
200 S Laurel Ave - Bldg A
Middletown, NJ
Paul S. Henry is a Member of the Access Technology & Applications Research Division at AT&T Labs, where his interests focus on bringing high-speed Internet connectivity to homes and businesses. After receiving his Ph.D. in physics from Princeton University, Mr. Henry joined AT&T (Bell) Laboratories, where he has been engaged in research on communications circuits and systems as well as radio astronomy instrumentation. He has served on the editorial boards of IEEE publications and has published papers or patented inventions in several fields, including millimeter-wave radio techniques, cosmology, optical fiber and powerline communications, wireless systems and data security. He is a Fellow of AT&T and the IEEE and was the keynote speaker at Infocom 2002 (New York) and ICCCP 2005 (Muscat, Oman).
A Wireless Channel Sounding System for Rapid Propagation Measurements
Byoung Kim, Paul Henry, Eric Rozner, Muhammad Islam
ICC 2013,
2013.
[PDF]
[BIB]
IEEE Copyright
This version of the work is reprinted here with permission of IEEE for your personal use. Not for redistribution. The definitive version was published in 2012. , 2013-02-24
{As more wireless systems are deployed in many new environments with different antenna heights, frequency bands, and multipath conditions, there are increasing demands for making more channel measurements to better understand wireless propagation and assist deployment engineering. We design and implement a rapid wireless channel sounding sys- tem using the Universal Software Radio Peripheral (USRP) platform and GNU Radio software to address these demands. Our approach incorporates the simultaneous measurement of channel propagation characteristics from multiple transmitters. The system consists of multiple battery-powered reference signal transmitters and battery-powered receivers that can discriminate the transmitters. This enables the rapid set-up of the channel sounder at a field location and expedited measurements by analyzing multiple reference signals during a single walk or drive through the environment. In this paper, we describe our initial design and implementation of this rapid channel sounding system. We expect that the proposed approach, with a few further refinements, can transform the propagation measurement as a routine part of day-to-day wireless network engineering.}

Directions for Future Cellular Mobile Network Architecture
Byoung Kim, Paul Henry
FirstMonday.org,
2012.
[PDF]
[BIB]
{Despite the extraordinary success of the cellular mobile telecommunications industry, many of the underlying design strategies and service assumptions that have served us arguably well over the past four decades may benefit from a fresh new look. Even today’s LTE (Long-Term Evolution), which is designed to meet the demands of modern broadband Internet packet connectivity, nonetheless draws heavily on the legacy of cellular’s circuit-oriented origins. Its heavy reliance on fine-grained tunnels and hard-state signaling protocols, for example, imposes performance penalties and cost burdens that may not be inevitable if hard-earned lessons are incorporated in the coming years. In this paper we describe a fresh approach to cellular network architecture. Inspired by past and present ideas and experiences by others and ours, we propose fundamental principles to guide the development of efficient and flexible network architecture, able to serve the still-unknown needs and preferences of future users. We offer an example of a network built on those principles and suggest how we can manage the evolution from today’s networks to an architecture better suited to the decades ahead.}

Rayleigh backscattering from optical fibers � could it be used to identify individual fibers?
Mikhail Brodsky, Jungmi Oh, Moshe Tur, Paul Henry
FiO 2010,
2010.
[PDF]
[BIB]
Optical Society of America Copyright
The definitive version was published in FiO 2010. , 2010-10-19
{We probe stochastic fluctuations in Rayleigh backscattering with a photon-counting
OTDR apparatus. Surprisingly, the statistics of these fluctuations can be captured by a simple
empirical model. The temporal stability of the data is discussed.}
Internet Roaming - An Enterprise-Oriented WLAN/Cellular Data Network Integration Solution
Hui Luo, Byoung-Jo Kim, N Shankaranarayanan, Paul Henry, Zhimei Jiang
Internet Computing Magazine,
2003.
[BIB]
{Internet Roaming is an IP-based corporate data network architecture that provides convenient secure mobile networking across office WLANs, residential WLANs, public WLANs, and cellular data networks for corporate wireless data users. It has three building blocks: the IRC (Internet Roaming Client), the SMG (Secure Mobility Gateway), and the VSA (Virtual Single Account) server. Working with an SMG and a VSA server, an IRC can present a single sign-on authentication interface for a user to initiate a secure connection to a corporate intranet via the best available wireless network, and maintain the secure connectivity thereafter as the user moves from one wireless network to another. As a proof of concept, a software-based prototype system has been developed, which enables a Windows-based computer to seamlessly roam between WLANs attached to different subnets while maintaining an encrypted connection to a Windows-based SMG. A hardware-based IRC that looks like a network interface card is also under development. It can provide secure mobile networking for a variety of mobile devices such as PDAs. The measurements of handoff speed of the software-based prototype system and comparisons between Internet Roaming and other WLAN/cellular integration methods are also given in this paper. }

Integrating wireless LAN and cellular data for the enterprise
Hui Luo, Byoung Kim, N Shankaranarayanan, Paul Henry, Zhimei Jiang
IEEE Internet Computing Magazine,
2003.
[BIB]
{}
AT&T intelligent network card: foundation for a new mobile computing architecture
Hui Luo, Paul Henry, Byoung Kim, N Shankaranarayanan
ACM MobiCom 2003,
2003.
[BIB]
{We propose to demonstrate to the audience of Mobicom '03 a new approach for transparently enhancing mobile networking and application support mechanisms. Until now, such features have required support from the host operating system (OS). The host OS typically is closed and/or proprietary, and this is especially the case for host OS that is dominant in the market. The centerpiece of our new approach is an intelligent network interface card in a CF-to-PCMCIA converter from factor, which we call the "AT&T Intelligent Network Card" or "iCard" [1,2]. previously released: TD-5NNHGH }
Experimental study of user experience for data applications in future cellular wireless networks
Zhimei Jiang, Byoung Kim, N Shankaranarayanan, Paul Henry, Hilary Mason
SAINT'01,
2000.
[BIB]
{This paper presents results from an experimental survey of user experience for data applications in future cellular wireless networks. Using a network emulator, we tested a variety of network scenarios with different channel sharing schemes (dedicated and shared bandwidth), computing models (local processing with remote files and thin-client server based computing), applications (Web browsing, Word, PowerPoint), and devices (laptops and Palm devices). Subjective quality ratings (1 to 5) from 100+ users were collected to generate an average quality score for the user experience in each scenario. We quantify the degradation of user experience with lower bit rates and a larger number of users sharing the channel. We also find that users have a marked preference between local and thin-client computing based on bandwidth conditions and applications. Publisher: IEEE Pub/Conf: SAINT'01 }
Mobile Host Using A Virtual Single Account Client And Server System For Network Access And Management,
Tue Nov 20 16:12:23 EST 2012
A Virtual Single Account (VSA) system and method that provides a mobile user with automatic authentication and connection to a remote network via local access networks with a single password, where the local access networks may be independent of the remote network. A mobile user has a single authentication credential for one VSA that is utilized by a VSA client installed on a mobile computing device. The VSA client provides for automatically authenticating and connecting the user's mobile device to a current local access network, and the target remote network such as the user's office network. All authentication credentials are encrypted using a key generated from the user's VSA password that is generated from the user's single password. The VSA client derives the key from the submitted VSA password and decrypts all authentication credentials that are required in order to connect the mobile device to the current local access network and thereafter to the office network.
Method And System For Providing Broadband Access To A Data Network Via Gas Pipes,
Tue Apr 17 16:10:08 EDT 2012
A method and system for providing broadband access to a data network via gas pipes is disclosed. Embodiments of the present invention utilize Orthogonal Frequency-Division Multiplexing (OFDM) or Frequency-Division Multiplexing (FDM) as a modulation technique in order to protect against the effects of dispersion in the gas pipes. An OFDM transceiver modulates a digital data stream into an OFDM signal, RF up-converts the OFDM signal, and transmits the RF up-converted OFDM modulated signal through a gas pipe.
Off-The-Record E-Mail Methods And Apparatus,
Tue Mar 27 16:09:40 EDT 2012
This invention provides for an off-the-record e-mail system that can ensure that messages, particularly sensitive messages, are available only for the intended recipient and never reside on permanent storage media. Control of the existence of the off-the-record e-mail can lie completely with the sender. The sender of the off-the-record e-mail sets the time-to-live (TTL) for the message content. When an off-the-record e-mail message is deleted, there is preferably no trace of the e-mail message on any computer backup system. The sender may also update the e-mail content at any time. The off-the-record e-mail system can include a personal server that combines the functions of a web server and an e-mail transfer server. The personal server may reside on an individual's personal workstation and might serve no one but that particular user. The personal server acts as a broker between the sender and the sender's SMTP server.
Wireless Microphone Beacon,
Tue Mar 27 16:09:38 EDT 2012
Disclosed is a method and system for a radio beacon to protect wireless microphones from interference. One embodiment involves providing each wireless microphone system with a signal detector that detects interfering signals and a `beacon` transmitter that sends a multitone beacon signal. Users that transmit on a potentially interfering frequency employ a beacon detector that `listens` for the beacon signal. The users inhibit transmission if such a signal is detected.
Fast Authentication And Access Control System For Mobile Networking,
Tue Nov 22 16:06:38 EST 2011
A fast authentication and access control method of authenticating a network access device to a communications network having an access point communicating with a remote authentication (home AAA) server for the network access device. The method includes the step of receiving an access request having an authentication credential from the network access device at the access point. The authentication credential includes a security certificate having a public key for the network access device and an expiration time. The security certificate is signed with a private key for the remote authentication server. The access point locally validates the authentication credential by accessing the public key of the remote authentication server from a local database, and checking the signature and expiration time of the security certificate. If the authentication credential is validated at the access point, the access point grants the network access device conditional access to the network by sending an access granted message to the network access device. The access granted message includes a session key encrypted with a public key for the network access device. The session key is stored in a database associated with the access point. The access point contacts the remote authentication server to check a revocation status of the security certificate for the network access device. If the access point receives a message from the remote authentication server that the authentication credential for the network access device has been revoked, it suspends network access for the network access device.
Systems And Methods Of Wireless Communication,
Tue Nov 22 16:06:35 EST 2011
Systems and methods for wireless communication are provided. In a particular embodiment, a base station device is disclosed that includes an interface coupled to a network to communicate with a central controller and a wireless transceiver adapted to communicate wirelessly with one or more portable devices via a local area network. The base station device also includes logic coupled to the interface and to the wireless transceiver. The logic communicates with the remote central controller device via the network to receive an authorization to communicate wirelessly. The logic selectively activates the wireless transceiver after receiving the authorization.
Buffering Packets Destined For A Mobile Device While The Mobile Device Moves From One Network To Another Network To Prevent Handoff Packet Loss,
Tue Nov 22 16:06:33 EST 2011
A method and system for preventing packet loss during handoff of a mobile host between access networks. In accordance with an aspect of the invention, a home agent on a network maintains a FIFO (First In-First Out) buffer for every mobile host that it serves. When a packet destined for a particular mobile host is received at the home agent, it is assigned an incremental sequence number, encapsulated as an IP packet, and forwarded to the mobile host with the sequence number as an identifier. The packet and sequence number are thereafter stored in the buffer for a period of time after the packet was forwarded to the mobile host. After hand-off to the arriving network is completed, the mobile host sends the sequence number of the last-received IP packet to the home agent and the new care-of IP address. Using this sequence number, the home agent then determines whether any incoming packets had been routed to the previous care-of IP address. These are retrieved from the buffer, and resent to the new care-of IP address.
Inbound Interference Reduction In A Broadband Powerline System,
Tue Jun 28 16:05:34 EDT 2011
Disclosed is a method and apparatus for reducing inbound interference in a broadband powerline communication system. Data modulated on first and second carrier frequencies is received via respective first and second lines of the powerline system. A characteristic of at least one of the carrier signals (e.g., phase or amplitude) is adjusted at the receiver in order to reduce the effects of inbound interference on the transmission system. The adjustment parameters may be determined by adjusting the parameters, during a period of no data transmission, until the output of a differential receiver is zero.
Method And System For Providing Broadband AccessTo A Data Network Via Gas Pipes,
Tue Feb 22 16:04:31 EST 2011
A method and system for providing broadband access to a data network via gas pipes is disclosed. Embodiments of the present invention utilize Orthogonal Frequency-Division Multiplexing (OFDM) or Frequency-Division Multiplexing (FDM) as a modulation technique in order to protect against the effects of dispersion in the gas pipes. An OFDM transceiver modulates a digital data stream into an OFDM signal, RF up-converts the OFDM signal, and transmits the RF up-converted OFDM modulated signal through a gas pipe.
Mobile Host Using A Virtual Single Account Client And Server System For Network Access And Management,
Tue Aug 31 15:04:33 EDT 2010
A Virtual Single Account (VSA) system and method that provides a mobile user with automatic authentication and connection to a remote network via local access networks with a single password, where the local access networks may be independent of the remote network. A mobile user has a single authentication credential for one VSA that is utilized by a VSA client installed on a mobile computing device. The VSA client provides for automatically authenticating and connecting the user's mobile device to a current local access network, and the target remote network such as the user's office network. All authentication credentials are encrypted using a key generated from the user's VSA password that is generated from the user's single password. The VSA client derives the key from the submitted VSA password and decrypts all authentication credentials that are required in order to connect the mobile device to the current local access network and thereafter to the office network.
Layer-2 IP Networking Method And Apparatus For Mobile Hosts,
Tue Aug 03 15:04:17 EDT 2010
A method and apparatus to enable IP networking for mobile hosts without requiring changes to be made to the TCP/IP stack in the operating system installed on the mobile hosts. The apparatus is an "intelligent device" that can be installed on or connected to a mobile host, and may comprise a software-only logical module, physical hardware, or a combination of both. To a mobile host, the intelligent device emulates a network interface such as an Ethernet card or a telephone modem. The intelligent device appears to an access network just like any regular IP host connected to the access network through a physical network interface device. The intelligent device handles all mobile networking functions for the mobile host, and may control multiple different physical network interface devices to enable a connection to the "best" access network available to the mobile user at his location.
Over-Buffer Method In A Mobility Home Agent For Preventing Handoff Packet Loss,
Tue Oct 06 16:08:05 EDT 2009
A method and system for preventing packet loss during handoff of a mobile host between access networks. In accordance with an aspect of the invention, a home agent on a network maintains a FIFO (First In-First Out) buffer for every mobile host that it serves. When a packet destined for a particular mobile host is received at the home agent, it is assigned an incremental sequence number, encapsulated as an IP packet, and forwarded to the mobile host with the sequence number as an identifier. The packet and sequence number are thereafter stored in the buffer for a period of time after the packet was forwarded to the mobile host. After hand-off to the arriving network is completed, the mobile host sends the sequence number of the last-received IP packet to the home agent and the new care-of IP address. Using this sequence number, the home agent then determines whether any incoming packets had been routed to the previous care-of IP address. These are retrieved from the buffer, and resent to the new care-of IP address.
Snoop-And-Shortcut Routing Method For Better Mobility Support On Networks,
Tue Sep 22 16:08:02 EDT 2009
A shortcut routing method to improve packet routing between a visiting mobile host connected to a subnet and a communicating host on the network or the same subnet. When a router receives an IP tunnel packet from a network interface on the visited network, it checks the inner IP packet for its final destination. If the destination IP address of the inner IP packet can be reached from the same network interface, the router decapsulates the IP tunnel packet and sends the inner IP packet directly to the communicating host on the subnet. For every outbound IP packet sent to the communicating host by the visiting mobile host, a portion of the round trip between the mobile host and home agent, is thereby eliminated. Optionally, the router can shortcut IP packets to a visiting mobile host that remains on the same subnet as the communicating host.
Broadband Coupler Technique For Electrical Connection To Power Lines,
Tue Jul 14 16:07:35 EDT 2009
Disclosed is a power line broadband communication system having broadband coupler devices capable of direct electrical connection to an energized power line. The coupler includes a conductive portion movable by an adjustable member from a non-conducting retracted position spaced apart from the power transmission line to a forward conducting position in electrical contact with the power line. An insulated arm supports the coupler on the power line. A base on the coupler is engageable with a remotely activated tool in order to accomplish the electrical connection in a safe and secure manner. Broadband data signals are sent to and from customer premises along the shared energized power lines. New coupler connections to the energized power lines allow the additional broadband customers and/or repeaters to join the communication system. Also couplers may provide connections to control electronics, routers, wireless transceivers, and may allow the broadband signals to bypass transformers on the power lines. The invention helps to minimize risk by allowing an installer to be remotely spaced from the energized power line while making the electrical coupling contact with the energized power line.
Network Access Device Having Internetworking Driver With Active Control,
Tue Jun 09 16:07:28 EDT 2009
A network interface driver embodied in a processor readable medium comprising executable program instruction that, when executed by a processor, independently process internetworking protocols for a hot computer (or other network access device) with another computer on a remote network. The driver appears to the operating system as a regular network interface driver, but it can support enhanced kernel-level internetworking protocols by using a state machine to generate, drop, and change incoming and outgoing IP packets in a manner transparent to the operating system.
Inbound interference reduction in a broadband powerline system,
Tue Nov 18 18:13:15 EST 2008
Disclosed is a method and apparatus for reducing inbound interference in a broadband powerline communication system. Data modulated on first and second carrier frequencies is received via respective first and second lines of the powerline system. A characteristic of at least one of the carrier signals (e.g., phase or amplitude) is adjusted at the receiver in order to reduce the effects of inbound interference on the transmission system. The adjustment parameters may be determined by adjusting the parameters, during a period of no data transmission, until the output of a differential receiver is zero.
System and method to support networking functions for mobile hosts that access multiple networks,
Tue Oct 21 18:13:05 EDT 2008
An IP-based corporate network architecture and method for providing seamless secure mobile networking across office WLAN, home WLAN, public WLAN, and 2.5G/3G cellular networks for corporate wireless data users. The system includes Internet roaming clients (IRCs), a secure mobility gateway (SMG), optional secure IP access (SIA) gateways, and a virtual single account (VSA) server. The IRC is a special client tool installed on a mobile computer (laptop or PDA) equipped with a WLAN adaptor and a cellular modem. It is responsible for establishing and maintaining a mobile IPsec tunnel between the mobile computer and a corporate intranet. The SMG is a mobile IPsec gateway installed between the corporate intranet and the Internet. It works in conjunction with the IRC to maintain the mobile IPsec tunnel when the mobile computer is connected on the Internet via a home WLAN, a public WLAN, or a cellular network. The SIA gateway is a special IPsec gateway installed in the middle of the wired corporate intranet and an office WLAN. It works with the IRC to ensure data security and efficient use of corporate IP addresses when the mobile computer is connected to the office WLAN. The VSA server manages authentication credentials for every corporate user based on a virtual single account concept. The Internet Roaming system can provide secure, always-on office network connectivity for corporate users no matter where they are located using best available wireless networks.
Mobile device having network interface selection,
Tue Feb 20 18:11:54 EST 2007
An access interface module includes a first network interface module for interfacing with a first access network and a second network interface module for interfacing with a second access network of a type that is different from the first network. The access module can further include a processor coupled to the first and second network interface modules and a device interface module coupled to the processor for interfacing with a host device.
Fast authentication and access control method for mobile networking,
Tue Feb 06 18:11:52 EST 2007
A fast authentication and access control method of authenticating a network access device to a communications network having an access point communicating with a remote authentication (home AAA) server for the network access device. The method includes the step of receiving an access request having an authentication credential from the network access device at the access point. The authentication credential includes a security certificate having a public key for the network access device and an expiration time. The security certificate is signed with a private key for the remote authentication server. The access point locally validates the authentication credential by accessing the public key of the remote authentication server from a local database, and checking the signature and expiration time of the security certificate. If the authentication credential is validated at the access point, the access point grants the network access device conditional access to the network by sending an access granted message to the network access device. The access granted message includes a session key encrypted with a public key for the network access device. The session key is stored in a database associated with the access point. The access point contacts the remote authentication server to check a revocation status of the security certificate for the network access device. If the access point receives a message from the remote authentication server that the authentication credential for the network access device has been revoked, it suspends network access for the network access device.
Broadband coupler technique for electrical connection to power lines,
Tue Dec 05 18:11:44 EST 2006
Disclosed is a power line broadband communication system having broadband coupler devices capable of direct electrical connection to an energized power line. The coupler includes a conductive portion movable by an adjustable member from a non-conducting retracted position spaced apart from the power transmission line to a forward conducting position in electrical contact with the power line. An insulated arm supports the coupler on the power line. A base on the coupler is engageable with a remotely activated tool in order to accomplish the electrical connection in a safe and secure manner. Broadband data signals are sent to and from customer premises along the shared energized power lines. New coupler connections to the energized power lines allow the additional broadband customers and/or repeaters to join the communication system. Also couplers may provide connections to control electronics, routers, wireless transceivers, and may allow the broadband signals to bypass transformers on the power lines. The invention helps to minimize risk by allowing an installer to be remotely spaced from the energized power line while making the electrical coupling contact with the energized power line.
Internetworking driver with active control,
Tue Aug 15 18:11:29 EDT 2006
A network interface driver embodied in a processor readable medium comprising executable program instructions that, when executed by a processor, independently process internetworking protocols for a host computer (or other network access device) with another computer on a remote network. The driver appears to the operating system as a regular network interface driver, but it can support enhanced kernel-level internetworking protocols by using a state machine to generate, drop, and change incoming and outgoing IP packets in a manner transparent to the operating system.
Inbound interference reduction in a broadband powerline system,
Tue Aug 15 18:11:29 EDT 2006
Disclosed is a method and apparatus for reducing inbound interference in a broadband powerline communication system. Data modulated on first and second carrier frequencies is received via respective first and second lines of the powerline system. A characteristic of at least one of the carrier signals (e.g., phase or amplitude) is adjusted at the receiver in order to reduce the effects of inbound interference on the transmission system. The adjustment parameters may be determined by adjusting the parameters, during a period of no data transmission, until the output of a differential receiver is zero.
Mobile host using a virtual single account client and server system for network access and management,
Tue Jun 27 18:11:23 EDT 2006
A Virtual Single Account (VSA) system and method that provides a mobile user with automatic authentication and connection to a remote network via local access networks with a single password, where the local access networks may be independent of the remote network. A mobile user has a single authentication credential for one VSA that is utilized by a VSA client installed on a mobile computing device. The VSA client provides for automatically authenticating and connecting the user's mobile device to a current local access network, and the target remote network such as the user's office network. All authentication credentials are encrypted using a key generated from the user's VSA password that is generated from the user's single password. The VSA client derives the key from the submitted VSA password and decrypts all authentication credentials that are required in order to connect the mobile device to the current local access network and thereafter to the office network.
Layer-2 IP networking method and apparatus for mobile hosts,
Tue Jun 06 18:11:17 EDT 2006
A method and apparatus to enable IP networking for mobile hosts without requiring changes to be made to the TCP/IP stack in the operating system installed on the mobile hosts. The apparatus is an intelligent device that can be installed on or connected to a mobile host, and may comprise a software-only logical module, physical hardware, or a combination of both. To a mobile host, the intelligent device emulates a network interface such as an Ethernet card or a telephone modem. The intelligent device appears to an access network just like any regular IP host connected to the access network through a physical network interface device. The intelligent device handles all mobile networking functions for the mobile host, and may control multiple different physical network interface devices to enable a connection to the best access network available to the mobile user at his location
Network access device having internetworking driver with active control,
Tue Apr 11 18:11:05 EDT 2006
A network interface driver embodied in a processor readable medium comprising executable program instructions that, when executed by a processor, independently process internetworking protocols for a host computer (or other network access device) with another computer on a remote network. The driver appears to the operating system as a regular network interface driver, but it can support enhanced kernel-level internetworking protocols by using a state machine to generate, drop, and change incoming and outgoing IP packets in a manner transparent to the operating system.
System and method for providing access to multiple user accounts via a common password,
Tue Feb 07 18:10:52 EST 2006
A common password method is disclosed which provides both convenience and security assurance for users who have multiple accounts protected by passwords. According to the present invention, a user only needs to remember a common password to access any of the user's accounts. A designated password for each account is generated by a hash function of the common password and some account-dependent information. The hash value is calculated at the user's computer, and then submitted as a designated password to a server. Thus, each account is protected by the distinct designated password, and the common password is never revealed in an unauthorized manner.
Virtual Single Account Client And Server System For Network Access And Management,
Tue Nov 29 18:10:40 EST 2005
A Virtual Single Account (VSA) system that provides a mobile user with automatic authentication and connection to a remote network via local access networks with a single password, where the local access networks may be independent of the remote network. A mobile user has a single authentication credential for one VSA that is utilized by a VSA client installed on a mobile computing device. The VSA client provides for automatically authenticating and connecting the user's mobile device to a current local access network, and the target remote network such as the user's office network. All authentication credentials are encrypted using a key generated from the user's VSA password that is generated from the user's single password. The VSA client derives the key from the submitted VSA password and decrypts all authentication credentials that are required in order to connect the mobile device to the current local access network and thereafter to the office network.
Fast authentication and access control system for mobile networking,
Tue Feb 15 18:10:18 EST 2005
A fast authentication and access control method of authenticating a network access device to a communications network having an access point communicating with a remote authentication (home AAA) server for the network access device. The method includes the step of receiving an access request having an authentication credential from the network access device at the access point. The authentication credential includes a security certificate having a public key for the network access device and an expiration time. The security certificate is signed with a private key for the remote authentication server. The access point locally validates the authentication credential by accessing the public key of the remote authentication server from a local database, and checking the signature and expiration time of the security certificate. If the authentication credential is validated at the access point, the access point grants the network access device conditional access to the network by sending an access granted message to the network access device. The access granted message includes a session key encrypted with a public key for the network access device. The session key is stored in a database associated with the access point. The access point contacts the remote authentication server to check a revocation status of the security certificate for the network access device. If the access point receives a message from the remote authentication server that the authentication credential for the network access device has been revoked, it suspends network access for the network access device.
Method And Apparatus For Providing High Speed Services Using A Wireless Communications System,
Tue Dec 02 18:08:54 EST 2003
A method and apparatus for scheduling transmissions between a plurality of communications sites within a communications system. The communications system provides service to a service area which is divided into sectors. Each sector is assigned a time subframe in a pattern where adjacent sectors use different subframes. Communications sites within each sector communicate packets of information in at least one time subframe according to a schedule to minimize interference from other communications sites.
Calling Assistance System And Method,
Tue Jun 17 01:05:29 EDT 2003
A method for providing a called party's telephone number in response to some online identifying information provided by a calling party. The calling party provides an entire or at least a portion of an electronic mail address, screen name or login name belonging to the called party. The electronic mail address, screen name or login name is associated with the called party's telephone number. The number is provided to the calling party and the calling party may be connected to the called party directly via the telephone network.
Method and apparatus for providing high speed services using a wireless communications system,
Tue May 30 18:05:32 EDT 2000
A method and apparatus for scheduling transmissions between a plurality of communications sites within a communications system. The communications system provides service to a service area which is divided into sectors. Each sector is assigned a time subframe in a pattern where adjacent sectors use different subframes. Communications sites within each sector communicate packets of information in at least one time subframe according to a schedule to minimize interference from other communications sites.