks not presently having this capability. Effective handoff allows the user to obtain all of the benefits of a wireless LAN when he is within range but still to be mobile, in that the connection is retained when he moves out of range, either by connecting to another wireless LAN or by connecting directly to the PLMN network if he has a suitable client.
In order to provide an overall solution, five different general cases are considered as follows, with subcases for each:
1. Intra Hot Spot handoff a) Between overlapping Wireless Networks (WNs) operating with the same technology b) Between non-overlapping WNs operating with the same techology c) Between overlapping WNs operating with different technology
2. Inter Hot Spot handoff a) Between overlapping Hot Spots operating with the same or different technologies b) Between non-overlapping Hot Spots operating with the same or different technologies
3. Inter wireless wide area network (PLMN) handoff a) Between overlapping PLMNs operating with different technology b) Between non-overlapping PLMNs operating with different technology 4. Handoff between wireless local and wide area networks a) Handoff from local to wide area network b) Handoff from wide to local area network
5. Expansion of the handoff concept for connection and reconnection to the WWAN (cellular, GPRS) network through a wireline network e.g. Internet
Conceptually, the following cases are covered by the handoff aspect of the present invention:
1. Handoff may be commanded by a Network Controller entity or initiated by the User unit 2. The network maintains a strong session logic that takes into account handoff and temporary drops in communication. The session may be continued after communication is established on the new network. The system is able to determine that the user has dropped from one network and joined another one and is then able to resume the session that was interrupted. Alternatively, the user unit informs the network that it is resuming an interrupted session
3. Hard handoff or soft handoff may be supported. In the case of soft handoff there is no interruption, and connection with the new network is established while communication is still in effect with the original network
4. Hand off may be dealt with by the AP communication protocol (the medium access control or MAC). This may require modification of the existing protocols. If this option is not available, system logic may support controls outside the MAC to initiate communication with another AP and then re-establish the session. Although neither AP knows that a handoff has occurred, the AP that has been supporting communication up till now preferably reacts as if the user has dropped off the network. At the same time the AP to which communication has been transferred preferably reacts as if a new user (and new session) has accessed its network.
5. The logic preferably supports all or a subset of a system including:
Multiple Hot Spots; each Hot Spot may comprise one or several APs. Hot Spots may operate using the same or different local area technologies or connection protocols, e.g. 802.1 lb, Bluetooth, etc.and one or more wide area technologies or communication protocols e.g. GPRS, CDMA2000, Reflex
6. The logic preferably determines a priority order of search to determine when handoff is required between APs of the same technology;
APs of different technology; Local area and wide area technology; and Different wide area technologies.
The mobile unit preferably connects through a logic entity designated the Service Controller that is responsible for the maintenance of the mobile communication sessions. These sessions are independent communication entities between the mobile and another party or service, defined as the remote or far end of the session (the mobile being defined as the near end). The Service Controller may support services that from the remote end may seem to be circuit switched or packet switched, voice/ data voice over data, real and non real time. The puφose of the handoff is thus to ensure the continuity of these sessions when the mobile changes its access channel.
The session is defined within any protocol, standard or non-standard, that is common to the mobile unit and to the Service Controller, including but not limited to IP-based protocols. The session is implemented as a layer above the communication between the mobile unit and the access channel it is presently using, be it a wireless Wide Area Network (WWAN), a Wireless Local Area Network (WLAN), Internet, intranets, PSTN, etc. Thus the networks addressed within the present embodiments include among others PLMNs (including GPRS, EDGE and CDMA cellular data), the various 802.1 1 WLANs, Bluetooth, ISDN, X.25, Frame Relay, etc.
Multiple types of handoff are discussed below. For the puφose of clarification of the concepts, each definition addresses a specific case, e.g. handoff between WLAN and WWAN. It is stressed upfront that in practice a complex handoff logic, including one or more of the methods defined above, may be operated within the same mobile unit and activated as the need arises. For example, a mobile losing communication within a WLAN may be trying to perform handoff to another Wireless Network within the same WLAN Hot Spot as well as looking for a possible handoff to a WWAN, so when more than one course of action is feasible, the mobile, its Service Controller or even the Hot Spot Controller is able to select for use the handoff with the highest priority or benefit.
Continuity of service is ensured for multiple cased of networks that are not integrally equipped with handoff or handoff capabilities. This continuity is implemented by performing handoff at a layer above the communication of the networks. Details of the implementation vary according to the type of wireless networks supported by the handoff.
Reference is now made to Fig. 17, which is a simplified schematic diagram showing two local wireless networks WNl and WN2 overlapping in their coverage area, and both being controlled from the same Hot Spot Central Point 100. The first Wireless Network, WNl, comprises an Access Point API which controls four subscriber units SU1 - SU4. The second wireless network WN2 has an Access Point AP2 which controls two subscriber units SU5 - SU6. Mobile subscriber (MS) unit SU4 is currently being served by API, i.e. it is part of WNl. When communication conditions within WNl become unacceptable, either because of degraded signal reception at SU4 or API (e.g. due to mobility and interference) or if the load within WNl happens to be too high, a handoff process is carried out in which SU4 becomes part of WN2 and the same session SU4 that was being conducted through WNl continues now via WN2.
Reference is now made to Fig. 18, which is a simplified schematic diagram showing a local wireless network 110 operating within the coverage area of a wide area network 1 12. The local Wireless Network 110 comprises an access point (AP) 114 from which it is assumed to be controlled, although, in the alternative, it may be controlled from a Hot Spot Central Point as depicted in Fig. 17. The Wide Area Network 1 12 is controlled from a WAN Center 1 16. Several subscriber units SU operate within each network. A specific subscriber unit SU5 is transitioning between the two network, i.e. it has been operating within the WAN 112 and transfers to the WN 1 10 or vice versa. Several solutions are proposed for the implementation of this handoff while maintaining the sessions of the wireless subscribers operating within the networks. The solutions are intended to support a wide range of mobile and network capabilities. It is pointed out that the solutions hereindescribed, whether they address hard or soft handoff, may be implemented on a time division basis, supporting sharing of resources to reduce cost of hardware and thereby to minimize interference typical of the implementation of more than one radio within a single mobile unit.
Solution 1- Intra Hot Spot handoff between overlapping Wireless Networks - same technology
1. Brute force switching of wireless network communication with continuity at the session level.
Reference is now made to Fig.19, which is a simplified flow chart showing the handoff between interlapping wireless networks which use the same technology.
When either network or mobile identify communication conditions are unacceptable, the respective party drops the communication. The user device may just drop and switch to another wireless network, or the AP may comprise a stopping service which actively drops the user. In both cases, the MS attempts to join another network, in this case WN2. Once communication is re-established, the Central Point logic determines that there is a pending (waiting or interrupted) session with the user device and the pending session is automatically re-joined. When implementing distributed Central Point logic (CP logic within the AP), the AP controlling the accepting wireless network is informed of the pending session of this MS by either one of push or pull logic. In the push case the AP of the previous serving wireless network takes the initiative of informing the AP of the receiving wireless network ( and potentially other neighbor wireless networks) of the pending session; the pull case means the AP of the receiving wireless network requests information on the pending sessions of the MS that joined the new network.
2. Hard network controlled handoff with no local wireless mobile assistance
Reference is now made to Fig. 20, which is a simplified flow chart showing how handoff is carried out without assistance from the mobile devices. In this implementation, secondary receivers within neighbor wireless networks measure reception from the user that may require to be handed off. The secondary receiver may be a separate receiver or may simply comprise some time slots allocated for this puφose within the regular AP receiver work plan.
The decision to hand off the mobile from one WN to another is now determined by the CP, in case of the centralized logic, or by the servicing AP and the APs of the candidate receiving WNs. If this logic determines one of the candidate receiving WNs may provide improved communication service, per its measured mobile to AP communication characteristics and its loading conditions (either one or both), the handoff takes place.
The mobile is handed off from the servicing WN to the receiving WN in one of two ways: a) If the mobile is capable of accepting wireless network selection controls, it is commanded to hand off to the selected (receiving) WN, including if possible transfer of the WN communication parameters to speed up the hand off process; b) If the mobile is not capable of accepting wireless network selection controls, it is dropped off the servicing WN by refusing service; then the mobile tries to log onto another WN, and only the selected (receiving) WN accepts its attempts to join the network
3. Mobile assisted hard network controlled handoff In this implementation, the local wireless mobile searches additional channels to measure and determine communication conditions of other networks and sends this information to the AP. The network architecture may be either centralized or distributed, the AP accordingly either maintaining the information locally or sending it to the CP. The local wireless mobile searches additional channels when any one of the following conditions are met: a) The mobile is programmed to perform the search at regular intervals and the end of the interval is reached. The search interval may be preprogrammed or controlled through AP transmissions. b) The mobile is commanded by the AP to search additional channels. This will typically occur when the AP determines a handoff may be required. c) The mobile is commanded by the CP or distributed CP logic to search additional channels. This search may be required to support analysis of current Hot Spot communication conditions, and allowing reallocation of WNs if necessary or for testing puφoses.
The CP (or distributed CP logic within the AP) then determines which is the best WN the mobile may be handed off to. This decision is based on the reported communication conditions, the loading conditions of the WNs and the services required by the mobile. The AP controlling the WN is then notified.
The mobile is handed off from the servicing WN to the receiving WN in one of the two ways discussed with reference to Fig. 20: a) If the mobile is capable of accepting wireless network selection controls, it is commanded to hand off to the selected (receiving) WN, including if possible transfer of the WN communication parameters to speed up the hand off process; b) If the mobile is not capable of accepting wireless network selection controls, it is dropped off the servicing WN by refusing service; then the mobile tries to log onto another WN, and only the selected (receiving) WN accepts its attempts to join the network
4. Mobile controlled hard handoff.
In this implementation, the local wireless mobile searches additional channels when (i) the quality of service it is getting is not satisfactory, or (ii) when it receives a command to hand-off to a better channel in a different WN.
The mobile then performs the search and measurement of all wireless networks it can receive and determines which is the best one to switch to. The criteria to determine best WN to switch to may include measuring of communication characteristics as well as network loading. The mobile then drops off the WN that has been servicing it. The option is retained for the mobile to send a notification before dropping off the WN in order to speed up the handoff process.
After dropping off from the current servicing WN, the mobile attempts to join the WN it has selected for handoff. The system may identify that the mobile has been handed off from its current servicing WN to a new one and ensures that it resumes its session or sessions through the new WN.
Although in the preferred embodiment of the handoff method no network assistance is required, the option is retained to implement the handoff as described with network assistance. Network assistance may be provided for any of the following:
(i) identification of acceptable neighbor WNs i.e. provision of their communication parameters, for example to prevent attempts to log into WNs that belong to other systems; (ii) information on loading conditions or other availability parameters of neighbor WNs; and
(iii) information on expected loading conditions of the servicing WN.
5. Network commanded, mobile controlled hard handoff Reference is now made to Fig. 21, which is a simplified flow chart showing a method for implementation when the network control, either residing in the CP or in the AP, determines that the servicing WN cannot support the mobile service communication conditions. Network control may or may not determine potential neighbor networks that have the capability to support service; if this capability is determined, network control (through the AP communications) sends information on the communication parameters of available WNs to the local wireless mobile.
The mobile then searches for other WNs that may support its service requirements. In the preferred embodiment of this method, the mobile unit time multiplexes its search of neighboring networks with its communication within the service WN, thus minimizing the handoff service impact. When this is not feasible, an optional embodiment is retained wherein the mobile drops servicing network access and searches for neighbor WNs. In both embodiments the mobile may use data previously provided by the network or engage in a blind search.
Based on this search, the mobile determines which WN it will hand off to and attempts to access this WN. If the mobile does not succeed in accessing the selected WN, the mobile attempts to access the next best WN according to its search results, and so on.
After access is successfully completed, network control recognizes that this is a resumption of a previous session or sessions ensuring continuity of the session.
6. Soft handoff
Four of the previous five methods described above with hard handoff may also be implemented using "soft" handoff. The term "soft" handoff as used herein refers to maintaining seamless continuity of communication when transitioning from one WN to another, with no impact whatsoever on the sessions active within the local wireless mobile including those that depend on time bounded continuity of communication.
Soft handoff as supported by the present embodiments may be implemented by establishing communication between the mobile unit and the second AP before dropping it from the presently serving AP. As an alternative it may be achieved by switching WNs fast enough so there is no discontinuity in session communication. Soft handoff may for example be achieved if the secondary AP uses a slot designated for outward transmission in which it in fact listens to the present mobile unit. In the reverse case in which the mobile unit is taking the initiative, the mobile may use slots designated for it to transmit to listen to an active neighbor system.
Several methods are discussed hereinbelow to implement soft handoff within a WN. a) Soft network controlled handoff with no local wireless mobile assistance
In this implementation, secondary receivers within neighbor wireless networks measure reception from the user that may require to be handed off. The secondary receiver may be a separate receiver or some time slots allocated for this puφose within the regular AP receiver work plan.
Network control provides accurate parameters of the new serving AP to the mobile and handoff controls to the new serving WN so there is no interruption in service.
b) Mobile assisted soft network controlled handoff
In this implementation, the local wireless mobile searches additional channels to measure and determines communication conditions of other networks and sends this information to the AP, which depending on the centralized or distributed architecture maintains the information locally or sends it to the CP.
The HS network control (centralized or distributed) now selects the new serving WN based on the information provided by the mobile and the operational status of its WNs. Network control provides accurate parameters of the new serving AP to the mobile and handoff controls to the new serving WN.
In order to ensure uninterrupted communication, the mobile now establishes communication within the new serving WN without disconnecting its old WN communication. Once communication is established, the mobile drops off the WN that has been servicing it. A variation allows the mobile to send a notification before dropping off the WN. c) Mobile controlled soft handoff.
In this implementation, the local wireless mobile searches additional channels when (i) the quality of service it is getting is not satisfactory, or (ii) when it receives a command to hand-off to a better channel in a different WN.
The mobile then performs the search and measurement of all wireless networks it can receive and determines which is the best one to switch to. The criteria to determine best WN to switch to may include measured communication characteristics as well as network loading (either/ or). The mobile then notifies Network Control as to which WN it selected for the handoff and waits either for an acknowledgment or a time out to expire, upon which it establishes communication with the new WN without disconnecting from the present WN. After communication is established, the mobile drops off the WN that has been servicing it. The option is retained for the mobile to send a notification before dropping off the WN. d) Network commanded, mobile controlled soft handoff
This method is implemented when Network Control, either residing in the CP or in the AP, determines that the servicing WN cannot support the mobile service communication conditions. Network control may or may not determine potential neighbor networks that have the capability to support service; if this capability is determined, network control (through the AP communications) sends information on the communication parameters of available WNs to the local wireless mobile.
Once the mobile is in possession of the potential WNs, the process continues as in the previous case (mobile controlled soft handoff)
Intra Hot Spot handoff between non-overlapping WNs operating with the same technologyReference is now made to Fig. 22 which is a simplified schematic diagram depicting two non-overlapping WNs within the same Hot Spot, and connected to a single central point 100. The Hot Spot may include additional WNs. When a unit drops off the communication of a WN, and at the same time the communication conditions do not allow it to establish communication with another WN, it is assumed that the user is not within coverage area of the Hot Spot. It could be that the Hot Spot is in fact covering the unit but is not presently capable of supporting it, however this case is preferably handled in the same way as if the unit is not within the coverage area. In this latter case the unit is preferably not treated as if it has dropped off the network. Rather, for the duration of a time out that may be constant or configurable, the logical communication of the unit may be held off or frozen. The time out may be defined differently for circuit switched communication and for packet communication, or for voice and data. Upon expiration of the time out, the communication with the unit mayl be assumed to be lost.
If, while the communication continues, the unit accesses another WN, the Hot Spot control preferably immediately treats it as in the first handoff case defined above (brute force switching of wireless network communication with continuity at the session level).
Intra Hot Spot handoff between WNs operating with different technology
A further embodiment is also described by Fig. 22, the difference being that in this case the WNs are operating with different technologies, e.g. 802.1 1 b WLAN (Wi- Fi) and Bluetooth respectively. Since different technologies are involved, it makes no difference whether the WNs are overlapping or not; the assumption is that the unit hands off communication from one WN before establishing communication within the other WN. Preferably,handoff is carried out in much the same way as between overlapping WNs operating with the same technology and as described in detail above.
As before, the unit is not treated as if it has dropped off from the network. Rather, for the duration of a time out that is either constant or configurable, the logical communication of the unit is held off or frozen, that is the session is held pending. The time out may be defined differently for circuit switched communication and for packet communication, or for voice and data. Upon expiration of the time out, the communication with the unit is assumed to be lost.
The communication is by definition lost and a new communication is re- established. The Hot Spot controller, or any connection logic above it, checks the pending session of the user unit establishing communication. If the Hot Spot connection logic succeeds in associating the mobile unit with a communication (one or more sessions) that is being held, the Hot Spot control immediately treats it as in the handoff case defined above for brute force switching of wireless network communication with continuity at the session level, and the session or sessions are reestablished within a short time without data loss.
Intra Hot Spot handoff between overlapping Hot Spots operating with same or different technologies
The hand-off embodiments defined above may be expanded to include scenarios in which the mobile unit, rather than accessing a new WN controlled by the same Hot Spot, accesses a WN belonging to a different Hot Spot, as depicted in Fig. 23 for overlapping WNs and Fig. 24 for non-overlapping WNs.
In the case of Fig. 24 (overlapping WNs), handoff is treated in much the same way as that described for handoff between WNs in the same Hot Spot. All handoff techniques mentioned thereinabove apply to this case as well for both hard and soft handoff.
Intra Hot Spot handoff between non-overlapping Hot Spots operating with same or different technologies
An embodiment is provided for the scenario of intra hot spot handoff in which the hotspots are non-overlapping. Such a scenario is illustrated in Fig. 24 which shows a hot spot controller 110 and two non-overlapping hot spots HS1 and HS2. Inside each hot spot is a wireless LAN, respectively WNl and WN2. The hot spots may use the same or different technologies. The embodiment operates in a similar manner to the case of non-overlapping WNs within the same Hot Spot, as discussed abov e in respect of Fig. 23, and is characterized by a temporary loss of communication when the unit is out of coverage of any WN.
The solutions discussed above may also be applied to the scenario of Fig. 24. The Hot Spot controller 1 10, which is any entity controlling both Hot Spots, or at least exchanging information between the Hot Spots, ensures that the mobile unit sessions remain frozen, that is to say pending, but not lost. Alternatively, the Hot Spot that last serviced the mobile unit maintains the sessions in a frozen state. Maintaining the session open may be performed by not providing indications that the communication with the mobile is lost. Other parts within the system may ensure that as long as no such information is provided, and at least for the duration of the required timeout, the sessions may actually be maintained in this frozen state.
Refering now to Fig. 24, it is assumed that the mobile M was last serviced within wireless network WN 1 , which is located within Hot Spot 1. After the mobile M loses communication or service within WNl , then when it subsequently comes within the coverage of WN2 in Hot Spot 2 it establishes communication within this wireless network. The information regarding this communication establishment is sent to the Hot Spot Controller 1 10, whether the controller is implemented as centralized or distributed processing. A search is then performed to determine whether there are frozen sessions for the mobile M. If a frozen session is found, it is re-established ensuring no loss in communication. The optional communication techniques supporting this handoff process are the same as for the case of the handoff between WNs of the same Hot Spots.
The present embodiment thus ensures that the transfer between WNs of the same Hot Spot or between different Hot Spots maintains the same seamless properties.
Inter-PLMN handoff between overlapping PLMNs operating with different technology
Reference is now made to Fig. 25, which is a simplified schematic diagram illustrating handoff between overlapping PLMNs, which is to say two cellular networks. Two PLMNs, PLMN1, 120 and PLMN2, 122,overlap. Each has a an access point 124 and 126 respectively, and the access points lead eventually to a common logic controller 128.
An embodiment which is now to be described with reference to Fig. 25 addresses a way of improvement in providing service to a mobile unit that is capable of reception from two PLMNs covering the area where it is presently located. That is either that the two PLMNs use the same technology or the mobile unit is capable of connecting using two technologies.
The mobile M, using data communication (including voice over IP VoIP) is currently being serviced by PLMNl, 120. The quality of service becomes unacceptable, and the mobile is instructed to search, or searches on its own, for an alternative service. The result of the search indicates it may be serviced by PLMN2, 122.
In accordance with the present embodiment, the mobile unit is preferably serviced by Service Controller 128. The Service Controller is typically operated by a different service than the PLMNs, although in some cases it may actually belong to one of the PLMN carriers. As explained below, embodiments are provided both for immediate continuity of service if the mobile, which is possible provided that the mobile unit is equipped to maintain simultaneous communication with both PLMNs, and for the simpler case where the mobile drops communication with PLMNl and subsequently establishes communication with PLMN2.
When the service provided to the mobile within PLMNl becomes unacceptable, whether due to poor communication conditions, loading or any other conditions within PLMNl , the unit searches for an alternative service. The Service Controller freezes the mobile ongoing sessions to a maximum duration of a pre-set time out that may be constant or configurable. The logical communication of the unit is thus retained or frozen while physical communication is not operational or is being re-established. The time out may be defined differently for voice and different types of data. Upon expiration of the time out, the communication with the unit is assumed to be lost. The following optional techniques are proposed for the handoff between
PLMNs:
1. Brute force switching of wireless network communication with continuity at the session level.
When PLMN, Service Controller or mobile unit identify communication conditions as being unacceptable, the respective party drops the communication. Communication drop by the Service Controller is preferably either by sending a control signal to the mobile unit or by disrupting the session flow to the point at which it causes the mobile unit to determine that communication must be switched. The mobile unit may then just drop communication and look for another PLMN to switch to, or the PLMNl stopping service effectively drops the mobile unit. In both cases, the mobile unit finds that another PLMN is active in the area and attempts to join its network, in this case PLMN2. Once communication is re-established, the Service Controller identifies that there are one or more pending sessions with the reconnecting mobile unit and the session (or sessions) thus identified is automatically re-joined. An alternative embodiment utilizes Service Control logic residing within the
PLMN. In this case, the PLMN accepting the mobile finds out by contacting PLMNs operating within the area whether the mobile has been serviced lately and there are pending (frozen) sessions; alternatively, a PLMN maintaining an open session may inform neighbor PLMNs.
2. Mobile assisted hard network controlled handoff
In a further embodiment, the mobile searches for and identifies the operation of another acceptable PLMN before dropping the PLMN where it is presently connected or active. The mobile then sends this information to the Service Controller or to another entity controlling the logic of its physical communication. This entity then instructs the mobile to switch to the new PLMN if it is determined to be acceptable per defined logical criteria (business relationship, loading conditions, mobile subscription contract, etc.)
The local wireless mobile unit searches for coverage by another PLMN when any one of the following conditions are met: a) The mobile unit is programmed to perform the search regularly. The search interval may be pre-programmed or controlled through Service Controller or Communication Logic controller commands. b) The mobile is commanded by the Service Controller or Communication Logic Controller to search additional channels. This may typically occur when the latter determines that a handoff may be required.
The Service Logic (or equivalent communication control logic) may then determine whether the mobile unit is in condition to actually be handed off to another PLMN. Such a decision is based on the reported communication conditions, the loading conditions of the candidate PLMN and the services required by the mobile. The PLMN may be notified if such a handoff is deemed worthwhile.
The mobile is preferably handed over from the servicing WN to the receiving WN in one of two ways as follows: a) If the mobile is capable of accepting wireless network selection controls, it is commanded to hand over to the selected (receiving) PLMN. Such a handoff preferably includes transfer of the PLMN communication parameters to speed up the hand over process; b) If the mobile is not capable of accepting wireless network selection controls, it is dropped off the servicing PLMN as a result of the network refusing it service. The mobile then tries to log onto another PLMN, and only the selected network accepts it.
3. Mobile controlled hard handoff. In a further embodiment, the local wireless mobile searches for alternative
PLMN coverage when
(i) the quality of service it is getting is deemed not to be satisfactory, or
(ii) when it receives from the Service Controller 128 or similar communication control logic a command to hand-over to a better communication service. The mobile then performs the search and measurement of all PLMNs it can detect and determines which is the best one to switch to. Possible criteria for determining which is the best PLMN to switch to may include measured communication characteristics or any other relevant parameters that may be provided by the particular PLMN. The mobile drops away from the PLMN that is currently servicing it. In a preferred embodiment the mobile unit sends a notification before dropping off the PLMN in order to speed up the handoff process.
After dropping off from the current servicing PLMN, the mobile unit attempts to join the PLMN that it has selected for handoff. The Service Controller 128 identifies that the mobile unit has been handed off from its previous servicing PLMN to a new one, typically by matching it to a pending session as before, and resumes its session or sessions through the new PLMN.
In one preferred embodiment of the above-described handoff method no network assistance is required. In an alternative embodiment, however, network assistance is used. Network assistance may be provided typically for any of the following:
(i) identification of acceptable neighbor PLMNs i.e. provision of their communication parameters, for example to prevent attempts to log into PLMNs known to be operational within the area but not acceptable because of other constraints; (ii) information on loading conditions or other availability parameters of neighbor PLMNs; and
(iii) information on expected loading conditions of the servicing PLMN.
4. Network commanded, mobile controlled hard handoff
A further embodiment encompasses a hard handoff that is network commanded but controlled by the mobile unit. The embodiment is implemented when the session control, either residing in the Service Controller 128 or other communication control logic, determines that the servicing PLMN cannot support the mobile service communication conditions. Network control may or may not determine potential availability of neighboring networks that have the capability to support service. If such a capability is identified, then the network control preferably sends information regarding communication parameters of candidate PLMNs to the local wireless mobile unit. The mobile then searches for other PLMNs that may support its service requirements. In the preferred embodiment of this method, the mobile unit time multiplexes its search of neighbor networks along with communication within the servicing PLMN, thus minimizing the handoff service impact. When handoff is not feasible, an option is for the mobile unit to drop servicing PLMN access and search instead for neighbor PLMNs. In both embodiments the mobile may use data previously provided by the Service Controller network or it may engage in a blind search.
Based on the search, the mobile determines whether it may perform handoff to another PLMN and attempts to access this PLMN. If the mobile does not succeed in accessing the selected PLMN, the mobile attempts to access the next best PLMN as indicated by its search results, and so on.
After access has been successfully completed, the Service Controller recognizes that the connection is in fact a resumption of a previous session or sessions, and is thereby able to ensure continuity of the session.
5. Soft handoff Three of the previous four embodiments described above that use hard handoff may also be implemented using soft handoff. As mentioned above, the term "soft handoff as used herein refers to maintaining seamless continuity of communication when transitioning from one PLMN to another, with no impact whatsoever on the sessions active within the local wireless mobile, including those that depend on time bounded continuity ofcommunication. That is to say, there are time bounded communication limitations e.g. tcp and time bounded applications e.g. streaming. The point about soft handoff is that no sessions are frozen, therefore no degradation in service is perceived. Soft handoff as supported by the present embodiments may be implemented by establishing mobile unit communication with the second PLMN before dropping communication with the current serving PLMN. Alternatively it may be achieved by switching PLMNs fast enough so there is no discontinuity in session communication. To support the latter conditions, the Service Controller 128 may advance data to the mobile unit. The advance data may be buffered to maintain the service during handoff. Mobile logic may also switch to a degraded mode that requires less data, extending the time supported by the buffer for continuous service as perceived by the user of the mobile unit.
The handoff may be soft if common service is available among both PLMN networks, at least in the direction of transition of the mobile, so that the candidate PLMN may use its own resources to listen to the mobile unit before the handoff actually occurs; or conversely, when the mobile is taking charge of the soft handoff, then the mobile unit is able to use its own resources to monitor the neighboring PLMN whilst still connected to the first PLMN. Several methods are represented by the following embodiments to implement this soft handoff: a) Soft network controlled handoff with no mobile assistance
In this embodiment, secondary receivers within the neighbor (candidate) PLMN measure reception from the mobile after it has been notified by the Service Controller of that mobile that it may require to be handed over. The secondary receiver may be a dedicated receiver, may comprise temporarily available resources or simply some time slots allocated for this puφose within the PLMN work plan. The Service Controller provides parameters of the new PLMN to the mobile unit so there is no interruption in service. b) Mobile assisted soft PLMN handoff
A further embodiment comprises a soft handoff from PLMN to another with assistance from the mobile unit. In this embodiment, the mobile searches additional channels to measure and determine communication conditions of other PLMNs and sends the information to the Service Controller or similar Communication Control logic.
The Service Controller or similar Communication Control logic, whether centralized or distributed, now selects the new serving PLMN, based on the information provided by the mobile unit and the operational status of the PLMNs. Preferably, the PLMNs provide such status information to the Service Controller/ Communication Logic supporting the mobile.
The Service Controller then provides parameters of the new serving PLMN to the mobile. Additionally, the service controller provides handoff controls/ indications to the new serving PLMN, if the latter is capable of accepting them.
In order to ensure uninterrupted communication, the mobile unit now establishes communication within the new serving PLMN without disconnecting its old PLMN communication. Once communication is established, the mobile drops off the old PLMN. In a variation, the mobile unit sends a notification before dropping off the PLMN. c) Mobile controlled soft handoff.
A further embodiment involves soft handoff from one PLMN to another under full control of the mobile unit, by contrast to the previous embodiment which was merely mobile assisted. In the embodiment, the mobile unit itself searches for channels of additional PLMNs when
(i) the quality of service it is getting is not satisfactory and it cannot get better service within the present PLMN, or
(ii) it receives a command to hand-off to another PLMN. The mobile then performs the search and which involved making a measurement of all wireless networks it can receive. From the measurements it determines which is the best network to switch to. The criteria to determine the best PLMN to switch to may include measured communication characteristics as well as network loading, if broadcast or available from the Service Controller.
The mobile then notifies the Service Controller/ Communication Logic 128 which PLMN it has selected for the handoff and waits either for an acknowledgment or a time out to expire, at which point it establishes communication with the new PLMN without disconnecting from the present PLMN. After communication is established, the mobile unit drops off the PLMN that has been servicing it. In a variation, the mobile sends a notification before dropping off the PLMN. d) Network commanded, mobile controlled soft handoff
A further embodiment encompasses a network commanded handoff which, once commanded by the network is fully implemented under control of the mobile unit. The method is implemented when the mobile Service Control/ Communication Logic Controller determines that the servicing PLMN cannot support the mobile service communication conditions. Service Control may or may not determine potential neighbor PLMN networks that have the capability to support service. If a capability is determined, then the Service Control sends information on the communication parameters of available PLMN to the local wireless mobile.
Once the mobile is in possession of the candidate PLMNs, the process continues as in the previous mobile controlled soft handoff embodiment.
It is noted that the above PLMN concepts may be expanded to any type of wireless wide area network (WWAN). Such expansion is contemplated within the scope of the present invention.
Inter-PLMN handoff between non-overlapping PLMNs operating with different technology
Reference is now made to Fig. 26, which is a simplified schematic diagram illustrating two non-overlapping PLMN networks having a common service/communication logic controller. Two networks, PLMN 1, 130 and PLMN2, 132 each have respective access points 134 and 136. A mobile unit 138 is at the edge of PLMNl coverage, and PLMN2 has coverage within the vicinity but without any actual overlapping. For practical purposes it could be that the PLMNs have overlapping coverage within some area that does not include the present MS location, but this does not affect operation as far as mobile unit 138 is concerned. Logic controller 140 is located at a point accessible from both PLMN networks.
The embodiment for dealing with handoff in the case of Fig. 26 is a particular case of the overlapping PLMN handoff.
Once the mobile MS drops off its communication with a PLMN, in this example PLMNl, its sessions are held off (frozen) by the Service Controller 140. The Service Controller freezes the ongoing mobile sessions for up to a preselected maximum duration. Thus, logical communication of the mobile unit will be held off or frozen while the physical communication is not operational or is being reestablished. The maximum duration may be defined differently for voice and different types of data. Upon expiration of the time out, the communication with the mobile unit 138 is assumed to be lost.
At the time communication with the current PLMN is lost, typically per logic in the mobile unit, it searches continuously or intermittently for an alternative PLMN service. When it comes into the coverage area of another PLMN, in this example PLMN2, it establishes communication with it. The mobile communication is routed to its Service Controller 140. Depending on implementation details, this may be implemented automatically within the PLMN, however within the preferred embodiment the mobile unit provides the address of its Service Controller 140 after joining the PLMN network.
The handoff process is thus implemented in the present case at the session level, without involving the PLMN. When the mobile unit re-establishes communication with the Service Controller 140, the latter looks up any sessions that are still pending for the mobile, i.e. those sessions whose time out has not expired and were not disconnected by the party with which they were held. Those sessions are now allowed to continue, and there is preferably no loss of data in either direction. It is pointed out that the session handoff is applicable to numerous data communication protocols; which may be IP-based or may use any other basis that is common between the mobile and its Service Controller. The only requirement is that the mobile be able to achieve communication with the Service Controller through the PLMN that it is presently communicating through.
Handoff between wireless local and wireless wide area network
Further embodiments concern handoff between wireless LAN and WAN. More particularly, additional embodiments of this invention address handoff for service optimization for dual mode mobiles capable of accessing a wireless wide area network such as a PLMN (e.g GPRS) on the one hand and a Hot Spot a location supported by one or more wireless local network such as a 802.1 1 WLAN or a Bluetooth, the local network being serviced by one or more Access Points. These wide area and local area modes are referred to herein using the term "communication modes". The respective scenario is as illustrated in Fig. 18.
As before, the mobile unit connects through a logical entity designated Service Controller that is responsible for maintenance of the mobile communication sessions.
The puφose of the handoff in this case is to support the best communication for the mobile, per defined system service criteria subject to the limitations of the WWAN and the WLAN. Typical service system criteria are best quality of service and lowest cost, however other criteria may be implemented within the entities that control the communication flow: the mobile client, the Service Controller and the communication networks (the WWAN and the WLAN). As will be appreciated, since the hotspot is entirely within the purview of the WWAN the question of service quality falling below a threshold does not really apply.
Alternative embodiments consider a case in which a mobile unit has the capability to search for another communication mode and a case where again it has the ability to search in the other communication mode, but only by interrupting the present communication mode.
The logic used in the presently preferred embodiment operates simply by automatically associating a higher priority with the WLAN connection. This means that whenever Hot Spot connectivity and PLMN connectivity are available, the Hot Spot connection is preferred. In the present embodiment, a mobile unit is connected to a PLMN when it detects the presence of a WLAN. As the WLAN service has priority the mobile unit attempts to connect to the WLAN. The methods by which the mobile unit verifies that the WLAN is valid for it and establishes communication with its Service Controller through the WLAN are as described above and are not repeated in the present connection.
During the course of a handoff, the mobile unit connects with the new network and establishes communication once again with the Service Controller. Alternatively, the Service Controller establishes communication with the mobile. The open cellular session is maintained as long as is necessary, and at least until the reconnecting mobile is identified or until a timeout is reached.
Maintaining the session in the case of a cellular data service means that the cellular data protocol is used and user data is actually tunneled through whatever access channels are being used, e.g. in the WLAN. This ensures that the cellular service is unaffected even though a non-cellular channel is being used for mobile access. In the case being considered, the access channel actually being used can in fact be any conceivable type of channel that the particular local LAN may be using. To further clarify this point, a subscriber of a GPRS network may access its cellular services through one of the gateways discussed hereinabove, by implementing an IP tunnel through its Service Controller. The Service Controller in this case may be implemented within the GPRS gateway or as a separate entity.
The mobile uses the WLAN access as long as its quality of service is acceptable, per criteria that are defined within the mobile client, the Service Controller or both. When the mobile detects that its quality of service within the WLAN Hot Spot is unacceptable, or when so indicated by its Service Controller, it preferably starts searching for WWAN access. If communication is still available with the WLAN network, the mobile may notify its Service Controller of the need for handoff and its search for a different access route, including the WWAN access. A different embodiment has the Service Controller indicating to the mobile that it should hand off to the WWAN. This may be either as a general command or may specifically be a WWAN access which is expected to be operational within the area where the mobile is located. Handoff from the wireless local back to the wireless wide area network therefore takes place always, or almost always, when the mobile's WLAN connection is severely degraded or even lost and the mobile detects availability of the WWAN (e.g PLMN, GPRS). Generally that means that the mobile unit is simply moving out of range of the WLAN.
The various handoff methods that have been discussed above, can generally be applied to the present WLAN to WWAN case. Five different embodiments are discussed below:
1. Brute force switching of wireless network communication with continuity at the session level.
A first embodiment When Hot Spot Controller, Service Controller or mobile identify communication conditions are unacceptable, the respective party drops the communication. Communication drop by the Service Controller will be either by sending a handoff control signal to the mobile or by disrupting the session flow to the point at which it causes the mobile unit to determine that communication must be switched. The MS may then simply drop communication and look for a WWAN access to switch to, or may do it when it can no longer get service from the WLAN. In either case, if the MS finds a WWAN active in the area, it attempts to log on thereto. Once communication is re-established, the Service Controller identifies one or more pending sessions with the mobile unit and the identified session (or sessions) is automatically re-joined.
An alternative embodiment of the invention concerns a case in which Service Control logic resides within the WLAN Hot Spot. In this case, the Service Controller within the WWAN finds out by contacting the WLAN controller whether the mobile has been serviced lately and thereby that there are pending (frozen) sessions.
2. Mobile assisted hard network controlled handoff
In this embodiment, the mobile searches for and identifies the operation of an acceptable WWAN before dropping the degrading service of the WLAN where it is still connected or active, albeit at an unacceptable quality of service. The mobile then sends the details of the identification it has made to the Service Controller or to another entity that controls the logic of the physical communication. The entity then instructs or enables the mobile to switch to the WWAN if it is determined to be acceptable per defined logical criteria (roaming agreements, loading conditions, mobile subscription contract, etc.) The mobile is handed off from the servicing WLAN to the receiving WWAN in one of two ways: a) If the mobile is capable of accepting wireless network selection controls, it is commanded to hand off to the WWAN. Preferably, if possible and required, transfer includes the WWAN communication parameters, thereby to speed up the hand off process; b) If the mobile is not capable of accepting wireless network selection controls, it is simply dropped off the servicing WLAN by discontinuing service; at which point the mobile unit tries to log into the WWAN and reach its Service Control logic.
3. Mobile controlled hard handoff
In a further embodiment, the mobile unit searches for WWAN coverage when
(i) the quality of service it is getting is not satisfactory, or
(ii) when it receives from the Service Controller or similar communication control logic a command to hand-off to a better communication service.
The mobile then performs a search involving measurement of one or more WWANs it can detect and determines which is the best one to switch to. Preference is typically granted to its home service provider, but specific logic within the mobile client or controls from the Service Controller may modify this priority. The mobile then drops off the WLAN that has been servicing it, if it has not already been disconnected. In a variation of the present embodiment, the mobile sends a notification before dropping off the WLAN in order to speed up the handoff process and improve system and session control.
After dropping off from the servicing WLAN the mobile unit attempts to join the WWAN selected for handoff. The Service Controller preferably determines that the mobile unit has been handed off from its previous servicing WLAN to the WWAN, identifies the corresponding sessions and allows the session or sessions to be resumed through the new connection.
Although in the preferred embodiment of this handoff method no network assistance is required, the an additional embodiment is provided which implements the handoff with network assistance. Network assistance may be provided for any of the following:
(i) identification of acceptable neighboring WWANs, i.e. provision of their communication parameters, for example to prevent attempts to log into WWANs known to be operational within the area but not acceptable due to other conditions;
(ii) information on service conditions or other availability parameters of neighboring WWANs, for example if their service in the area is known or anticipated to have problems; and
(iii) information on expected availability of the servicing WLAN.
4. Network commanded, mobile controlled hard handoff
A further embodiment relates to a network commanded handoff. Following the command, the handoff itself is controlled by the mobile unit. The method is implemented when the session control, either residing in the Service Controller or other communication control logic, determines that the servicing WLAN cannot support mobile service communication conditions. Network control may be used to determine potential availability of WWANs within the service area, but this is not essential. If such availability is determined, network control sends information regarding communication parameters of candidate WWANs to the mobile unit The mobile unit now searches for any WWANs that may support its service requirements. In the preferred embodiment of this method, the mobile unit time multiplexes its search of WWANs while still trying to maintain communication with the WLAN to provide its user with a predetermined level of service, thus minimizing the handoff service impact. When this is not feasible, a variation allows the mobile drop to drop the WLAN access and only search for WWAN service. In both embodiments the mobile may use data previously provided by the Service Controller network or engage in a blind search.
Based on the search, the mobile determines whether it is in a position to perform handoff to the WWAN, and, if so, it attempts to access the WWAN. If the mobile does not succeed in accessing the first WWAN attempted, then it may attempt to access the next best WWAN in its search results, and so on.
After access is successfully completed, the Service Controller recognizes that this is a resumption of a previous session or sessions ensuring continuity of the session.
5. Soft handoff
Three of the previous four embodiments described above in respect of hard handoff may also be implemented to provide soft handoff. As explained above, the term soft handoff as used herein refers to maintaining seamless continuity of communication when transitioning from the WLAN to the WWAN, with no impact whatsoever on the sessions active within the local wireless mobile including those that depend on time bounded continuity ofcommunication. The difference is that no sessions are frozen, and therefore no degradation in service is perceived.
Soft handoff as supported by the present embodiments may be implemented, either by establishing mobile unit communication with the WWAN before dropping communication with the serving WLAN, or by joining the WWAN quickly enough upon dropping the WLAN so that there is no discontinuity in session communication. To support the latter conditions, the Service Controller may advance data to the mobile. The advanced data may be buffered to maintain service during handoff. Mobile logic may also switch to a degraded mode that requires less data, extending the time supported by the buffer for continuous service as perceived by the user of the mobile unit.
A variation of the soft handoff embodiments concerns the mobile unit being capable of joining the WWAN before dropping off the WLAN and effecting the handoff.
Soft handoff may be network controlled or mobile controlled. a) Network controlled soft handoff.
In the network controlled embodiment, the mobile unit searches per its own logic, or per instruction from the Service/ Communication Control WWAN channels, to measure and determine their communication availability. Availability information is then passed on to the Service Controller or similar Communication Control logic, which, as discussed above may be centralized or distributed.
The Service Controller or similar Communication Control logic may now select the new serving WWAN based on the information provided by the mobile unit and the operational status of the WWANs. The latter may be implemented by the WWANs providing such status information to the Service Controller/ Communication Logic supporting the mobile.
The Service Controller may provide parameters of the new serving WWAN to the mobile or handoff controls/ indications to the selected WWAN.
In order to ensure uninterrupted communication, the mobile unit preferably establishes communication within the WWAN before disconnecting its WLAN connection.. Once communication is established, the mobile drops away from the WLAN. In a variation, the mobile sends a notification before dropping off the WLAN. b) Mobile controlled soft handoff. In the mobile controlled implementation, the mobile unit searches for channels of active WWANs when
(i) there are indications that the quality of service may become not satisfactory, or
(ii) it receives a command to hand-off to a WWAN. The latter may occur when the Service Controller receives advanced indications that the WLAN service is to be dropped.
The mobile then preferably performs a search involving measurement of all applicable wireless networks that it is currently able to receive and determines which is the best one to switch to. The criteria to determine which is the best WWAN to switch to may include measured communication characteristics as well as network loading, if broadcast or available from the Service Controller. The mobile then notifies the Service Controller/ Communication Logic which WWAN it has selected for the handoff and waits either for an acknowledgment or a time out to expire (minimum timeout may be zero), upon which it establishes communication with the WWAN without disconnecting from the WLAN. After communication is established, the mobile drops off the WLAN that has been servicing it. In a variation, the mobile sends a notification before dropping off the WLAN.
The handoff reverse process, from the WWAN to the WLAN, is similar. However, as mentioned above, in this case handoff is not necessarily triggered by drop in quality of service from the WWAN. The following distinctions are made: The mobile is required to check periodically, per its defined logic, for availability of a WLAN. This is due to the partial WLAN coverage within the WWAN service area. Alternatively, a Hot Spot itself may include the means to detect local mobile transmission, automatically leading to the issuance of commands to the mobile unit to look for the WLAN. Handoff from the WWAN to the WLAN seldom requires loss of WWAN communication. However the handoff techniques discussed cover the cases where the mobile joins the WLAN and establishes communication through the WLAN with its Service Controller before disconnecting the WWAN (the ultimate soft handoff) as well as the case where the mobile loses WWAN connection and only some time later succeeds in establishing communication with the WLAN and re-establishing its sessions.
Embodiments are included in which handoff between WLAN and WWAN requires additional supportive actions beyond establishment of regular communication protocols of the medium to which the mobile unit is handed off. An example of these supportive actions may be a WWAN registration or a different security process, since the acceptance of the mobile by the WWAN may depend on authentication and security that cannot be transferred from the WLAN communication processes.
Handoff between wireless wide area network and Internet
The concept of handoff is expanded to cases where a WWAN -equipped mobile, e.g. a GPRS unit, may at some time access the WWAN Service Controller as well as WWAN services through the Internet or other wireline network. The embodiments include simultaneous connection to both WWAN and Internet networks as well as to the case where one connection is made after another one has been dropped.
For the above embodiments, variations may use all of the previous handoff methods.
Furthermore, logic installed within the mobile client or within the Service/ Communication Controller may provide priority of connectivity when both WWAN and Internet links are available. In the preferred embodiment, the Internet connection is preferred and the WWAN traffic is in this case tunneled to the Service/ Controller through the Internet.
The handoff techniques suitable for switching between the two networks include the following:
1. Brute force switching of network communication with continuity at the session level. When the mobile or the Service Controller detects that service is available within a higher priority network, e.g. the Internet in the above-mentioned preferred embodiment, the mobile drops the communication through the lower priority network. Then the mobile attempts to join the other network and connect with the Service Controller. Once communication is re-established, the Service Controller logic identifies that there is one or more pending sessions with the mobile unit and the session or sessions are automatically continued.
2. Hard network controlled handoff with no mobile assistance
In the embodiment, the mobile unit establishes communication through both networks without taking control over session routing. The Service Controller may control a drop in service level through the lower priority network, thereby forcing the mobile to try and establish service through the higher priority network. The Service Controller then notifies the mobile of its decision, and a number of variations are possible for what follows.
The decision to hand off the mobile from one network to another is thus only dependent on the Service Controller. The mobile is handed off from one network connection to the other in one of two ways: a) If the mobile is capable of accepting network selection controls from its Service/ Communication Controller, it may be commanded to hand off to the selected (receiving) network. It may additionally be sent communication parameters to speed up the hand off process; b) If the mobile is not capable of accepting wireless network selection controls, it is simply dropped off the servicing network by refusing service; forcing it to try and log onto the other network.
3. Mobile assisted hard network controlled handoff
In this implementation, the local wireless mobile searches for alternative service possibilities and determines communication conditions within the alternate network. It then sends the information gathered to the Service/ Communication Controller (SCC) 128 or 140.
The mobile unit searches for the alternate network when any one of the following conditions are met: a) The mobile unit is programmed to perform the search at regular intervals. The search interval may be pre-programmed or controlled through commands from the SCC 128. b) A hardware indication is provided to signal that an alternate service may be available. One example may be a hardware identification of 100BaseT availability. c) The mobile is commanded by the SCC 128 to search for an alternate network. This may typically occur when an external service determines that there is a possibility of such availability per information provided by the mobile
The mobile is handed off from its previous servicing network to the selected network in one of two ways: a) If the mobile is capable of accepting SCC controls, it is commanded to hand off to the selected network, including if possible transfer of the communication parameters to speed up the hand off process; b) If the mobile is not capable of accepting wireless network selection controls, it is dropped off the servicing network by discontinuing service. In such a case the mobile tries to connect through the other network until it reaches the SCC and sessions are re-established.
4. Mobile controlled hard handoff. In mobile controlled hard handoff, the mobile searches for an alternate network connection when
(i) it detects availability of a higher priority network,
(ii) the quality of service it is getting is not satisfactory, or
(iii) when it receives a command to hand-off to another network of the types defined above.
The mobile unit performs the search and obtains measurements of alternate network availability, from which it determines handoff priority. In one example of this measurement, the mobile may ping a defined IP and measure the delay in response. The mobile then drops off the network that has been servicing it and connects through the selected alternate network. In a variation, the mobile sends a notification before dropping off its present servicing network in order to speed up the handoff process.
When the mobile attempts to join the network it has selected for handoff, the system determines that the mobile has been handed off from its previous servicing network to the new one and wishes to resume its existing session or sessions, which it is able to identify.
Although in the preferred embodiment of this handoff method no network assistance is required, a variant is included which carries out this handoff with network assistance. Network assistance may be provided for any of the following: (i) identification of potentially available networks or network parameters, including preferred access channels for the WWAN and proxy IP's for Internet access that may support a better distributed SCC architecture.
(ii) information on loading conditions or other availability parameters of various access networks or points of entry (e.g. different phone numbers for Internet access); and
(iii) information on expected loading conditions of the servicing network (e.g. for some Intranet connections)
5. Network commanded, mobile controlled hard handoff
Network commanded mobile controlled hard handoff is implemented when the SCC 128 or 140 either finds communication conditions unacceptable or has logic that requires periodic checks for higher priority connectivity. Network control may or may not determine potential alternate networks that have the capability to support service. If such capability is determined, the SCC 128 sends information on the communication parameters of available networks or network accesses to the mobile unit.
The mobile then searches for networks that may support its service requirements. In the preferred embodiment of this method, the mobile searches for alternate networks without disrupting its present connection, thus minimizing the handoff service impact. An example would be to dial several Internet access numbers to determine availability before dropping off a wireless GPRS connection. When this is not feasible, an option provides that the mobile first drops its servicing network access and only then searches for alternate networks. In both embodiments the mobile may use data previously provided by the network or engage in a blind search.
Based on this search, the mobile determines which network to hand off to and attempts to access this network.
If the mobile does not succeed in accessing the selected network, then it may attempt to access the next best network according to its search results, and so on. Such initial and subsequent access attempts are preferably controlled by programmable or pre-programmed timers. After access is successfully completed and connection with the SCC 128, 140 has been re-established, the SCC recognizes that the new connection is a resumption of a previous session or sessions, preferably in one of the ways hereinbefore described, thereby ensuring continuity of the session.
6. Soft handoff
Four of the previous five methods described above with hard handoff may also be implemented using soft handoff. As mentioned above, the term "soft handoff as used herein refers to maintaining seamless continuity of communication when transitioning from one network access to another, with no impact whatsoever on the sessions active within the local wireless mobile including those that depend on time bounded continuity ofcommunication.
Soft handoff as supported by the present embodiments may be implemented by establishing mobile communication with the SCC 128, 140 through a new serving network before dropping it from the presently serving network. Alternatively, soft handoff may be achieved by switching network connection fast enough so there is no discontinuity in session communication.
Several methods are discussed below to implement soft handoff:
a) Mobile assisted soft network controlled handoff
In a first soft handoff embodiment, the local wireless mobile searches for the alternate network and determines communication conditions. It then sends availability information to the SCC 128, 140.
The SCC subsequently makes the decision as to which network, and when, to perform the handoff. It provides the handoff parameters to the mobile; and optionally may provide handoff controls to a proxy IP node or to control entities within the WWAN. The latter may be required if there is advanced data suggesting that the connection is about to be lost, either due to identification of a deterioration in conditions or there is information that one of the entities supporting the communication is about to be taken down, thereby to ensure continuous communication. Thus, in order to ensure uninterrupted communication, the mobile preferably now establishes communication within the new serving network without disconnecting its current network communication. Once communication with the new network is established all the way to the SCC 128, 140, the mobile drops off the network that has been servicing it. In a variation, the mobile sends a notification before dropping off this network.
b) Mobile controlled soft handoff.
In a second soft handoff embodiment, this time controlled by the mobile unit, the mobile searches additional channels when (i) a higher priority network condition is detected;
(ii) the quality of service it is getting is not satisfactory, or
(iii) when it receives a command to hand-off to an alternate network.
The mobile unit itself performs a search in the course of which it carries out measurements of alternate networks per pre-defined or programmable priorities and rates them per determined priority to select a preferred network to switch to. In a variant, the mobile need not search all possible alternate networks, but only the top n out of m available networks. In a specific embodiment, m=l. The criteria to determine the best network to switch to may include measured communication characteristics as well as network loading. The mobile unit notifies the SCC as to which network has been selected for the handoff and waits either for an acknowledgment or a time out to expire, upon which it establishes communication with the new network without disconnecting from the present serving network. After communication is established, the mobile drops off the network that has been servicing it. In a variant, the mobile sends a notification before dropping off its current serving network. c) Network commanded, mobile controlled soft handoff
A further embodiment comprises a soft handoff that is network commanded but subsequently mobile controlled. The handoff is carried out when the SCC determines that the servicing network cannot support the mobile service communication conditions. The SCC may or may not identify potential alternate networks that currently have the capability to support communication service to the mobile. If such capability is identified, the SCC then sends information on the communication parameters of the thus identified networks to the mobile unit.
Once the mobile is in possession of the access data for potential alternate networks, the process continues as in the previous embodiment of mobile controlled soft handoff.
Summary of Handoff
All the embodiments described above provide functionality that is presently not available within wireless local area networks.
The soft handoff solutions have the potential to provide smoother continuous service, however since all solutions are packet based at the mobile end, continuous service may be attained with both soft and hard handoff embodiments.
Mixed Network Authentication
Mobile communication provides a high degree of personalization. For example, GSM phones provide a SIM card which provides each user with personalized communication associated with his/her account with his/her mobile telephone service provider. CDMA based mobile also entails similar personalization. In accordance with the embodiments of the present invention, a user is enabled to set up a transaction over any unsecured or secured means at his disposal, following which the transaction is confirmed or authorized via his/her mobile telephone. Authorization may for example be via an SMS message sent to his mobile telephone to which he sends a simple reply. Alternatively, the user may send an SMS message from his own mobile telephone to a number indicated to him. The transaction may then be charged to the mobile telephone account. The advantage of charging to a mobile telephone account is that, unlike credit card and like other accounts, the telephone account is uniquely set up for charging small amounts at a time. The embodiments thus provide a means of providing low cost products and services on the Internet, previously made difficult because of minimum charges by credit card companies. The embodiment can also be used to provide binding between a non- authenticatable and an authenticatable device. Once the non-authenticatable device has been authorized, secret authentication data can be installed in it. This authentication data may be further used to prove the linkage between the non- authenticatable device, and the PLMN authenticatable device. This method can be used to initialize a virtual SIM (see above)
Reference is now made to Fig. 27, which is a simplified block diagram showing an authentication mechanism according to a first preferred embodiment of the present invention. In Fig. 27, there is shown a communicator 110, typically part of a cellular Internet portal including an SMS portal. Optionally this Internet portal may include a WAP portal, in addition to or instead of the SMS portal. The communicator is able to communicate with a first personalized device 1 12 via an authenticatable link 1 14 such as a GSM or CDMA link as well as any extension thereof (GPRS, UMTS, etc.). GSM etc, links provide not only authentication but also encryption, which is preferred but is not a requirement of the present invention. A basic embodiment requires only authentication and non -repudiation of the transmission. Generally, the communication is a digital communication such as an SMS or GPRS data message, although, as will be explained below, voice can also be used. The communication preferably takes advantage of user authentication, which is a feature of GSM or CDMA. Additional authentication can be provided by a link 1 14 and the device 112, additionally supporting encryption. The personalization preferably enables the first personalized device to be positively identified. In addition there is provided an associator 116, which is able to carry out the positive identification of the first personalized device 1 12 and to associate the authentication with a separate activity or request for activity received by a server 1 18 or like device through an non-authenticatable link 120 from a requesting device 122. In the present context, a non-authenticatable link is a link through which users or requesting devices cannot be positively identified, and particularly includes general Internet connections. The inability to identify the requesting device may be due to there being no strong authentication mechanism such a SIM card, or because the link itself is insecure, allowing eavesdropping and impersonation or for any other reason. The mechanism of Fig. 27 thus solves the problem of the insecure link by requiring an extra leg of communication via an authenticable link. Generally, mobile telephone devices are authenticatable personalized devices, and by requiring an extra leg of the communication via a mobile telephone link, a provider can determine that a request is genuine. In addition, the mobile telephone is associated with a charging account, and provision is made to allow for billing to be directed to the customer thus identified. As will be explained below, the authenticatable link leg of the communication may precede or follow the non-authenticatable leg, as long as the two legs can be successfully associated, and a non-exhaustive list of alternative procedures is described hereinbelow. In addition several non-authenticatable legs can be associated with a single authenticatable leg. Of course, the invention is not limited to mobile telephones and any securely personalized device that communicates over a secure link such that it cannot be impersonated may be used.
The associator 116 is preferably connected to an authentication communicator 123 for indicating to the server 118 that a given activity request is approved. Alternatively, the authentication communicator 123 may communicate the authentication to an external proxy server or gateway associated with the non- authenticatable device. As a further alternative, the authentication communicator may communicate the authentication to any device or network node responsible for managing the activity which is the subject of the request. In a further embodiment, the authentication communicator 123 may communicate the authentication by applying a change to a routing table on a router.
In addition to GSM and CDMA, a non-exhaustive list of other systems currently available that provide secure links includes IS-136, PDC, EDGE, WCDMA, GPRS, Iridium, and GlobalStar. The term CDMA covers the IS-95 standard and the 2.5 and 3G versions thereof are known respectively as 1XRTT and 3XRTT.
Reference is now made to Fig. 28, which is a simplified diagram showing a GSM device 124 such as a mobile telephone. The GSM device comprises a SIM which consists of one or more integrated circuits where at least one of those contains personalized data that supports authentication, encryption and decryption for the secure link 1 14. The SIM both identifies the mobile telephone and makes it impossible for other devices to impersonate that telephone, thus providing authentication and secure access to a charge account corresponding to the respective mobile telephone user. Although in the above, the assumption has been that the messaging itself is data messaging, the invention is in no way limited thereto. The secure link 114 is also secure for voice communication and it is possible to provide automatic voice message construction functionality at the communicator 110 to construct messages from pre- recorded message sections. Additionally it is possible to provide an artificial voice. Either way a voice message may be sent to the personalized device over the secure link. The voice message may for example identify the transaction and may request that the user presses one of the keys by way of an affirmative reply.
In a particularly preferred embodiment of the present invention, a device corresponding to a potential user of a service requests the service via the insecure link 120. The insecure link 120 may be any kind of network, particularly an open network such as the Internet, or other digital or analogue networks, and may include a LAN, a Wireless LAN (WLAN), in particular any WLAN corresponding to the IEEE 802.1 1 standards, including 802.11, 802.11b, 802.11 a... g, etc. During the log-in process it identifies its secure link, for example by giving an associated mobile telephone number. The identification may be retrieved from storage or entered manually by the user. The associator 116 receives the identification (e.g. mobile telephone number). It may need to translate the received identification into a different identification appropriate to the communicator 110, and the translation may be carried out by the associator 116 itself or through external translation services, for example by accessing a home location register (HLR). The associator 116 then uses the communicator 10 to contact the mobile telephone in any appropriate way. A timer 123 is operated, giving the owner of the mobile telephone a fixed time to reply and confirm the identity of the user. Additionally or alternatively, a failure counter 124 counts unsuccessful attempts to establish the authentication, stopping the authentication operation when a predetermined threshold is reached.
In an alternative embodiment the operation is initiated both at the non- authenticatable device 122, which makes contact with the server 18 and at the personalized device 112, which makes contact with the communicator 1 10. The associator 116 makes a link between the two communications, and the service to the non-authenticatable device is authorized. One way of assuring that the authorization by the user was not inadvertent is to provide a password in the reply to the authenticatable device 112. The password is then entered by the user at the non- authenticatable device 122, thus making clear that the user of the non-authenticatable device 122 is the same as the user of the authenticatable device and that this action is intentional. If such a password embodiment is used, the authenticating link is preferably encrypted, so as not to reveal the password. Alternatively the password may only be used a limited number of times, for example only once, in which case the authenticating link need not be encrypted.
As will be explained below, since the log-on name used by the non- authenticatable device is the MSISDN, that is to say the mobile telephone number, it is possible for fraudulent users to probe different MSISDN values. Such probes may cause the mobile phone to receive a request for service and, if the user is not vigilant, the user could inadvertently authorize service for these fraudulent users. The problem may be reduced by requiring the non-secure device to use a password, in addition to the MSISDN. An alternative solution starts the authentication sequence from the Mobile Unit: The user sends an SMS to the communicator, which in turn responds to the mobile with a temporary password for the session. The user uses the PDA or other non-authenticatable device to connect, via the Internet, to the server 118, and enters his user name (MSISDN) and the temporary password. Alternatively, the communicator provides a temporary identifier and password pair, to ensure user anonymity and the user enters this temporary identifier and password pair.
Transfer of the identifiers from the authenticatable device to the non- authenticatable device may be manual or through some local wired or wireless communication link.
The associator or communicator recognize the access data provided, such as the temporary password and identity, as associated with the MSISDN and service is authorized. Preferably, in such an embodiment, SMS transmissions are completed prior to the logon sequence of the mobile terminal (PDA, laptop, etc.) being started.
As a further alternative to the above, the SMS may comprise a quasi-random number, which the user is required to copy or that is otherwise transferred into his non-authenticatable device to complete the authentication, thereby reducing the risk of inadvertent authentication .The requested activity may be an Internet browsing activity. Use of the secure link, which is associated with a charging account, allows for small amounts to be charged, hitherto a problem with Internet browsing which has tended to rely on credit cards. The requested activity may be the browsing itself, or it may include activities associated with browsing such as purchasing, using pay services, etc. Thus the user may arrive at an Internet bookstore or the like and make a purchase by entering his mobile telephone number rather than his credit card number. He then receives a message on his mobile telephone and replies to that message to complete the transaction. The Internet activity may additionally be ftp type activity or an activity that does not involve browsing, such as streaming data based applications, email, etc.
In an alternative embodiment, the non-authenticatable device 122 may be a credit card or a smart card and the requested activity may be a point of sale activity such as use of an ATM. In this connection, reference is made to Fig. 29, which is a simplified diagram showing a card 128, such as a smart card or credit card, with a memory unit 130. The memory unit 130 may be part of an integrated circuit as with a smart card, or it may be a magnetic strip as with a conventional credit card. Preferably, the memory unit 130 comprises the standard transaction information such as an ATM number, and in addition a further number that allows for identification of the mobile telephone number. In one embodiment, the number encoded on the card is the mobile telephone number, however this has the disadvantage that a false telephone number could be entered. In another embodiment the further number is an encoded version of the mobile telephone number. The encoded version could be an enciphered version, in which a function is available to decipher the telephone number. Alternatively, a code could be used, which is simply an entry in a lookup table. The latter version is particularly secure since a hacker can only substitute a different telephone number if he knows its code in the lookup table. The user enters his card into the ATM in the normal way. The card transfers the user's telephone number, or a code related to it, which is used to generate a call to the user's mobile telephone. The user completes the transaction by replying to the mobile telephone or by entering into the ATM a uniquely generated PIN number provided in the communication. In a preferred embodiment, the user both replies and enters the PIN number.
The requested activity may for example be access to a network, that is to say the user requests access to a LAN or to the Internet or the like. It thus enables the provision of roaming Internet, the ability to log on to the Internet using local resources when traveling and not in the proximity of one's own Internet provider.
In particular, the network to which access may be requested may be a network accessed via Wireless LAN access points or infra-red access points or via Bluetooth access points. The idea of Wireless LAN or infra-red or Bluetooth is to provide flexible network access to all devices in proximity of the access points and the present embodiments allow for potential users to be identified and charged for the service.
As a further alternative, after the user has transfered the quasi-random number or the password to his non-authenticatable device, the number or the password can be used multiple times to authorize an activity. Since multiple transmissions of the number or password are exposed to replay attacks, the multiple authorization can use the quasi-number/password as a seed key to a challenge-response protocol. For example - if a virtual SIM is installed in the non-authenticable device, then Ki of the virtual SIM (see above in the SIM description) can be set to be the quasi- number/password (Ki is used in the generation of SRES and Kc from RAND).
Another alternative, that has a higher security level, is to use the above quasi-number/ password to authenticate the establishment of a secure channel (by IPsec, TLS, SSL, SSH etc.). The key Ki may be transferred between the associator and the non-authenticatable device, and may then be used as the seed for the challenge-response execution. As discussed above, the communicator preferably obtains a telephone number, in either plaintext, or as an encoded or enciphered version of the telephone number from the non-authenticatable device. The number is preferably used for establishing a communication with the secure mobile device. However, in those embodiments in which communication is initiated from the secure mobile device, the telephone number is preferably used to associate the secured and non-authenticatable links that have already been established.
In accordance with the above, the non-authenticatable device may be a credit card, a smart card, an infra-red device, a Bluetooth device, a PDA, a wearable computer, a mobile computer, a fixed computer, and a network of computers or any other device that is able to establish a communication using infra-red or Bluetooth or
Wireless LAN or HomeRF or wired or any other type of communication.
Reference is now made to Fig. 30 which is a simplified block diagram showing a further embodiment of verification apparatus according to the invention, with component parts shown in greater detail. A non-authenticatable device such as a PDA 130 communicates wirelessly via network access points 132, to a LAN/WAN 134, which itself may be wired or wireless. The LAN may be connected directly (or indirectly) to a cellular Internet authentication portal 136, and may be a means of providing the user with access to the Internet or any other data network or services. The portal 136 preferably appears to the PDA 130 as a standard Internet authentication device to which it logs in as normal. The login process can be carried out manually or can be automated as desired. The number of the user's mobile telephone may be supplied as the login username or as a separate part of the login procedure. The portal begins to run a timer to timeout the authentication after a predetermined time limit. Optionally the portal may also set up a counter to limit the number of login attempts to reduce the risk of hacking. The portal is connected directly or indirectly to a short message service center SMS-C 138, the network element that manages SMS messaging. The SMS-C 138 sends an SMS message via MSC 140, BSC 142 and cellular base stations 144 to SIM protected mobile telephone 146. The user thus receives a request telling him to press reply in order to activate his network connection. In a further enhancement, the user may be asked to provide a password. The SMS itself is usually encrypted and the SIM supports authentication to make it clear that it is only the intended mobile telephone that is replying. The mobile telephone replies to the SMS. All SMS messages have an address of origin, which is usually not passed on in Internet-based SMS. In order to enable a reply, the SMS message as sent may be provided with a telephone number of the authenticator to allow a reply to reach the authenticator. The user is then authorized to access the Internet or other data network via the LAN and his use of the LAN may then be charged to his mobile telephone. Reference is now made to Fig. 31, which is a simplified flow chart showing verification of a non-authenticatable channel via an authenticatable channel according to an embodiment of the present invention. In Fig. 31, authenticating the link comprises steps of communicating via an authenticatable link with an authenticatable device, verifying, using the authentication procedures of the link, that the communication is with an intended mobile device, setting up a second link via a non- authenticable second channel or link. A stage follows of binding or associating the verification with an activity request via a non-authenticatable device. Once the two channels or links have been bound then the authentication on the one link may be used to allow the request on the other link, as explained above, thereby to permit the activity request of the non-authenticatable device. The step of binding may be carried out by use of an identifying telephone number provided by the non-authenticatable device. The step of authenticating preferably includes sending a message to the authenticatable mobile device, to which a reply is expected as explained above. As discussed above, it is not crucial to the invention which of the two links is made first or whether they are made simultaneously. Each possibility provides a legitimate embodiment of the invention with attendant advantages and disadvantages. In one version, communication starts with the non-authenticable device. The system sends a message to the related authenticatable device requesting approval. The device user sends back his approval and either the authentication is completed at that point or the system sends a password to the authenticatable device. The user receives the password and enters or copies or otherwise transfers the password to the non-authenticatable device, thus to complete the authentication. In another version, a communication request originates from the authenticatable device. The system sends a password or temporary username and password to the authenticable device. The password, or username and password, is copied or transferred to the non-authenticatable device, and the non-authenticable device relays the password etc. back to the system to establish the authentication. The above procedures are only used on initial communication establishment, or in a particularly preferred embodiment only on an initiating communication. Thereafter, a secure communication channel is established between the system and the non- authenticatable device using additional identity/ identities provided to access the system the next time(s). During future accesses, the system adds additional identities/ passwords, with optional notification to the authenticatable device. Such a preferred embodiment saves the delay needed to set up the authenticable channel with the authenticatable device, after the first communication.
In the preferred embodiment, the authentication method does not require any special hardware or software to be installed on the PDA 130. The PDA works with a standard browser and standard network interface units.
In an alternative embodiment, software is installed to support the defined processes and assist in or save manual user actions such as entry of addresses and transfer of data between the authenticatable and non-authenticatable units.
The subscriber does not need to learn any new numbers or passwords, and the mobile phone number (MSISDN) may be provided as a user name.
The mobile terminal 46 is a standard authenticable unit. The terminal may be voice only, SMS only, WAP only, GPRS only, 3G only, any other data communication standard or a combination. Authorization for the requested service requires possession of the user specific SIM or USIM or similar device., thus binding the service to the SIM or USIM or similar device.
The service need not be provided with any special provisioning database. The user identification is the MSISDN or similar identifier (such as IMSI). No new passwords are required to be provided for or memorized by the user. However, an alternative embodiment requires provision of data bases, for example when used with a RADIUS Server. A RADIUS server is a server used to authenticate users who access a communication system, which authentication is based on the RADIUS or remote authentication dial-in user server protocol.
A single network server 122 may be used to support many carriers.
It is appreciated that certain features of the invention, which are, for clarity, described in the context of separate embodiments, may also be provided in combination in a single embodiment. Conversely, various features of the invention which are, for brevity, described in the context of a single embodiment, may also be provided separately or in any suitable subcombination.
There is thus provided an authentication system which comprises the use of a mobile telephone secure channel to securely transfer an authorization code that may be used to authorize some other service.
Summary of Embodiments
In the above there are provided a series of embodiments that between them provide for a seamless interface between the cellular or PLMN environment and the wireless LAN environment. The interface allows cellular enabled units able to move from one environment to the other without the user being aware of it, so as to take advantage of the higher data rates and local resources of the wireless LAN when available. Non-cellular enabled units are enabled to connect to the wireless LAN and to have access to the cellular environment via the LAN.
Features of the invention, which are, for clarity, described in the context of separate embodiments, may also be provided in combination in a single embodiment.
Conversely, various features of the invention which are, for brevity, described in the context of a single embodiment, may also be provided separately or in any suitable subcombination. It will be appreciated by persons skilled in the art that the present invention is not limited to what has been particularly shown and described hereinabove. Rather the scope of the present invention is defined by the appended claims and includes both combinations and subcombinations of the various features described hereinabove as well as variations and modifications thereof which would occur to persons skilled in the art upon reading the foregoing description.

Claims

Claims
1. Interface device for interfacing between a PLMN network and a non- PLMN network, said PLMN network being configured to recognize cellular base stations as nodes thereof through which to mediate connections to cellular mobile devices, said non-PLMN networks each comprising a plurality of access points for mediating connections to network compatible mobile devices, said network compatible mobile devices not being required to be cellular devices, said interface device being configured as a node of said PLMN network to appear to said PLMN network as a base station thereof and comprising functionality to make non-cellular devices connecting to said non-PLMN network and attempting to access said PLMN network therethrough appear as cellular devices to said PLMN network.
2. The interface device of claim 1, comprising a circuit-switched interface for telephony and a packet interface for data and control.
3. The interface device of claim 1 , wherein said PLMN network is a GSM network having an A interface or a Gb interface and wherein said circuit-switched interface is operable to use said A interface and said packet interface is operable to use said Gb interface.
4. The interface device of claim 1, wherein said PLMN network is a UMTS network having an IuCS interface and an IuPS interface and wherein said circuit switch interface is operable to use said IuCS interface and said packet interface is operable to use said IuPS interface.
5. The interface device of claim 1, comprising a simulated cellular identity gateway associated with a security layer of said non-PLMN network and operable to determine that a connecting device has been authenticated by said non- PLMN network, and to respond to a PLMN network authentication query to indicate that said authentication has been successful.
6. The interface of claim 5, wherein said simulated cellular identity gateway is a simulated SIM gateway and said PLMN network is a GSM network.
7. The interface of claim 6, wherein said simulated cellular identity gateway is a simulated ESN gateway and said PLMN network is a CDMA network.
8. The interface of claim 5, wherein said non-PLMN security layer is one of a group comprising SSL, Ipsec, TLS, SRP, and SSH, and wherein an authentication of said one of said group is required to permit said simulated SIM gateway to provide said authentication response to said PLMN network.
9. The interface of claim 8, wherein said security layer is configurable to set a desired security level.
10. The interface of claim 1, further comprising a vocoder for receiving voice signals from said non-PLMN network for vocoding, and receiving vocoded voice signals from said PLMN network for decoding.
1 1. The interface of claim 1, further comprising a vocoder for receiving partly vocoded signals from said non-PLMN network for vocoding, and receiving vocoded voice signals from said PLMN network for part decoding.
12. The interface of claim 1, configured to appear to said PLMN network as both a serving GPRS support node (SGSN) for packet data and as a base station for circuit switched data.
13. The interface of claim 12, further comprising functionality to authenticate a device connecting to said non-PLMN network.
14. The interface of claim 13, further comprising functionality to register a device connecting to said non-PLMN network.
15. The interface of claim 12, further comprising functionality to update the location of a device connecting to said non-PLMN network.
16. The interface of claim 12, further comprising support functionality for allowing a device connecting to said non-PLMN network to generate service requests.
17. The interface of claim 1, further comprising functionality to provide said PLMN network with connection control data formatted for said PLMN network to be able to integrate corresponding activity into a consolidated bill.
18. The interface of claim 12, configured to operate together with a connection management unit of said non-PLMN network, thereby to obtain from said non-PLMN network details of connecting parties and quantity of data exchanged.
19. The interface of claim 18, further comprising functionality to format said details obtained into a PLMN compatible format.
20. An access card for a wireless LAN, comprising a cellular identity module associated therewith for providing PLMN security functionality, thereby to allow access via said wireless LAN to a PLMN network.
21. The access card of claim 20, wherein said cellular identity module is mounted on said access card.
22. The access card of claim 20, wherein said cellular identity module is reversibly mounted on said access card.
23. The access card of claim 20, wherein said cellular identity module is a SIM.
24. The access card of claim 23, comprising both a SIM carrier and a SIM reader.
25. The access card of claim 20, wherein said cellular identity module is a virtual cellular identity module.
26. The access card of claim 25, wherein said virtual cellular identity module is a virtual module comprising SIM functionality.
27. The access card of claim 20, comprising functionality to exchange authentication signals with a LAN gateway, thereby to achieve network authorization.
28. The access card of claim 27, wherein said authentication signals are formatted to be transferable between said LAN gateway and said PLMN network, thereby to obtain PLMN authorization.
29. A method of accessing a PLMN network via a non-PLMN network using a non-PLMN device, comprising: providing said non-PLMN device with an access card suitable for said non PLMN network, providing said access card with a cellular identification module, providing said non-PLMN network with gateway functionality to relay cellular identification signals between said non-PLMN device and said PLMN network.
30. A method of accessing a PLMN network via a non-PLMN network using a non-PLMN device, comprising: providing said non-PLMN network with a secure authentication unit for authentication of said non-PLMN device, providing said non-PLMN network with gateway functionality, associated with said secure authentication unit, to operate said authentication unit and to relay cellular identification signals to said PLMN network in response to authentication of said non-PLMN device.
31. A method of operating a secure gateway between a PLMN network and a non-PLMN network such that a non-PLMN device is authenticatable for a PLMN connection, the method comprising: authenticating said non-PLMN network via a first authentication protocol, and exchanging signals with said PLMN network via a cellular authentication protocol, comprising indicating device authentication following authentication via said first protocol.
32. A method of operating a secure gateway between a PLMN network and a non PLMN network, such that a non-PLMN device is authenticatable for a PLMN connection, the method comprising: exchanging signals with said PLMN network via a cellular authentication protocol thereby to authorize said non-PLMN network to connect to said device.
33. Handoff manager for managing handoff of a mobile unit communicating using an identifiable session between a first mobile network access point and a second mobile network access point, wherein said first access point belongs to a first network, and said second access point belongs to a second network, said manager being commonly accessible to each network and comprising a mobile unit matcher for performing matching between mobile units having disconnected from one network and mobile units having connected to other networks, and a session maintainer associated with said mobile unit matcher for transferring sessions between units thus matched, thereby to handoff between networks.
34. The handoff manager of claim 33, comprising a unit at a single location.
35. The handoff manager of claim 33, comprising distributed functionality located at a plurality of intra-network or inter-network nodes.
36. The handoff manager of claim 33, wherein one of said networks is a
PLMN network.
37. The handoff manager of claim 33, wherein one of said networks is a wireless LAN network.
38. The handoff manager of claim 36, wherein one of said networks is a wireless LAN network.
39. The handoff manager of claim 33, further comprising a session active management unit for determining from a currently used network when connection quality threshold is not being met, for instructing said mobile unit to search for surrounding networks and determine connection parameters thereof, to identify from said parameters a best network and to instruct said mobile unit to connect to said best network.
40. The handoff manager of claim 39, wherein said session active management unit is associated with said mobile unit matcher, thereby to use said instruction to assist with said matching.
41. The handoff manager of claim 39, wherein said session active management unit is operable to determine whether said instructed match has succeeded and, in the absence of a successful connection, is operable to instruct said mobile unit to connect to a next best network.
42. The handoff manager of claim 41, wherein said session active management unit is operable to continue to instruct said mobile unit to connect to a next best unit until a successful connection is indicated.
43. The handoff manager of claim 33, further comprising a session passive management unit for determining from said mobile unit when connection quality threshold is not being met, for instructing said mobile unit to search for surrounding networks and determine connection parameters thereof, to identify from said parameters a best network and to instruct said mobile unit to connect to said best network.
44. The handoff manager of claim 33, further being operable to instruct said mobile unit to disconnect from a first network and subsequently to connect to a best network.
45. The handoff manager of claim 33, further being operable to instruct said mobile unit to connect to a best network and subsequently to disconnect from a current network.
46. The handoff manager of claim 33, operable to reduce a connection quality level at a current network, thereby to force said mobile unit to disconnect therefrom and find another network.
47. The handoff manager of claim 33, operable, following a selection of to a best network for reconnection, to reduce a connection quality at a current network, and to send an instruction to said mobile unit to connect to said selected best network.
48. The handoff manager of claim 33, further operable to provide to said mobile unit identification of potentially available networks.
49. The handoff manager of claim 33, further operable to provide to said mobile unit network parameters of a potentially available network.,
50. The handoff manager of claim 49, wherein said parameters include any one of a group comprising: preferred access channels for a respective PLMN network, identity of proxy IP's for Internet access which are capable of supporting a better distributed SCC architecture, loading conditions of said potentially available networks, general availability parameters of said potentially available networks, network access numbers for Internet access, and information on expected loading conditions of said potentially available network.
51. The handoff manager of claim 33, wherein said first mobile network and said second mobile network are respectively wireless LANs of a single hotspot.
52. The handoff manager of claim 51, wherein said first and said second networks are overlapping networks and a mobile unit for handoff is located at a point of overlap between said networks.
53. The handoff manager of claim 33, wherein said first and said second networks respectively use a same network protocol.
54. The handoff manager of claim 33, wherein said first and said second networks respectively use a different network protocol.
55. The handoff manager of claim 51, wherein said first and said second networks are non-overlapping.
56. The handoff manager of claim 33, wherein said first network and said second network are respectively of different Hot Spots.
57. The handoff manager of claim 56, wherein said different hotspots have a region of overlap and where a mobile device for handoff is located in said region of overlap.
58. The handoff manager of claim 56, wherein said hotspots utilize a single communication protocol.
59. The handoff manager of claim 56, wherein said hotspots utilize respectively different communication protocols.
60. The handoff manager of claim 33, wherein said first network and said second network are respectively PLMN networks.
61. The handoff manager of claim 60, wherein said first PLMN and said second PLMN network utilize a single communication protocol.
62. The handoff manager of claim 60, wherein said first and said second
PLMN network utilize respectively different communication protocols.
63. The handoff manager of claim 60, wherein said first and said second communication network have a region of overlap and wherein a mobile device for handoff is located in said region of overlap.
64. The handoff manager of claim 33, wherein said first network is a wireless local network and said second network is a PLMN network.
65. The handoff manager of claim 64, wherein said wireless local network is located within a region of coverage of said PLMN network.
66. The handoff manager of claim 65, comprising a priority unit for setting said wireless local network as a higher priority than said PLMN network such that a mobile unit is automatically handed off to said wireless local network when in range thereof.
67. A method of handoff of a mobile device, communicating in a communication session, said handoff being between access points of a first and a second wireless network respectively, the method comprising: providing a control point at a location common to both said networks, at said control point determining identities of mobile devices whose connections have been terminated and obtaining data of respective sessions thereof, at said control point determining identities of new connections formed with mobile devices, at said control point matching said identities, thereby to match an existing session with a mobile device that has terminated its connection at a first access point and has reconnected at a second access point.
68. Authentication apparatus comprising: a communicator for communicating with an authenticatable mobile device, a verifier associated with said authenticatable mobile device to verify that the communication is with an intended one of authenticatable devices, and an associator for associating the verification with an activity request via a non authenticatable device, thereby to authenticate the activity request of the non- authenticatable device.
69. The apparatus of claim 68, wherein said authenticable device is a GSM device and said authenticatable link is a GSM link.
70. The apparatus of claim 68, wherein said authenticatable device is a
CDMA device and said authenticatable link is a CDMA link.
71. The apparatus of claim 68, wherein said authenticatable device is a PDC device and said authenticatable link is a PDC link.
72. The apparatus of claim 68, wherein said authenticatable device is an EDGE device and said authenticatable link is an EDGE link.
73. The apparatus of claim 68, wherein said authenticatable device is a WCDMA device and said authenticatable link is a WCDMA link.
74. The apparatus of claim 68, wherein said authenticatable device is a GPRS device and said authenticatable link is a GPRS link.
75. The apparatus of claim 68, wherein said authenticatable device is an Iridium device and said authenticatable link is an Iridium link.
76. The apparatus of claim 68, wherein said secure link involves a subscriber identity module located at said secure mobile device.
77. The apparatus of claim 68, wherein said authenticatable link is a secure link utilizing a subscriber identity module located at said authenticatable device.
78. The apparatus of claim 68, wherein said authenticatable device is a mobile telephone.
79. The apparatus of claim 68, wherein said communication comprises an electronic data communication.
80. The apparatus of claim 79, wherein said electronic data communication comprises electronic messaging.
81. The apparatus of claim 80, wherein said electronic messaging comprises SMS messaging.
82. The apparatus of claim 80, wherein said electronic messaging comprises WAP.
83. The apparatus of claim 80, wherein said electronic messaging comprises email.
84. The apparatus of claim 80, wherein said electronic messaging comprises EMS.
85. The apparatus of claim 80, wherein said electronic messaging comprises MMS.
86. The apparatus of claim 80, wherein said communicator comprises functionality to initiate said communication by sending an initial message to said authenticatable device and functionality to receive a reply to said initial message from said authenticatable device, therewith to authorize said activity request.
87. The apparatus of claim 80, wherein said communicator comprises functionality to receive an initializing communication from either one of said authenticatable device and said non-authenticatable device, and functionality to send a reply to said initial message, therewith to authorize said activity request.
88. The apparatus of claim 80, wherein said communicator comprises functionality to receive an initializing communication from an external device and functionality to establish a link between said authenticatable device and said non- authenticatable device, therewith to authorize said activity request.
89. The apparatus of claim 80, wherein said communicator involves functionality to receive a message from said authenticatable device and functionality to complete said communication by sending a response thereto to said secure authenticatable device, thereby to authorize said activity request.
90. The apparatus of claim 86, wherein said communicator comprises functionality to insert an identifier into said reply for a requesting party to enter via said non-authenticatable device, and wherein said verifier further comprises functionality to determine whether said identifier have been received via said non- authenticatable device.
91. The apparatus of claim 68, wherein said communicator is operable to use an automatic voice for communicating with said authenticatable device.
92. The apparatus of claim 68, wherein said authenticatable device is associated with a payment account, said apparatus further comprising functionality to charge said requested activity to said payment account.
93. The apparatus of claim 68, wherein said requested activity is an Internet browsing activity or a point of sale activity.
94. The apparatus of claim 68, wherein said requested activity is access to a network.
95. The apparatus of claim 68, operable to connect to said non- authenticable device via Bluetooth access points.
96. The apparatus of claim 68, operable to connect to said non- authenticatable device via at least one WLAN access point.
97. The apparatus of claim 68, being connectable to said non- authenticatable device via a TCP/IP link.
98. The apparatus of claim 68, wherein said communicator is operable to obtain a telephone number for communicating with said authenticatable device, from said non-authenticatable device.
99. The apparatus of claim 68, wherein said communicator is operable to obtain identification data, from said non-authenticable device, for forming said association.
100. The apparatus of claim 68, wherein said non-authenticatable device is any one of a group comprising a credit card, a smart card, an infra-red device, a Bluetooth device, a PDA, a mobile computer, a fixed computer, and a network of computers.
101. The apparatus of claim 68, further comprising a counter for timing said communication to fail said authorization if said communication is not completed by a predetermined time limit.
102. The apparatus of claim 68, further comprising a log-in functionality for logging in the non-authenticatable device.
103. The apparatus of claim 68, wherein said associator is connected to an authenticator for indicating that said activity request is approved.
104. The apparatus of claim 103, wherein said authentication communicator is operable to communicate said authentication to an external gateway associated with said non-authenticatable device.
105. The apparatus of claim 103, wherein said authentication communicator is operable to communicate said authentication to a server associated with said requested activity.
106. The apparatus of claim 103, wherein said authentication communicator is operable to communicate said authentication by applying a change to a routing table on a router.
107. A personal transaction card compatible with ATM machines, comprising, in ATM readable format, an ATM routing number and a mobile telephone number, said mobile telephone number being associated with an owner of said personal transaction card.
108. The personal transaction card of claim 107, wherein said numbers are stored on a magnetic strip.
109. The personal transaction card of claim 107, wherein said numbers are stored in an internal integrated circuit.
1 10. Authentication method comprising: communicating via a secure link with an authenticatable device, verifying that the communication is with an intended one of authenticatable devices, and associating the verification with an activity request via a non-authenticatable device, thereby to authenticate the activity request of the non-authenticatable device.
111. The method of claim 110, wherein said authenticatable device is a GSM device and said authenticatable link is a GSM link.
112. The method of claim 110, wherein said authenticatable device is a
CDMA device and said authenticatable link is a CDMA link.
113. The method of claim 110, wherein said authenticatable device is a PDC device and said authenticatable link is a PDC link.
1 14. The method of claim 110, wherein said authenticatable device is an edge device and said authenticatable link is an edge link.
115. The method of claim 110, wherein said authenticatable device is a WCDMA device and said authenticatable link is a WCDMA link.
116. The method of claim 110, wherein said authenticatable device is a GPRS device and said authenticatable link is a GPRS link.
117. The method of claim 110, wherein said authenticatable device is an
Iridium device and said authenticatable link is Iridium link.
1 18. The method of claim 1 10, wherein said authenticatable link comprises a secure link involving a subscriber identity module located at said authenticatable device.
119. The method of claim 111, wherein said secure link involves a subscriber identity module located at said authenticatable device.
120. The method of claim 1 10, wherein said authenticatable device is a mobile telephone.
121. The method of claim 110, wherein said communication comprises electronic data communication.
122. The method of claim 121, wherein said electronic data communication comprises electronic messaging or SMS messaging.
123. The method of claim 122 comprising initiating said communication by sending an initial message to said authenticatable device and functionality to receive a reply to said initial message from said authenticatable device, therewith to authorize said activity request.
124. The method of claim 123, wherein said communicating involves receiving a message from said authenticatable device and completing said communication by sending a response thereto to said authenticatable device, thereby to authorize said activity request.
125. The method of claim 124, comprising inserting a password into said reply for a requesting party to enter via said non-authenticatable device, and determining whether said password has been received via said non-authenticatable device.
126. The method of claim 1 10, comprising using an automatic voice for communicating with said authenticatable device.
127. The method of claim 1 10, wherein said authenticatable device is associated with a payment account, said method further comprising charging said requested activity to said payment account.
128. The method of claim 1 10, wherein said requested activity is one of a group comprising an Internet browsing activity, a point of sale activity and accessing a network.
129. The method of claim 110, comprising using one of infra-red and bluetooth.
130. The method of claim 1 10, said non-authenticatable device being a TCP/IP link.
131. The method of claim 1 10, comprising obtaining a telephone number for communicating with said authenticatable device, from said non-authenticatable device.
132. The method of claim 1 10, wherein said non-authenticatable device is any one of a group comprising a credit card, a smart card, an infra-red device, a Bluetooth device, a PDA, a mobile computer, a fixed computer, and a network of computers.
133. The method of claim 1 10, further comprising timing said communication to fail said authorization if said communication is not completed by a predetermined time limit.
134. The method of claim 1 10, further comprising a logging in procedure for logging in the non-authenticatable device.
135. The method of claim 110, comprising outputting an indication that said activity request is approved.
136. The method of claim 135, wherein said indication is output to an external gateway associated with said non-authenticatable device.
137. The method of claim 135, wherein said indication is output to a server associated with said requested activity.
138. The method of claim 135, wherein said indication is output by applying a change to a routing table on a router.
11
PCT/IL2002/000382 2001-05-16 2002-05-16 Access to plmn networks for non-plmn devices WO2002093811A2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
AU2002302956A AU2002302956A1 (en) 2001-05-16 2002-05-16 Access to plmn networks for non-plmn devices
US10/502,791 US8086855B2 (en) 2001-05-16 2002-05-16 Access to PLMN networks for non-PLMN devices, and to issues arising in interfaces in general between PLMN and non-PLMN networks
TW091134023A TWI262005B (en) 2001-05-16 2002-11-21 Access to PLMN networks for non-PLMN devices, and to issues arising in interfaces in general between PLMN and non-PLMN networks

Applications Claiming Priority (16)

Application Number Priority Date Filing Date Title
US29096001P 2001-05-16 2001-05-16
US29095901P 2001-05-16 2001-05-16
US29096101P 2001-05-16 2001-05-16
US29096301P 2001-05-16 2001-05-16
US60/290,961 2001-05-16
US60/290,960 2001-05-16
US60/290,963 2001-05-16
US60/290,959 2001-05-16
US29556101P 2001-06-05 2001-06-05
US60/295,561 2001-06-05
US29779801P 2001-06-14 2001-06-14
US60/297,798 2001-06-14
US32491401P 2001-09-27 2001-09-27
US60/324,914 2001-09-27
US09/990,875 2001-11-23
US09/990,875 US20030061503A1 (en) 2001-09-27 2001-11-23 Authentication for remote connections

Publications (2)

Publication Number Publication Date
WO2002093811A2 true WO2002093811A2 (en) 2002-11-21
WO2002093811A3 WO2002093811A3 (en) 2003-04-10

Family

ID=27575344

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IL2002/000382 WO2002093811A2 (en) 2001-05-16 2002-05-16 Access to plmn networks for non-plmn devices

Country Status (3)

Country Link
US (1) US8086855B2 (en)
AU (1) AU2002302956A1 (en)
WO (1) WO2002093811A2 (en)

Cited By (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10245760A1 (en) * 2002-10-01 2004-04-15 Deutsche Telekom Ag Internet service access procedure for adhoc radio networks uses gateway to fixed infrastructure network with transfer of address, service type and authentication data
WO2004049668A1 (en) * 2002-11-27 2004-06-10 Research In Motion Limited Data transfer from a host server via a tunnel server to a wireless device, and associating a temporary ipv6 address with a temporary ipv4 address for communicating in an ipv4 wireless network with the device
WO2004114612A2 (en) 2003-06-20 2004-12-29 Cisco Technology, Inc. Wireless voice over ip phone system for transmitting packets to a handset over a wireless personal area network or a wireless local area network
WO2005024543A2 (en) * 2003-09-05 2005-03-17 Bergs Magnus H Method and device for setting up links between communication terminals and data and communication networks comprising wireless transmission paths
WO2005104597A1 (en) 2004-04-26 2005-11-03 Nokia Corporation Improved subscriber authentication for unlicensed mobile access signaling
WO2005110006A2 (en) * 2004-05-14 2005-11-24 Virtualiti Holdings Ltd. Method and arrangement device relating to communication network
WO2005117478A1 (en) * 2004-05-26 2005-12-08 Nokia Corporation Improved method and system for associating subscriber identity information
WO2005120101A1 (en) * 2004-06-04 2005-12-15 De Sousa Elvino Silveira Medin Autonomous infrastructure wireless networks
WO2005125261A1 (en) * 2004-06-17 2005-12-29 Telefonaktiebolaget Lm Ericsson (Publ) Security in a mobile communications system
EP1615097A2 (en) * 2004-06-16 2006-01-11 PCCW-HKT DataCom Services Limited Dual-path-pre-approval authentication method
GB2428942A (en) * 2005-08-01 2007-02-07 Ubiquisys Ltd Access point for connection to a LAN/WAN device without using cellular core network
EP1834446A2 (en) * 2004-11-18 2007-09-19 Azaire Networks Inc. Maintaining consistent network connections while moving through wireless networks
WO2007135356A1 (en) * 2006-05-23 2007-11-29 British Telecommunications Public Limited Company Inter wlan handover without mobile network support
EP1895722A1 (en) * 2006-06-30 2008-03-05 Telefonaktiebolaget LM Ericsson (publ) Network node, method, and mobile terminal for providing voice calls to a mobile terminal in a packet-switched-only network
WO2008057731A2 (en) * 2006-10-17 2008-05-15 Mavenir Systems, Inc. Providing mobile core services independent of a mobile device
US7711359B2 (en) 1998-10-02 2010-05-04 Telespree Communications Portable cellular phone system having automatic initialization
US7792265B2 (en) 2006-03-10 2010-09-07 British Telecommunications Plc Call completion service in case of called party unavailability
KR101071524B1 (en) * 2006-09-25 2011-10-10 콸콤 인코포레이티드 Method and apparatus having null-encryption for signaling and media packets between a mobile station and a secure gateway
US8086855B2 (en) 2001-05-16 2011-12-27 Flash Networks Ltd. Access to PLMN networks for non-PLMN devices, and to issues arising in interfaces in general between PLMN and non-PLMN networks
CN102341986A (en) * 2009-01-05 2012-02-01 惠普开发有限公司 Extending device functionality amongst inductively linked devices
EP2528359A1 (en) * 2011-05-27 2012-11-28 The Nielsen Company (US), LLC Methods and apparatus to associate a mobile device with a panelist profile
US8483126B2 (en) 2006-05-23 2013-07-09 British Telecommunications Plc Multi-network mobile communications systems and/or methods
US8483760B2 (en) 2007-02-23 2013-07-09 Ubiquisys Limited Basestation for cellular communications system
US8571600B2 (en) 2010-02-26 2013-10-29 Cisco Technology, Inc. Reducing power consumption of wireless devices
US8818901B2 (en) 2006-06-02 2014-08-26 The Nielsen Company (Us), Llc Digital rights management systems and methods for audience measurement
US8849249B2 (en) 2011-05-23 2014-09-30 Gigsky, Inc. Devices and systems that obtain and manage subscriptions for accessing wireless networks on an ad hoc basis and methods of use
US8850045B2 (en) 2008-09-26 2014-09-30 Qualcomm Incorporated System and method for linking and sharing resources amongst devices
US8868939B2 (en) 2008-09-26 2014-10-21 Qualcomm Incorporated Portable power supply device with outlet connector
US8887235B2 (en) 2006-10-17 2014-11-11 Mavenir Systems, Inc. Authentication interworking
US8948692B2 (en) 2011-02-08 2015-02-03 Qualcomm Incorporated Graphic notification feedback for indicating inductive coupling amongst devices
CN106332201A (en) * 2015-07-07 2017-01-11 西安中兴新软件有限责任公司 Wireless hotspot switching method and mobile terminal
US9686721B2 (en) 2004-12-09 2017-06-20 Interdigital Technology Corporation Method and system for interworking of cellular networks and wireless local area networks
US9913211B2 (en) 2011-05-23 2018-03-06 Gigsky, Inc. Global e-marketplace for mobile services
CN114095984A (en) * 2021-11-02 2022-02-25 中国联合网络通信集团有限公司 Session management method, OAM and AMF

Families Citing this family (152)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8140845B2 (en) * 2001-09-13 2012-03-20 Alcatel Lucent Scheme for authentication and dynamic key exchange
FI114276B (en) * 2002-01-11 2004-09-15 Nokia Corp Arranging online visits
SE0104325D0 (en) * 2001-12-20 2001-12-20 Ericsson Telefon Ab L M A method and apparatus for switching access between mobile networks
US7197301B2 (en) 2002-03-04 2007-03-27 Telespree Communications Method and apparatus for secure immediate wireless access in a telecommunications network
US8046581B2 (en) 2002-03-04 2011-10-25 Telespree Communications Method and apparatus for secure immediate wireless access in a telecommunications network
GB2386504B (en) * 2002-03-12 2005-03-02 Toshiba Res Europ Ltd Alternative radio system monitoring
DE10215151A1 (en) * 2002-04-05 2003-10-16 Fg Microtec Gmbh Process for the transmission of information over IP networks
US7908378B2 (en) * 2002-04-26 2011-03-15 Nokia, Inc. Provisioning seamless applications in mobile terminals through registering and transferring of application context
JP4239058B2 (en) * 2002-05-22 2009-03-18 ソニー株式会社 Radio communication apparatus, radio communication apparatus control method, radio communication apparatus control method program, and recording medium storing radio communication apparatus control method program
CN100388816C (en) * 2002-06-06 2008-05-14 汤姆森特许公司 Wlan as a logical support node for hybrid coupling in an interworking between wlan and a mobile communications system
BR0305028A (en) * 2002-06-06 2004-11-09 Thomson Licensing Sa Wlan as a software node (sgsn) for interoperation between wlan and a mobile communication system
JP3796200B2 (en) * 2002-06-20 2006-07-12 インターナショナル・ビジネス・マシーンズ・コーポレーション Wireless communication system and switching method
US7047036B2 (en) * 2002-07-02 2006-05-16 Interdigital Technology Corporation Method and apparatus for handoff between a wireless local area network (WLAN) and a universal mobile telecommunication system (UMTS)
US7519364B2 (en) * 2002-08-02 2009-04-14 Pctel, Inc. System and method for seamless roaming between wireless networks
US7046989B2 (en) * 2002-09-12 2006-05-16 Broadcom Corporation Controlling and enhancing handoff between wireless access points
WO2004036492A2 (en) * 2002-10-16 2004-04-29 Sci-Tel Ltd. Smart card network interface device
JP3742056B2 (en) * 2002-12-19 2006-02-01 株式会社バッファロー Wireless network access authentication technology
US7369859B2 (en) 2003-10-17 2008-05-06 Kineto Wireless, Inc. Method and system for determining the location of an unlicensed mobile access subscriber
US7640008B2 (en) 2002-10-18 2009-12-29 Kineto Wireless, Inc. Apparatus and method for extending the coverage area of a licensed wireless communication system using an unlicensed wireless communication system
US7885644B2 (en) * 2002-10-18 2011-02-08 Kineto Wireless, Inc. Method and system of providing landline equivalent location information over an integrated communication system
US7079521B2 (en) * 2002-11-18 2006-07-18 Cisco Technology, Inc. Method and system for voice calls in a wireless local area network (WLAN)
US7133386B2 (en) * 2002-11-18 2006-11-07 Cisco Technology, Inc. Method and system for service portability across disjoint wireless networks
US7242950B2 (en) * 2003-02-18 2007-07-10 Sbc Properties, L.P. Location determination using historical data
KR100560849B1 (en) * 2003-05-14 2006-03-13 에스케이 텔레콤주식회사 System and Method for Setting Handover Based on Quality of Service in WCDMA System
CN100386999C (en) * 2003-07-23 2008-05-07 华为技术有限公司 Method for monitoring user connection state
FI20031412A0 (en) * 2003-09-30 2003-09-30 Nokia Corp A method, system, and radio access network nodes for reconnecting a user data connection
CA2542015C (en) * 2003-10-08 2011-12-06 Research In Motion Limited System and method of handling ip layer mobility in a wireless network
US8713626B2 (en) * 2003-10-16 2014-04-29 Cisco Technology, Inc. Network client validation of network management frames
TWI391004B (en) 2003-11-12 2013-03-21 Interdigital Tech Corp System for application server autonomous access across diferent types of access technology networks
TWI249360B (en) 2003-11-13 2006-02-11 Interdigital Tech Corp Method and system for facilitating inter-system handover
WO2005053341A1 (en) * 2003-11-27 2005-06-09 Telecom Italia S.P.A Method for simulating a communication networks that cosiders quality of service
US7735120B2 (en) * 2003-12-24 2010-06-08 Apple Inc. Server computer issued credential authentication
US8078164B2 (en) 2004-01-06 2011-12-13 Vasu Networks Corporation Mobile telephone VOIP/cellular seamless roaming switching controller
US8913604B2 (en) 2004-01-06 2014-12-16 Vasu Networks Corporation Access point with controller for billing and generating income for access point owner
US10419996B2 (en) 2004-01-06 2019-09-17 Vasu Networks Corporation Mobile device with automatic switching between cellular and wifi networks
EP1738538B1 (en) 2004-01-06 2018-08-08 Vasu Networks Corporation Telephone with automatic switching between cellular and voip networks
US8520605B2 (en) * 2004-01-06 2013-08-27 Vasu Networks Corporation Apparatus for controlling broadband access and distribution of content and communications through an access point
US8514867B2 (en) 2004-01-06 2013-08-20 Hava Corporation Method of determining broadband content usage within a system
US7836189B2 (en) * 2004-01-26 2010-11-16 Avaya Inc. Multiple simultaneous wireless connections in a wireless local area network
JP2005222261A (en) * 2004-02-05 2005-08-18 Nec Corp In-train network connection service operation method, communication system using the method, and service operation system
FR2867006B1 (en) * 2004-02-27 2006-06-23 Cit Alcatel METHOD FOR CONTROLLING RIGHTS OF ACCESS IN A MOBILE RADIOCOMMUNICATIONS SYSTEM
DK1723814T3 (en) 2004-03-12 2009-11-09 Interdigital Tech Corp Method of switching a radio switching technology between wireless communication systems with a multimode wireless transmitting / receiving device
DE102004013316A1 (en) * 2004-03-17 2005-10-27 Tenovis Gmbh & Co. Kg Telecommunication system Method for configuring and operating a telecommunication system
US7849135B2 (en) * 2004-04-09 2010-12-07 At&T Mobility Ii Llc Sharing content on mobile devices
US7295833B2 (en) 2004-04-09 2007-11-13 At&T Mobility Ii Llc Spam control for sharing content on mobile devices
US20050239496A1 (en) * 2004-04-14 2005-10-27 Nortel Networks Limited Mobile terminal with wired and wireless network interfaces
US7283803B2 (en) 2004-04-16 2007-10-16 Broadcom Corporation Location-aware application based quality of service (QOS) via a broadband access gateway
ATE499787T1 (en) 2004-04-30 2011-03-15 Research In Motion Ltd SYSTEM AND METHOD FOR SECURING DATA
US8296825B2 (en) * 2004-05-31 2012-10-23 Telecom Italia S.P.A. Method and system for a secure connection in communication networks
US20050271018A1 (en) * 2004-06-03 2005-12-08 Sbc Knowledge Ventures, L.P. System and method for assisting handoff between wide area and local area networks
US7554960B2 (en) * 2004-06-09 2009-06-30 Vanu, Inc. Reducing cost of cellular backhaul
US9232463B2 (en) 2004-08-09 2016-01-05 Blackberry Limited Apparatus, and associated method, for facilitating communications by a mobile node in a multiple network radio communication system having interworking capability
US20060029027A1 (en) * 2004-08-09 2006-02-09 Adrian Buckley Apparatus, and associated method, for facilitating communications by a mobile node in a multiple network radio communication system having interworking capability
US7940746B2 (en) 2004-08-24 2011-05-10 Comcast Cable Holdings, Llc Method and system for locating a voice over internet protocol (VoIP) device connected to a network
US20060056390A1 (en) * 2004-09-10 2006-03-16 Bantex Corporation Public network system of payment mode using a card with a chip
US7778228B2 (en) * 2004-09-16 2010-08-17 The Boeing Company “Wireless ISLAND” mobile LAN-to-LAN tunneling solution
KR100566296B1 (en) * 2004-10-08 2006-03-30 삼성전자주식회사 Method for accessing subscriber identity module in complex mobile terminal
US8964765B2 (en) * 2004-11-12 2015-02-24 Broadcom Corporation Mobile handheld multi-media gateway and phone
US7623852B2 (en) * 2004-11-15 2009-11-24 At&T Mobility Ii Llc Remote programming/activation of SIM enabled ATA device
JP2006165928A (en) * 2004-12-07 2006-06-22 Hitachi Ltd Data distribution support method for traveling object
US10320989B2 (en) 2005-02-11 2019-06-11 Vasu Networks Corporation Access point with controller for billing and generating income for access point owner
US7933598B1 (en) 2005-03-14 2011-04-26 Kineto Wireless, Inc. Methods and apparatuses for effecting handover in integrated wireless systems
TWI270286B (en) * 2005-04-18 2007-01-01 Inventec Appliances Corp Method of fast boot for mobile communication device
US7496346B2 (en) * 2005-04-25 2009-02-24 Cisco Technology, Inc. Authorizing a mobile node for service
US7734732B2 (en) * 2005-05-12 2010-06-08 At&T Mobility Ii Llc System, apparatus and methods for storing links to media files in network storage
US7466991B2 (en) * 2005-05-26 2008-12-16 Sprint Spectrum L.P. Method and system using a conference bridge for handoff of a multi-mode mobile station
CN101228805A (en) * 2005-05-30 2008-07-23 艾利森电话股份有限公司 Technique for controlling switch in multi radio wireless communication system
US20060291412A1 (en) 2005-06-24 2006-12-28 Naqvi Shamim A Associated device discovery in IMS networks
JP4892884B2 (en) * 2005-08-01 2012-03-07 日本電気株式会社 Mobile phone terminal with built-in wireless LAN, mobile phone system, and personal information protection method thereof
US7843900B2 (en) 2005-08-10 2010-11-30 Kineto Wireless, Inc. Mechanisms to extend UMA or GAN to inter-work with UMTS core network
US8559921B2 (en) * 2005-08-17 2013-10-15 Freescale Semiconductor, Inc. Management of security features in a communication network
DE102005040002A1 (en) * 2005-08-23 2007-03-15 Thales Defence Deutschland Gmbh Method and device for identifying a mobile terminal in a digital cellular mobile network
US7515910B2 (en) * 2005-09-26 2009-04-07 Motorola, Inc. Cellular/WLAN hybrid-terminal handover techniques
WO2007069988A1 (en) * 2005-12-14 2007-06-21 Telefonaktiebolaget Lm Ericsson (Publ) Arrangment and method in a mobile telecommunication system
KR100791288B1 (en) * 2005-12-27 2008-01-04 삼성전자주식회사 Apparatus and method for providing seamless handover
US7539490B2 (en) * 2005-12-27 2009-05-26 Motorola, Inc. Method and system for rapid channel acquisition across heterogeneous radio access technologies
US7979059B2 (en) * 2006-02-06 2011-07-12 Rockefeller Alfred G Exchange of voice and video between two cellular or wireless telephones
US20070188298A1 (en) * 2006-02-11 2007-08-16 Radioframe Networks, Inc. Establishing secure tunnels for using standard cellular handsets with a general access network
US7944885B2 (en) * 2006-02-11 2011-05-17 Broadcom Corporation General access network controller bypass to facilitate use of standard cellular handsets with a general access network
US8543105B2 (en) * 2006-02-11 2013-09-24 Broadcom Corporation Using standard cellular handsets with a general access network
RU2405281C2 (en) * 2006-02-28 2010-11-27 Нокиа Корпорейшн Handover in communication networks
JP4177853B2 (en) * 2006-03-10 2008-11-05 株式会社カシオ日立モバイルコミュニケーションズ Mobile terminal and control method thereof
US7650406B2 (en) * 2006-04-26 2010-01-19 Microsoft Corporation Termination of a security association between devices
WO2008018151A1 (en) * 2006-08-09 2008-02-14 Hitachi, Ltd. Communication system using multi-radio mode, monitor node apparatus, control node apparatus and base station apparatus
KR100800822B1 (en) * 2007-01-03 2008-02-04 삼성전자주식회사 Method for processing handover in bridge-based cellular ethernet network
US8019331B2 (en) 2007-02-26 2011-09-13 Kineto Wireless, Inc. Femtocell integration into the macro network
US8712474B2 (en) * 2007-04-20 2014-04-29 Telefonaktiebolaget L M Ericsson (Publ) Secure soft SIM credential transfer
US8792450B2 (en) * 2007-05-10 2014-07-29 Starhome Gmbh System and method for providing local IP connectivity for a roaming mobile subscriber
US8854990B1 (en) * 2007-08-15 2014-10-07 Marvell International Ltd. Multiple concurrent call sessions over a single voice call account
EP2187675B1 (en) * 2007-09-04 2014-12-24 Nippon Telegraph and Telephone Corporation Wireless relay apparatus and wireless communication system
KR20090039896A (en) * 2007-10-19 2009-04-23 삼성전자주식회사 Mobile terminal for multi network and method for using simcard thereof
JP2009152812A (en) * 2007-12-20 2009-07-09 Hitachi Ltd Network connection method of non-portable terminal by transfer of user identification information of terminal
US8200736B2 (en) * 2007-12-24 2012-06-12 Qualcomm Incorporated Virtual SIM card for mobile handsets
US20090170472A1 (en) * 2007-12-28 2009-07-02 Chapin John M Shared network infrastructure
US20090191846A1 (en) * 2008-01-25 2009-07-30 Guangming Shi Biometric smart card for mobile devices
US20090216678A1 (en) * 2008-02-25 2009-08-27 Research In Motion Limited System and method for facilitating secure communication of messages associated with a project
US20090245213A1 (en) * 2008-03-26 2009-10-01 Uti Limited Partnership Efficient Quality of Service (QoS) Scheduling in OFDMA Wireless Networks
WO2010069402A1 (en) * 2008-12-19 2010-06-24 Telefonaktiebolaget L M Ericsson (Publ) Gre user-plane
US8700072B2 (en) 2008-12-23 2014-04-15 At&T Mobility Ii Llc Scalable message fidelity
WO2010080759A2 (en) * 2009-01-06 2010-07-15 Altobridge Limited Base station subsystem multiplexer with support for local switching
US9510148B2 (en) 2009-03-03 2016-11-29 Mobilitie, Llc System and method for wireless communication to permit audience participation
US9369938B2 (en) 2009-03-31 2016-06-14 Microsoft Technology Licensing, Llc Subscriber identity module (SIM) for mobile stations
US8634828B2 (en) * 2009-06-08 2014-01-21 Qualcomm Incorporated Method and apparatus for switching virtual SIM service contracts based upon a user profile
US8649789B2 (en) 2009-06-08 2014-02-11 Qualcomm Incorporated Method and apparatus for switching virtual SIM service contracts when roaming
US20100311402A1 (en) * 2009-06-08 2010-12-09 Prasanna Srinivasan Method and apparatus for performing soft switch of virtual sim service contracts
US8639245B2 (en) * 2009-06-08 2014-01-28 Qualcomm Incorporated Method and apparatus for updating rules governing the switching of virtual SIM service contracts
US8811969B2 (en) 2009-06-08 2014-08-19 Qualcomm Incorporated Virtual SIM card for mobile handsets
US9014017B2 (en) * 2009-07-24 2015-04-21 Broadcom Corporation Method and system for associating physical link partners using a layer two mechanism
US8676180B2 (en) * 2009-07-29 2014-03-18 Qualcomm Incorporated Virtual SIM monitoring mode for mobile handsets
JP5257306B2 (en) 2009-09-11 2013-08-07 ブラザー工業株式会社 Wireless communication apparatus and computer program
DE102009043090A1 (en) * 2009-09-25 2011-03-31 Wincor Nixdorf International Gmbh Device for handling notes of value
EP2387263B1 (en) * 2010-05-12 2015-07-15 ThinxNet GmbH Authenticating a mobile device
US8549597B1 (en) * 2010-05-14 2013-10-01 Amazon Technologies, Inc. Temporary virtual identities in a social networking system
US8447986B2 (en) 2010-06-23 2013-05-21 Microsoft Corporation Accessing restricted content based on proximity
WO2012021662A2 (en) * 2010-08-10 2012-02-16 General Instrument Corporation System and method for cognizant transport layer security (ctls)
US9668129B2 (en) * 2010-09-14 2017-05-30 Vodafone Ip Licensing Limited Authentication in a wireless access network
IT1404159B1 (en) * 2010-12-30 2013-11-15 Incard Sa METHOD AND SYSTEM OF CONTROL OF A COMMUNICATION BETWEEN AN INTEGRATED CIRCUIT UNIVERSAL CARD AND AN EXTERNAL APPLICATION
US8863256B1 (en) 2011-01-14 2014-10-14 Cisco Technology, Inc. System and method for enabling secure transactions using flexible identity management in a vehicular environment
US8707022B2 (en) * 2011-04-05 2014-04-22 Apple Inc. Apparatus and methods for distributing and storing electronic access clients
WO2012168262A1 (en) * 2011-06-10 2012-12-13 Hirschmann Automation And Control Gmbh Completely redundant connection and handover in cellular industrial radio networks
CN102378175A (en) * 2011-10-08 2012-03-14 华为终端有限公司 Wireless local area network (WLAN) authentication method and mobile terminal
US11095549B2 (en) 2011-10-21 2021-08-17 Nant Holdings Ip, Llc Non-overlapping secured topologies in a distributed network fabric
KR101307826B1 (en) * 2011-11-28 2013-09-12 에스케이텔레콤 주식회사 Apparatus for service transmitting data in heterogeneous network
US10349272B2 (en) 2011-12-30 2019-07-09 Telefonaktiebolaget Lm Ericsson (Publ) Virtual SIM card cloud platform
US10956899B2 (en) * 2012-02-14 2021-03-23 Mastercard International Incorporated Mechanism to allow the use of disposable cards on a system designed to accept cards conforming to the standards of the global payments industry
US9026666B2 (en) 2012-02-14 2015-05-05 Avaya Inc. Communication session cloning using barcodes
US9479345B2 (en) * 2012-02-14 2016-10-25 Avaya Inc. Fixed mobile convergence for audio and web conference sessions using barcodes
US8737225B2 (en) * 2012-02-17 2014-05-27 City University Of Hong Kong Mobile internet service system for long distance trains
US9253589B2 (en) 2012-03-12 2016-02-02 Blackberry Limited Wireless local area network hotspot registration using near field communications
US9264955B1 (en) * 2012-03-16 2016-02-16 Sprint Spectrum L.P. Method and apparatus for frequency management
ES2903232T3 (en) * 2012-06-14 2022-03-31 Samsung Electronics Co Ltd Public land mobile network selection procedure for network sharing
JP2015179882A (en) * 2012-07-23 2015-10-08 パナソニック株式会社 Electronic apparatus
CN103582053B (en) * 2012-07-23 2016-09-14 华为终端有限公司 A kind of channel switching method, device and system
US9338805B2 (en) * 2012-11-16 2016-05-10 Mediatek, Inc. Method and apparatus for standby with a dual-standby modem and establishing single connection for one subscriber identity card
US9143550B2 (en) * 2012-12-01 2015-09-22 Qualcomm Innovation Center, Inc. Graceful degradation of websocket connections to nonpersistent HTTP-based communications
JP2014138238A (en) * 2013-01-16 2014-07-28 Nec Saitama Ltd Portable terminal device, wireless communication device, wireless communication system and wireless communication method
US9215075B1 (en) 2013-03-15 2015-12-15 Poltorak Technologies Llc System and method for secure relayed communications from an implantable medical device
US9729514B2 (en) * 2013-03-22 2017-08-08 Robert K Lemaster Method and system of a secure access gateway
US10491467B2 (en) 2014-05-23 2019-11-26 Nant Holdings Ip, Llc Fabric-based virtual air gap provisioning, systems and methods
US11023117B2 (en) * 2015-01-07 2021-06-01 Byron Burpulis System and method for monitoring variations in a target web page
US10285053B2 (en) * 2015-04-10 2019-05-07 Futurewei Technologies, Inc. System and method for reducing authentication signaling in a wireless network
US10098064B2 (en) * 2015-05-22 2018-10-09 Cable Television Laboratories, Inc. Virtual cells for radio access network (RAN) sharing
CN107182050B (en) * 2016-03-09 2021-09-03 中兴通讯股份有限公司 Verification method, device and terminal
US9900765B2 (en) * 2016-06-02 2018-02-20 Apple Inc. Method and apparatus for creating and using a roaming list based on a user roaming plan
US10356096B2 (en) * 2017-02-17 2019-07-16 At&T Intellectual Property I, L.P. Authentication using credentials submitted via a user premises device
US10440776B2 (en) 2017-03-17 2019-10-08 Harris Corporation Non-standard alternate protocol based satellite communications
CN109889270B (en) * 2019-02-01 2021-09-10 国网江苏省电力有限公司 Accurate load shedding system and method based on power wireless private network
FR3096201B1 (en) * 2019-05-13 2021-05-07 Sagemcom Energy & Telecom FRAME ACKNOWLEDGMENT PROCESS
US11375023B2 (en) * 2019-12-02 2022-06-28 International Business Machines Corporation Dynamically configuring a web server timeout
CN111563248B (en) * 2020-04-20 2024-03-08 北京智芯微电子科技有限公司 Secure chip access system
US11729588B1 (en) 2021-09-30 2023-08-15 T-Mobile Usa, Inc. Stateless charging and message handling
US11924915B2 (en) * 2022-03-30 2024-03-05 T-Mobile Usa, Inc. Enhanced PLMN coverage for mobile devices

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010034767A1 (en) * 1999-12-23 2001-10-25 Nokia Mobile Phones Ltd. Messaging service
US20010050908A1 (en) * 1998-10-19 2001-12-13 Markku Verkama Mechanism for network-initiated information transfer
US20020085540A1 (en) * 2000-12-29 2002-07-04 Jani Hyvarinen Telecommunication service provision in multi-network wireless telecommunication system
US20020101859A1 (en) * 2000-09-12 2002-08-01 Maclean Ian B. Communicating between nodes in different wireless networks

Family Cites Families (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5887256A (en) * 1995-05-04 1999-03-23 Interwave Communications International, Ltd. Hybrid cellular communication apparatus and method
DE19521484A1 (en) * 1995-06-13 1996-12-19 Deutsche Telekom Ag Method and device for authenticating subscribers to digital switching centers
EP0960402B1 (en) 1996-06-19 2007-09-26 Behruz Vazvan Real time system and method for remote purchase payment and remote bill payment transactions and transferring of electronic cash and other required data
GB2315193B (en) * 1996-07-10 2000-11-15 Orange Personal Comm Serv Ltd Mobile communications system
US6608832B2 (en) * 1997-09-25 2003-08-19 Telefonaktiebolaget Lm Ericsson Common access between a mobile communications network and an external network with selectable packet-switched and circuit-switched and circuit-switched services
US6104928A (en) * 1997-10-07 2000-08-15 Nortel Dasa Network System Gmbh & Co. Kg Dual network integration scheme
US6192361B1 (en) 1997-12-23 2001-02-20 Alcatel Usa Sourcing, L.P. Full group privileges access system providing user access security protection for a telecommunications switching system
US6138158A (en) 1998-04-30 2000-10-24 Phone.Com, Inc. Method and system for pushing and pulling data using wideband and narrowband transport systems
AU2515800A (en) 1999-01-26 2000-08-07 Infolio, Inc. Universal mobile id system and method for digital rights management
EP1037478A1 (en) * 1999-03-18 2000-09-20 Telefonaktiebolaget L M Ericsson (Publ) Cellular communication network architecture for fixed subscribers
US6515997B1 (en) * 1999-05-17 2003-02-04 Ericsson Inc. Method and system for automatic configuration of a gateway translation function
US7307958B2 (en) * 1999-12-08 2007-12-11 Cello Partnership Tunnelling wireless voice with software-defined vocoders
KR100407922B1 (en) 2000-01-18 2003-12-01 마이크로 인스펙션 주식회사 Certified method on the internet using cellular phone
JP3444486B2 (en) 2000-01-26 2003-09-08 インターナショナル・ビジネス・マシーンズ・コーポレーション Automatic voice response system and method using voice recognition means
US7302497B2 (en) * 2000-02-08 2007-11-27 Telefonaktiebolaget Lm Ericsson (Publ) Using internet protocol (IP) in radio access network
US20010037254A1 (en) 2000-03-09 2001-11-01 Adi Glikman System and method for assisting a customer in purchasing a commodity using a mobile device
FI20000760A0 (en) * 2000-03-31 2000-03-31 Nokia Corp Authentication in a packet data network
KR100334558B1 (en) * 2000-05-24 2002-05-03 윤종용 Wire·wireless unified in-building communication method and system
US6829486B2 (en) * 2000-08-14 2004-12-07 Vesuvius Communique system for combined cellular and wireline communication networks
SE517352C2 (en) * 2000-09-25 2002-05-28 Possio Ab Publ A gateway for a wireless internet system
US20020090089A1 (en) 2001-01-05 2002-07-11 Steven Branigan Methods and apparatus for secure wireless networking
US20020142761A1 (en) * 2001-02-01 2002-10-03 Wallstedt Yngve Kenneth Handoff between digital wireless office system (DWOS) radio-infrastructure units using a conference call
US6701151B2 (en) * 2001-03-27 2004-03-02 Ericsson Inc. Short access for realizing a signaling radio bearer in geran
US20030061503A1 (en) 2001-09-27 2003-03-27 Eyal Katz Authentication for remote connections
WO2002093811A2 (en) 2001-05-16 2002-11-21 Adjungo Networks Ltd. Access to plmn networks for non-plmn devices
US20020194499A1 (en) 2001-06-15 2002-12-19 Audebert Yves Louis Gabriel Method, system and apparatus for a portable transaction device
US7680085B2 (en) 2001-07-24 2010-03-16 Symbol Technologies, Inc. Out-of-band management and traffic monitoring for wireless access points
GB2379525A (en) 2001-09-08 2003-03-12 Int Computers Ltd Electronic payment authorisation
US7653200B2 (en) * 2002-03-13 2010-01-26 Flash Networks Ltd Accessing cellular networks from non-native local networks

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010050908A1 (en) * 1998-10-19 2001-12-13 Markku Verkama Mechanism for network-initiated information transfer
US20010034767A1 (en) * 1999-12-23 2001-10-25 Nokia Mobile Phones Ltd. Messaging service
US20020101859A1 (en) * 2000-09-12 2002-08-01 Maclean Ian B. Communicating between nodes in different wireless networks
US20020085540A1 (en) * 2000-12-29 2002-07-04 Jani Hyvarinen Telecommunication service provision in multi-network wireless telecommunication system

Cited By (66)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7711359B2 (en) 1998-10-02 2010-05-04 Telespree Communications Portable cellular phone system having automatic initialization
US7869800B2 (en) 1998-10-02 2011-01-11 Telespree Communications Portable cellular phone system having automatic initialization
US8086855B2 (en) 2001-05-16 2011-12-27 Flash Networks Ltd. Access to PLMN networks for non-PLMN devices, and to issues arising in interfaces in general between PLMN and non-PLMN networks
DE10245760A1 (en) * 2002-10-01 2004-04-15 Deutsche Telekom Ag Internet service access procedure for adhoc radio networks uses gateway to fixed infrastructure network with transfer of address, service type and authentication data
US8107483B2 (en) 2002-11-27 2012-01-31 Research In Motion Limited IPv4-to-IPv6 address transitioning methods and apparatus for systems that push information to wireless communication devices
US7710984B2 (en) 2002-11-27 2010-05-04 Research In Motion Limited Data transfer from a host server via a tunnel server to a wireless device, and associating a temporary IPV6 address with a temporary IPV4 address for communicating in an IPV4 wireless network with the device
WO2004049668A1 (en) * 2002-11-27 2004-06-10 Research In Motion Limited Data transfer from a host server via a tunnel server to a wireless device, and associating a temporary ipv6 address with a temporary ipv4 address for communicating in an ipv4 wireless network with the device
WO2004114612A3 (en) * 2003-06-20 2005-06-09 Cisco Tech Ind Wireless voice over ip phone system for transmitting packets to a handset over a wireless personal area network or a wireless local area network
WO2004114612A2 (en) 2003-06-20 2004-12-29 Cisco Technology, Inc. Wireless voice over ip phone system for transmitting packets to a handset over a wireless personal area network or a wireless local area network
WO2005024543A2 (en) * 2003-09-05 2005-03-17 Bergs Magnus H Method and device for setting up links between communication terminals and data and communication networks comprising wireless transmission paths
WO2005024543A3 (en) * 2003-09-05 2006-05-04 Magnus H Bergs Method and device for setting up links between communication terminals and data and communication networks comprising wireless transmission paths
WO2005104597A1 (en) 2004-04-26 2005-11-03 Nokia Corporation Improved subscriber authentication for unlicensed mobile access signaling
AU2005236981B2 (en) * 2004-04-26 2009-09-10 Nokia Technologies Oy Improved subscriber authentication for unlicensed mobile access signaling
EP2403283A1 (en) * 2004-04-26 2012-01-04 Nokia Corporation Improved subscriber authentication for unlicensed mobile access signaling
EP2547134A1 (en) * 2004-04-26 2013-01-16 Nokia Corporation Improved subscriber authentication for unlicensed mobile access signaling
KR101170191B1 (en) 2004-04-26 2012-07-31 노키아 코포레이션 Improved subscriber authentication for unlicensed mobile access signaling
US7200383B2 (en) 2004-04-26 2007-04-03 Nokia Corporation Subscriber authentication for unlicensed mobile access signaling
WO2005110006A2 (en) * 2004-05-14 2005-11-24 Virtualiti Holdings Ltd. Method and arrangement device relating to communication network
WO2005110006A3 (en) * 2004-05-14 2006-01-05 Virtualiti Holdings Method and arrangement device relating to communication network
US8615272B2 (en) 2004-05-26 2013-12-24 Nokia Corporation Method and system for associating subscriber identity module
WO2005117478A1 (en) * 2004-05-26 2005-12-08 Nokia Corporation Improved method and system for associating subscriber identity information
WO2005120101A1 (en) * 2004-06-04 2005-12-15 De Sousa Elvino Silveira Medin Autonomous infrastructure wireless networks
EP1615097A3 (en) * 2004-06-16 2006-04-05 PCCW-HKT DataCom Services Limited Dual-path-pre-approval authentication method
EP1615097A2 (en) * 2004-06-16 2006-01-11 PCCW-HKT DataCom Services Limited Dual-path-pre-approval authentication method
WO2005125261A1 (en) * 2004-06-17 2005-12-29 Telefonaktiebolaget Lm Ericsson (Publ) Security in a mobile communications system
EP1834446A2 (en) * 2004-11-18 2007-09-19 Azaire Networks Inc. Maintaining consistent network connections while moving through wireless networks
EP1834446A4 (en) * 2004-11-18 2008-05-21 Azaire Networks Inc Maintaining consistent network connections while moving through wireless networks
US9686721B2 (en) 2004-12-09 2017-06-20 Interdigital Technology Corporation Method and system for interworking of cellular networks and wireless local area networks
US8639248B2 (en) 2005-08-01 2014-01-28 Ubiquisys Limited Handover information sent over a public wide area network (e.g. internet)
US8676265B2 (en) 2005-08-01 2014-03-18 Ubiquisys Limited Local area cellular basestation
GB2428942B (en) * 2005-08-01 2009-08-12 Ubiquisys Ltd Local area cellular basestation
GB2458041A (en) * 2005-08-01 2009-09-09 Ubiquisys Ltd SIM interface of a base station allows LAN-connected device to appear as a mobile device to the cellular core network
US8909294B2 (en) 2005-08-01 2014-12-09 Ubiquisys Limited Local area cellular basestation
US8204543B2 (en) 2005-08-01 2012-06-19 Ubiquisys Limited Local area cellular basestation
US8738084B2 (en) 2005-08-01 2014-05-27 Ubiquisys Limited Local area cellular basestation
GB2428942A (en) * 2005-08-01 2007-02-07 Ubiquisys Ltd Access point for connection to a LAN/WAN device without using cellular core network
GB2458041B (en) * 2005-08-01 2010-02-10 Ubiquisys Ltd Local area cellular basestation
US7792265B2 (en) 2006-03-10 2010-09-07 British Telecommunications Plc Call completion service in case of called party unavailability
WO2007135356A1 (en) * 2006-05-23 2007-11-29 British Telecommunications Public Limited Company Inter wlan handover without mobile network support
US8483126B2 (en) 2006-05-23 2013-07-09 British Telecommunications Plc Multi-network mobile communications systems and/or methods
US11520864B2 (en) 2006-06-02 2022-12-06 The Nielsen Company (Us), Llc Digital rights management systems and methods for audience measurement
US8818901B2 (en) 2006-06-02 2014-08-26 The Nielsen Company (Us), Llc Digital rights management systems and methods for audience measurement
US9699763B2 (en) 2006-06-30 2017-07-04 Telefonaktiebolaget Lm Ericsson (Publ) Network node, method, and mobile terminal for providing voice calls to a mobile terminal in a packet-switched-only network
EP3119157A1 (en) * 2006-06-30 2017-01-18 Telefonaktiebolaget LM Ericsson (publ) Network node, method, and mobile terminal for providing voice calls to a mobile terminal in a sae/lte network
EP1895722A1 (en) * 2006-06-30 2008-03-05 Telefonaktiebolaget LM Ericsson (publ) Network node, method, and mobile terminal for providing voice calls to a mobile terminal in a packet-switched-only network
KR101071524B1 (en) * 2006-09-25 2011-10-10 콸콤 인코포레이티드 Method and apparatus having null-encryption for signaling and media packets between a mobile station and a secure gateway
US9130992B2 (en) 2006-09-25 2015-09-08 Qualcomm Incorporated Method and apparatus having null-encryption for signaling and media packets between a mobile station and a secure gateway
CN101554013B (en) * 2006-09-25 2013-01-02 高通股份有限公司 Method and apparatus having null-encryption for signaling and media packets between a mobile station and a secure gateway
US8533454B2 (en) 2006-09-25 2013-09-10 Qualcomm Incorporated Method and apparatus having null-encryption for signaling and media packets between a mobile station and a secure gateway
WO2008057731A3 (en) * 2006-10-17 2008-09-12 Mavenir Systems Inc Providing mobile core services independent of a mobile device
WO2008057731A2 (en) * 2006-10-17 2008-05-15 Mavenir Systems, Inc. Providing mobile core services independent of a mobile device
US8887235B2 (en) 2006-10-17 2014-11-11 Mavenir Systems, Inc. Authentication interworking
US7813730B2 (en) 2006-10-17 2010-10-12 Mavenir Systems, Inc. Providing mobile core services independent of a mobile device
US8849279B2 (en) 2007-02-23 2014-09-30 Ubiquisys Limited Basestation for cellular communications system
US8483760B2 (en) 2007-02-23 2013-07-09 Ubiquisys Limited Basestation for cellular communications system
US8850045B2 (en) 2008-09-26 2014-09-30 Qualcomm Incorporated System and method for linking and sharing resources amongst devices
US8868939B2 (en) 2008-09-26 2014-10-21 Qualcomm Incorporated Portable power supply device with outlet connector
CN102341986A (en) * 2009-01-05 2012-02-01 惠普开发有限公司 Extending device functionality amongst inductively linked devices
US8571600B2 (en) 2010-02-26 2013-10-29 Cisco Technology, Inc. Reducing power consumption of wireless devices
US8948692B2 (en) 2011-02-08 2015-02-03 Qualcomm Incorporated Graphic notification feedback for indicating inductive coupling amongst devices
US8849249B2 (en) 2011-05-23 2014-09-30 Gigsky, Inc. Devices and systems that obtain and manage subscriptions for accessing wireless networks on an ad hoc basis and methods of use
US9913211B2 (en) 2011-05-23 2018-03-06 Gigsky, Inc. Global e-marketplace for mobile services
EP2528359A1 (en) * 2011-05-27 2012-11-28 The Nielsen Company (US), LLC Methods and apparatus to associate a mobile device with a panelist profile
CN106332201A (en) * 2015-07-07 2017-01-11 西安中兴新软件有限责任公司 Wireless hotspot switching method and mobile terminal
CN114095984A (en) * 2021-11-02 2022-02-25 中国联合网络通信集团有限公司 Session management method, OAM and AMF
CN114095984B (en) * 2021-11-02 2023-08-18 中国联合网络通信集团有限公司 Session management method, OAM and AMF

Also Published As

Publication number Publication date
US20060291455A1 (en) 2006-12-28
US8086855B2 (en) 2011-12-27
WO2002093811A3 (en) 2003-04-10
AU2002302956A1 (en) 2002-11-25

Similar Documents

Publication Publication Date Title
US8086855B2 (en) Access to PLMN networks for non-PLMN devices, and to issues arising in interfaces in general between PLMN and non-PLMN networks
AU2005236981B2 (en) Improved subscriber authentication for unlicensed mobile access signaling
Buddhikot et al. Design and implementation of a WLAN/CDMA2000 interworking architecture
US7450554B2 (en) Method for establishment of a service tunnel in a WLAN
JP4409950B2 (en) Method and apparatus for switching access between mobile networks
TWI343733B (en) Method and apparatus for simultaneous communication utilizing multiple wireless communication systems
EP1597866B1 (en) Fast re-authentication with dynamic credentials
EP2103077B1 (en) Method and apparatus for determining an authentication procedure
EP1693995B1 (en) A method for implementing access authentication of wlan user
TWI262683B (en) A method, a wireless server, a mobile device, and a system for handing over, from a wireless server to another wireless server, in a connection between a mobile device in a foreign intranet network, and an intranet network
US20060229071A1 (en) Roaming arrangement
US20030139180A1 (en) Private cellular network with a public network interface and a wireless local area network extension
EP1672945A1 (en) UMTS-WLAN interworking system and authentication method therefor
US7813730B2 (en) Providing mobile core services independent of a mobile device
Shi et al. IEEE 802.11 roaming and authentication in wireless LAN/cellular mobile networks
KR20100054833A (en) Heterogeneous wireless ad hoc network
JP2005530459A (en) Interworking function in communication system
EP1378091A1 (en) System and method for strong authentication achieved in a single round trip
US7296152B1 (en) System and method for providing access to a network in a communications environment
TWI262005B (en) Access to PLMN networks for non-PLMN devices, and to issues arising in interfaces in general between PLMN and non-PLMN networks
EP1438869B1 (en) Roaming arrangement
Mahmoud et al. DEPARTMENT OF COMPUTER ENGINEERING
Komarova Fast authentication and trust-based access control in heterogeneous wireless networks
Noll et al. Authentication, Authorisation, and Access Control in Mobile Systems
Atai et al. SIP-Enabled Gateway MSC: Linking WiFi Hot Spots with 2.5/3G Networks

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ CZ DE DE DK DK DM DZ EC EE EE ES FI FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 2006291455

Country of ref document: US

Ref document number: 10502791

Country of ref document: US

WWP Wipo information: published in national office

Ref document number: 10502791

Country of ref document: US