Initialisation of communication units

FIELD: radio engineering, communication.

SUBSTANCE: initialisation and control of access for communication units includes assignment of identifiers to sets of units, at the same time identifiers may be used to control access to limited units of access, which provide certain services only to determined specified sets of units. In certain aspects initialisation of the unit may contain provision of a unique identifier for sets from one or more units, such as limited points of access and terminals of access, which are authorised to receive a service from limited points of access. Access control may be provided by means of an operation of a limited point of access and/or a network unit. In certain aspects initialisation of a unit contains provision of a list of preferable roaming for a unit. In certain aspects the unit may be initialised with the help of a list of preferable roaming using a beacon radio signal of self-initialisation.

EFFECT: optimised process of access control.

36 cl, 28 dwg

 

The claim to priority under 35 U.S.C. 119

This application claims the priority under common property of the provisional application for U.S. patent number 60/978363, filed October 8, 2007 with an assigned number 080042P1 in the registry attorney; provisional application for U.S. patent number 61/025686, filed February 1, 2008 with an assigned number 080745P1 in the registry attorney; and provisional application for U.S. patent number 61/061537, filed June 13, 2008 with an assigned number 081811P1 in the registry attorney, disclosure of each of which is contained by reference in this document.

Prior art

The technical field to which the invention relates

This application in General relates to wireless communications, and more particularly, but not exclusively, to improving performance connection.

Introduction

Wireless communication systems are widely deployed to provide various types of communication (e.g. speech, data, multimedia services etc) to multiple users. As the demand for high speed services and transmission of multimedia data is rapidly growing, there is a tough task to implement an efficient and fault-tolerant communication systems with increased performance.

To complement the base station traditional mobile phone CE and, can be deployed base station with a small coating (for example, to set the user home). In some aspects, these base stations can provide a more resilient inner coating for wireless communication of the mobile modules. Such a base station with a small coating commonly known as a base station in the form of access points, home node B or femtocells. Typically, such a base station with a small floor connect to the Internet and mobile network operator via a DSL router or cable modem.

In some scenarios, the base station with a small coating can be deployed randomly organized (ad hoc) way. Consequently, there may be problems associated with the implementation of the access to these base stations. For example, the access terminals may need to be performed with the opportunity to access their associated base stations. In addition, it may be desirable to prevent access to certain base stations through unauthorized access terminals. Thus, there is a need to improve access control for wireless networks.

The invention

The essence of the exemplary aspects of the disclosure are described below. It should be understood that any reference to the term "the aspects" in this document can belong to one or more aspects of the disclosure.

This disclosure relates in some aspect to the initialization of the communication nodes, and providing access control for wireless communications. For example, the identifiers can be assigned to sets of nodes and identifiers can be used to control access to restricted access points, which provide certain services only to specified sets of access terminals. Here limited the access point may, for example, to provide certain services (for example, different billing and payment of the subscription services, additional services, different quality of service) for terminal access one or more preferred user, but not for other users.

In some aspects, the initialization of a node may contain the provision of a unique identifier for a set of one or more nodes. For example, the unique identifier may be assigned one or more limited access points. Similarly, the unique identifier may be assigned a set of access terminals that are authorized to receive service from one or more limited access points. In some aspects, the temporary ID may be assigned to the access terminal, whereby access to the site may contain conversion of temporary IDA is tificate in a permanent identifier for the access terminal.

Using such identifiers can be achieved the required level of access control, even when nodes can be initialized arbitrarily organized way. In some aspects, the access control can be provided through limited access points. In some aspects, the access control may be provided by a network node. In some aspects, the access control can be provided through the interaction of a limited access point and a network node.

This disclosure relates in some aspects to initialize a node with a list of preferred roaming. In some aspects, the node may be initialized using a list of preferred roaming by default, a host can use to get a different list of preferred roaming to provide access to restricted access points. In some aspects, the node may be initialized using a list of preferred roaming using makabago signal of canonicalization.

Brief description of drawings

These and other exemplary aspects of the disclosure are described in the detailed description and the attached claims, which are listed below and on the attached drawings, on which:

Figure 1 is a simplified the th block diagram of several exemplary aspects of the access node;

Figure 2 is a block diagram of the operational sequence of the method for several sample aspects of operations that may be used to initialize the network nodes and to provide access control;

Figure 3 is a simplified diagram of several exemplary components of a network node;

4 is a flowchart of the operational sequence of the method for several sample aspects of operations that may be used to initialize the access point;

5 is a flowchart of the operational sequence of the method for several sample aspects of operations that may be used to initialize the access terminal;

6 is a flowchart of the operational sequence of the method for several sample aspects of operations that may be used to initialize the access terminal;

7 is a flowchart of the operational sequence of the method for several sample aspects of operations that may be used to provide access control;

Fig is a flowchart of the operational sequence of the method for several sample aspects of operations that may be used to provide access control;

Fig.9 is a block diagram the th sequence of the method for several sample aspects of operations, which can be used to provide access control;

Figure 10 is a flowchart of the operational sequence of the method for several sample aspects of operations that may be used to provide access control;

11 is a flowchart of the operational sequence of the method for several sample aspects of operations that may be used to provide access control;

Fig is a flowchart of the operational sequence of the method for several sample aspects of operations that may be used to initialize the access terminal;

Fig is a flowchart of the operational sequence of the method for several sample aspects of operations that may be used to provide access control;

Fig is a simplified diagram of a wireless communication system;

Fig is a simplified diagram of a wireless communication system, comprising famously;

Fig is a simplified diagram illustrating the coverage area for wireless communication;

Fig is a simplified block diagram of several sample aspects of components of communication; and

Fig-28 are simplified block diagrams of several sample aspects of devices, the ability to provide initialization and/or access control, as discussed in this document.

In accordance with established practice, the various signs, illustrated in the drawings may not be drawn to scale. Accordingly, the dimensions of the various features may be arbitrarily increased or reduced for clarity. In addition, some of the drawings may be simplified for clarity. Thus, the drawings may not illustrate all of the components of this device (for example, device or method. Finally, similar reference numbers may be used to designate similar signs throughout the detailed description and drawings.

Detailed description of the invention

Various aspects of the disclosure are described below. It should be obvious that the ideas in this document can be implemented in many forms and that any specific structure, function, or both, disclosed herein are merely typical. Based on the ideas in this document are specialists in this field of technology should take into account that the aspects disclosed herein may be implemented independently of any other aspects, and that two or more of these aspects can be combined in various ways. For example, the device may be implemented or a method can be used to practice the ICA by using any number of aspects, set forth in this document. In addition, such a device may be implemented or a method can be used in practice by using other structure, functionality, or structure and functionality in addition to or other than one or more aspects set forth herein. In addition, an aspect can contain at least one element of the claims.

Figure 1 illustrates several nodes in the exemplary communication system 100 (for example, parts of the network). To illustrate various aspects of the disclosure are described in the context of one or more network nodes, access points and access terminals that communicate with each other. You should note, however, that the ideas in this document may be applicable to other types of devices or other similar devices, which are referred to using other terms.

Points 102 and 104 of the system 100 provide one or more services (for example, connectivity to the network) to one or more wireless terminals (for example, terminal 106 and/or 108, which may be installed within or that may move across the associated geographic area. In addition, points 102 and 104 are able to communicate with one or more network nodes 110, that is to simplify connectivity to the WAN. This network node may take various forms. For example, a network node may include a mobility Manager or some other appropriate network entity (for example, the object underlying network).

Points 102 and 104, access may be limited In some aspects, whereby each access point provides certain services to certain access terminals (for example, the terminals 106 and 108 of access), but not other access terminals (for example, Microterminal access, not shown). For example, points 102 and 104, access can be limited so as not to give other access terminals at least one of the following: registration, transmission of signals, voice call, data access or any other service provider. Limited access points can be deployed randomly organized (ad hoc) way. For example, given the landlord can install and configure their own limited point of access.

Figure 2 provides a brief overview of several operations that can be performed in order to simplify the deployment of limited access points and access terminals that are authorized to use the access points. In some aspects of these operations can be used to provide an opportunity for a small site DOS the UPA to determine its identity, to determine the identity of the access terminals that are authorized to access (for example, to connect to a restricted access point, and to confirm the identity of the access terminal (for example, access terminal that is attempting to access a restricted access point). In some aspects of these operations can be used to enable the access terminal to determine its identity, to determine the identity of the restricted access point to which the access terminal is allowed to access, convert the temporary identification information of the access terminal in a permanent identity and to confirm the identity of the access point (for example, limited access point to which the access terminal attempts to access).

For convenience, the operation of figure 2 (or any other operations that are explained or discussed in this document) can be described as performed by specific components (for example, components of the system 100 and/or components of the system 300, as shown in figure 3). You should note, however, that these operations can be performed by other types of components and can be performed using a different number to the of mponents. You should also take into account that one or more of the operations described in this document may not be used in this implementation.

Figure 3 illustrates several sample components that may be included in the network node 110 (for example, the mobility Manager, the switching center of a mobile phone or serving GPRS support node), the point 102 of the access terminal 106 access in accordance with the ideas in this document. You should take into account that the components illustrated for the given one of these nodes, can also be incorporated into other nodes in the communication system. For example, the terminal 108 may include components similar to those described for the terminal 106 of the access point 104 may include components similar to those described for point 102 access.

The network node 110, the point 102 of the access terminal 106 access include receiving-transmitting devices 302, 304 and 306, respectively, to communicate with each other and with other nodes. Receiver-transmitter 302 includes a transmitting device 308 for sending signals (for example, messages) and a receiver 310 for receiving signals. Receiver-transmitter 304 includes a transmitting device 312 for transmitting signals and receiving device 314 for receiving signals. Two-way radio device is in 306 includes a transmitting device 316 for transmitting signals and receiving device 318 for receiving signals.

The network node 110, the point 102 of the access terminal 106 also include various other components that may be used in connection with the initialization of the nodes and access control, as discussed in this document. For example, the network node 110, the point 102 of the access terminal 106 of access may include controllers 320, 322 and 324 connection, respectively, for managing communication with other nodes (for example, sending and receiving messages/indicators) and for providing other related functionality described in this document. The network node 110, the point 102 of the access terminal 106 of access may include controllers 326, 328 and 330 initialization, respectively, to initialize the node and for providing other related functionality described in this document. The network node 110, the point 102 of the access terminal 106 of access may include controllers 332, 334 and 336 access, respectively, to provide access control and for providing other related functionality described in this document. For purposes of illustration, all nodes are illustrated in figure 3 as having a functionality related to initialization and access control. In some implementations, however, one or more of these components may not be used in this node. Negativee is a great explanation describes several different schemes (for example, due to the different drawings) to initialize the network nodes and providing access control. For convenience, these various schemes, the network node 110, the point 102 of the access terminal 106 access can be referred to as having different functionality and may be referred to as representing different types of nodes (for example, in various implementations, the network node 110 may represent SRNC or MME, or AAA, etc). You should note, however, that in this implementation, the network node 110, the point 102 of the access terminal 106 of the access can be performed in a particular way.

Again referring to figure 2, as represented by step 202, each access terminal (for example, the terminal 106 access) in the system may be initialized to provide communication with one or more access points (for example, point 102 access). In the example in figure 3, these operations can be performed, for example, through the work of the controllers 326 and 330 initialization.

In some aspects, the operator can assign a unique identifier to the terminal 106 access. In some implementations, the identifier contains the identifier of the network access (NAI) or international number digital network integrated services for mobile stations (MS ISDN). Alternatively, the identification data of the subscriber, such as the international ID AB is the component for mobile communications (IMSI), also can be retrieved from a subscriber identity module, such as SIM, USIM or VSIM present in the access terminal. In some cases, this identifier is only guaranteed to be unique within the domain of the operator (for example, the entire network provided by a cellular operator). In some implementations, the identifier may be part of the session information for the terminal 106 access. For example, the identifier may be sent to network node 110 (for example, the session reference network controller, SRNC) via terminal 106 access when the terminal 106 access creates a session, or the identifier may be overcrowded in the network node 110 from the object authentication, authorization, and accounting (AAA), as soon as the session is created. In some implementations, the identifier is available to the user so that the user can, for example, to configure their limited point(s) of access to provide services to one or more access terminals. In some implementations, the access terminal may be assigned a temporary ID. For example, the network may appoint permanent and temporary identifiers for the terminal 106 access and store these IDs in the network. In addition, the network may send a temporary identifier to the terminal 106 of access so that the terminal 106 may use this ID is ID, when he accesses the access point.

The terminal 106 access can also be initialized with the identity of each access point (for example, point 102, to which the terminal 106 of the access is allowed to access. As described in more detail below, it may contain, for example, sending an identifier of the access points in the terminal 106 of the access (for example, the model of passive acceptance and active transmission) and/or the enable terminal 106 access select the access point that the access terminal 106 of access (for example, the model of active reception and passive transfer). The terminal 106 access thus can store a list of authorized access points (for example, a white list or a list of preferred user zone)to which the terminal 106 of access may apply as moves through different zones wireless coverage.

In some implementations, the user terminal 106 of access can be specified to determine what he wants or not to allow the terminal 106 access to access the access point. In some implementations, the terminal 106 access can automatically allow access to the access point. In some implementations, the terminal 106 may determine, based on the configuration information in the terminal 106 on the stupa, it should allow access automatically or require user indicated to allow access. In some implementations, the user can choose to access or choose not to access to one or more access terminals. In this case, the list of allowed and/or denied terminal(s) of access can be stored in the terminal 106 access. Thus, the terminal 106 access may not be allowed (for example, automatically to prevent attempts to access the access point in the list.

As represented by step 204, each limited access point (for example, point 102 access) in the system may be initialized to provide communication with one or more access terminals (for example, terminal 106 access). In the example in figure 3, these operations can be performed, for example, through the work of the controllers 326 and 328 initialization.

For example, the unique identifier may be assigned point 102 access or set of access points (for example, points 102 and 104 access). This unique identifier is different from the unique device ID that can be assigned to identify individual access terminals in the system. As described in more detail below, such an identifier may include, for example, a special type ID CE and (NID) or the subnet identifier, or identifier assigned to the group of access terminals that have identical properties limited associate (for example, CSG). In some cases, the Autonomous network can be assigned a unique identifier. In some cases, one or more access points can request identifier (for example, by determining the proposed ID and send it to the network). In these cases, the network may determine that used already or not the requested identifier with one or more other access points. If the requested ID is already in use, the network may choose a different ID (for example, the same identifier), which is not used by other access points, and send the identifier to the requesting point of access.

Point 102 access can also be initialized with one or more identifiers associated with each access terminal (for example, terminal 106 access)which are allowed to access point 102 access. As described in more detail below, it may contain, for example, the preservation of the identity of the access terminals in a database managed by the network, and/or storing identifiers of the access terminals on the list for the local access point 102 access.

In some implementations, the JV is the juice of the access control for this limited access points can be managed in this limited the access point. For example, as explained below in connection with Fig, the user can configure your access point using the access terminal (for example, cell phone) or by using a password-protected web page hosting which runs in a restricted access point.

Alternatively, in some implementations, the access control list for each limited access points in the network managed by the network (for example, core network). For example, as explained below in connection with figure 4, the access control list can be managed on the web page hosting which is performed by the network operator. Management access control list in the network may provide one or more advantages in some contexts. In some aspects, this approach can provide greater flexibility in the policy. For example, the operator may limit access to restricted access points if necessary, and the operator can check the records (for example, for terminal access) in a single rating scheme and payment of the subscription services. In addition, the network may be more reliable than a single access point. Therefore, the reliability of the access control list may increase. In addition, since the access control list may not be delivered in a limited access point may not be necessary provided the identification of direct interface with limited access points (for example, application software, USB ports, etc). In addition, with centralized access control can be easier to manage multiple limited access points that belong to a common organization.

As only limited access point is initialized, it may notify its assigned identifier for the radio interface. For example, the point 102 may transmit in broadcast mode identifier as part of a parameter sector or by some other appropriate method.

As represented by step 206, once the access terminal is initialized, the access terminal may monitor signals (for example, pilot signals/Macovei radio signals)that are transmitted in broadcast mode by nearby access points. As explained in detail below, if the terminal 106 identifies the access signals from point 102 access (for example, in the scenario where the terminal 106 of the access is allowed to access point 102, the terminal 106 may request access to this point 102 access. Identification of available access points via terminal 106 may contain, for example, comparing the identifier associated with the point 102 access to a trusted list 338 authorized access points (for example, a white list is), stored via a terminal 106 access. In the example in figure 3 these and other related operations can be performed, for example, by the controller 336 access.

As represented by step 208, the point 102 of the access and/or one or more network nodes (for example, the network node 110) may determine, whether or not the terminal 106 access to access point 102 access. This operation access control may contain, for example, the identity of the terminal 106 access and comparison of the identifier of the terminal 106 of the access list of authorized access terminals stored by point 102 access (for example, list 340 for local access), and/or stored by the network node 110 (for example, a list of 342 access to online database). In the example in figure 3 these and other related operations can be performed, for example, by the controller 334 access and/or controller 332 access.

From the above brief overview of the additional details regarding the initialization and access control are described with reference to Fig.4-13. It should be taken into account based on the ideas in this document that one or more of the operations described in connection with the given one of these drawings can be used in conjunction with operations that is written in another of these drawings. For convenience, these operations are described in relation to the components of figure 1. You should take into account that these operations may also be applicable to other nodes in the network.

Referring initially to figure 4, several operations related to the initialization of the restricted access point.

As shown by step 402, the network node 110 assigns an identifier (for example, a unique identifier) for the limited access points. In some cases, this identifier is only guaranteed to be unique within the domain of the operator (for example, the entire network provided by a cellular operator). For example, a network object may store a database of identifiers that is used to ensure the uniqueness of any assigned identifier.

The identifier may take various forms. In some implementations, the identifier contains the identifier of the network (for example, the identifier of the femtocell, FNID). In some implementations, the identifier can be an identifier of a closed subscriber group (CSG ID). As mentioned above, the limited set of access points (for example, associated with a single administrative domain) may share a common identifier (for example, CSG ID). In some implementations, the set FNID can be associirovat General CSG. For example, CSG can be assigned to organizations, and various FNID can be assigned different access points in the organization (for example, in different buildings). In some implementations, additional identifiers, which can be understandable to users (for example, text)can also be used.

The unique identifier may be initialized in different ways. For example, in some cases, the identifier is selected and configured, when the user activates a restricted access point. Here, the ID can be configured by the operator at the point of sale or in some other way.

As represented by step 404, a list of access terminals that are authorized to access point 102 access (and, if applicable, to all other access points in a given set of access points). This access list can include, for example, identifiers of the access terminals, as explained in this document. Thus, such an identifier may identify a particular access terminal (for example, NAI or IMSI or MS ISDN) or a set of one or more access terminals (for example, one or more access terminals associated with this CSG). In addition, the access list can specify permissions (for example, conditions for access), associer the bathrooms with the given access terminal.

In some implementations, the access list can be managed using the web site 344 (for example, accessible via computer, phone or some other appropriate device). Thus, the owner or user point 102 may access the web site to add, remove, or edit entries terminal access in the access list. For example, to provide an opportunity for home or invited to the access terminal (for example, the terminal 108 access) to access point 102, the user can add a constant NAI terminal access-list access through the web page. Here different naming conventions (for example, user-friendly identifiers, such as Telephone Joe" and the like) can be associated with a unique identifier of an access terminal (for example, NAI or MS ISDN), and one or more of these identifiers may be displayed on a web page after they have been added to the web page.

As represented by step 406, in some implementations the access list managed by the network operator. For example, the operator may store the server for the web site access lists. Thus, the operator may authorize any modification of access list (for example, to restrict entry for terminal access from the other operator is the moat).

As shown by step 408, information about the access list can then go into each access point or other network nodes that perform the access control associated with the given access list. For example, the server can "push" information about the list of access point 102 or access point 102 can access to retrieve ("pull") the information about the access list from the server. As an example of a model of passive acceptance and active transfer ('push') the access list can be sent from a web site operator to the configuration server, which then sends the list of access point 102 access. As another example, the access list can be sent from a web site operator via the Internet application software at the point 102 access. As an example of a model of active reception and passive transfer ("pull") point 102 may query the configuration server to accept the latest version of the access list. Such a request may be, for example, each time point 102 access connects to the network operator (for example, establishes a new connection IPSec). Thus, if the point 102 access goes offline for a certain period of time, the point 102 access can be sure of receiving the latest version of the access list every time is to re-connects to the network.

Through the storage access list in a location different from the point 102 to the access point 102 access is released from load for the storage access list. This approach allows us to provide superior control list access because the access list can be updated, even when the point 102 access is offline. In addition, this approach can simplify the management access list that is associated with multiple access points. For example, a single access list can be specified for a set of access points (for example, associated with this CSG). In this case, the access point can detect the access list from one source rather than having to coordinate with each other to control (for example, to update the access list for all access points.

The use of a Central access list can also facilitate the use of temporary identifiers. For example, the point 102 access can use this ID for the duration when the IPSec tunnel is set. When a new IPSec tunnel is set, the access list can be configured with a different set of identifiers. Here a new set of identifiers can identify or not to identify these terminals access the previous version of the access list.

As shown by what redstem stage 410, point 102 access transmits in broadcast mode identifier (for example, FNID or CSG ID) on air. Thus, all of the access terminals that are in the coverage area of the point 102 access, can identify the point 102 access and determine what is allowed or not to access point 102 access.

Referring now to figure 5 and 6, describes several operations that can be used to initialize the access terminal. In particular, these drawings describe the technology to initialize the access terminal using the identification data of one or more limited access points that the access terminal is allowed to access.

Figure 5 illustrates several operations that can be performed in order to "push" information about the access list in the access terminal (i.e., the model of passive acceptance and active transmission). In this example, it is assumed that a unique identifier assigned to the access terminal (for example, as explained above).

As shown by step 502, at some point in time the access terminal may be referred to as authorized to access one or more access points. For example, the owner of one or more access points can add invited the access terminal to the access list associated with visiting th is(kami) access as explained above in connection with figure 4.

As shown by step 504, the operator sends a message to the access terminal that indicates that the access terminal is now allowed to access the access point or set of points of access. This message may include an identifier associated with the point(kami) access (for example, FNID or CSG ID), and any restrictions which may be applicable (for example, terms for guest access). This message may be sent, for example, when the identifier of the terminal 108 is added to the access list associated with the point 102 access. This message may also be sent in various ways. For example, the network may send an SMS message to an application layer Protocol (for example, the device management standard open community of manufacturers of mobile communication, the message control radio communications, search the call or some other type of message to the access terminal to transmit information about the access point (for example, a query that requests the terminal 108 access or not he wanted to access point 102 access).

As represented by step 506, the terminal 108 of the access can then inform the user terminal 108 of the access that he has the right to access ctacke(Kam) access. For example, the terminal 108 may display the indicator relative to the identification data point(EC) access or provide some other form of indicator. Such an indicator may include, for example, the identifier assigned to the point(Kam) access, or alternative name (for example, user-friendly identifiers, such as "House sue" and the like), which is associated with the identifier.

As represented by step 508, the user can then determine what to allow or not (for example, using the input device to the terminal 108 of the access requested access point(Kam) access. Based on the decision of the user terminal 108 may update the list (for example, a white list), which it stores, access points, to which it is allowed (for example, given the opportunity) to access. As explained below, the terminal 108 access can use this list to determine which access points it can access, as the terminal 108 access to move across the network. Here the user may not be required to provide any additional authorization access if the access terminal enters the coverage area of the access point in the list, because the access terminal may automatically "remember" the access point. In kotoryj implementations, the white list may be updated only after as confirmation is received from the network operator.

In some implementations, the terminal 108 may send a message to the operator indicating the user's decision. Thus, the operator can choose to modify the list of access points(EC) access, if necessary.

By allowing the user of the access terminal to accept or reject the access to the access point may not be permitted unilateral allowing the access terminal (for example, the access terminal neighbor) to access this access point user access point. Thus, the user of the access terminal can be sure that his information is not sent to an unauthorized access point.

In addition, this model of passive acceptance and active transmission does not require that the access terminal was located near the access point, in order to add an access point to your white list. In addition, since the access terminal may receive the message "push" only when it is added to the access list, the probability of the user selecting the wrong access point (for example, to which the access terminal is not permitted access) may be reduced.

6 illustrates several operations that can be performed in order to "extract" information is the access list in the access terminal (i.e. the model of active reception and passive transfer). On the other hand, it is assumed that a unique identifier assigned to the access terminal.

As represented by step 602, at some point in time, the user of access terminal (for example, terminal 108 access) initiates a scan for nearby access points. To this end, the terminal 108 may include an input device which can be manipulated by the user (for example, the selection menu)to instruct the receiving device 318 to monitor one or more channels for the signals, pilot signals or other signals from an access point.

As represented by step 604, the terminal 108 access informs the user about all the access points that are detected in the scan result. For example, the terminal 108 may display the indicator relative to the identification data detected point(EC) access or provide some other form of indicator. Also, this indicator may contain the identifier assigned to the point(Kam) access, an alternate name or some other appropriate information.

As represented by step 606, the user can choose to allow access to one or more of the detected access points. For example, the user can operate the input device in t is rminal 108 access to select one or more access points that are displayed through the terminal 108 access.

The access terminal then attempts to access the selected access point, if necessary. As explained below, if the user chose the wrong access point (for example, the access point to which the access terminal is not permitted access), the access point may deny access. The access point can then relay this information to the access terminal (for example, to prevent this again in the future).

As represented by step 608, in some implementations, the terminal 108 access can update the list that it stores, access points, to which it is allowed to access (for example, a white list), based on user decisions. Thus, the terminal 108 can access to "remember" the selected access point so that user input is not required for future access to this access point (for example, the terminal 108 may connect to the access point without the need for the user to initiate another scan).

As represented by step 610, in some implementations, the model of active reception and passive transfer can be used to provide a terminal 108 access access access point n the conditional basis (for example, fee for use). For example, multiple access points (for example, owned by a common owner, such as a hotel or other organization) can alert one unique identifier (for example, FNID or CSG ID). When the access terminal is located next to one of these access points and the user terminal 108 access initiates a scan, the user can choose to connect to one of these access points (for example, point 102 access). When the terminal 108 of the access attempts to connect to access point 102 access point 102 access may not check your list control local access to authorized or not the terminal 108 access to access, but instead may provide an opportunity to the terminal 108 of the access to make the initial connection. This is the initial connection may contain, however, the user is redirected to a web page, whereby the terminal 108 may receive service from point 102 access only if certain conditions are satisfied (for example, payment is made). Using this model, any terminal access (as opposed to certain designated terminal access) can access the associated set of access points.

As mentioned above, the access point and/or network node can control the time Asino or not a given access terminal to access the access point. In some implementations, the access control for this limited access points can be managed in this limited the access point. In some implementations, the access control for this limited access points can be managed in this limited the access point Manager centralized access control (for example, implemented in a network node). 7 to 11 illustrate several technologies that can be used to manage this access.

Referring initially figure 7, describes several operations related to a scenario where the access point controls access to itself. In some aspects, the access provided by the access point may be conditional. For example, if the access point determines that access to a specific service should not be granted the requested access may be unilaterally prohibited. However, if the access point determines that the access to this service should be provided, the access point may send a request to the network to confirm that, or should not be allowed access.

In some implementations, the access point can control (for example, one way to manage access to local services. For example, the access terminal may attempt to access the services provided in the local CE and, associated with the access point. Such services may include, for example, access to the local server (for example, to access audio, video data or other content), access to printer, etc.

As represented via step 702 in Fig.7, at some point in time the access terminal (for example, the terminal 108 access) starts communication with limited access point (for example, point 102 access). In connection with this operation, the terminal 108 may attempt to open a session (or route) to the point 102 access. In addition, the associated information session can be stored in the network (for example, in a network node 110). To simplify the proof by point 102 access the identification data of the terminal 108 of access, in some cases, the identifier of the terminal 108 may be part of the session information (for example, to be included in the context information for the access point). This identifier can contain, for example, a permanent identifier (for example, NAI), as explained in this document.

As represented by step 704, the point 102 can access to obtain information to confirm the identity of the terminal 108 access. For example, in some cases, the point 102 may receive the identifier (for example, a temporary identifier) or other n the improper information directly from the terminal 108 of the access (for example, on the radio interface). In some cases, the point 102 may extract the above information session that includes the identifier of the access terminal (for example, temporary or permanent identifier)of the network (for example, from SRNC). Mainly, in this last scenario, the transmission of the identifier (for example, the permanent NAI) on the radio interface may be prohibited.

In cases where the temporary ID is used (for example, temporary NAI), point 102 may communicate with the network, to ensure the validity of the ID. For example, in some implementations, the point 102 access sends the temporary identifier in the AAA-object that authenticates the ID. In some implementations, the point 102 access sends a temporary identifier to the network and receives the associated permanent identifier in response. In this case, the point 102 may use a permanent identifier to authenticate the terminal 108 access.

As represented by step 706, the point 102 access compares the information about the access terminal (for example, temporary or permanent ID) information in its list for local access (for example, represented by a list of 340 for local access figure 3). As explained above, the list for local access can the t can be performed with the opportunity to include a unique identifier, associated with the terminal 108 of the access (for example, NAI, CSG ID, and so on).

As represented by step 708, the point 102 access may then allow or deny the requested access based on the comparison at step 706. Here the point 102 may send a reject message to the terminal 108 and/or point 102 may redirect the terminal 108 access to another access point (for example, by sending a message redirection, which identifies local macropoint access).

As described below, in some implementations, the terminal 102 may communicate with the network to authenticate the terminal 108 access. For example, if the identifier of the access terminal is not in the list for the local access point 102 may send a request to a network node, such as AAA-an object that provides authentication, etc. on the subject of limited access points (for example, Femto-AAA implemented, for example, as a stand-alone object or through the inclusion of relevant functionality in a traditional network AAA-object). Here, the network node may store the access control list for a point 102 of the access network node uses to authenticate the terminal 108 of the access (for example, in a similar manner as explained above). In addition, if the anima, the network node can communicate with another network node (for example, AAA-object for terminal 108 access)to retrieve persistent identifier associated with the terminal 108 of the access identifier that is sent to the point 102 access through terminal 108 access. Point 102 access may then allow or deny the requested access based on the response that it receives from the network node indicating that authorized or not the terminal 108 access to access point 102 access. In accordance with the ideas in this document, the access control can be performed in the access point or other network object, such as a gateway switching center mobile communications (MSC), serving GPRS support node (SGSN)serving node packet data (PDSN) or MME in various implementations.

Referring now to Fig, describes several operations relating to the scenario in which the network sends a list of identifiers of access terminals (for example, an access list (access point) in the access point so that the access point can determine whether to grant or no access request from the access terminal. In this example, the operation steps 802 and 804 may be similar to the operations of steps 702 and 704 described above. In this scenario, however, the point 102 access can't retrieve info is the information session in some cases.

As represented by step 806, the point 102 sends the access request to the network (for example, the network node 110)to authenticate the terminal 108 access. If the point 102 access receives information session (for example, which includes the identifier information of the access terminal, such as MS ISDN, CSG ID, or NAI), point 102 may send this information to the network node 110 with the request (for example, included in the request message). In some implementations, this operation may comprise a request for a list of identifiers of access terminals. In practice, the point 102 access can query this list repeatedly (for example, every time the access point is switched on or connected to the network, whenever the access terminal attempts to access the access point, periodically, etc).

As represented by step 808, the network node 110 receives the ID associated with the terminal 108 access. This identifier can contain, for example, a list of identifiers that specify one or more access groups associated with the access terminal. For example, the identifier can contain a list of closed subscriber groups, is a member of the terminal 108 of the access, the list of access terminals that are authorized to access point 102 access (for example,a list of access point 102, or a list of identifiers of access points to which the access terminal 108 access. The definition of the identifier by the network node 110 may include, for example, receiving the identifier from another network node (for example, HSS) or obtain the ID from the local database. In some implementations, the determination of the identifier may comprise a determination of the permanent identifier, as explained in this document (for example, on the basis of the received temporary identifier). Network node 110 sends the identifier or identifiers obtained in step 808, the point 102 of the access at step 810.

As represented by step 812, the point 102 access can then determine what to allow or deny the requested access based on the received identifier(s). For example, the access point may compare the received identifier (for example, CSG ID)indicating the sets, which belongs to the terminal 108, c information (for example, the CSG ID list for the local access point 102 access, which is a sign of sets, which belongs point 102 access. Point 102 access may then allow or deny the requested access based on the comparison.

Referring now to figure 9, describes several operations relating to the scenario in which the network controls access to accurate, the e access. In this example, the operations of steps 902, 904 and 906 may be similar to the operations of steps 802, 804 and 806, as described above. Also point 102 access may not extract information session in some cases. In addition, in some cases, the point 102 may send your list to a local access network for use in the authentication operation.

As represented by step 908, in implementations that use temporary identifiers to identify one or more nodes (for example, access terminals), the network node 110 (for example, Femto-AAA) can determine a permanent identifier associated with the terminal 108 of access, based on the temporary ID associated with the terminal 108 access. For example, the point 102 access, may receive a temporary ID from the access terminal (for example, at step 902), or from the session information (for example, step 904). In this case, the point 102 may send a temporary identifier (for example, temporary NAI) to terminal 108 of access along with the identifier (for example, FNID) terminal 102 to the access network node 110 along with the request at step 906. As explained above in connection with Fig.7, the network node 110 may then communicate with another network node to extract the permanent identifier of the terminal 108 of the access from the temporary ID is ficalora.

As represented by step 910, the network node 110 determines, whether or not the terminal 108 access to access point 102 access. For example, the network node 110 may compare the identifier of the terminal 108 of the access (for example, NAI, CSG ID, and so on) with a list of access point 102 access. Here is a list of access may be a local list obtained from point 102 to access, or may be an access list stored by the network (for example, on the basis of information received from the web server, as explained above). The network node 110 may then determine that allow or deny the requested access, on the basis of this comparison.

As represented by step 912, the network node 110 sends the indicator relative to the definition in point 102 access. Point 102 access may then allow or deny the requested access based on the received indicator (step 914). Mostly, in such implementations, as these point 102 should know the actual identity of the access terminals that access point 102 access. In addition, the access control list for a point 102 of the access does not have to go to the point 102 access. In this implementation, the access control is entirely in the network node is transparent to the access point.

Various technologies can IP olsavica for to manage the identifiers of the access terminals in the network. As mentioned above, the access point may maintain a valid ID (for example, NAI)used by the access terminal. In some implementations, the identifier can remain valid for a specified period of time. Here, if the access terminal re-visits the access point within the time period (i.e., the access terminal has the same ID at this time), the access point may receive the access terminal without obtaining authorization from the network (for example, Femto-AAA). In some implementations, the operator can choose to use the temporary ID or a permanent identifier for terminal access. If you are using a persistent identifier, constant identifiers can be stored in the access points (for example, in the list 340 for local access), so the access point can independently authenticate the access terminal. If you are using the temporary ID, the operator can control the frequency with which the access point is checked against the network (for example, Femto-AAA)to verify the IDs stored in the list 340 for local access.

Figure 10 illustrates an example of access control operations that can be performed in implementations that use the standard long term evolution (LTE) or the other similar technology. In this example, the network (for example, the basic network in contrast to the radio access network controls the permitted or not the access terminal to access the access point. In addition, there are technologies to initialize the access terminals and access points using information on CSG-subscription (for example, mapping information), forced activation of access control (for example, idle or active mode), modification of the initialization of the access point or access terminal and forced activation CSG list when the access terminal performs operations such as power on, the update tracking and transfer services.

Network (for example, the server's own subscribers, HSS, or the server CSG-subscription) you can store information on CSG-subscription for terminal access and limited access points in the network. In a similar manner as described above, the operator may provide a web server that allows the user to manage information on CSG-subscription for its limited point(EC) access. For example, the user may modify your subscription details (for example, MS ISDN) using the web site. The network can then authorize modifications (for example, write access terminal), carried out by the user and the web server can otpravlat the subscription details in the network (for example, HSS). Here, MS ISDN can be converted to IMSI. The network can then send CSG-information (for example, unique CSG-ID) in the appropriate limited period(s) of access. In addition, the network may send information on CSG-subscription in the MME when the associated access terminal registered in the MME.

As described above, the initialization of the access terminal (for example, using the list of unique CSG ID may be authorized by the owner of the access terminal. In addition, the operator may authorize the initialization of the access terminal. Here this CSG ID may be associated with a set of one or more access terminals that are authorized to receive at least one service from a set of at least one limited access points. In other words, the set of access terminals and a set of access points associated with a common CSG ID. You should also take into account that the access terminal or the access point may also be associated with multiple CSG. In some aspects, the network (for example, the HSS may store information indicating a correspondence between the identifier of the access terminal and the subscription CSG ID. In addition, since HSS is connected to the MME, the MME can extract CSG-information and relay it to the limited access points, if necessary.

With drugoystorony initialization of the access terminal may comprise a model of passive acceptance and active transfer" or "the model of active reception and passive transfer". For example, in the first case, the network (for example, a network node) may send an SMS message to the access terminal to inform the access terminal on the new subscription (for example, identification of one or more CSG ID), and the user accepts or rejects the subscription. In the second case, the user can initiate a manual scan, and the access terminal displays a list of nearby access points (for example, user-friendly CSG ID or other types of identifiers of the access point) so that the user can select one or more records from the list, if necessary.

As represented by step 1002 in figure 10, at some point in time the access terminal starts accessing the restricted access point. For example, when the terminal 108 of access determines what it is about point 102 access (for example, if the point 102 of the access signals CSG ID, which is also associated with the terminal 108 of the access terminal 108 may send a request for registration or other appropriate message to the point 102 access.

As represented by step 1004, the point 102 sends the access request to the network (for example, one or more network at the catch 110), in order to authenticate the terminal 108 access. Here, the network node(s) 110 may include an entity mobility management (MME) or some other appropriate network object or objects. Point 102 also may send an identifier (for example, the CSG ID associated with the point 102 to the access network node 110 with the request (for example, included in the request message). In addition, the request may include information downloaded from terminal 108 of access (for example, step 1002).

As represented by step 1006, the network node 110 receives the context information associated with the terminal 108 of the access (for example, from the previous MME to terminal 108 of access or from the HSS). This context information may include, for example, a set of identifiers associated with the terminal 108 access. For example, the context information may include a list of all the CSG ID associated with the terminal 108 access. In some implementations, the network node 110 may store your own list of CSG IDS for each of their limited access points. In this case, the network node 110 can update your list whenever a record is changed on the web server.

As represented by step 1008, the network node 110 determines the permitted or not the terminal 108 access to access point 102 access. For example the EP, network node 110 determines, or is no point identifier 102 access (for example, pointing to the CSG, to which the point belongs 102 access) in the list of identifiers associated with the terminal 108 of the access (for example, point to all of the CSG, to which the terminal 108 of the access belongs to).

The determination in step 1008 may be performed in different network nodes. For example, in some implementations, this determination may be performed in the MME, which receives and/or stores the ID associated with the point 102 of the access terminal 108 access.

In some implementations, this determination may be performed in another network node, such as HSS. For example, the MME may send the request to the HSS to determine what is authorized or not the terminal 108 access to access point 102 access. Together with this request, the MME can send the information (for example, identifiers such as IMSI and CSG ID) in HSS in some cases. In addition, in some cases, the HSS may receive and store such information on their own. After determining the allowed or no access, the HSS sends the appropriate response back to the MME.

As represented by step 1010, the MME sends a response to the point 102 of the access based on the definitions made MME, or based on definitions made by other network node (for example, HSS). Based on this the answer point 102 access may then allow or deny access by point 108 access.

11 illustrates operations that may be used in connection with the operation of the transmission service. For example, the terminal 108 access may initially be serviced by point 104 access, and, later, the service terminal 108 of the access is passed to the point 102 of the access, and then it is served by this node.

As represented by step 1102, the network (for example, the HSS may store context information for each access terminal in the system. As mentioned above, this context information may include a list (for example, a white list), indicating that all the sets of access (for example, CSG), which belongs to the terminal 108 of the access.

As represented via step 1104, the network (for example, the MME selects a context for the given access terminal, and provides the context in a limited access point when the access terminal is active in a restricted access point. Referring to the example in figure 3, when the terminal 108 access becomes active (for example, included) at the point 104, the access network node 110 may send the context information to the terminal 108 of the access point 104 access. Thus, the terminal 108 access may initially be serviced by point 104 access.

As represented via step 1106, at some point in time the service access terminal 10 can be transmitted point 102 access. For example, if the terminal 108 of the access moves away from point 104 access, the measurement reports from the terminal 108 access can indicate that the intensity of signals received from a point 102 access, now exceeds the intensity of signals received from a point 104 access. In this case, the network may initiate the transfer of service from point 104, the access point 102 access.

As represented by steps 1106 and 1108, together with this transfer point 104 access (i.e. the source access point may receive the identifier associated with the target access point (i.e. the point 102, such as, for example, the CSG ID. For example, this information may be received from a terminal 108 of access. Point 104 access can then determine what is authorized or not the terminal 108 access to access point 102 on the basis of this identifier. For example, point 104 may compare the identifier with a list that indicates the access point to which the terminal 108 of the access is allowed to access (for example, a white list, such as list of CSG ID from the context information for the terminal 108 access).

As represented by step 1110, if the terminal 108 of the access is not authorized to access point 102 access (for example, the CSG ID of the point 102 of access is not in the list of CSG ID of the term is and 108, operation transmission maintenance may not be performed. For example, the point 102 may send a message to the network node 110 to complete the transfer operation of the service. In addition or alternatively, the point 102 may send a message of rejection and/or redirection to a point 108 of access (for example, as explained above).

As represented by step 1112, the operation of the transmission service may continue if the terminal 108 of the access is authorized to access point 102 access (for example, the CSG ID of the point 102 of the access is in the list of CSG ID of the terminal 108 access). Accordingly, the network (for example, the MME may send the context information to the terminal 108 of the access point 102 or access point 102 may receive this information from point 104 access.

As represented by step 1114, the point 102 may determine that authorized or not the terminal 108 access to access point 102 access. For example, in a similar manner as explained above, the point 102 may compare the identifier (for example, the CSG ID list, which indicates the access point to which the terminal 108 of the access is allowed to access (for example, a list of CSG ID from the context information for the terminal 108 access).

As represented by step 1116, nectariniidae point 102 may send a request to the network (for example, MME)in order to confirm, whether or not to execute the transfer (for example, with the request switch tract). For example, as explained above, the point 102 may send a request (for example, optionally including an identifier associated with the terminal 108 and CSG ID for the access point, if necessary) in the network node 110 to determine whether or not the terminal 108 access to resolve the access point 102 access.

In cases where the access terminal should access to the target access point without any prior preparation for the transfer (for example, during a failure in the radio link), the target access point may select the context of the access terminal from a source access point. As mentioned above, this context includes CSG list of the access terminal. Thus, the target access point may determine that it is permitted or not the access terminal to access the target access point.

As represented by step 1118, based on the determination at step 1114 (not necessarily at step 1116) transfer of either allowed or rejected. If the transfer is permitted, the point 102 access then becomes the serving access point for the terminal 108 access. On the contrary, if the transfer is not permitted, the transmission rinse the deposits can be completed (for example, as explained in connection with step 1110).

Referring now to Fig, in some implementations, limited access point can be used to initialize the access terminal. As an illustration, the following examples describe the examples where the access terminal is initialized (for example, configured with a list of preferred roaming (PRL). You should note, however, that the access terminal can be initialized using other types of information in accordance with the ideas in this document.

As represented via step 1202, the access terminals in the network (for example, all of the access terminals that can access the restricted access point) can initially be configured with PRL default (for example, the list contains or indicates the default configuration). For example, the terminal 106 may be configured by the network operator when the terminal 106 access is purchased by the user. This PRL may indicate, for example, the system ID (SID) by default, the network identifier (NID) by default, and the default frequency for the initial detection of all limited access points, which can be deployed in the network. Here above all the access terminals can be configured using the PRL by default, So each access terminal can find and access the restricted access point for initialization. In some aspects, the information PRL default (for example, SID and/or NID) may correspond to one or more access points associated with the highest priority. For example, the access terminal can be executed with the ability to search (for example, first search) specified the preferred access point or above preferred access points (for example, home access points).

In some aspects, the PRL settings by default, can be reserved for connected with limited access point operations. For example, the default SID can be reserved for limited access points network operator. With this SID may not be permitted to attempt registration in limited access points, access terminals that are not configured to access the limited access points (for example, access terminals, made use of only in macroset). In addition, NID default can be reserved for connected with limited access point initialization routines. In addition, the default frequency can be defined as the total frequency, which should be used through limited points to blunt the network for transmission makovich signals for initialization routines. In some cases, the default frequency may be identical operating frequency macropoint access or operating frequency of the restricted access point.

PRL default may also include information for selecting the macrosystem. For example, PRL default may include identifiers and frequencies that can be used to access micrococcal access the network.

As represented by step 1204, limited access points in the system (for example, point 102 access) is made with the ability to pass makovy signal of canonicalization. In some aspects this makovy signal of canonicalization may contain temporary makovy the radio signal, which is used in connection with the initialization provided by point 102 access. Here makovy signal of canonicalization can be transmitted in the broadcast mode in accordance with the General parameters PRL explained above (for example, makovy the radio signal may include or specify the default configuration). For example, makovy signal of canonicalization (for example, makovy signal by default) can be transmitted at a frequency of default and may include the default SID and NID default (for example, sent to service messages).

Makovy redesign the l canonicalization can be transmitted at very low power level, which is much lower transmit power makabago signal in the normal course of operations of the access point (for example, when the access point is configured not associated with the initialization operation, such as normal operating mode). For example, the transmit power makovich signals of canonicalization can lead to a range of coverage (for example, radius) for makabago signal of canonicalization order of one meter or less.

In some implementations, the point 102 may transmit Macovei radio signals of canonicalization, when the access point is in initialization mode (for example, configuration or initialization). In some implementations, the user may use the input device to translate the point 102 of the access configuration mode, when the user wants initially to initialize or re-initialize the terminal 106 access. For example, the access terminal may be initialized when the access point is first set when the access terminal is initially acquired or when PRL terminal access updated by macrosite (for example, due to changes in the list of roaming, travel abroad, etc)to overwrite PRL, which is initialized by the access point (as explained below).

As is redstavlena via step 1206, when the terminal 106 access, initialized using PRL default is about limited point 102 available in the initialization mode, the terminal 106 may take makovy signal of canonicalization passed through point 102 access. In response, the terminal 106 may send the message to the point 102 to initiate the initialization operation. In some implementations, the message may include PRL, currently used by the terminal 106 access. In some implementations, the user terminal 106 may initiate the initialization by selecting the appropriate feature access terminal (for example, set the preset number).

As represented by step 1208, the point 102 of the access (for example, the controller 328 initialization) can define a new PRL to the terminal 106 of the access (for example, for normal operations of the mobile stations). New PRL may include information about the macrosystem, as in PRL default, but information initialization PRL default can be removed. Instead, you can add information for a new PRL (for example, the list contains or indicates a new configuration). In some aspects, the information of the new PRL may be specific for a point 102 of the access (for example, a new PRL may differ from PRL, initializer the bath through other access points). For example, the new PRL can specify a SID, which is reserved for all limited access points, as explained above, NID, which is unique for point 102 access (for example, Femto NID, FNID), and the frequency parameter that indicates the operating frequency point 102 access. This frequency parameter may be the same or different from the frequency of default. In some aspects, the information of the new PRL (for example, SID and/or NID) may correspond to one or more access points associated with the highest priority. For example, the terminal 106 may be implemented with the possibility to search (for example, first search) specified the preferred access point or above preferred access points (for example, home access points).

Point 102 may receive information PRL macrosystem different ways. In some implementations, the point 102 may request this information PRL from macropoint access (for example, through the network node 110 or radio). In some implementations, the point 102 may receive this information PRL from the access terminal (for example, terminal 108 access). For example, the point 102 may include functionality of the radio interface. Here the point 102 may send a message (for example, SSPR configuration request)to request the current PRL term the La access (which may include information of the current macro-PRL, as explained above), and the access terminal may respond by sending your current PRL-way radio service in point 102 access.

Once the point 102 of the access sets a new PRL, point 102 access sends (for example, pushes) PRL in terminal 106 access. For example, the point 102 may send PRL in the access terminal by the radio interface (for example, through the OTASP or OTAPA).

Mainly through the initialization terminal 106 of the access point 102 as explained above, the network operator must not store-specific terminal access information (for example, information PRL). However, it may be desirable to configure point 102 access to perform regular updates PRL terminal access. For example, the PRL may be updated every evening and go to the terminal 106 of the access interface. In addition, in order to prevent overwriting by one access point from a set of related access points information PRL initialized by another access point of the set, each access point may be made with the ability to simply update the current PRL terminal access. For example, the point 102 may request the terminal 106 access to its information current PRL, whereby the point 102 access adds its own system information is July to the current PRL PRL terminal 106 access instead of overwriting the information of the current PRL.

As represented by step 1210, after the terminal 106 access initialized using the information in the new PRL, the terminal 106 access should use this information to identify the access point to which it can access. For example, if the terminal 106 access defines what the point 102 of the access is in the neighborhood (for example, after the access point is configured in the normal mode), the terminal 106 may give preference to service through point 102 access, and not any other access points (for example, macropoint access)that can be detected by terminal 106 access.

Referring now to Fig, describes various techniques for managing limited access (for example, Association) in the access point. In this example, the access point can be configured with a local list of access terminals permitted to access one or more services provided by the access point. The access point can then grant or deny access based on the local list. Mainly, in some aspects it can give the owner access point to provide temporary service to the invited terminal access (for example, by means of which the adding/removal of these access terminals to/from the list) without the participation of the network operator.

As represented by step 1302, limited access point (for example, point 102 access) is configured with an access list (for example, represented by a list of 340 for local access figure 3). For example, the owner of the point 102 may configure a list of IDs (for example, telephone number) of the access terminals permitted to use one or more services provided by point 102 access. In some implementations, the management of which the terminal can access to access point 102 access might lie on the owner's point 102 of the access, not the network operator.

Point 102 access can be initialized in different ways. For example, the owner can use the web interface 102, costamesa through the access point to configure point 102 access.

In addition, different access terminals may be granted different levels of access. For example, the invited terminal access may be granted temporary access on the basis of different criteria. In addition, in some implementations, a home access terminal may be assigned a better quality of service than invited to the access terminal. In addition, some access terminals (for example, guest access terminals) may be pre is left access to certain services (for example, local services, such as media server or some other type of information server) without authentication by the network operator. In addition, in some cases, the list 340 for local access can be used as the initial temporary replacement at the point 102 access, whereby the actual authentication (for example, for a telephone call) can be executed via the network, to prevent violations of network security.

As represented by step 1304, the point 102 may send the identifier information of the access terminal, which is configured at step 1302 (for example, a list of 340 for local access), network database (for example, the Central authentication/register own subscribers, AC/HLR) and request another identification information associated with the respective access terminals. For example, the point 102 may send the telephone number of the terminal 106 of the access network node 110 (for example, containing the database HLR), and to receive an electronic serial number (ESN) or international mobile subscriber identity (IMSI), which is assigned to the terminal 106 of the access from the network node 110.

As represented by step 1306, the point 102 may notify its identity (for example, as explained in this to Amante). For example, the point 102 may notify information about SID and FNID, as explained above.

As represented by step 1308, the access terminal, which is initialized to access point 102 access, can determine what it is about point 102 access, after receiving the notified identification information. For example, the terminal 106 of the access can be initialized with the PRL through point 102 as explained above, or the terminal 106 of the access can be initialized with the PRL, which includes SID limited access points, NID wildcard and one or more operating frequencies that are used by point 102 or access terminal 106 access may be initialized in some other way, which gives him the ability to identify a point 102 of the access (for example, initialized with the list of preferred user zone). The terminal 106 of the access can then attempt to register at the point 102 access as a result of taking different SID (for example, which may represent an area other than macrozone for based on the registration zones). Thus, in some cases, the access terminal may automatically try to access point 102 access. In other cases, however, the user can control sushestvam or not the terminal 106 of the access points 102 access (for example, the user provides input through the input device in response to the indicator relative to the detected access points displayed via the terminal 106 access). In connection with this registration terminal 106 may send its ID (for example, your ESN, IMSI etc) to the point 102 of the access (for example, through the access channel).

As represented by steps 1310 and 1312, the point 102 access determines what is permitted or not the terminal 106 access to access point 102 access. For example, the point 102 may determine that, listed or not the identifier received from the terminal 106 of the access list 340 for local access. You should take into account that the authentication information is different from ESN and IMSI may be used in various implementations. For example, the point 102 may receive information non call initiation message in the idle state and to use this information for authentication (for example, to compare with the number of the caller is received from the terminal 106 access through the registration message, or any other way).

As represented by step 1314, if the terminal 106 access not allowed access (for example, the received identifier of the access terminal is not in the list 340 for local access point 102, the access is can deny access. For example, the point 102 may send a message to reject the registration terminal 106 access. In addition or in the alternative, the point 102 may send a redirect message services in the terminal 106 access. This message may include, for example, information (for example, the SID, the NID, the operating frequency), which identifies the alternative access point (for example, local macroset), which can realize the access terminal 106 access.

As represented by step 1316, if the terminal 106 of the access granted access (for example, the received identifier of the access terminal is in the list 340 for local access point 102 may provide access to certain services. For example, as explained above, the point 102 may provide access to local services delivered through the local network.

In addition or alternatively, the point 102 may transmit registration information to the network node 110 (for example, the HRL macroset) for authentication and registration of the terminal 106 access. The network node 110 may then respond with a message accepting or rejecting the registration. In response, the point 102 may send a corresponding message to the terminal 106 access. If authorized, the point 106 access then receives the requested service from point 102 p is a (for example, access to the network).

You should take into account that the above technology may be implemented in various ways in accordance with the ideas in this document. For example, authentication information, which is different from the information specifically mentioned above (for example, ESN, IMSI, CSG ID), can be used in a device or method carried out in practice on the basis of the ideas in this document.

In some aspects of the ideas in this document can be used in a network that includes macrodactylia (for example, in a cellular network a large area, such as a 3G network, typically called macro-cellular network or WAN) and the floor on a small scale (for example, network environment in an apartment or in a house, typically called LAN). As the access terminal moves in the network, the access terminal may be served in certain locations by access points that provide macrodactylia, while the access terminal may be served at other locations by access points that provide coverage on a small scale. In some aspects the nodes cover a small scale can be used to provide incremental increases in capacity, coverage inside buildings and various services (for example, to more reliably the user experience). Note this document is a node that provides coverage in a relatively large area may be referred to as macrotel. A node that provides coverage in a relatively small area (for example, in the apartment), may be referred to as femtocell. A node that provides coverage for the area which is less than the macroregion and more pentablet, may be referred to as picosa (for example, when providing coverage within an office building).

Honeycomb associated with Makrolon, femtocell or echoslam, may be referred to as macrosoma, femtocell or picosat, respectively. In some implementations, each node can be associated with (for example, is divided into one or more hundred or sectors.

In various embodiments use other terms may be used to refer to macrotel, femtocell or picosec. For example, macrotel may be configured or referred to as an access node, base station, access point, e-node B, microsata etc. in Addition, femtocell may be configured or referred to as home node B, a home e-node B, base station, access point, femtocell, etc.

Fig illustrates a system 1400 wireless communication performed with the opportunity to support a certain number of users, which may be implemented ideas in the data document. System 1400 provides connectivity to several hundred 1402, such as, for example, macrosomy 1402A-1402G, each cell served by the corresponding point 1404 access (for example, points 1404A-1404G access). As shown in Fig, terminals 1406 access (for example, terminals 1406A-1406L access) can be dispersed in various locations throughout the system over time. Each terminal 1406 access can communicate with one or more points 1404 access in a straight line (FL) and/or the return line (RL) at a given moment, depending on, for example, whether or not the terminal 1406 access active, and it is found or not in the soft mode of transmission service. System 1400 wireless communication may provide services to a large geographic area. For example, macrosomy 1402A-1402G may cover a few blocks in the district or more miles in a rural environment.

Fig illustrates an exemplary system 1500 of communication, where one or more femtocell deployed within a network environment. In particular, the system 1500 includes several femtocell 1510 (for example, famously 1510A and 1510B)installed in a network environment relatively small scale (for example, in one or more apartments 1530 user). Each femtocell 1510 may be associated with a global computer network 1540 (for example, In what the Internet) and basic network 1550 mobile operator via a DSL router, cable modem, line, wireless or other means of connections (not shown). As explained below, each femtocell 1510 may be configured to serve associated terminals 1520 access (for example, terminal 1520A access) and, optionally, additional terminals 1520 access (for example, terminal 1520B access). In other words, access to femtocell 1510 can be restricted, whereby the terminal 1520 access can be maintained through a set of these (for example, through home) femtocell 1510, but cannot be served by unspecified femtocell 1510 (for example, through famously 1510 neighbor).

Fig illustrates an example of a map 1600 coating, where several areas 1602 tracking (or routing areas or areas) are defined, each of which includes several areas of 1604 macropore. Here's coverage area, associated with areas 1602A, 1602B, and 1602C tracking, described by broad lines, and areas of 1604 macropore are represented by hexagons. Region 1602 tracking also include zones 1606 of pantoporate. In this example, each of the zones 1606 of pantoporate (for example, area 1606C pantoporate) is illustrated within the area of 1604 macrodactylia (for example, zone 1604B of macropore). You should take into consideration is the W, however, that area 1606 of pantoporate may not be entirely within the area of 1604 macropore. In practice, a large number of zones 1606 of pantoporate can be set using this field 1602 track or zone 1604 macropore. In addition, one or more zones ekoparty (not shown) can be specified within this region 1602 track or zone 1604 macropore.

Referring again to Fig, the owner of famously 1510 can subscribe to mobile service, such as, for example, service, 3G mobile service, offered through the underlying network 1550 mobile operator. In addition, the terminal 1520 may allow work in macrocrania and network environments on a small scale (for example, housing). In other words, depending on the current location of the terminal 1520 access terminal 1520 access can be maintained through the point 1560 access macrosty associated with the underlying network 1550 mobile operator, or by any set femtocell 1510 (for example, femtocell 1510A and 1510B, which are always placed within the respective apartments 1530 user). For example, when the subscriber is away from home, he is served by a standard macropoint access (for example, point 1560 access)and when the subscriber is at home, he is served by Fe is touzla (for example, site 1510A). Here we must take into account that femtocell 1510 may be backward compatible with existing terminals 1520 access.

Femtocell 1510 can be deployed on a single frequency or, in the alternative, at several frequencies. Depending on the specific configuration single frequency or one or more of the multiple frequencies may overlap one or more frequencies used by macropoint access (for example, point 1560 access).

In some aspects, the terminal 1520 may be configured to connect to the preferred famously (for example, home famously terminal 1520 access) each time when such connectivity is possible. For example, each time the terminal 1520 access in the apartment 1530 user, it may be desirable that the terminal 1520 access sharing of data only with home femtocell 1510.

In some aspects, if the terminal 1520 access works in macro-cellular network 1550, but is not always in its most preferred network (for example, specified in the list of preferred roaming), the terminal 1520 may continue to search for the most preferred network (for example, the preferred famously 1510) by re-selecting the best system (BSR), which may comprise a periodically is some scanning of available systems, to determine what is or there is no best system currently available, and subsequent actions to be associated with such preferred systems. When recording detection terminal 1520 access can limit the search to a specific frequency band and channel. For example, the search for the most preferred system may be periodically repeated. Upon detection of the preferred famously 1510 terminal 1520 selects femtocell 1510 for call waiting within its coverage area.

Femtocell may be limited in some aspects. For example, this femtocell can only provide certain services to certain access terminals. In deployments with so-called restricted (or closed) by associating the access terminal may only be operated via a mobile phone network macrosty and a given set femtocell (for example, femtocell 1510, which are always placed in the appropriate apartment 1530 user). In some implementations, a node can be restricted to not provide at least one node of at least one of the following: the transmission of signals, data access, registration, search calls or service.

In some aspects, limited femtocell (which may also be referred to as D. the domestic node B closed user group) is femtocell, which provides services limited initialized to the set of access terminals. This set may temporarily or permanently be expanded as needed. In some aspects, a closed subscriber group (CSG) can be defined as a set of access points (for example, femtocell)that share a common access control list of access terminals. Limited access point can include CSG, which allows multiple access terminals to connect to it. One access terminal may be able to connect to multiple limited access points. The channel that runs all famously (or all limited famously) in the field, may be referred to as femtocell.

Different relationships can exist between data femtocell and data access terminal. For example, from the perspective of the access terminal, outdoor femtocell may be referred to as femtocell without Association limited (for example, femtocell provides access to all access terminals). Limited femtocell may be referred to as femtocell that is restricted in some way (for example, limited to the Association and/or registration). Home femtocell may be referred to as femtocell for which the access terminal is authorized to access and a slave is that (for example, permanent access is available for a given set of one or more access terminals). Invited femtocell may be referred to as femtocell for which the access terminal is temporarily authorized to access and work. Stranger femtocell may be referred to as femtocell for which the access terminal is not authorized to access and work, with the possible exception of emergency situations (for example, emergency calls).

From the point of view of a limited famously home access terminal may be referred to as an access terminal that is authorized to access the limited famously (for example, the access terminal has a constant access to famously). Invited the access terminal may be referred to as an access terminal with a temporary access to the limited famously (for example, limited on the basis of the delivery date, time of usage, bytes, meter connections, or some other criterion or criteria). Outside the access terminal may be referred to as an access terminal that does not have permission to access the limited famously, except for perhaps emergency situations, such as emergency calls (for example, the access terminal that does not have the credentials or permission to register is limited to famously).

For convenience, the disclosure herein describes a different functionality in the context of ventouse. You should note, however, that Ecotel can provide identical or similar functionality for greater coverage. For example, Ecotel may be limited, home Ecotel can be specified for a given access terminal, etc.

Wireless communication system with multiple access can simultaneously support communication for multiple wireless terminals access. As mentioned above, each terminal may communicate with one or more base stations via the transmission for forward and reverse links. Direct link (or downward communication refers to the communication line from the base stations to the terminals, and the reverse link (or upward communication refers to the communication line from terminals to base stations. This communication link may be established through a system with one input and one output, a system with many inputs and many outputs (MIMO) or some other type of system.

MIMO system uses multiple (NT) transmit antennas and multiple (NR) receiving antennas for data transmission. MIMO channel formed by NTtransmitting and NRreceiving antennas may be decomposed into NSindependent the x channel, also referred to as spatial channels, where NS<min{NTNR}. Each of the NSindependent channels corresponds to a dimension. MIMO system can provide improved performance (for example, higher throughput and/or greater reliability)if there are more dimensions that are created by multiple transmitting and receiving antennas.

MIMO system can support systems with duplex time division channels (TDD) and duplex frequency division multiplexing (FDD). In the TDD transmission system for forward and reverse links are in the same frequency region so that the principle of reversibility provides channel estimation straight line from the channel of the reverse link. This allows the access point to extract profit from the beam forming transmission in a straight line, when multiple antennas are available at the access point.

The ideas in this document can be included in the node (for example, device)that uses various components to communicate with at least one other node. Fig illustrates several sample components that may be used to simplify communication between nodes. In particular, Fig illustrates a wireless device 1710 (for example, t is CCW access) and wireless device 1750 (for example, the access terminal) in a MIMO system 1700. In the device 1710 traffic data for a certain number of data streams is provided from a source 1712 data processor 1714 transmission (TX) data.

In some aspects, each data stream is transmitted through the corresponding transmit antenna. The processor 1714 TX-data formats, encodes, and punctuates traffic data for each data stream based on a particular coding scheme selected for that data stream to provide coded data.

The coded data for each data stream may be multiplexed with control data using OFDM technology. Control data are typically known data pattern that is processed in a known manner and can be used in the system of the receiver to estimate the channel response. Multiplexed control and coded data for each data stream is then modulated (i.e. displayed in characters) based on a particular modulation scheme (for example, BPSK, QSPK, M-PSK or M-QAM)selected for that data stream to provide modulation symbols. The rate of issuance of data, coding, and modulation for each data stream may be determined by instructions performed by the processor 1730. The storage device may 1732 SOH is anati code data and other information used by the processor 1730 or other components of device 1710.

The modulation symbols for all data streams are then provided in the TX MIMO processor 1720, which may further process the modulation symbols (for example, for OFDM). TX MIMO processor 1720 then provides NTstreams of modulation symbols in NTreceiving-transmitting devices (XCVR) 1722A-1722T. In various embodiments, the implementation of the TX MIMO processor 1720 applies weighting factors of formation of the pattern to the symbols of the data streams and to the antenna from which the character is sent.

Each receiver-transmitter 1722 receives and processes the corresponding character stream to provide one or more analog signals, and optionally adjusts (for example, amplifies, filters and converts with increasing frequency) analog signals to provide a modulated signal suitable for transmission over a MIMO channel. NTmodulated signals from transmitter-receiver pairs 1722A-1722T then transmitted from the NTantennas 1724A-1724T, respectively.

In the device 1750 transmitted modulated signals are received by NRantennas 1752A-1752R, and the received signal from each antenna is available in 1752 corresponding receiver-transmitter (XCVR) 1754A-1754R. To the each receiver-transmitter 1754 adjusts (for example, filters, amplifies and converts with decreasing frequency) corresponding to the received signal, digitizes adjusted signal to provide samples, and additionally processes the samples to provide a corresponding "received" a stream of characters.

The processor 1760 reception (RX) data and then receives and processes NRaccept streams of characters from the NRreceiving-transmitting devices 1754 on the basis of specific treatment technologies to the receiving device to provide NT"discovered" streams of characters. The processor 1760 RX-data then demodulates, back punctuates and decodes each detected character stream to recover the traffic data for the data flow. Processing by processor 1760 RX-data complementary to the processing performed by TX MIMO processor 1720 and processor 1714 TX-data device 1710.

The processor 1770 periodically determines what kind of matrix pre-encoding to use (described below). The processor 1770 formulates a message back line containing part of the index matrix and part of the value of the rank. Storage device 1772 may store program code, data and other information used by processor 1770 or other components of the device 1750.

Message back Lin and communication may contain various types of information, related to the communication line and/or receive data stream. Message return line is then processed by processor 1738 TX-data, which also receives traffic data for a certain number of data streams from a source 1736 data is modulated by modulator 1780, is provided to the appropriate settings via the receiving / transmitting devices 1754A-1754R and transmitted back to the device 1710.

In the device 1710 modulated signals from the device 1750 accepted by antennas 1724, are set to the appropriate settings via the transmitter-receiver pairs, 1722, demodulated through a demodulator (DEMOD) 1740 and processed by processor 1742 RX-data to retrieve the message back to the communication line to be passed through the device 1750. The processor 1730 then determines what kind of matrix pre-coding be used to determine the weights of the beam forming, and then processes the extracted message.

Fig also illustrates that the communication components may include one or more components that perform access control, as discussed in this document. For example, a component 1790 access control can interact with the processor 1730 and/or other components of the device is istwa 1710, to send/receive signals to/from another device (for example, device 1750), as discussed in this document. Similarly, component 1792 access control can interact with the processor 1770 and/or other components of the device 1750 to send/receive signals to/from another device (for example, device 1710). You should take into account that for each device 1710 and 1750 the functionality of two or more of the described components may be provided by a single component. For example, a single processing component may provide the functionality of the component 1790 access control and processor 1730, and a single processing component may provide the functionality of the component 1792 access control and processor 1770.

The ideas in this document can be included in various types of communication systems and/or components of systems. In some aspects of the ideas in this document can be used in a multiple access system that can support communication with multiple users by sharing available system resources (for example, by specifying one or more of bandwidth, transmit power, encode, interleave, and so on). For example, the ideas in this paper can be applied to any or combinations of the following t is hnology: system multiple access code division multiple access (CDMA), CDMA multi-carrier (MCCDMA)systems, wideband CDMA (W-CDMA), high speed packet access (HSPA, HSPA+)systems, multiple access with time division multiplexing (TDMA)systems, multiple access frequency division multiple access (FDMA)FDMA system with single-carrier (SC-FDMA)systems, multiple access orthogonal frequency division multiplexing (OFDMA), or other multiple access technologies. Wireless communication system, using the ideas in this document, can be performed with the opportunity to implement one or more standards such as IS-95, cdma2000, IS-856, W-CDMA, TDSCDMA and other standards. A CDMA network may implement such wireless communication technology as a universal terrestrial radio access (UTRA), cdma2000, or some other technology. UTRA includes W-CDMA and the standard low speed when transferring characters pseudonoise sequence (LCR). Additionally, technology cdma2000 covers standards IS-2000, IS-95 and is-856. TDMA network may implement such wireless communication technology such as global system for mobile communications (GSM). OFDMA network may implement the wireless communication technology, as the enhanced UTRA (E-UTRA), IEEE 802.11, IEEE 802.16, IEEE 802.20, Flash-OFDM, etc. UTRA, E-UTRA and GSM are part of the universal mobile telecommunications system (UMTS). The ideas in this document may be implemented in systems is according to the standard 3GPP long-term development (LTE), the standard ultra-wideband transmission for mobile devices (UMB) and other types of systems. LTE is a version of UMTS, which uses EUTRA. Although certain aspects of the disclosure may be described using 3GPP terminology, it should be understood that the ideas in this paper can be applied to technology 3GPP (Re199, Re15, Re16, Re17), as well as to technology 3GPP2 (1xRTT, 1xEV-DO RelO, RevA, RevB) and other technologies.

The ideas in this document can be included (for example, implemented within or performed by) many devices (for example, nodes). In some aspects, the host (for example, wireless node, implemented in accordance with the ideas in this document may contain an access point or access terminal.

For example, the access terminal may contain, be implemented as, or known as subscriber unit, subscriber station, the subscriber module, mobile station, mobile device, mobile node, remote station, remote terminal, user terminal, user agent, user device, or some other term. In some implementations, the access terminal may include a cellular phone, a cordless phone, telephone Protocol session initiation (SIP), wireless local loop (WLL), personal digital appliance (PDA), handheld device that supports wireless connections, or some other appropriate processing device, connected to a wireless modem. Accordingly, one or more covered in this document aspects can be included in the phone (for example, cell phone or smart phone), a computer (for example, a laptop computer), a portable communication device, a portable computing device (for example, personal digital device), home appliance (for example, music or video device, or a satellite radio), the device is a global positioning system or any other suitable device that is configured to communicate via a wireless medium.

The access point can contain, be implemented as, or known as a nodeb, e-node B, radio network controller (RNC), base station (BS), base station (RBS), a base station controller (BSC), base transceiver transmitting station (BTS), the function of transmitting and receiving devices (TF), Radiorama-transmitting device, radiomaster, a basic service set (BSS), extended service set (ESS) or some other similar term.

In some aspects, the host (for example, the access point may include an access node for communication systems. Such an access device may provide, for example, connectivity to a network (for example, a global computer network such as the Internet and the cellular network) via a wired line or wireless network. Accordingly, the access node may provide an opportunity to another node (for example, the access terminal to access the network, or some other functionality. In addition, you should take into account that one or both of the nodes can be portable or, in some cases, relatively reportative.

You should also take into account that the wireless node may allow for the transmission and/or reception of information besprovodnoy way (for example, through a wired connection). Thus, the receiving device and the transmitting device, as explained in this document may include appropriate components of the communication interface (for example, components for the electrical or optical interface)to communicate through besprovodnoy medium.

The wireless node may communicate via one or more radio links, which are based on or otherwise support any suitable wireless technology. For example, in some aspects, the wireless node may be associated with the network. In some aspects, the network can include a local area network or a global computer network. A wireless device may support or otherwise use one or more of a variety of technologies, and the flow rate is fishing or wireless communication standards, for example, clarified in this document (e.g., CDMA, TDMA, OFDM, OFDMA, WiMAX, Wi-Fi etc). Similarly, the wireless node may support or otherwise use one or more of a variety of appropriate modulation or multiplexing. Wireless node thus may include appropriate components (for example, a radio interface)to establish and communicate via one or more radio links using the above or other wireless technologies. For example, a wireless node may include a wireless transceiver transmitting device associated with the components of a transmitting device and a receiving device, which may include various components (for example, the shapers of signals and signal processors)that facilitate communication over a wireless transmission medium.

The components described herein can be implemented in a variety of ways. Referring to Fig-28, device 1800, 1900, 2000, 2100, 2200, 2300, 2400, 2500, 2600, 2700 and 2800 are represented as a sequence of interconnected functional blocks. In some aspects, the functionality of these blocks may be implemented as a processing system that includes one or more components of the processor. In some aspects, the functionality of these blocks can be the implemented using, for example, at least part of one or more integrated circuits (for example, ASIC). As explained in this document, the integrated circuit may include a processor, software, other related components, or some combination of the above. The functionality of these blocks may also be implemented in some other way, as discussed in this document. In some aspects, one or more of the selected dotted line blocks on Fig-28 are optional.

Device 1800, 1900, 2000, 2100, 2200, 2300, 2400, 2500, 2600, 2700 and 2800 may include one or more modules that may perform one or more of the functions described above with reference to various drawings. For example, the tool 1802 receiving/sending may correspond to, for example, the communication controller, as explained in this document. The tool 1804 define identifiers may correspond to, for example, access controller, as explained in this document. The tool 1806 definition of permitted services may correspond to, for example, access controller, as explained in this document. The tool 1902 reception may correspond to, for example, the communication controller described in this document. The tool 1904 sending may correspond to, for example, access controller, as explained in this document. Tool definition wide-angle 1906 the identifiers may correspond to, for example, access controller, as explained in this document. The tool 2002 submission may correspond to, for example, access controller, as explained in this document. The tool 2004 reception may correspond to, for example, the communication controller described in this document. The tool 2006 definition of permitted services may correspond to, for example, access controller, as explained in this document. Means 2102 configuration may correspond to, for example, the controller initialization, as explained in this document. The tool 2104 receive may correspond to, for example, access controller, as explained in this document. Means 2106 reception may correspond to, for example, the communication controller described in this document. The tool 2108 definition may correspond to, for example, access controller, as explained in this document. The tool 2202 definitions of identifiers may correspond to, for example, the controller initialization, as explained in this document. Means 2204 send may correspond to, for example, the communication controller, as explained in this document. Means 2206 destination may correspond to, for example, the controller initialization, as explained in this document. Means 2302 reception may correspond to, for example, the controller initialization, as explained in the word document. The tool 2304 transmission may correspond to, for example, the communication controller, as explained in this document. The tool 2402 define identifiers may correspond to, for example, the controller initialization, as explained in this document. The tool 2404 send may correspond to, for example, the communication controller, as explained in this document. Means 2502 reception may correspond to, for example, the communication controller described in this document. The tool 2504 determine activation of access may correspond to, for example, access controller, as explained in this document. Means 2506-based definitions configuration may correspond to, for example, access controller, as explained in this document. The tool 2508 storage list may correspond to, for example, access controller, as explained in this document. The tool 2602 configuration may correspond to, for example, the controller initialization, as explained in this document. The tool 2604 transmission may correspond to, for example, the communication controller, as explained in this document. The tool 2606 reception may correspond to, for example, the communication controller described in this document. The tool 2608 send may correspond to, for example, the controller initialization, as explained in this document. The tool 2610 job may need in order to live up to, for example, the controller initialization, as explained in this document. Means 2702 monitoring may correspond to, for example, the receiving device described in this document. Means 2704 reception makovich radio signals may correspond, for example, the receiving device described in this document. Means 2706 send may correspond to, for example, the communication controller, as explained in this document. The tool 2708 reception of the roaming list may correspond to, for example, the controller initialization, as explained in this document. The tool 2802 configuration may correspond to, for example, the controller initialization, as explained in this document. Means 2804 reception makovich radio signals may correspond, for example, the receiving device described in this document. The tool 2806 submission may correspond to, for example, the communication controller, as explained in this document. The tool 2808 receive authorization may correspond to, for example, access controller, as explained in this document. The tool 2810 instructions may correspond to, for example, access controller, as explained in this document. The tool 2812 display receipt may correspond to, for example, access controller, as explained in this document.

It should be understood that any reference to an element in the data document using this notation, as "first", "second", etc. are, in General, does not limit the number or the order of these elements. Instead, the data symbols can be used herein as a convenient method of distinguishing between two or more elements or instances of the element. Thus, references to the first and second elements does not mean that only two elements can be used in this case or that the first item should precede the second element in some way. In addition, if not stated otherwise, the set of elements may contain one or more elements.

Experts in the art should understand that information and signals may be represented using any of a variety of different technologies. For example, data, instructions, commands, information, signals, bits, symbols, and characters pseudonoise sequence that can be cited as examples throughout the above description may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination of the above.

Specialists in the art will additionally must take into account that any of the various illustrative logical blocks, modules, processors, means, circuits, and steps of the algorithm described in connection with aspects the AMI, disclosed herein, may be implemented as electronic hardware (for example, a digital implementation, an analog implementation, or a combination thereof, which may be designed using source coding or some other technique), various forms of programme or project code containing instructions (which for convenience may be referred to herein as "software" or "software module"), or a combination of the above. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps described above, in General, on the basis of functionality. Implemented this functionality as hardware or software depends upon the particular application and design constraints imposed on the system as a whole. Specialists can implement the described functionality in varying ways for each particular application, but such solutions should not be interpreted as being a departure from the scope of the present invention.

The various illustrative logical blocks, modules, and circuits described in connection with the aspects disclosed herein, can be Rea is sovani within or performed by an integrated circuit (IC), the access terminal or access point. IC may include a General purpose processor, a digital signal processor (DSP), a specialized integrated circuit (ASIC), programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, electrical components, optical components, mechanical components, or any combination of the above made with the possibility to carry out the functions described in this document, and may enforce codes or instructions that are permanently placed on the IC out IC or there. The General-purpose processor may be a microprocessor, but in an alternative embodiment, the processor may be any conventional processor, controller, microcontroller, or state machine. The processor may also be implemented as a combination of computing devices, for example a combination of a DSP and a microprocessor, a variety of microprocessors, one or more microprocessors with a DSP core, or any other such configuration.

It should be understood that the specific order or hierarchy of steps in the disclosed processes is an example of a typical approach. On the basis of constructive preferences should be understood that the specific order of the sludge is a hierarchy of steps in the processes may be changed, while remaining within the scope of the present disclosure. Points on the way in the attached claims present elements of the various steps in a sample order, and have no intention to be limited presents specific order or hierarchy.

The functions described may be implemented in hardware, software, firmware or any combination of the above. If implemented in software, the functions may be stored or transmitted as one or more instructions or code on a computer readable medium. Machine-readable media includes both computer storage media data, and the communication environment, including any medium that facilitates the movement of a computer program from one place to another. The storage media can be any available media that can be accessed through a computer. As an example, but not limitation, these machine-readable media can include RAM, ROM, EEPROM, CD-ROM or other storage device for optical drives, storage on magnetic disks or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instrument the functions or data structures, and to which you can access through your computer. Any connection is properly termed a computer readable media. For example, if the software is transmitted from a web site, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared, radio, and microwave environment, coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, microwave, and environment, is included in the definition of the media. Disk (disk) and the disk (disc) when used in this document include compact disc (CD), laser disc, optical disc, digital versatile disk (DVD), floppy disk and Blu-Ray disc, and the drive (disk) usually reproduce data magnetically, while discs (disc) usually reproduce data optically with lasers. Combinations of the above are covered by the term "machine-readable medium". Thus, it is necessary to take into account that the machine-readable medium may be implemented in any suitable computer software product.

Given the above, in some aspects, the first communication method includes: determining the identifier for a set of at least from about the Noah access point, which is made with the ability to provide at least one service only to a set of at least one access terminal, and the identifier uniquely identifies a set of at least one access point within the network operator; and sending the identifier to each access point in the set of at least one access point. In addition, in some aspects at least one of the following also may apply to the first communication method: ID contains the ID of the network, and the network contains a domain of the mobile operator; the identifier is determined together with the activation of the access point of the set of at least one access point; a set of at least one access point contains many access points that belong to a common administrative domain; a set of at least one access point contains many access points that are associated with a common closed user group identifier is a text; each access point of the set of at least from one access point is restricted to not provide at least one other access terminal, at least one from the group consisting of the following: the transmission of signals, data access, registration, and service; each access point set at least from the ne access point contains femtocell or picosec; determining the identifier includes receiving the request identifier and determining whether or not the identifier of the at least one other access point; if the requested ID is already used at least by one other point, sending the identifier includes sending a response to a request that contains an identifier that is not used by other access points, each access point of the set of at least one access point provides at least one different service at least one other access terminal; the method further comprises assigning a unique device ID for each access point of the set of at least one access points, each access point of the set of at least one access point provides services for a set of at least one access terminal that is different from at least one other access terminal.

Considering the above, in some aspects, the second communication method includes: receiving the identifier for a set of at least one access point in the access point set, with each access point of the set is configured to provide at least one service only to a set of at least one term is and access and when this identifier uniquely identifies at least one access point within the network operator; and transmitting the identifier of the interface. In addition, in some aspects at least one of the following also may apply to the second communication method: the method further comprises receiving a registration message from an access terminal of the set of at least one access terminal in response to the transmission of the identifier; the identifier contains the identifier of the network, and the network contains a domain of the mobile operator; the identifier is received as a result of activation of the access point that receives the identifier; a set of at least one access point contains many access points that belong to a common administrative domain; a set of at least one access point includes multiple access points, associated with the common closed user group identifier is a text; each access point of the set of at least one access point is restricted to not provide at least one other access terminal, at least one from the group consisting of the following: the transmission of signals, data access, registration, and service; each access point of the set of at least one access point content is t femtocell or picosec; each access point of the set of at least one access point provides at least one different service at least one other access terminal; each access point of the set of at least one access point provides services for a set of at least one access terminal that is different from at least one other access terminal; the identifier is received in response to the request identifier; the method further comprises determining the proposed identifier, and the request includes a proposed identifier.

Considering the above, in some aspects, the third communication method includes: determining the identity of the access terminals of the set of access terminals; and sending the identifier of at least one access point that is configured to provide at least one service only to a set of access terminals. In addition, in some aspects at least one of the following can also be applied to the third communication method: persistent identifiers include identifiers for access terminals; IDs contain temporary IDs for access terminals; the identifiers include identifiers, network addresses, or international non digital network integrated the mi services for the mobile station; identifiers are sent in response to a request from an access point at least one access point; determining includes receiving identifiers from a network node; determining includes receiving identifiers from the web server, which allows the user to specify the access terminals that are authorized to accept this at least one service of at least one access point; a set of access terminals associated with the common closed user group; each access point at least one access point is restricted to not provide at least one other access terminal, at least one from the group consisting of the following: the transmission of signals, data access, registration, and service; each access point at least one access point contains femtocell or picosec; each access point at least one access point provides at least one different service at least one other access terminal.

Considering the above, in some aspects, the fourth communication method includes: receiving a message relating to a request by the access terminal to access the access point, the message includes a first identifier associated with the access terminal; determine what their second identifier, associated with the access terminal, based on the first identifier; and determining whether permitted or not the access terminal to receive service from the access point based on the second identifier and at least one identifier associated with the access point. In addition, in some aspects at least one of the following can also be applied to the fourth method of communication: the first identifier includes a temporary identifier and the second identifier includes a permanent identifier, the second identifier includes identification information of the network address of the access terminal or the international number digital network integrated services for the mobile station to the access terminal; a second identifier identifies at least one closed user group that can access the access terminal, and at least one identifier associated with the access point that contains the identifier of the closed subscriber group associated with the access point; at least one identifier associated with the access point that contains the access list for the access point, and determining whether permitted or not the access terminal to receive service from the access point includes determining whether the second identifier in the access list; behold the eve node performs the determining, permitted or not the access terminal to receive service from the access point, the message contains the request from the access point to authenticate the access terminal, and the method further comprises sending, to the access point, the message indicating the determination of permitted or not the access terminal to receive service from the access point; determining a second identifier includes sending the first identifier to the network node and receiving the second identifier from a network node; the access point performs the determination of permitted or not the access terminal to receive service from the access point; at least one identifier associated with the access point is received from a network node; determining permitted or not the access terminal to receive service from the access point includes: sending the second identifier and at least one identifier associated with the access point in the network node, and receiving, from the network node, the indication, is permitted or not the access terminal to receive service from the access point; determining whether permitted or not the access terminal to receive service from the access point includes: sending the second identifier to a network node and receiving at least one identifier associated with the access point, from a network node; the access point is limited to not p is dostavljati at least one other access terminal, at least one from the group consisting of the following: the transmission of signals, data access, registration, and service; the access point contains femtocell or picosec.

Considering the above, in some aspects, the fifth communication method includes: receiving a request from an access point to authenticate the access terminal; and sending to the access point at least one identifier that identifies at least one set of access points from which the access terminal is allowed to receive at least one service. In addition, in some aspects at least one of the following also may apply to the fifth method of communication: at least one identifier contains the identifier of the closed subscriber group; the request contains the identification data of the network address of the access terminal or the international number digital network integrated services for the mobile station to the access terminal; the method further comprises determining at least one identifier based on the permanent identifier associated with the access terminal, and the determination of a permanent identifier on the basis of a temporary identifier associated with the access terminal; the request includes the temporary identifier; determining permanent identifier includes sending a temporary identifier of the network node and receiving the permanent identifier of the network node; the method further comprises receiving at least one identifier of the network node; the access point is restricted to not provide at least one other access terminal, at least one from the group consisting of the following: the transmission of signals, data access, registration, and service; the access point contains femtocell or picosec.

Considering the above, in some aspects, the sixth communication method includes: sending, by the access point, the authentication request to the access terminal; and receiving, in response to the request from at least one identifier that identifies at least one set of access points from which the access terminal is allowed to receive at least one service. In addition, in some aspects at least one of the following also may apply to the sixth communication method: method further includes determining whether permitted or not the access terminal to receive service from the access point based on the at least one identifier; at least one identifier contains the identifier of the closed subscriber group; at least one identifier identifies a closed user group that can access the access terminal, and the determining includes determining, owls is fully or not at least one identifier with the identifier of the closed subscriber group, associated with the access point; the request is sent based on the determination that the access terminal is not listed in the list for local access access point; the request contains the identification data of the network address of the access terminal or the international number digital network integrated services for the mobile station to the access terminal; the request includes the temporary identifier associated with the access terminal; the method further comprises receiving the session information associated with the access terminal from a network node, in this case: information session contains the context information for the access terminal, and the request contains contextual information; the access point is restricted to not provide at least one other access terminal, at least one from the group consisting of the following: the transmission of signals, data access, registration, and service; the access point contains femtocell or picosec.

Considering the above, in some aspects, the seventh communication method includes: sending, by the access point, the request containing an identifier of a set of at least one access terminal that is authorized to receive service from the access point; and receiving, in response to the request list at least one access terminal that is authorized n is then, to receive service from the access point. In addition, in some aspects at least one of the following also may apply to the seventh method of contact: method further includes determining whether permitted or not the access terminal to receive service from the access point based on the at least one identifier; at least one identifier comprises at least one identifier of a closed subscriber group identifier contains the list of the at least one identifier of a closed subscriber group associated with the access terminal, and the determining includes determining whether the identifier of the closed subscriber group associated with the access point in the list; the request is sent based on the determination that the access terminal is not listed in the list for local access access point; the request contains the identification data of the network address of the access terminal or the international number digital network integrated services for the mobile station to the access terminal; the request includes the temporary identifier associated with the access terminal; the method further comprises receiving the session information associated with the access terminal from a network node, in this case: information session contains contextual information term for the channel access, and the request contains contextual information; the access point is restricted to not provide at least one other access terminal, at least one from the group consisting of the following: the transmission of signals, data access, registration, and service; the access point contains femtocell or picosec.

Considering the above, in some aspects the eighth communication method includes: receiving, from the first access point identifier of at least one other access point to which the access terminal has the right to access; and determining, based on the identifier, whether or not the access to at least one other access point. In addition, in some aspects at least one of the following also may apply to the eighth method of communication: definition contains an offer to the user to determine what to allow or not; the definition contains a display indicator identifier and receiving user input indicating that whether or not the access, the method further comprises determining, based on configuration information that should be allowed access automatically or allow access in response to the request, the method further comprises storing a list of access points that are allowed to access through Ter the Inal access moreover, the definition of advanced list-based; the method further comprises storing a list of access points that the user has chosen not to access, and the definition of advanced list-based; the identifier contains the network identifier; the identifier contains the identifier of the closed subscriber group identifier is received via an SMS message to an application layer Protocol message to the control radio or search the call; the identifier is received from a network node; each access point at least one access point is restricted to not provide at least one other access terminal, at least one from the group consisting of the following: the transmission of signals, data access, registration, and service; each access point at least one access point contains femtocell or picosec.

Considering the above, in some aspects the ninth communication method includes: configuring the access point in the initialization mode; transfer makabago signal default contains the default configuration during the initialization mode; receiving a message from the access terminal in response to makovy signal default; and sending a list of preferred roaming terminal to blunt in response to the message. In addition, in some aspects at least one of the following also may apply to the ninth method of communication: makovy signal default contains the default configuration, is transmitted at the first power level, and the method further comprises configuring the access point in another operating mode, whereby Macovei radio signals transmitted at the second power level which is greater than the first power level; a first power level provides less coverage than provided by the second power level; the default configuration contains the ID of the default network, which is different from the network ID used for is not associated with the initialization the operating mode; the default configuration specifies the system ID and the default network at least one access point with the highest priority, and the list of preferred roaming specifies other IDs systems and networks at least one access point with the highest priority; makovy signal is initially passed to the default frequency, and a list of preferred roaming indicates a different frequency makovich radio access point, which is different from the frequency of default; the method further comprises specifying a list item is edocfile roaming based on another list of preferred roaming associated with the access terminal; the method further comprises receiving another list of preferred roaming from access terminal; the method further comprises receiving another list of preferred roaming network node; the access point is restricted to not provide at least one other access terminal, at least one from the group consisting of the following: the transmission of signals, data access, registration, and service; the access point contains femtocell or picosec.

Considering the above, in some aspects the tenth communication method includes: monitoring, at the access terminal, makovich radio signals based on the first list of preferred roaming, which specifies the default configuration; receiving makabago signal containing the default configuration of the access point as a result of the monitoring; sending messages to the access point in response to the received makovy signal; and receiving the second list of roaming from access point in response to the message, while the second roaming list specifies a configuration different from the default configuration. In addition, in some aspects at least one of the following can also be applied to the tenth method of communication: the first list of preferred roaming lists is ominga default initialization and the second list of preferred roaming lists for roaming is not associated with the initialization operations; the default configuration contains the ID of the default network; a second list of preferred roaming contains a different network identifier associated with the access point, which is different from the network ID default; makovy the radio signal is received on the default frequency specified by the first list of preferred roaming, and the second list of preferred roaming specifies the carrier frequency to the access point, which is different from the frequency of default; the access point is restricted to not provide at least one other access terminal, at least one from the group consisting of the following: the transmission of signals, data access, registration, and service; the access point contains femtocell or picosec.

Considering the above, in some aspects the eleventh communication method includes: configuring the access point with the first identifier of the access terminal; receiving a second identifier of the access terminal based on the first identifier; receiving a message requesting access by the access terminal; and determining, at the access point, not to provide the requested access, on the basis of the second identifier. In addition, in some aspects at least one of the following also may apply to the eleventh method of communication: the first ID contains the identification data of the network address or an international number digital network integrated services for the mobile station; a second identifier includes an electronic serial number or the international mobile subscriber identity; obtaining includes: sending the first identifier to the network node and receiving the second identifier from a network node as a result of sending the first identifier; determining includes comparing the identifier received through the message from the access terminal, with the second identifier; determining includes: sending the second identifier to a network node, and receive, as the result of sending the second identifier, the indicator regarding whether or not to disclose the requested access; the access point is configured via a web interface; the access point is restricted to not provide at least one other access terminal, at least one from the group consisting of the following: the transmission of signals, data access, registration, and service; the access point contains femtocell or picosec.

Also with regard to the foregoing, some aspects of the twelfth method of the ligature includes: configuring the access terminal by using a list of preferred roaming which includes the identifier of the set of access points that are restricted to provide services to limited sets of access terminals; receiving makabago signal from one of the access points, while makovy the radio signal includes the identifier; sending messages to the same access point in response to makovy signal; and receiving authorization to access the one access point, in response to the message. In addition, in some aspects at least one of the following also may apply to a twelfth method of communication: the set of access points includes all access points in the domain of the mobile operator, which is limited to provide services to limited sets of access terminals; identifier contains the identifier of the network; the list of preferred roaming specifies the carrier frequency used by a set of access points; the method further includes prompting the user to determine whether or not to access the one access point, the method further comprises displaying the indicator one access point and receiving a user input indicating that whether or not to access the one access point; the access terminal automatically determines whether or not to access the one access point; each of the second access point from the set of access points is limited so not to provide at least one other access terminal, at least one from the group consisting of the following: the transmission of signals, data access, registration, and service; each access point from the set of access points contains femtocell or picosec.

Considering the above, in some aspects, the thirteenth communication method includes: receiving a request from an access point to authenticate the access terminal; determining whether permitted or not the access terminal to receive service from the access point based on the identifier of the set of at least one access terminal that receives a service from the access point; and sending a message indicating the determination to the access point. In addition, in some aspects at least one of the following also may apply to the thirteenth method of communication: determining includes determining whether the identifier in the access list the access point; the request contains the access list; the identifier contains a permanent identifier, the method further comprises determining the permanent identifier based on the time set identifier of at least one access terminal; determining permanent identifier includes sending a temporary identifier to the network node and the reception is a constant identifier of the network node; the identifier contains the identifier of the closed subscriber group identifier contains the list of the at least one identifier of a closed subscriber group associated with a set of at least one access terminal, and the determining includes determining whether the identifier of the closed subscriber group associated with the access point in the list; the access point is restricted to not provide at least one other access terminal, at least one from the group consisting of the following: the transmission of signals, data access, registration, and service; the access point contains femtocell or picosec.

Also with regard to the foregoing, some aspects of the fourteenth communication method includes: receiving, at the access point, an access request from the access terminal and the access-request contains a first identifier associated with the access terminal; determining a second identifier associated with the access terminal, based on the first identifier; and determining whether permitted or not the access terminal to receive service from the access point based on the second identifier and list at least one access terminal that is authorized to receive service from the access point. In addition, in some aspects, what about the at least one of the following also may apply to the fourteenth method of communication: the first identifier includes a temporary identifier, and the second identifier includes a permanent identifier, the first identifier includes identification information of the network address of the access terminal or the international number digital network integrated services for the mobile station to the access terminal; the list is received from the network node, and contains the individual identifiers of the access terminals; a second identifier contains the identifier of the closed subscriber group associated with the access terminal, and the list contains the identifier of the closed subscriber group associated with the access point; determining includes: sending the second identifier and the list in the network node, and receiving, from the network node, the indication, is permitted or not the access terminal to receive service from the access point; the definition includes: sending the second identifier to a network node and receiving the list from the network node; the access point is restricted to not provide at least one other access terminal, at least one from the group consisting of the following: the transmission of signals, data access, registration, and service; the access point contains femtocell or picosec.

In some aspects, the functionality corresponding to one or more of the above aspects of the first, second, third, fourth, fifth, sixth, seventh, is omogo, the ninth, tenth, eleventh, twelfth, thirteenth and fourteenth means of communication may be implemented, for example, in the device using the structure, as discussed in this document. In addition, the computer software product may contain codes that are executed with the ability to instruct the computer to provide functionality corresponding to one or more of the above aspects of these methods of communication.

The previous description of the disclosed aspects is provided to enable any person skilled in the art to make or use the present disclosure entity. Various modifications to these aspects should be obvious to a person skilled in the art, as described in this document, the General principles can be applied to other aspects without deviation from the scope of the disclosure. Thus, the present disclosure is not intended to be limited shown in this document aspects, and must satisfy the widest extent consistent with the principles and new features, disclosed in this document.

1. The communication method containing the steps are: determine the network identifier for a set of at least one access point that is configured to give the TB at least one service only to a set of at least one access terminal, moreover, the network identifier uniquely identifies the set of at least one access point within the network operator; and sending the network identifier to each access point in said set of at least one access point.

2. The method according to claim 1 in which the said set of at least one access point contains many access points that are associated with a common closed user group.

3. The method according to claim 1, wherein the network identifier based on the text.

4. The method according to claim 1, wherein each access point of the above-mentioned set of at least one access point is restricted to not provide, for at least one other access terminal, at least one from the group consisting of the following: the transmission of signals, data access, registration, and maintenance.

5. The method according to claim 1, wherein when determining the network ID take the request to the network identifier and determine whether or not the network identifier of at least one other access point.

6. The method according to claim 5, in which, if the requested network ID is already used at least one other access point, sending a network ID send a response to the aforementioned request, which contains the network ID, which does not IP alzueta any other access points.

7. The method according to claim 1, additionally containing phase, which assigns a unique device identifier for each access point of the above-mentioned set of at least one access point.

8. The method according to claim 1, wherein each access point of the above-mentioned set of at least one access point provides services for the mentioned set of at least one access terminal that is different from the service for at least one other access terminal.

9. Communication device, comprising: means for determining a network identifier for a set of at least one access point that is configured to provide at least one service only to a set of at least one access terminal and the network identifier uniquely identifies the set of at least one access point within the network operator; and means for sending the network identifier to each access point in said set of at least one access point.

10. The device according to claim 9, with the set of at least one access point contains many access points that are associated with a common closed user group.

11. The device according to claim 9, the network identifier based on the text.

12. The device according to claim 9, with each point to blunt the mentioned set of at least one access point is limited so not to provide for at least one other access terminal, at least one from the group consisting of the following: the transmission of signals, data access, registration, and maintenance.

13. The device according to claim 9, in which determining the network identifier includes receiving the request for the network ID and determine whether or not the network identifier of at least one other access point.

14. The device according to item 13, wherein, if the requested network ID is already used at least one other access point, sending the network identifier includes sending a response to the aforementioned request, which contains the network ID that is not used by other access points.

15. The device according to claim 9, further containing a means to assign a unique device ID for each access point of the above-mentioned set of at least one access point.

16. The device according to claim 9, with each access point of the above-mentioned set of at least one access point provides services for the mentioned set of at least one access terminal that is different from the service for at least one other access terminal.

17. Communication device, comprising: a controller initialization is executed with a possibility is to predilate the network identifier for a set of at least one access point, which is made with the ability to provide at least one service only to a set of at least one access terminal and the network identifier uniquely identifies the set of at least one access point within the network operator; and a communication controller that is configured to send the network identifier to each access point in said set of at least one access point.

18. The device 17, while the set of at least one access point contains many access points that are associated with a common closed user group.

19. The device 17, and the network identifier based on the text.

20. The computer-readable medium containing codes for prescribing the computer to: determine a network identifier for a set of at least one access point that is configured to provide at least one service only to a set of at least one access terminal and the network identifier uniquely identifies the set of at least one access point within the network operator; and sending the network identifier to each access point referred to the set of at least one access point.

21. The method contains the steps that: the principle is thought the network identifier for a set of at least one access point in the access point mentioned set, in addition, each access point of the set is configured to provide at least one service only to a set of at least one access terminal and the network identifier uniquely identifies mentioned at least one access point within the network operator; and transmit the identifier of the network interface.

22. The method according to item 21, in which the said set of at least one access point contains many access points that are associated with a common closed user group.

23. The method according to item 21, in which the network identifier based on the text.

24. The method according to item 21, in which each access point of the above-mentioned set of at least one access point is restricted to not provide, for at least one other access terminal, at least one from the group consisting of the following: the transmission of signals, data access, registration, and maintenance.

25. The method according to item 21, in which each access point of the above-mentioned set of at least one access point provides services for the mentioned set of at least one access terminal that is different from the service for at least one other access terminal.

26. The method according to item 21, in which the network identifier is received in response to the request ID is the network ID.

27. Communication device, comprising: means for receiving the network identifier for a set of at least one access point in the access point mentioned set, with each access point of the set is configured to provide at least one service only to a set of at least one access terminal and the network identifier uniquely identifies mentioned at least one access point within the network operator; and means for transmitting the identifier of the network interface.

28. The device according to item 27, while the set of at least one access point contains many access points that are associated with a common closed user group.

29. The device according to item 27, the network identifier based on the text.

30. The device according to item 27, with each access point of the above-mentioned set of at least one access point is restricted to not provide, for at least one other access terminal, at least one from the group consisting of the following: the transmission of signals, data access, registration, and maintenance.

31. The device according to item 27, with each access point of the above-mentioned set of at least one access point provides services for the mentioned set of at least od the CSOs access terminal, different from the service for at least one other access terminal.

32. The device according to item 27, in which the network identifier is received in response to the request for the network identifier.

33. Communication device, comprising: a controller initialization performed with the opportunity to take the network identifier for a set of at least one access point in the access point mentioned set, with each access point of the set is configured to provide at least one service only to a set of at least one access terminal and the network identifier uniquely identifies mentioned at least one access point within the network operator; and a communication controller that is configured to transmit the identifier of the network interface.

34. The device according to p, with the set of at least one access point contains many access points that are associated with a common closed user group.

35. The device according to p, with the network identifier based on the text.

36. The computer-readable medium containing codes for the text, for instructions to the computer to: receive a network identifier for a set of at least one access point in the access point mentioned set, each access point of this set is made with the capability, the capacity to provide at least one service only to a set of at least one access terminal, and the network identifier uniquely identifies mentioned at least one access point within the network operator; and pass the ID of the network interface.



 

Same patents:

FIELD: radio engineering, communication.

SUBSTANCE: system of avionics is connected with surface infrastructure with the help of at least one carrier of communication provision. The method includes at least one stage to receive service data stored in a memory of surface infrastructure related to faults of at least one functional unit, via the specified at least one carrier of communication provision, and a stage of repair of the specified at least one functional unit on the basis of received service data, at the same time the system of avionics established communication with surface infrastructure in a synchronous mode of communication.

EFFECT: reduction of costs for service and improvement of access to appropriate information for realisation of operations of aircraft servicing.

8 cl, 7 dwg

FIELD: radio engineering, communication.

SUBSTANCE: methods and devices are provided to format headings for data packages within a communication frame for use in a system of wireless communication. Formatting of headings includes determination of a size of a wireless communication frame and formatting of useful loads and related headings within a communication frame according to a certain size. Such formatting includes placement of headings in the beginning of the frame in front of data packages corresponding to these headings, in order to optimise processing of headings in a receiver. Formatting may also include formatting of headings according to the first format within the frame, when the determined size of the frame is less than the pre-determined size, in order to optimise the size of headings, and formatting according to the second format within the frame, when the size of the data package is equal or more than the predetermined size.

EFFECT: optimised processing for frames having large data packages.

52 cl, 10 dwg

FIELD: radio engineering, communication.

SUBSTANCE: server in a centre of data processing and storage may be arranged as capable of providing either a list of hashes or requested data on the basis of the fact, whether a system of cashes supported with a host node is permitted or not. The cash supported by the host node at the customer's side may provide data to the customer on the basis of hashes. Hashes may be generated to provide a reference sum of data, which may be used to efficiently index data.

EFFECT: provision of improvement in respect to delay time and reduction of total traffic of a global computing network.

20 cl, 10 dwg

FIELD: physics.

SUBSTANCE: interference detector of moving underwater object has a generator, a radiating antenna device, a signal processing unit which includes first and second receiving channels, having corresponding receiving antenna devices, a corresponding matching device and a filter unit, as well as a subtractor and an adaptive filter, an amplitude detector, a recording device, an information display unit, wherein the signal processing unit additionally includes a frequency tuning channel, which includes a third receiving antenna device, a third matching device, a third filter unit and a unit for calculating and comparing the coherence function.

EFFECT: detecting a moving underwater object in shallow water based on the changing interference pattern in the investigated region.

5 cl, 1 dwg

FIELD: information technology.

SUBSTANCE: functioning instructions are added to user group subscription stored in the IP multimedia subsystem, instructing nodes in the IP multimedia subsystem to adapt their standard functioning for this specific group of users. The instructions in a subscription of a specific user group, provide a node of the IP multimedia subsystem which no longer needs to be specific for certain types of users, but has a standard way of operation, which is modified by instructions for dedicated operation for only that specific user group.

EFFECT: easy access to services of an IP multimedia subsystem, by users group which require alternative handling in relation to the standard handling of IP multimedia subsystem users.

15 cl

FIELD: information technology.

SUBSTANCE: system has a receiving-control device having a subsystem for expanding wireless zones with a module for expanding wireless zones to provide two-way radio communication for constant control of the communication channel of wireless sensors and the receiving-control device on an internal communication bus; the sensors are configured form a data packet of control-diagnostic messages consisting of a pseudorandom encryption byte, a unique sensor number and packet index number, the message itself, the signal level of the previous received response from the corresponding module for expanding wireless zones and noise level in the sensor zone, and fitted with a transceiver for transmitting the data packet to the corresponding module for expanding wireless zones of the receiving-control device.

EFFECT: high reliability of the system and cryptographic protection of data transmission channels in order to reduce the probability of a security and fire alarm system being bypassed by intruders, interfacing a central monitoring system with digital communication channels.

19 cl, 1 dwg, 12 tbl

FIELD: information technology.

SUBSTANCE: method comprises steps of: organising the exchanged data into messages (M), having a single configuration; and the messages are described, as well as processing systems and applications with the same configuration in files stored in a storage unit (2) which is connected to the network and is accessible to data processing systems such that a data processing system which receives a message is capable, based on information delivered in the message, of finding the necessary data in the files of the storage unit.

EFFECT: improved adaptation properties of a data transmission system.

10 cl, 9 dwg

FIELD: information technologies.

SUBSTANCE: method includes stages, at which the following is carried out: a type T of integer-valued type is set in the format ASN.1, a transmitting party fills a message in the format ASN.1 by a message containing an example of data structure, and the transmitting party codes the message into a code flow, besides, the code flow of the data structure example in the message contains the value of the field V or contains the integer-valued type of the value V, the length L of this value V, and the value V itself.

EFFECT: invention provides for realisation of mutual connection between different versions of ASN.

10 cl, 6 dwg

FIELD: information technologies.

SUBSTANCE: method includes the following stages: by means of an agent, or or more data flows are received, or an indication is received that one or more data flows shall be received, from an access terminal via an access mechanism; by means of the agent, identification information of flow is generated for each of this one or more data flows; by means of the agent identification information is sent into a component of policies to support association of flow policies with this one or more data flows; by means of the agent one or more data flows are received from the access terminal with appropriate identification information of the flow; and by means of the agent it is verified, whether this one or more data flows received with appropriate identification information were sent via the specified access mechanism from the access terminal in compliance with associated policies of flows.

EFFECT: invention provides for accurate transfer of policies for correct reception or interpretation of data flows.

26 cl, 17 dwg

FIELD: information technologies.

SUBSTANCE: method to use a protected node network includes stages, at which the following is carried out: it is identified, whether a requesting object has proper rights of access, at least to a part of a protected node network; the requesting object is authenticated in accordance with the circuit of previous distribution of keys; a list is requested, which includes safety metadata, to detect whether the requesting object has proper rights of access; and in response to positive results of the request, access is provided to the requesting object; one or more units are included into the protected node network, which are configured to provide for functional possibilities of data collection and data transfer; nodes are functionally connected; one or more networks of physiological sensors is formed; data is collected with the help of a node; and collected data is sent to one or more nodes in a protected node network.

EFFECT: automatic establishment and control of a protected zone and higher efficiency of a system.

23 cl, 5 dwg

FIELD: mobile communications.

SUBSTANCE: base station determines speed of direct data transfer of data in accordance to control data about data transfer speed received from base station, reads temporary maximal total size encoder packers from buffer, determines, if it is possible to transfer these temporary packets at this speed of data transfer forms a combination of logic packets from these temporary packets, if it possible to transfer these packets at current data transfer speed, and total size of temporary packets is greater or equal to certain threshold value, and transmits logic packets with physical level packet.

EFFECT: higher data transfer speed.

3 cl, 9 dwg

FIELD: telecommunication systems and methods for global network access.

SUBSTANCE: proposed system has station that provides for meeting specified regulations concerning authentication of subscribers, authorization of access and services, accounting of network resources, and mobility. These specified regulations are determined by Internet service provider at decision station concerning specified regulations which is, essentially, server connected to Internet that communicates with mentioned providing station. Internet service provider may be made in the form of encryption key for given providing station and encryption key for particular subscriber.

EFFECT: enlarged functional capabilities.

33 cl, 4 dwg

FIELD: communications engineering.

SUBSTANCE: proposed device and method are used for voice frame/ data frame transmission in mobile communication system supporting ALL-IP network.Mobile phone sends heading information using synchronization frame and then separately transfers voice frame only; communication center B detects heading information in synchronization frame received, memorizes detected heading information, and upon receiving voice frame adds heading information to voice frame and transfers voice frame with added headings to base network.

EFFECT: provision for preventing addition of headings to traffics in mobile communication line.

39 cl, 7 dwg

FIELD: mobile communications.

SUBSTANCE: method and device for delivering a service are based on multiple speeds of data transfer, use scaling capability of multimedia codec in asynchronous communications network with multiple aces with code separation, delivering a service of multimedia broadcast and group transfer, area of whole cell is separated on first area and second area, first data are sent to first area, and second data are sent to second area, while first controller of electric power is in control of electric power of first data, and second controller of electric power controls electric power for second data, user device, positioned in second area, receives first data and second data, and user device in second area combines first data and second data, thus receiving one data element.

EFFECT: broader functional capabilities, lower costs.

5 cl, 13 dwg

FIELD: wireless communications.

SUBSTANCE: before starting data transfer between first object, for example, access terminal, and second object, for example, data transfer network, for synchronization a set of levels and/or protocols is selected, for each selected level and protocol, i.e. for each attribute, a list of selected attribute values is determined, viewed as acceptable for first object, selected attributes and attribute values connected thereto are sent from first object, and in response only a list of processed attributes is received and lists of values of processed attributes connected thereto, each list of values of processed attributes includes values of attributes, viewed as acceptable for first object, levels and protocols in first object are then configured in accordance to list of processed attributes and values of processed attributes connected thereto.

EFFECT: higher precision, broader functional capabilities, higher efficiency.

5 cl, 22 dwg, 1 tbl

FIELD: communication systems.

SUBSTANCE: system has commutated phone network and packet data transfer network Internet, control means, connected to Internet and made with possible determining of preferred route for phone calls through commutated phone network, and/or Internet, connection means, connected to commutated phone network, controlled by said control means, Internet-phone gateways, which are connected to commutated phone network and Internet network, and also authentication server, connected to Internet network.

EFFECT: higher efficiency, broader functional capabilities.

16 cl, 2 dwg

FIELD: establishing emergency communication session in information management system networks.

SUBSTANCE: proposed system has at least one piece of user's equipment and one or more network entities participating in establishment of emergency communication session when user's equipment initiates session establishment by sending message to network entity where identifier, such as call number or logic name of called entity, is indicated; one of network entities analyzes received identifier; if initiated session is found to be emergency communication session, information is returned to user's equipment to inform it about the fact that initiated session is just emergency communication session, whereupon user's equipment initiates emergency communication session execution; if user's equipment cannot find out that given session is emergency communication session, network will inform user's equipment about emergency communication session so as to provide for its adequate processing.

EFFECT: enhanced speed and reliability of emergency communication session identification.

38 cl, 4 dwg

FIELD: communication systems.

SUBSTANCE: system has receiver, transmitter, processing element, connected to receiver and transmitter and controlling receiver and transmitter, digital rights module, connected to processing elements and controlling operation of communication device in digital rights environment on domain basis, while digital rights module of communication device together with dispenser of domains of digital rights environment on domain basis is made with possible selective addition of communication device to domain, owning one or several communication devices, which together use a cryptographic key.

EFFECT: possible selective retrieval and decoding of digital content on basis of membership in a domain.

10 cl, 11 dwg

FIELD: telecommunications.

SUBSTANCE: method includes optimizing combination of event data, and excluding unnecessary transfer of detailed event records from one network object, responsible for data-gathering, to another.

EFFECT: detailed records of events, related to one session, but generated by several different network nodes, are sent in centralized manner in real time to data-gathering network node.

3 cl, 7 dwg

FIELD: mobile communication systems.

SUBSTANCE: proposed method used for Internet protocol (IP) mobile centers in heterogeneous networks with real-time applications includes following procedures: module 134 designed for managing interfaces of mobile center 10 checks mobile center for available network interfaces 14 - 17, generates recoding table with available and configurable interfaces 14 - 17, and communicates with applications 11 of interfaces 14 - 17. Applications 11 of IP mobile center 10 are given access to heterogeneous networks through virtual network IP interface 133 organized in mobile center 10; this IP interface 133 communicates with current network 21 - 24 through interface management module 134. Changing interface 14 - 17 of mobile center 10 updates communications of IP permanent virtual network interface with network 21 - 24 basing on recoding table by means of interface management module 134.

EFFECT: ability of change-over from one network connection to other in heterogeneous networks without interrupting internet protocol applications.

16 cl, 9 dwg

Up!