MXPA06005181A - System for application server autonomous access across different types of access technology networks - Google Patents
System for application server autonomous access across different types of access technology networksInfo
- Publication number
- MXPA06005181A MXPA06005181A MXPA/A/2006/005181A MXPA06005181A MXPA06005181A MX PA06005181 A MXPA06005181 A MX PA06005181A MX PA06005181 A MXPA06005181 A MX PA06005181A MX PA06005181 A MXPA06005181 A MX PA06005181A
- Authority
- MX
- Mexico
- Prior art keywords
- server
- network
- communication
- access
- wtru
- Prior art date
Links
- 238000005516 engineering process Methods 0.000 title claims abstract description 15
- 230000001808 coupling Effects 0.000 claims abstract 3
- 238000010168 coupling process Methods 0.000 claims abstract 3
- 238000005859 coupling reaction Methods 0.000 claims abstract 3
- 238000004891 communication Methods 0.000 claims description 112
- 230000004044 response Effects 0.000 claims description 17
- 230000005540 biological transmission Effects 0.000 claims description 16
- 238000006243 chemical reaction Methods 0.000 claims description 14
- 230000002457 bidirectional Effects 0.000 claims description 5
- 230000000694 effects Effects 0.000 claims description 5
- 230000005055 memory storage Effects 0.000 claims description 5
- 230000001276 controlling effect Effects 0.000 claims description 3
- 231100000279 safety data Toxicity 0.000 claims 2
- 230000035897 transcription Effects 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 15
- 230000003542 behavioural Effects 0.000 description 4
- 238000000034 method Methods 0.000 description 3
- 241000182988 Assa Species 0.000 description 2
- 230000000295 complement Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 241000399233 Rita Species 0.000 description 1
- 101700050571 SUOX Proteins 0.000 description 1
- 230000003466 anti-cipated Effects 0.000 description 1
- 230000001413 cellular Effects 0.000 description 1
- 230000002596 correlated Effects 0.000 description 1
- 230000000875 corresponding Effects 0.000 description 1
- 238000007703 enzymatic ligation assisted by nucleases technique Methods 0.000 description 1
- 150000002500 ions Chemical class 0.000 description 1
Abstract
An Application Server Autonomous Access (ASAA) system for providing autonomous access to a wireless infrastructure by devices employing different types of access technology. The system includes a server, having an associated data storage device, for storing at least one policy, and a plurality of subnetworks, coupled to server, provide access to the server. The plurality of subnetworks employ at least two different types of access technology. A plurality of wireless transmit/receive units (WTRUs) are wirelessly coupled to at least one of the sub-networks. The server monitors the wireless coupling and, depending upon the at least one policy, switches the WTRU between different ones of the subnetworks.
Description
SYSTEM FOR AUTONOMOUS ACCESS OF APPLICATION SERVER THROUGH DIFFERENT TYPES OF ACCESS TECHNOLOGY NETWORKS
Field of the Invention The present invention relates to. wireless communication systems. More particularly, the present invention relates to a system that allows access to an infrastructure by devices that employ different types of access technology.
Background of the Invention Current technology allows different types of wired and wireless access networks to offer service to subscribers. The mobility inter-operation support between different access technologies, for example, second and third generation wireless networks
(2G / 3G), multiple access networks 2000 by code division (CDMA 2000), wireless local area networks
(WLAN) / Bluetooth1 ^, exists to a very limited degree at the radio access network (RAN) level. The work of standardization, in the area of inter-operation of the Universal Mobile Telecommunications System (UMTS) / WLAN and Global Standard for Mobile Units (GSM) is in progress. However, the mechanisms that are defined confront the mobility between these networks within the radio access domain. As such, these efforts take into account only wireless criteria (ie RAN) in their schemes. A mechanism is needed through which integration at the "application level" is possible through heterogeneous access networks, allowing perfectly integrated mobility and inter-functionality between these systems.
Brief Description of the Invention The present invention solves the problems associated with the interoperability problems of the prior art. The present invention is an Autonomous Application Server Access System (ASAA) that brings together different types of wireless and wired access networks. It allows a third-party service provider, of potentially non-public Mobile Network LAN, to provide services to subscribers, based on the location of users, behavioral preferences, tariff criteria, etc. The ASAA network consolidates location, service and routing information for users as they are roaming between different types of access networks. The ASAA network provides flexible call routing and contact services to users through the appropriate technology network, based on criteria such as user location, behavioral preferences and tariff preferences. The architecture of the ASAA network allows different types of services to be offered to the user based on the same criteria. In essence, this architecture allows a third-party service provider to obtain significant revenues from, (and outside of), wide-area PLMN networks, (such as GSM / UMTS and CDMA 2000 networks).
Brief Description of the Figures Figure 1 is a diagram showing a network of
ASAA implemented in accordance with the present invention. Figure 2 is a diagram showing the relationship between a WTRU, an ASAA server and access networks. Figure 3 is a diagram showing an ASAA network implementation of a remote video media function according to an aspect of the present invention. Figure 4 is a schematic diagram showing a remote control connection of a camera device implemented in accordance with an embodiment of the present invention. Figure 5 is a schematic diagram showing a remote control operation of a camera device implemented in accordance with an embodiment of the present invention.
Figure 6 is a schematic diagram showing a user interface of a personal lock and key device that provides secure communication over an ASAA network in accordance with a particular aspect of the present invention. Figure 7 is a schematic block diagram showing the operational functions of the locking device and personal key of Figure 6. Figure 8 is a schematic diagram showing the interoperability of the locking device and personal key of Figure 6 with a WTRU application or terminal.
Detailed Description of Preferred Modalities As used herein, the terminology
"wireless transmission / reception unit" (WTRU) includes, without limitation, a user equipment, mobile station, mobile or fixed subscriber unit, pager, or any other type of device capable of operating in a wireless environment. The term "base station" includes, without limitation, a Node B, site controller, access point or any other type of interconnection device in a wireless environment. An "access point" (AP) is a station or device that comprises a wireless access for the devices to establish a wireless connection such as a LAN, and establish a part of a wireless LAN (WLAN). If the AP is a fixed device in a WLAN, the AP is a station that transmits and receives data. The AP allows the connection of a WTRU to a network, with the condition that the WLAN itself has a connection to the network. According to the present invention, wireless telecommunication services are provided to at least one WTRU by identifying at least a plurality of wireless access networks capable of providing wireless links to the WTRU. A server is able to communicate with a plurality of wireless access networks and determines a state of the WTRU at. the sense of an ability to establish a radio link with one or more of the wireless access networks. The server establishes a server communication link of one of the wireless access networks with which the WTRU has the ability to establish a radio link and uses the communication link to establish communication between the WTRU. The server communication link is then used to establish communication between the WTRU and an additional destination through one of the access networks. The ASAA server consolidates the location, service and routing information for the subscribed users. The ASAA server also routes calls and contact services to an appropriate service network of the user, based on policy profiles. These profiles include, for example, location, technology network capabilities, behavioral factors and tariff criteria. The ASAA network uses IP-based technologies (eg, SIP) to support inter-technology convergence. Figure 1 is a schematic diagram of an ASAA network 11, showing an example relationship between an ASAA server 12, network service entities 21-26, and a WTRU 13 according to the present invention. The ASAA network 1 implemented in accordance with the present invention brings together different technology networks, such as: 3G wide area PLMN (eg UMTs and CDMA 2000); private area networks (WPAN), for example networks in offices and campuses (for example, WLAN, Bluetooth, IEEE 802.11, IEEE 802.15 and ZigBee); and private SOHO networks (for example, WLAN, Bluetooth, IEEE 802.15 and ZigBee). As shown in Figure 1, in addition to network 11 of ASAA and server 12 of ASAA, there is a public switched telephone network and a public data network (PSTN / PDN) 14 and a public land mobile network (PLMN). ) 15. While certain protocols are described, such as IEEE 802.15, different protocols suitable for communications may be used within the scope of the present invention. These are described by way of example and it is contemplated that other communication techniques and protocols, such as ZigBee, UWB and IrDA, will cease to implement the inventive concepts. The PLMN 15 includes a plurality of LANs 21-25, represented as an entertainment storage 21 at an airport location, an airport room 22, a coffee shop 24 that offers WLAN services, and a home network 25. The PLMN 15 also it includes a network 26 that offers large area mobile services, which in the example include a 3G device 27 and a SIP device 28. The large-area mobile service network 26 provides communication via WLAN, BT and UMTS. LANs 21-25 and network 26 of large area mobile services form access networks. Typical communications between LANs 21-25 are in accordance with the IP protocol, SIP protocol or other packet switched protocols. Typically, these communications use a common channel and are allocated bandwidths according to demand. A plurality of servers 41 are provided,
42 and 43 of the ASAA application in various locations including in the office network 23, the home network 25 and the large area mobile service network 26. The ASAA application servers 41, 42 and 43 provide application services through their respective access networks 23, 25 and 26, but they are also accessible through other access networks. The WTRU 13 is represented and is able to communicate with several of the access networks 21-26. The ASAA server 12 is able to establish a communication link with the WTRU 13 by connecting directly or indirectly to the individual networks of the networks 21-26 to which the WTRU 13 has established a communication link. The services come from the ASAA server in this architecture. The access networks provide access to the user and therefore, calls and other interactions between the user and the ASAA server are routed through the access network to which the user connects. This allows the ASAA server 12 to function as a service platform in order to provide services to the user through the various access networks 21-26. The WTRU 13 is capable of communicating through various services as provided by the ELAN 23, but once connected, the ASAA server 12 can provide administrative functions to provide either services directly through the ASAA server 12, or request that services are routed through the various access networks 21-26, to an access network connected to the WTRU 13. The services are provided by the ASAA server 12 in this architecture. The access networks provide access to the WTRU 13, and therefore calls and other interactions between the WTRU 13 and the ASAA server 12 are routed through the access networks 21-26 to which the WTRU 13 is connected. ASAA server 12 also includes modules 61,
62 of server function. The server function modules 61, 62 provide administrative functions to operate the ASAA server 12, and maintain a database of the locations of the WTRU 13 and the availability of connections to the access networks 21-26. The server function modules 61, 62 also provide application functions that can be executed by the WTRU through connections to the access networks 21-26. The ASAA server 12 provides a fixed interface to the PSTN / PDN 14 for reception / transmission of call attempts, and routes the incoming calls to the access network serving WTRU based on the location of the WTRU. In the routing of incoming calls, the ASAA server 12 'packs all possible underlying service access networks configured for the WTRU 13. The WTRU 13 responds with a paging response, routed through the currently connected service network. The ASAA server 12 then distributes the incoming calls, through a service access network to which the WTRU 13 is currently connected.
The WTRU 13 can also "force the routing" on the incoming call through a specific service access network by configuring the ASAA server 12 appropriately, with the identity of the service access network to route the call through. your destiny. By specifying the access network, WTRU 13 can control which services are used. This architecture extends traditional cell paging and traditional call routing mechanisms to work through a variety of access networks. In one embodiment, an IP-based application-level paging mechanism operates through a variety of access networks to help locate the issued WTRU 13. One embodiment includes a provision of a consolidated interface, through the ASAA server 12, to allow reception of calls by PSTN / PDN 14. ASAA server 12 allows the reception of calls by PSTN / PDN 14 through an individual fixation point. The effect is that, from the point of view of the user, radio-relay services are provided by the particular radio links, which are the individual networks of the access networks 21-26. The service management, which is the user interface, can be either one of the local networks 21-26 or the ASAA server 12. In this way, as indicated by the ion line 69, the system displaces the administration of the network for user services and the service management for the user "up" of the individual access networks 21-26 to the server 12 of ASAA. The ASAA server 12 then becomes a virtual server from the user's perspective. Network services are provided by the individual access networks 21-26 for the radio link, and by the ASAA server for services provided to the user other than the radio link. If the operator of the ASAA server 12 is able to obtain wireless services as provided for the individual access networks 21-26. Then the user is able to make service subscription arrangements with the ASAA server operator. This architecture supports mobility of the WTRU 13 through multiple access networks, and helps to place the WTRU 13 as one piece. The use of the ASAA server 12 allows routing configured by the user of calls through a given access network. This also provides a uniform set of complementary services and complementary features across multiple access networks, resulting in continuity of user rience despite network changes. The architecture may also provide a configuration for a uniform mechanism for the provision of contact services to the WTRU 13 through multiple underlying access networks. The role of the ASAA server 12 providing an administrative function with respect to routing services to several access networks 12-26. Makes the ASAA server 12 capable of maintaining a common location for the user profiles. The user can determine what services to use, and under what physical circumstances. Examples of parameters include call handling, selection of services by type, selection of services by cost and cost structure, selection of services by membership of the network, notification of availability of connections to services, minimum quality of service (QOS) ) determined by the user, required bandwidth of the services for a particular function. The call handling profile selection functions can include voice mail, selective admission of calls and "recusal" responses. In a similar manner, ASAA server 12 can also provide voice mail services and other management services. of data. Figure 2 is a diagram showing the relationship between a WTRU '81, an ASAA server 83 and access networks 91-95. The WTRU 81 includes a first circuit 87 for establishing an RF link and a second circuit 88 for processing data, although some of these functions are functions integrated in circuit. The WTRU 81 establishes a communication link with the ASAA server 83, but in general the service connection is between the WTRU 81 and one of the service networks 91-95. The services can be communicated either through the ASAA server 83 through the radio communication service network with the WTRU 81. Alternatively, services can be communicated from a service network to a service network that establishes a radio link with the WTRU 81 without going through the ASAA server 83. In the case of communications monitored by the ASAA server, communications that do not pass through the ASAA server 83 or originate with the ASAA server 83 can still be monitored by the ASAA server 83. Since the processing circuitry 88 handles data despite its source, the actual connection of a particular service network 91-95 may be transparent to the user. In the operation, In the energization of the media devices, the ASAA application tries to access the ASAA server 83 through the 3G PLMN infrastructure. This registration action will result in the regular transmission of location information between the PLMN and the ASAA application server. The ASAA server 83 will maintain a catalog of secondary networks available to the media devices and during the session life, can contact the media device in these secondary networks automatically, or in some user commands after a system indicator of ASAA. This contact action is based on policy. As an example, server policies can include user's location,. Behavioral profile and optimal rates. During the lifetime of the session, the ASAA network provides connectivity between the media device and the PSTN / PDN. Depending on the ASAA and the PLMN subscription (such as the quality of the service profile), different levels and types of services can be offered to the media device. This may also depend on the location. As an example, a general PLMN voice service may not be necessary to a user who has a behavior profile that places the user at home or in the office for a large percentage of normal time. For this user, a simple ASAA paging scheme (based on SIP) can be applied during non-availability times of secondary networks. The ASAA system according to the present invention results in several advantages over current systems. The ASAA system consolidates the location, service and routing information for the users subscribed to the ASAA Server 83. This allows the provision of perfectly integrated mobility communication perfectly integrated between different technology networks, using a common scheme based on IP. The system routes calls and contact services to the appropriate technology network based on policy profiles. The system also supports a scheme of flexible rates based on the user's location and the choice of the technology network. Finally, the system allows third-party application providers to extract revenue from wireless network services. An additional advantage of the ASAA system is that the ASAA server 83 can assign a virtual identity to the WTRU 81, which for example can be a user identity. In this way, the user identity can be made portable through different WTRU. In this way, if each WTRU has a unique identity, the ASAA Server 83 can communicate with the various WTRUs according to their identities such as ESN numbers. The ASAA server 83 communication may be in response to different identity as selected by the user. This allows a user to "clone" a WTRU such as a cell phone when using the ASAA server 83. The ASAA server 83 can then communicate with a different WTRU in order to provide information corresponding to the identity. Therefore, a user can use a different physical device, with its own identity instead of a particular WTRU. On the contrary, multiple different user IDs can be correlated in an individual device by the ASAA server 83. In any case, the ASAA server 83 provides a proxi identity service for the WTRU. As an example, the user may wish to have a cell phone person and a work cell phone on a trip, but only carry an individual physical device. Instead of using the call forwarding services, the user can communicate under the supervision of the ASAA network that is able to communicate with the physical device that the user is carrying or carrying. Since this is under the supervision of the ASAA network, the ASAA server 83 can convert device information such as the telephone number or other identification data according to the information registered in the database of the ASAA server 83.
Remote Camera Device Figure 3 is a diagram showing an ASAA network implementation of a remote video media function according to an aspect of the present invention. As can be seen, camera devices 121 and 122 are connected through network connections that provide virtual connections to an ASAA server 128. The actual connections of the camera devices 121 and 122 can either be through a LAN, such as a WLAN 131, or through a WTRU 135 capable of making a cellular connection. The WTRU 135 may be a separate device connected through a local connection such as IEEE 802.15 or it may be self-contained in or connected by wires to the camera device 122. In each case, the communication that can be controlled by server 128 of ASAA is carried out. Also shown in Figure 3 is a PC 142 which is capable of communicating with the ASAA server 128 through either the WLAN 131 or through another connection such as a direct connection to the Internet. A local WTRU 146 communicates with the ASAA server 128 either directly or through the WLAN 131. Likewise, a WRU 149 can be located in a separate location and communicate with the ASAA server 128. The ASAA server 128 may provide a virtual identity to the WTRU 149 or the camera device 122 as described above. Figure 4 is a schematic diagram showing a remote control connection of a camera device 171 implemented in accordance with an embodiment of the present invention. This remote control is performed either through the ASAA network of Figures 1-3 or through the network services. Figure 4 shows a unidirectional transmission of images through a bidirectional link. The camera device 171 includes a camera with the associated image processor 172, an image storage device 173 and a transceiver 174. The camera device 171 communicates through an access point (AP) 177, which a it communicates with an ASAA network 181, under the control of an ASAA server 183. The ASAA network 181 is connected to a user WTRU 188, which provides an image through the display 189. The user WTRU 188 is capable of controlling the camera device 171 through the communication link established by the device 171 of camera, the AP 177, the network 181 of ASAA and the WTRU 188. The control can be opened or restricted by controlled access. In the case of restricted control of the camera device 171, this can be either according to the particular terminal providing control instructions or requesting outputs, according to the establishment of a secure connection, or by means of password authentication or other user information. In order to communicate with the camera device 171, the ASAA network 181 provides a register of the camera device 171. Communications with the camera device are made through the ASAA network 181 under the supervision of server ASAA 183. It is also possible to make other network connections (not shown). Therefore, control and access to the output of the camera device 171 is achieved in a controlled manner. This means that in order to access the camera device 171 through the ASAA server 183, either it must be registered through the ASAA server 183 or the access has been granted. An advantage of using the ASAA server 183 is that any user with access or to the ASAA network can be provided with access to the camera device 171 according to the registration. In use, if the camera device 171 is to have restricted use for reasons of privacy or utility, then the control of the camera device 171 is established by an authorized user. The authorized user can be given control of the camera device 171 by the ASAA server 138 and can process to control the camera device either through the ASAA server or through a connection authorized by the ASAA server 183. In this way, the camera can be reserved for use by particular individuals such as family members, or smaller restrictions can be allowed. Therefore, while the network link used by the camera device can be inherently opened to the external control of vision, the ASAA server allows control by the owner while allowing broad access by the owner and those authorized. by the owner. Figure 5 is a schematic diagram showing a remote control operation of the camera device 171 implemented in accordance with an embodiment of the present invention. The camera device 171 is controlled remotely by a remote terminal such as terminate 192 or by WTRU 188. Control operations are executed under the supervision of the ASAA server 128 which provides control between the WTRU 188 or terminal 192 and the 171 camera device. In addition, a media route 195 can be established through the ASAA server 128, under the supervision of the ASAA server 128 or independently. While the execution of the commands is represented as directly between the camera device 171, the WTRU 188, the terminal 192 and the ASAA server 128, it is anticipated that the ASAA server will use intermediate network connections to provide these signals. The registration with the ASAA server 128 is established by the WTRU 188 or the terminal 192 which registers 201, 202 separately as devices accessible by the ASAA server 128. A control request 203 is made by the terminal and 204 is granted. The terminal then opens the application 205, 206 which in this case is from the camera control. This is followed by orders such as return orders 207-210. In addition, the terminal can have access to the output of the camera as indicated by the rita 195 of means and can be registered by the server 128 of ASAA.
Closure and Personal Communication Key Communication through a network incorporates a variety of wired and wireless devices. In cases where security is required, a locking device and personal key provides controlled secure access to communication, services and data. According to the present invention, a separate personal lock and key device is used in order to implement security when making a wireless local or wireline connection with a local device operated by the user. The local device can be a WTRU, a terminal under the control of the user or a public terminal that is used by the user. The locking device and personal key is capable of providing multiple functions, which may include: 1) communication with a security server that provides security data to servers that offer services to the user; 2) padlock security by decryption encryption of signals processed by a local terminal or WTRU; 3) storage of password information that can be decrypted through the security server; 4) communication with multiple security servers, and 5) provide password access and security data to the servers according to the server protocol regardless of the security server. Figure 6 depicts the user end of a network environment 300 with a personal lock and key device 301, used to provide secure access through a computer terminal 311, the WTRUs 312, 313, and a laptop 314 connected through a WTRU (not represented separately). The lock and personal key device 301 is convenient since an individual device is capable of being used in conjunction with the various user devices without the requirement to provide separate equipment for each terminal device 311-314. In cases where the locking device 301 and personal key is not necessary for the operation of the terminal device 311-314, the locking device 301 and personal key can conveniently be stored because it has a limited profile for physical connection, and has no neither a user interface nor a limited user interface. The locking device 301 and personal key can use data stored internally. In addition, the lock and personal key device 301 is capable of reading additional security data, such as those provided by an external card device 321. This allows separate secure devices to operate in conjunction with the lock and personal key device 301 without a direct association between the protocol used by the external card device 321 and the lock and key device 301. The lock and personal key device 301 will be expected to communicate with the card device 321, external, separate and with the external services, but it will not be otherwise required to share a protocol with the external card device 321. Figure 7 is a schematic block diagram showing the operation functions of the lock and personal key device 301 of Figure 6. A wireless communication circuit 361 such as IEEE 802.15 or BlueTooth
(RM), and the infrared port 364 provides communication to a connection bus 371, which also- has an external port connection 376. The connection bis 371 communicates with a logic circuit 381, which retrieves signals transferred to the connection bus 371 of the wireless communication circuit 361, infrared port 364 or external port connection 376. The logic circuit 381 provides signals to the connection bus 371 for transmission through the wireless communication circuit 361, infrared port 364 or external port connection 376. The logic circuit 381 uses encryption / decryption data stored in a memory storage 385 for decryption or encryption of data transferred through the connection bus 371. A card reader circuit 389 receives data from an external card (321, figure 6) for communication via the connection bus 371 communicating with the wireless communication circuit 361, infrared port 364 or external port connection 376 as described above. The external card reader 389 can obtain full data conversions or can provide data for use by the logic circuit 381 for the conversion. In the case of the complete data conversion obtained by the external card reader 389, the logic circuit 381 transferred the data as it receives it to or from the connection bus 371 to or from the external card reader 389. In the case of data provided for use by the logic circuit 381 by the external card reader 389, the data is used by the logic circuit 381 to convert data transferred to the connection bus 371. It is also understood that the logic circuit 381 can use a combination of data externally converted and transferred by the reader 389 of external cards together with data converted by the logic circuit 381.
Figure 8 is a diagram showing the interoperability of lock device 301 and personal key and secure services. A local application device 401, which is a local terminal, includes an application 405 and a padlock port 404. The padlock port 404 may be a physical lock such as a USB port, a wireless communication port or another communication port. The purpose is to allow the personal lock and key device 301 to receive data from the local application device 401 and transmit the data back to the local application device 401. The use of an external padlock decryption device is known to those skilled in the art. The local application device 401 communicates through the network connections 420 and 421 to a security server 428, which provides encryption data cooperating with the lock device 301 and personal key. The security server 428 communicates with the lock and personal key device 301 to provide and receive encrypted data through the network connections 420 and 421. The security server 428 can retain data and provide program services. Additionally, services may be provided externally of the security server 428, as represented by the application services server 431. The security server 428 can communicate with the application service server 431 with secure protocols which may be the same or different protocols used by the security server 428 to communicate through the local application device 401 and the closure device 301 and personal key As shown, secure communication between the application service server 431 and the security server 428 can be through the network connection 421, but the communication link is effectively secure between the application service server 431 and the application server 431. security server 428 to be inaccessible from the outside as represented by dotted line 439. In that regard, security server 428 may store user keys or keys and passwords and respond to communication requests by communicating with device 301 of lock and personal key. When the locking device 301 and personal key is identified, the security server 428 communicates the necessary access information. By way of example, the user can have access to a private directory (such as a private list of names, list of clients or other confidential information). The directory is resident on a server that offers access to the directory only in a secure manner, so there is no public access to the directory. The user can connect to the local application device 401, which can be a public terminal, and request access to the security server 428. The security server 428 provides data that is accessible only through the lock and personal key device 301, and further uses the lock and personal key device 301 to authenticate the user. In this way, data is provided to the user only in the form requested by the user, and with essential elements in a format that is only readable through the closing device 301 and personal key. Therefore, the only displayed data selected by the user will be accessible at the public terminal 401 and will only be retrieved when the locking device 301 and personal key is connected to the padlock port 404. In this way, the transferred data can not be "sniffed" in decrypted form from the network connections 420 and 421. Only the data provided back to the public terminal 401 for local manipulation display can be detected through access to the public terminal 401. The data can be stored in the security server 428 in the manner of passwords, or it can be stored in another link, as in the application service server 431. In the example, if the data is stored in the application services server 431, then the data is transferred between the application services server 431 and the security server 428, and then transferred to the public terminal 401, where they are decrypted by the closing device 301 and personal key. The processing of the data may be presented at any convenient location, including the public terminal, the application services server 431 or the security server 428. In another example, secured data is stored in an application services server 431. The user wishes to download a data transfer to the local application device 401, which may be a portable computer. The transfer of data that is to be manipulated or displayed on the portable 401 computer. The user requests the service by providing authentication between the lock device 301 and the personal key and the security server 428. The firewall responds by providing authentication between themselves. The application service server 431 provides the service as requested to return a data transfer. The data transfer is then already provided. either directly to the user or the user through the security server 428. The data transfer can be provided in encrypted forms, to be decrypted by the lock device 301 and personal key, or in non-decrypted form, as appropriate for the particular type of data. For example, if the data transfer is a name and phone number derived from a confidential list, the user may not consider an individual name and the number is confidential and should rather be freely accessible locally. The security server 428 may be a separate device accessible through the communication link or may be provided as a function of the ASAA server 12. In the case of ASAA server 12, secure functions can be implemented through various networks while maintaining secure connections according to the protocols supported by lock device 301 and personal key. As shown in Figure 6, the lock and personal key device 301 may use self-contained data, or may use data provided by the external card device 321. This allows the lock and personal key device 301 to be used as an interface between the external card device 321 and the local application device 401, as shown in Figure 8. It is further contemplated that the lock and key device 301 will be conveniently mountable to at least one additional device such as a WTRU. This allows the lock and key device 301 to communicate through the WTRU in order to execute its function.
The ability to connect through an additional device is also useful in circumstances in which a particular device can not be connected to the personal lock and key device 301. For example, if a device may be unable to connect to the lock and personal key device 301 but it is connected to a WTRU for wireless connectivity. In this case, the WTRU is connected to both the lock and key device 301 that allows security and the device, thus providing secure wireless connection. It is possible to include biometric identification functions in the lock and key device 301. This will require an authentication and biometric identification procedure, to restrict the use of the lock and key device 301 to the owner. Examples of biometric functions will include a physical feature reader, voice correspondence circuitry or other function that uniquely identifies the user. The biometric data may also be provided for the purposes of using a different device such as a camera to match a biometric attribute based on the biometric data stored in the lock device 301 and personal key. The locking device 301 and personal key can be assigned to an identity by the security server 428. As shown in FIG. Alternatively, the security server 428 may assign a virtual identity or a device, such as the local application device 401, through which the lock and personal key device 301 communicates.
37
17. Server according to claim 16, wherein the server provides information regarding the state of the plural network system. 18. Server according to claim 16, wherein the communication circuit is communicated through at least one of a public switched telephone network (PSTN) and a public data network (PDN). 19. Server according to claim 16, wherein the server provides connectivity between the external network using data from the ASSA server). The server according to claim 16, further comprising a register by which at least one WTRU is registered with the ASSA server to provide network services. 21. A wireless transmission / reception unit (WTRU) for communicating with a server through a plurality of access networks, the WTRU, comprising: a circuit for receiving a paging request issued by the server through minus a first subset of access networks, a circuit for providing a connectivity indication of the WTRU through one of the networks in response to the paging request, a circuit for selectively communicating through at least a second secondary set of the access networks, so that the second secondary set can overlap with the first secondary set;
Claims (16)
- CLAIMS 1. System for providing autonomous access to a wireless infrastructure or devices that employ different types of access technology, the system comprising: a server, which has an associated data storage device, to store at least one policy; a plurality of secondary networks, coupled to the server, each to provide access to the server, the plurality of secondary networks that includes at least two different types of access technology; and a plurality of wireless transmission / reception units (WTRU) for the wireless coupling to the secondary networks, whereby the server monitors the wireless coupling and depending on at least one policy, switches the WTRU from one of the secondary networks to another of secondary networks. System according to claim 1, wherein the server provides a record with the WTRUs, the register that results in a regular transmission of location information between the PLMN and the server. 3. Architecture to provide network services at least one wireless transmission / reception unit (WTRU), the architecture comprising: a server for communicating with a plurality of networks, including a network that provides large area mobile services and at least one secondary network; circuit that provides connection requests through at least one secondary set of the plurality of networks, the circuit that provides connection requests in response to the server; a query function on the server capable of generating a list of possible connections available between the WTRU and at least one secondary set of the plurality of networks; a function for determining a preferred network connection selected from the plurality of networks in response to the list function that generates the list of possible available connections, whereby the WTRU contacts one of the plurality of networks in response to the determination of the preferred network; and a communication circuit for communicating with the WTRU when the WTRU is connected to one of the plurality of networks. 4. The architecture according to claim 3, wherein the server provides information regarding the state of the plural network system. 5. Architecture according to claim 3, further comprising: a communication network that includes a data network and / or external voice; and the data network and / or external voice including at least one of a public switched telephone network (PSTN) and a public data network (PDN). The architecture according to claim 5, wherein the application server autonomous access server (ASSA) provides connectivity between the external voice and / or data network and the WTRU is provided through the access networks using data from the ASSA server. The architecture according to claim 3, wherein an application server autonomous access server (ASSA) provides an identity for the WTRU, thereby providing network connection requests according to the identity assigned with the ASSA server. A method for providing wireless telecommunication services to at least one wireless transmit / receive unit, the method comprising: identifying at least a plurality of wireless access networks capable of providing wireless links to a WTRU; provide a server capable of communicating with a plurality of wireless access networks; determining a state of the WTRU of the ability to establish a radio link with one or more of the wireless access networks; using the server to establish a server communication link with at least one of the plurality of wireless access networks with which the WTRU has the ability to establish a radio link; using the server communication link to establish communication between the WTRU through one of the plurality of networks; and using the server communication link to establish communication between the WTRU and an additional destination through one of the plurality of access networks. 9. Method according to claim 8, which further comprises: the server in response to the address message received from the WTRU, which thus allows the establishment of a communication link between the WTRU and a target network through a network connected to the WTRU, so that the network connected to the WTRU provides an indication of connectivity of the WTRU; a communication network that provides an external voice and / or data network; and a wireless access network that provides communication with the server, thereby providing communication between the external voice and / or data network and the WTRU through the network routing that includes the network connected to the WTRU. The method according to claim 9, further comprising the server that provides information regarding the state of the plural network system. The method according to claim 9, wherein the external voice and / or data network communicates with at least one of the networks in response to the received response to a communication request. The method of claim 9, wherein the external voice and / or data network communicates with at least one of the networks in response to the response received to a paging response. The method of claim 9, wherein the application server stand-alone access server (ASSA) provides connectivity between the external voice and / or data network and the WTRU is provided through the access networks using server data. of ASSA. The method according to claim 9, further comprising providing a register by which at least one WTRU is registered with the ASSA server to control the network services. The method of claim 8, wherein the application server stand-alone access server (ASSA) provides an identity for the WTRU, thereby providing network connection requests according to the identity assigned by the ASSA server. 16. Server to provide network services at least one wireless transmission / reception unit (WTRU) according to the application server autonomous access protocol (ASSA), the server comprising: a communication request circuit that provides requests for communication through at least a secondary set of the plurality of networks; a circuit in response to messages received from the plurality of networks, such that a response to a communication request from a particular WTRU is received from one of the networks provides an indication of connectivity of the WTRU through at least one of the networks; and a communication circuit for communication between the external voice and / or data network and the WTRU through the network routing that includes one of the networks in response to the response received from the communication request. communication circuit, which communicates with the server through at least one of the second secondary set of access networks. 22. The WTRU according to claim 21, wherein the WTRU communicates through the server with an external voice and / or data network including at least one of a public switched telephone network (PSTN) and a public data network (PDN). ). 23. WTRU according to claim 21, wherein communication from the WTRU to the server provides autonomous application server access service (ASAA). 24. WTRU according to claim 21, further comprising a circuit function for communicating with the ASAA service in accordance with a registration with the ASAA server to provide network services. 25. Method for controllably operating a video camera, the method comprising: providing a wireless network to at least one camera device, the wireless network connection that provides operational control of the camera and retrieves images from the camera; providing a supervisory network capable of communicating operation control signals through the wireless network connection to the camera device and controlling the transmission of images from the camera as received by the wireless network connection to the camera; provide a control terminal; and establishing a link between the control terminal to the supervising network, the link between the control terminal and the supervisory network that provides control of the camera by providing communication of the operation control signals of the camera and providing transmission control of the images from the camera. 26. The method of claim 25, further comprising: using the monitor server to identify links to the camera device; use the supervisor server to establish a server communication link to control the camera device; and use the server communication link to establish communication between the camera and an additional destination. The method of claim 25, further comprising: using, as the supervisor server, a stand-alone application server access server (ASAA) that provides connectivity between the external network and the camera device, the connectivity provided through an access network that serves as in the server communication link and that will use the ASAA server; use the ASAA server to indicate links to the camera device; use the ASAA server to establish communication link to control the camera device; and use the server communication link to establish communication between the camera and an additional destination. The method of claim 25, further comprising providing a register by which at least one WTRU is registered with the supervising network to provide network services. 29. A system capable of providing secure access to at least one video device, the system comprising: a wireless network which provides a link to the video device and which provides operational control and which transfers images; a monitoring network capable of communicating operational control signals through the wireless network connection to the video device and controlling the transmission of images as they are transferred over the wireless network connection; a control terminal for communication with one of the supervisory network and the wireless network, and a function of the supervising network for establishing a link between the control network for the control of the video device by providing communication of the operational control signals to the video device and provide transmission control of the images in association with the video device. 30. System according to claim 29, wherein: the supervisor server identifies links to the video device; the supervisor server establishes a server communication link to control the video device; and the server communication link establishes communication between the video device and an additional destination. 31. The system according to claim 29, further comprising: an application server stand-alone access server (ASAA) that provides the function of the supervisor server, wherein the ASAA server provides connectivity between the external network and the camera device, the connectivity provided through an access network that serves as the network communication link and uses data from the ASAA server; The ASAA server includes a circuit function to identify links to the camera device and to establish the link. server communication to control the camera device; and the server communication link that establishes communication between the camera and an additional destination. 32. System according to claim 29, wherein at least one WTRU is registered by the supervising network to provide network services. 33. Video device accessible through a public network of subscribers and providing secure access, the video device comprising: a circuit for communication with a wireless network to provide a link between the network and video device to provide control of operation and transfer images through the wireless network; and a circuit responsive to a supervisory network for receiving operation control signals through the wireless network connection in a controlled manner by the supervising network, thereby enabling the control and monitoring of images over the wireless network connection, wherein the supervising network controls the establishment of a link between a remote terminal to control the video device to provide communication of the operation control signals to the video device and where the supervising network controls the transmission of the images in association with the video device. 34. Video device according to claim 33, wherein: the video device provides the monitoring server with data to identify links to the video device; the video device responds to a communication link with the server to control the video device; and the video device responds to the server to communicate with an additional destination. '35. Communication accessory for providing secured communications the communication accessory comprising: a circuit for communicating with at least one local device through a unidirectional port connection; a memory storage for storing code conversion data for transcription and / or decryption; and a logic circuit for receiving data through the bidirectional port, and decrypting the data using the code conversion data, wherein the code conversion provides a cooperative function with a predetermined server with remote access, and the local device that is communicates through the bidirectional port connection, when connected through a public network link provides communication with the predetermined server with random access through the public network link, such that the data accessed by the logic circuit provide conversion of code to establish a secure transfer of data between at least one service provided through the public network link and accessed through the local device. 36. Communication accessory according to claim 35, wherein a local device provides data limited by a limited set of remote and user commands, thereby limiting access to data through the local terminal except as provided by the limited set of orders. 37. The communication accessory according to claim 35, wherein the data accessed by the logic circuit includes data from a circuit separate from the predetermined server with remote access, and wherein a predetermined server with remote access provides secure access to the service separate from the predetermined server. with secure access. 38. Communication accessory according to claim 35, wherein the data accessed by the logic circuit includes data from a service separate from the default server with remote access, and wherein the predetermined server with remote access directs communication between the local terminal and the service separate from the predetermined server with access remote. 39. The communication accessory according to claim 35, further comprising a reading device that communicates operatively with the logic circuit to provide additional data processing. 40. The communication accessory according to claim 35, further comprising a reading device that communicates operatively with the logic circuit to further provide additional code conversion data. 41. The communication accessory according to claim 35, further comprising a reading device that communicates operatively with the logic circuit to provide additional data processing, at least a portion of the additional data processing generated independently of the logic circuit. 42. The communication accessory according to claim 35, wherein the accessory provides padlock security cooperatively with the predetermined server with remote access. 43. The communication accessory according to claim 35, wherein the accessory provides secure access to the local service by encryption and decryption of signals processed by the local terminal. 44. The communication accessory according to claim 35, further comprising one of the memory storage, the predetermined server with remote access or a service accessible by the predetermined server with remote access that provides storage of the password information, wherein the logical circuit decrypts the password information. 45. The communication accessory according to claim 35, wherein the communication accessory provides secure communication through the local terminal with one of a plurality of the security server selected in accordance with a particular function executed through the local terminal. 46. The communication accessory according to claim 35, wherein the predetermined remote server provides secure communication with an additional server according to the protocol of the additional server regardless of a protocol used by the communication accessory to effect secure communications with the predetermined remote server. 47. The communication accessory according to claim 35, wherein: the predetermined remote server provides secure communication with an additional server according to the protocol of the additional server independently of a protocol used by the communication accessory to effect secure communications with the predetermined remote server , the default remote server is configured as a stand-alone application server access server (ASAA); and the ASAA server provides the cooperative function for code conversion according to a local device registration with the ASAA server. 48. The communication accessory according to claim 35, wherein the predetermined remote server provides secure communication as a stand-alone application server access server (ASAA), the ASAA server that provides the cooperative function for code conversion in accordance with a registration of the local device with the ASAA server. 49. The communication accessory according to claim 35, further comprising a circuit function for reading additional safety data, thereby allowing the communication accessory to operate in conjunction with a separate safety device. 50. Method for providing secure data transfer when using at least one terminal interface separated by the use of a communication accessory, while maintaining separate security data from the terminal interface, and method comprising: providing the accessory security that contains a logic circuit and at least one memory storage; use the security accessory to communicate with at least one local device through a bidirectional port connection, where the local device establishes or maintains a public network connection; and providing a cooperative code conversion with a predetermined remote access server accessible through the public network connection, and a local device communicating through the bidirectional port connection, when connecting through a network connection The public provides communication with the predetermined server with remote access, such that the data accessed with the logic circuit provides code conversion to establish secure data transfer between at least one service provided through the public network link and accessed through a device. local. 51. The method of claim 50, further comprising using a local device to provide limited data with a limited set of remote and user commands, thereby limiting access to the data through the local terminal except as provided by the limited set of orders. 52. The method of claim 50, wherein the data used by the logic circuit includes data from a separate service of predetermined server with remote access, and wherein the predetermined server with remote access provides secure access to the service separate from the predetermined server with access remote. 53. The method of claim 50, wherein the accessor data by the logic circuit includes data from a service separate from the predetermined server with remote access, and wherein the predetermined server with remote access directs communication between the local terminal and the service separate from the predetermined server. with remote access. 54. The method of claim 50, further comprising using a reader device that communicates operatively with the logic circuit to provide additional data processing. 55. The method of claim 50, further comprising using a reading device that is operatively communicated with the logic circuit to provide additional code conversion data. 56. The method of claim 50, further comprising using a reader device that is operatively communicated with the logic circuit to provide additional data processing, at least a portion of the additional data processing generally or independently of the logic circuit. 57. The method of claim 50, wherein the accessory provides cooperative security for the remote access server. 58. The method of claim 50, further comprising using the accessory to provide secure access to the local server by encryption and decryption of signals processed by the local terminal. 59. The method of claim 50, further comprising: providing 'storage information and password in one of the memory storage, the default server with remote access or a service accessible by the predetermined server with remote access; and use where the logic circuit decrypts the password information. 60. The method of claim 50, further comprising using the communication access to provide secure communication through the local terminal with one of a plurality of security servers selected in accordance with a particular function executed through the local terminal. 61. The method of claim 50, further comprising using the predetermined remote server to provide secure communication with an additional server according to the protocol of the additional server regardless of the protocol used by the communication accessory to effect secure communications with the predetermined remote server. 62. The method of claim 50, further comprising: using the predetermined remote server to provide secure communication with an additional server according to the additional server protocol regardless of a protocol used by the communication accessory to effect secure communications with the remote server default, the default remote server configured as a stand-alone application server access server (ASAA); and using the ASAA server to provide the cooperative function for code conversion according to a local device registration with the ASAA server. 63. The method of claim 50, further comprising using an application server stand-alone access server (ASAA) as the default remote server, the ASAA server that provides the cooperative function for code conversion according to a device registration. local with the ASAA server. 64. The method of claim 50, further comprising reading additional safety data, thereby enabling the communication accessory to operate in conjunction with a separate safety device. 65. Architecture for providing network services to at least one wireless transmission / reception unit (WTRU), the architecture comprising: a server for communicating with a plurality of networks, including a network that provides large area mobile services; and providing connection requests through at least one secondary set of the plurality of networks and communicating with the WTRU in accordance with a preferred network connection, wherein the server provides an identity for the WTRU and the WTRU communicates according to the preferred network connection, thereby providing network connection requests in accordance with the identity assigned by the server. 66. Architecture according to claim 65, wherein the server provides information regarding the state of the plural network system. 67. Architecture according to claim 65, further comprising: a communication network that includes an external voice and / or data network; and the external voice and / or data network including at least one of a public switched telephone network (PSTN) a public data network. 68. The architecture of claim 65, further comprising a stand-alone application server access server (ASAA) that provides connectivity between the external network and the WTRU is provided through the access networks using data from the ASAA server.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US60/519,440 | 2003-11-12 | ||
US60/623,091 | 2004-10-28 |
Publications (1)
Publication Number | Publication Date |
---|---|
MXPA06005181A true MXPA06005181A (en) | 2006-10-17 |
Family
ID=
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1692795B1 (en) | System for application server autonomous access across different types of access technology networks | |
CN100405776C (en) | Service in wlan inter-working, address management system, and method | |
US7542455B2 (en) | Unlicensed mobile access (UMA) communications using decentralized security gateway | |
US8787361B2 (en) | System and method for call routing and paging across different types of networks | |
JP3984993B2 (en) | Method and system for establishing a connection through an access network | |
CN101606372B (en) | Support of UICC-less calls | |
US20120052914A1 (en) | Authenticating Multiple Devices Simultaneously Over a Wireless Link Using a Single Subscriber Identity Module | |
KR20050084926A (en) | Radio lan access authentication system | |
CN103181234A (en) | Dynamic connection of a mobile terminal to a local network | |
CA2503724A1 (en) | A method, a system and a terminal for realizing presenting information interaction of the wireless lan users | |
JP6884739B2 (en) | How to download subscriber information to the identification unit | |
US8259614B2 (en) | Personal network, and method to secure a personal network | |
KR101105552B1 (en) | Secure roaming between wireless access points | |
US7136646B1 (en) | Method and apparatus for electing an identification confirmation information | |
MXPA06005181A (en) | System for application server autonomous access across different types of access technology networks | |
JP3830388B2 (en) | Method and apparatus for performing security procedures involving mobile stations in a hybrid cellular telecommunications system |