Sign In to Follow Application
View All Documents & Correspondence

Allocating Network Identifiers To Access Terminals

Abstract: The disclosed subject provides embodiments of a method of allocating network identifiers to access terminals. One embodiment of the method includes allocating a fixed length identifier to an access terminal on initial entry of the access terminal to a network. The access terminal is identified by one of a plurality of mode dependent identifiers in communication over an air interface between the access terminal and the network. The mode dependent identifier is selected based on an operational mode of the access terminal. The method also includes providing the fixed length identifier to one or more entities in the network.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
14 December 2012
Publication Number
24/2014
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application

Applicants

ALCATEL LUCENT
3 avenue Octave Gréard F 75007 Paris

Inventors

1. NAIR Suresh P.
33 Deerfield Road Whippany NJ 07981
2. FEDER Peretz
300 Starling Road Englewood NJ 07631

Specification

ALLOCATING NETWORK IDENTIFIERS TO ACCESS TERMINALS
CROSS REFERENCE TO RELATEDAPPLICATIONS
"This application claims the benefit of the filing date of U.S. Provisional Application Ser. No.
61/356,826, filed June 21, 2010, entitled "Method for Managing IEEE 802.16m Advanced MS States and
Identifiers in a Wireless Network."
This application is related to U.S. Patent Application 13/150,307, filed on June 1, 2011, attorney docket
number 2100.047900 which claims the benefit of the filing date of U.S. Provisional Application Ser. No.
61/356,861, filed June 21, 2010, entitled "Method for IEEE 802.16m Paging Operation in Networks
Simultaneously Supporting Legacy and Advanced Mss. "
BACKGROUND
The disclosed subject matter relates generally to communication systems, and, more particularly, to
wireless communication systems.
Conventional wireless communication systems use a network of base stations or other access nodes to
provide wireless connectivity to a large and often mobile population of access terminals. Each access terminal
can be identified to the wireless communication system by an identifier that is permanently assigned or "burned
in" to the mobile unit. For example, implementations of WiMAX release 1 that are based on the standards and
protocols defined by IEEE 802. 16e (2009) use a constant 48-bit mobile station identifier (MS-ID) to identify the
access terminals in the network. The MS-ID is typically installed or programmed by the manufacturer of the
access terminal in the form of media access control (MAC) identifier. For another example, wireless
communication systems that operate according to the Global System for Mobile communications (GSM) and/or
Universal Mobile Telecommunication Services (UMTS) standards and/or protocols may use a 64-bit
International Mobile Subscriber Identity (IMSI) to identify each mobile unit or access terminal.
The conventional mobile station identifier is used to identify the access terminal within the network
and over the air. For example, the mobile station identifier can be included in headers of messages that are
transmitted within the network such as messages transmitted over the R6 network interfaces between base
stations and access serving network gateways (ASN-GWs), over R3 network interface between the ASN-GW
and the AAA server, over the R8 network interfaces between two neighboring base stations, over the R4
interfaces between two ASN-GWs, and the like. For another example, access terminals can be paged over the
air by transmitting a hashed value derived from the identifier, e.g., a 24-bit hash of a 48-bit identifier can be
used to page access terminals. The mobile station identifier can also be used directly as a pointer to the mobile
807821 2
station context information stored at one or more network nodes that are involved in a particular call associated
with a particular mobile station state.
Access terminals can also be associated with different identifiers in different circumstances. For
example, WiMAX networks that operate according to IEEE 802.16m standards and/or protocols may identify
access terminals using a set of identification numbers that range in length from 10 bits to 72 bits depending on
the operational state of the access terminal. Consequently, the identifier that is used by the network and over the
air varies as the operational mode changes, e.g., as the access terminal performs initial network entry, gets fully
authenticated and active and then shifts between sleeping, dormant, idle, active, or other operational states. The
wireless communication system must therefore maintain awareness of the appropriate value of the identifier
used to identify the access terminal in over the air messages as well as messages exchanged within the network
such as messages transmitted over the R3, R4, R6, R8 and other interfaces. Managing the various identifiers is
further complicated by the presence of both legacy access devices that use a single constant identifier such as
the 48-bit mobile station identifier and advanced access devices that use a set of identification numbers.
SUMMARY
The disclosed subject matter is directed to addressing the effects of one or more of the problems set
forth above. The following presents a simplified summary of the disclosed subject matter in order to provide a
basic understanding of some aspects of the disclosed subject matter. This summary is not an exhaustive
overview of the disclosed subject matter. It is not intended to identify key or critical elements of the disclosed
subject matter or to delineate the scope of the disclosed subject matter. Its sole purpose is to present some
concepts in a simplified form as a prelude to the more detailed description that is discussed later.
In one embodiment, a method is provided for allocating network identifiers to access terminals. One
embodiment of the method includes allocating a fixed length identifier to an access terminal on initial entry of
the access terminal to a network. The access terminal is identified by one of a plurality of mode-dependent
identifiers in communication over an air interface between the access terminal and the network. The modedependent
identifier is selected based on an operational mode of the access terminal. The method also includes
providing the fixed length identifier.
807821 3
In another embodiment, a method is provided for transmitting messages over an air interface. One
embodiment of the method includes receiving a message from a network. The message includes a header
containing a fixed length identifier associated with an access terminal. This embodiment also includes mapping
the fixed length identifier to one of a plurality of mode-dependent identifiers associated with the access terminal.
The mode-dependent identifier is selected based upon an operational mode of the access terminal. This
embodiment further includes transmitting information in the message over an air interface towards the access
terminal using the selected mode-dependent identifier.
In yet another embodiment, a method is provided for transmitting messages that include access
terminal information to a network entity. One embodiment of the method includes receiving a message over an
air interface from an access terminal. The message includes a header that contains one of a plurality of modedependent
identifiers associated with the access terminal. The mode-dependent identifier is selected based upon
an operational mode of the access terminal. This embodiment also includes mapping the mode-dependent
identifier to a fixed length identifier associated with the access terminal and transmitting information in an
associated message to one or more entities in the network using the fixed length identifier to identify the access
terminal.
BRIEF DESCRIPTION OF THE DRAWINGS
The disclosed subject matter may be understood by reference to the following description taken in
conjunction with the accompanying drawings, in which like reference numerals identify like elements, and in
which:
Figure 1 conceptually illustrates one exemplary embodiment of a wireless communication system;
Figure 2 conceptually illustrates one exemplary embodiment of a database entry;
Figure 3 conceptually illustrates one exemplary embodiment of a message format;
Figure 4 conceptually illustrates one alternative embodiment of a message format;
Figure 5 conceptually illustrates one exemplary embodiment of a method for allocating fixed length
identifiers to access terminals;
807821 4
Figure 6 conceptually illustrates one exemplary embodiment of a method for transmitting downlink
messages to access terminals over an air interface; and
Figure 7 conceptually illustrates one exemplary embodiment of a method for receiving uplink messages
from access terminals at a network over an air interface.
While the disclosed subject matter is susceptible to various modifications and alternative forms,
specific embodiments thereof have been shown by way of example in the drawings and are herein described in
detail. It should be understood, however, that the description herein of specific embodiments is not intended to
limit the disclosed subject matter to the particular forms disclosed, but on the contrary, the intention is to cover
all modifications, equivalents, and alternatives falling within the scope of the appended claims.
DETAILED DESCRIPTION OF SPECIFIC EMBODIMENTS
Illustrative embodiments are described below. In the interest of clarity, not all features of an actual
implementation are described in this specification. It will of course be appreciated that in the development of
any such actual embodiment, numerous implementation-specific decisions should be made to achieve the
developers' specific goals, such as compliance with system-related and business-related constraints, which will
vary from one implementation to another. Moreover, it will be appreciated that such a development effort might
be complex and time-consuming, but would nevertheless be a routine undertaking for those of ordinary skill in
the art having the benefit of this disclosure.
The disclosed subject matter will now be described with reference to the attached figures. Various
structures, systems and devices are schematically depicted in the drawings for purposes of explanation only and
so as to not obscure the described embodiments with details that are well known to those skilled in the art.
Nevertheless, the attached drawings are included to describe and explain illustrative examples of the disclosed
subject matter. The words and phrases used herein should be understood and interpreted to have a meaning
consistent with the understanding of those words and phrases by those skilled in the relevant art. No special
definition of a term or phrase, i.e. , a definition that is different from the ordinary and customary meaning as
understood by those skilled in the art, is intended to be implied by consistent usage of the term or phrase herein.
To the extent that a term or phrase is intended to have a special meaning, i.e. , a meaning other than that
807821 5
understood by skilled artisans, such a special definition will be expressly set forth in the specification in a
definitional manner that directly and unequivocally provides the special definition for the term or phrase.
Evolving wireless communication systems allow access terminals to be identified in messages
transmitted over the air interface using mode-dependent identifiers that can be selected based on the operational
mode of the access terminal. Although there are advantages to using different mode-dependent identifiers of
different lengths for communication over the air interface, identifying the access terminal using different
identifiers in different situations makes it extremely difficult for entities in the core and/or access network (e.g.,
base stations, access serving gateways, or authentication, authorization, and accounting (AAA) servers) to keep
track of the appropriate identifier. For example, the network would be required to monitor the state of each
access terminal and adjust its identifier in response to any changes. Supporting the different identifiers would
also require significant changes in the format of the message headers used between the network interfaces.
Furthermore, the evolving network cannot completely switch to a new identifier scheme because the network
needs to be able to support the conventional constant MSID used by legacy devices.
At least in part to address these concerns for evolving wireless networks, the present application
describes embodiments of techniques that can be used to define a fixed length identifier that identifies access
terminals within the core and/or access network. Embodiments of these techniques may be used to assign
identifiers or pseudo-identifiers to access terminals that use mode-dependent identifiers. For example, access
terminals that operate according to IEEE 802. 16m can select an identifier from a group of mode-dependent
identifiers for use over the air interface depending upon the operational mode of the access terminal. An access
node (or other entity within the network) may assign a fixed length identifier to the access terminal upon initial
network entry. For example, the fixed length identifier may be an identifier that includes 48 bits to correspond
to the number of bits in a legacy mobile station identifier (MS-ID) or media access control identifier (MAC-ID).
The fixed length identifier is then used to identify the access terminal during communication within the network,
e.g., in messages transmitted over the interfaces between different core and/or access network entities. The
access node can map or translate between the fixed length identifier and the mode-dependent identifiers so that
the appropriate mode-dependent identifier may still be used for communication over the air interface.
Figure 1 conceptually illustrates one exemplary embodiment of a wireless communication system 100.
In the illustrated embodiment, the wireless communication system 100 includes a plurality of access nodes 105
807821 6
such as base stations that are used to provide wireless connectivity. Access terminals 110 such as mobile units
can access the wireless communication system 100 over air interfaces 115 between the access terminals 110 and
the access node 105. The access nodes 105 and the access terminals 110 depicted in Figure 1 operate according
to WiMAX standards and/or protocols such as the standards and/or protocols defined by IEEE 802.16m.
However, persons of ordinary skill in the art having benefit of the present disclosure should appreciate that
alternative embodiments of the wireless communication system 100 may include access nodes and/or access
terminals that operate according to other standards and/or protocols. For example, the access nodes 105 and/or
the access terminals 110 may support wireless communication according to one or more legacy standards and/or
protocols. Moreover, alternate embodiments of the techniques described herein may be implemented in other
types of systems and/or devices that use wireless communication techniques.
In the illustrated embodiment, the base stations 105 are communicatively coupled to one or more
access serving network gateways (ASN-GWs) 120 over interfaces 125. For example, the interfaces 125 may be
R6 network interfaces that operate according to the WiMAX standards and/or protocols. The gateways 120 may
be used to support backhaul connections to the base stations 105 and to support mobility -related operations such
as handover decisions and/or load balancing, among other functions. The base stations 105 may communicate
with each other over interfaces 130 such as R8 interfaces that operate according to the WiMAX standards and/or
protocols. The ASN-GWs 120 may communicate with each other over interfaces 135 such as R4 interfaces that
operate according to the WiMAX standards and/or protocols. The ASN-GWs 120 may communicate with an
AAA server 140 over interfaces 145 such as R3 interfaces that operate according to the WiMAX standards
and/or protocols. In various embodiments, the AAA server 140 provides Internet Protocol (IP) functionality to
support the functions of authentication, authorization and accounting. Authentication refers to the process
where an entity's identity is authenticated, typically by providing evidence that it holds a specific digital identity
such as an identifier and the corresponding credentials. The authorization function determines whether a
particular entity is authorized to perform a given activity, typically inherited from authentication when logging
on to an application or service. Accounting refers to the tracking of network resource consumption by users for
the purpose of capacity and trend analysis, cost allocation, and/or billing.
Access terminal 110 can be identified over the air interfaces 115 using different mode-dependent
identifiers. As used herein, the term "mode-dependent identifier" is used to indicate that the different identifiers
that may be selected to identify each access terminal 110 are used to identify the access terminal 110 in different
807821 7
operational modes. In one embodiment, the mode-dependent identifiers have different lengths. For example,
identifiers of 10 bits, 12 bits, 18 bits, 24 bits, 48 bits, or 72 bits may be used as one or more of the modedependent
identifiers. In one embodiment, the set of mode-dependent identifiers is defined by the relevant
standards and/or protocols. For example, the IEEE 802. 16m standards and/or protocols may define the set of
available mode-dependent identifiers in the manner indicated in Table 1. However, persons of ordinary skill in
the art having benefit of the present disclosure should appreciate that the particular set of mode-dependent
identifiers shown in Table 1 is intended to be exemplary and other sets may be defined for alternative
embodiments.
Table 1
Embodiments of the base stations 105 may be configured to allocate fixed length identifiers to the
access terminals 110. The fixed length identifier may be used to identify the access terminal 110 in
communications between network elements such as messages transmitted over the interfaces 125, 130, 135, 145.
In one embodiment, the base station 105 allocates the fixed length identifier upon initial network entry of the
access terminal 110. The length of the fixed length identifier may be chosen to correspond to the number of bits
used to identify legacy access terminals. For example, the base station 105 may allocate a 48 bit identifier to the
807821 8
access terminal 110 so that the number of bits in the fixed length identifier corresponds to the 48 bits in a
conventional mobile station identifier or MAC-ID. When the same number of bits is used for the fixed length
identifier and the conventional mobile station ID, existing network message formats (and other standardized
network functionality) may be used for both legacy access terminals and access terminals 110 that use modedependent
identifiers over the air interface. In one embodiment, the fixed length identifier is used to point to
context information associated with the access terminal 110 and stored within the network 100.
A database may be used to store information indicating the relationship and/or mapping between the
fixed length identifier and the mode-dependent identifiers associated with the access terminal 110. In the
illustrated embodiment, the base stations 105 can store database entries 150 including mapping information for
the identifiers associated with the access terminals 110. This information can then be used to translate or map
fixed length identifiers into mode-dependent identifiers and vice versa during uplink and/or downlink
communications between the network 100 and the access terminal 110. Although portions of copies of the
database 150 are depicted within the base stations 105, persons of ordinary skill in the art having benefit of the
present disclosure should appreciate that alternative embodiments of the wireless communication system 100
may be able to maintain the database 150 in any location such as ASN-GW 120 or collection of locations.
Figure 2 conceptually illustrates one exemplary embodiment of a database entry 200. In the illustrated
embodiment, the database entry 200 includes various fields for storing information indicating the different
mode-dependent and/or fixed length identifiers associated with one access terminal. For example, a field 205 is
used to store information indicating the media access control identifier (MAC-ID) that is permanently associated
with the access terminal. Field 210 is used to store the station identifier (STID) that is used to identify the
access terminal when it is in the active operational mode and connected to the network. Field 215 is used to
store the temporary station identifier (TSTID) that identifies the access terminal prior to the station identifier
being allocated to the access terminal. Field 220 includes the de-registration identifier (DID) that is used to
identify the access terminal when it is coming out of a long inactive operational mode or if radio connection was
lost. Field 225 includes the context retention identifier (CRID) that is assigned to the access terminal during
initial network entry. Field 230 includes a multicast station identifier (MSTID) that can identify
multicast/broadcast service flows associated with the access terminal when the access terminal is operating in a
multicast/broadcast mode. Field 235 includes the fixed length identifier that is allocated to the access terminal,
807821 9
e.g., during initial network entry, and used to identify the access terminal during communication within the core
and/or access network.
Figure 3 conceptually illustrates one exemplary embodiment of a message format 300. In the
illustrated embodiment, the message format 300 includes a message header 305 and a message body 310. The
message header 305 includes fields that are used to define various parameters of the message 300 and/or to
identify the access terminal associated with the message. In the illustrated embodiment, the message header 305
includes fields for a version indicator, a set of flags, a function type for the message, an operand identifier (OP
ID), and a message type. For example, the version indicator may be one byte long and bit 7 may be set to 1 by
the sender. Bits 0-6 of the version indicator may be set to 0 by the sender. The receiver may ignore the values
in this field. The flag field may include a variety of flags such as a restart flag that indicates whether a restart is
expected for the next transaction identifier, a bit that indicates whether the message is sent in the relay mode of
operation, bits used to identify legacy nodes, and a comprehension bit that indicates whether comprehension is
required for fields such as the function type field, a message type field, or the OP ID field.
The message header 305 may also include fields that are used to indicate the length of the message, an
identifier of the associated access terminal (MSID), a transaction identifier, and one or more reserved fields. In
the illustrated embodiment, the access terminal identifier has a fixed length that corresponds to the length of the
identifiers used for legacy devices, such as the 48-bit mobile station identifier or MAC-ID. Allocating a fixed
length identifier to each access terminal for core and/or access network-side communication of the message
header 305 may therefore permit embodiments of the message header 305 to be used for messages transmitted
over the network interfaces for either legacy access terminals or access terminals that use mode-dependent
identifiers for communication over the air interface. For example, access terminals that operate according to
IEEE 802. 16m may use network message formats defined by previous WiMAX standards and/or protocols.
The message body 310 includes fields such as type-length-value (TLV) fields that are used to carry
information included in the message 300. In the illustrated embodiment, the message body 310 includes a
destination identifier TLV that includes information identifying the destination of the message 300, a source
identifier TLV that includes information identifying the source of the message 300, an R6 context TLV that
includes information defining the context for the R6 interface, and other TLVs that may optionally be included
in the message 300 to carry other information. In one embodiment, one or more of the other TLVs may be used
807821 10
to carry information indicating the actual mobile station ID or MAC-ID of the access terminal, e.g., in downlink
messages that include the previously allocated fixed length identifier in the message header 305. Modedependent
identifiers used by the access terminals may be indicated in the body of the relevant messages as
type-length-values.
Figure 4 conceptually illustrates one alternative embodiment of a message format 400. In the
alternative embodiment, the message format 400 includes a message header 405 and a message body 410. The
alternative embodiments of the message format 400 may be used to support mode-dependent identifiers during
communication within the network, e.g., in messages transmitted over the interfaces between network entities.
Consequently, the message format 400 is able to indicate which of the mode-dependent identifiers are being
used to identify the access terminal within the network. The message format 400 also includes information
indicating the mode-dependent identifier.
The alternative embodiment of the message header 405 includes fields that are used to define various
parameters of the message 400 and/or to identify the access terminal associated with the message. The message
header 405 includes fields for a version indicator, a set of flags, a function type for the message, an operand
identifier (OP ID), and a message type. The message header 405 may also include fields that are used to
indicate the length of the message, an identifier of the associated access terminal (MSID), a transaction
identifier, and one or more reserved fields. The alternative embodiment depicted in Figure 4 differs from the
embodiment shown in Figure 3 because it includes a larger field to accommodate a potentially larger identifier.
In particular, the MSID field is selected to be able to accommodate the longest identifier in a variable set of
identifiers, such as the 72 bit CRID defined by the WiMAX standards. The message header 405 also includes
an identifier type (ID TYPE) field to indicate which of the mode-dependent set of identifiers is being used in the
header 405.
In the alternative embodiment, the access terminal may be identified within the network using the
mode-dependent identifier that is selected based on the operational mode of the access terminal. However, the
alternative embodiment has a number of disadvantages relative to embodiments that use a fixed length identifier
to identify the access terminal within the network. For example, message construction and/or decoding
techniques used by current implementations of network elements such as base stations, ASN-GWs, and the like
would need to be modified to support the alternative embodiments of the message format 400. For another
807821 11
example, the network would need to be modified to identify legacy access terminals that use conventional
message formats such as the message format 300 and advanced access terminals that use the message format
400. For yet another example, providing support for procedures that identify access terminals using the modedependent
identifier may be difficult at least in part because the identifier changes based on the operational
mode of the access terminal.
Figure 5 conceptually illustrates one exemplary embodiment of a method 500 for allocating fixed
length identifiers to access terminals. In the illustrated embodiment, an entity in the network such as a base
station or other access nodes such as ASN-GW or core network nodes receives (at 505) a message during initial
network entry of an access terminal. The received message includes information indicating the identity of the
access terminal. In one embodiment, the identity of the access terminal is indicated using the true or permanent
mobile station identifier, e.g., the 48 bit identifier that is given to the access terminal when it is manufactured
and/or configured. The network entity then determines (at 510) whether the access terminal is a legacy device
or an advanced device that supports the use of mode-dependent identifiers to identify the access terminal during
communication over an air interface. If the access terminal is a legacy device, then the mobile station identifier
can be provided (at 515) to other network elements such as ASN-GWs, AAA servers, and the like so that these
network-side elements can use the identifier to identify the access terminal. Alternatively, the network entity
may assign a pseudo-identifier that has the same number of bits as the mobile station identifier and then provide
(at 515) the pseudo-identifier to the network so that the pseudo-identifier can be used to identify the access
terminal without revealing the true mobile station identifier.
If the network entity determines (at 510) that the access terminal supports mode-dependent identifiers,
then a fixed length identifier can be allocated (at 520) to the access terminal. The fixed length identifier can
then be used to identify the access terminal, e.g., in messages transmitted over interfaces between network
elements such as base stations, ASN-GWs, AAA servers, and the like. For example, the fixed length identifier
may be a 48 bit identifier allocated to the access terminal. The fixed length identifier may be a random number
or may be derived from one or more other identifiers for information associated with the access terminal. The
fixed length identifier may also be associated (at 525) with the mode-dependent identifiers that are used to
identify the access terminal and communications over the air interface. In one embodiment, the network entity
creates a database entry including the information that associates the fixed and mode-dependent identifiers for
the access terminal. The database can be accessed to map or translate between fixed and mode-dependent
807821 12
identifiers for uplink and/or downlink communication. The network entity can then provide (at 530) the fixed
length identifier to other elements in the network. In various embodiments, portions of the method 500 may be
performed before, concurrently with, or after authentication, authorization, and/or accounting processes are
performed for the access terminal.
Figure 6 conceptually illustrates one exemplary embodiment of a method 600 for transmitting
downlink messages to access terminals over an air interface. In the illustrated embodiment, an entity in the
network such as a base station or other access node receives (at 605) a downlink message that is addressed to an
access terminal using an identifier in the header of the message. The access node determines (at 610) whether
the access terminal is a legacy device or an advanced device that supports the use of mode-dependent identifiers
to identify the access terminal during communication over an air interface. If the access terminal is a legacy
device, then the identifier in the header of the message is a legacy identifier such as a mobile station identifier.
The access node may use the mobile station identifier to convey (at 615) portions of the message to the access
terminal. For example, the access node may generate a hashed value of the MSID that is used to page the access
terminal and once the access node has located the access terminal, some or all of the information in the
downlink message may be transmitted over the air interface to the access terminal.
If the access node determines (at 610) that the access terminal uses mode-dependent identifiers for
communication over the air interface, then the identifier in the header of the downlink message may be a fixed
length ID that has been allocated to the access terminal. The access node may therefore translate or map the
fixed length ID to the appropriate mode-dependent ID. In the illustrated embodiment, the access node selects (at
620) a mode-dependent identifier associated with the access terminal using the fixed length identifier and the
access terminal mode. For example, the access node may use the fixed length identifier to locate a database
entry that indicates the mode-dependent identifiers for the access terminal. The access node may then select (at
620) the appropriate mode-dependent identifier based on the operational mode of the access terminal, e.g. , the
DID may be selected for an idle access terminal. The access node may use the selected mode-dependent
identifier to convey (at 625) portions of the message to the access terminal. For example, the access node may
use the mode-dependent identifier (e.g., the DID) to identify the access terminal after a link loss or long
inactivity period and once the access node has located the access terminal, some or all of the information in the
downlink message may be transmitted over the air interface to the access terminal.
807821 13
Figure 7 conceptually illustrates one exemplary embodiment of a method 700 for receiving uplink
messages from access terminals at a network over an air interface. In the illustrated embodiment, an entity in
the network such as a base station or other access node receives (at 705) an uplink message from an access
terminal. The access node determines (at 710) whether the access terminal is a legacy device or an advanced
device that supports the use of mode-dependent identifiers to identify the access terminal during communication
over an air interface. If the access terminal is a legacy device, then the access terminal can be identified using a
legacy identifier such as a mobile station identifier. The access node may use the mobile station identifier to
convey (at 715) portions of the message to the network. For example, the access node may use the mobile
station identifier to create a header for a message that includes some or all of the information in the uplink
message. The message including the header may then be transmitted towards the core and/or access network.
If the access node determines (at 710) that the access terminal uses mode-dependent identifiers for
communication over the air interface, then the access node determines or identifies (at 720) a fixed length ID
that has been allocated to the access terminal. In one embodiment, the access node may translate or map the
mode-dependent identifier used by the access terminal for air interface communications to the fixed length
identifier used to identify the access terminal in the core and/or access network. In the illustrated embodiment,
the access node identifies (at 720) the fixed length identifier based on the mode-dependent identifier associated
with the access terminal and the access terminal mode. For example, the access node may use the modedependent
identifier to locate a database entry that indicates the association between fixed and mode-dependent
identifiers for the access terminal. The access node may then identify (at 720) the fixed length identifier by
mapping the mode-dependent identifier used in the current operational mode of the access terminal to the fixed
length identifier indicated in the database entry. The access node may use the selected fixed length identifier to
convey (at 725) portions of the message to the core and/or access network. For example, the access node may
use the fixed length identifier to create a header for a message that is used to transmit some or all of the
information in the uplink message to the core and/or access network, e.g., over an R6 interface.
Embodiments of the fixed length identifier allocation techniques described in the present application
may have a number of advantages over techniques that use mode-dependent identifiers for network
communications. For example, allocating the fixed length identifier may allow the network to operate
consistently with previous network implementations when the length of the fixed length identifier is the same as
the length of the legacy mobile station identifier. Moreover, the network can identify both legacy and advanced
807821 14
access terminals using the same length identifiers, which allows the network to preserve and utilize previously
defined message formats, thereby facilitating and supporting the evolutionary growth of the network. Paging
can be supported for both legacy and advanced access terminals when the fixed length identifiers are used.
Moreover implementations of the network entity such as base stations, gateways, paging controllers, AAA
servers, and the like may be aligned when a fixed length identifier is implemented for at least core and/or access
network-side communication. Allocating fixed length identifiers for core and/or access network-side
communication may also improve security by reducing transmissions of permanent identifier associated with the
access terminal. For example, in some cases the real mobile station identifier is only transmitted as an element
of a message sent during initial network entry. After that, a different identifier such as a pseudo-identifier is
used for communication over interfaces between the network entities.
Portions of the disclosed subject matter and corresponding detailed description are presented in terms
of software, or algorithms and symbolic representations of operations on data bits within a computer memory.
These descriptions and representations are the ones by which those of ordinary skill in the art effectively convey
the substance of their work to others of ordinary skill in the art. An algorithm, as the term is used here, and as it
is used generally, is conceived to be a self-consistent sequence of steps leading to a desired result. The steps are
those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities
take the form of optical, electrical, or magnetic signals capable of being stored, transferred, combined,
compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common
usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the
appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically
stated otherwise, or as is apparent from the discussion, terms such as "processing" or "computing" or
"calculating" or "determining" or "displaying" or the like, refer to the action and processes of a computer
system, or similar electronic computing device, that manipulates and transforms data represented as physical,
electronic quantities within the computer system's registers and memories into other data similarly represented
as physical quantities within the computer system memories or registers or other such information storage,
transmission or display devices.
807821 15
Note also that the software implemented aspects of the disclosed subject matter are typically encoded
on some form of program storage medium or implemented over some type of transmission medium. The
program storage medium may be magnetic (e.g., a floppy disk or a hard drive) or optical (e.g., a compact disk
read only memory, or "CD ROM"), and may be read only or random access. Similarly, the transmission
medium may be twisted wire pairs, coaxial cable, optical fiber, or some other suitable transmission medium
known to the art. The disclosed subject matter is not limited by these aspects of any given implementation.
The particular embodiments disclosed above are illustrative only, as the disclosed subject matter may
be modified and practiced in different but equivalent manners apparent to those skilled in the art having the
benefit of the teachings herein. Furthermore, no limitations are intended to the details of construction or design
herein shown, other than as described in the claims below. It is therefore evident that the particular
embodiments disclosed above may be altered or modified and all such variations are considered within the
scope of the disclosed subject matter. Accordingly, the protection sought herein is as set forth in the claims
below.
807821 16
CLAIMS
WHAT IS CLAIMED:
1. A method, comprising:
allocating a fixed length identifier to an access terminal on initial entry of the access terminal to a
network, wherein the access terminal is identified by one of a plurality of mode-dependent identifiers in
communication over an air interface between the access terminal and the network, said one mode-dependent
identifier being selected based on an operational mode of the access terminal; and
providing the fixed length identifier to at least one entity in the network.
2. The method of claim 1, wherein allocating the fixed length identifier comprises associating the fixed
length identifier with the plurality of mode-dependent identifiers for the access terminal.
3. The method of claim 1, wherein allocating the fixed length identifier to the access terminal comprises
allocating a fixed length identifier that is different than any of the plurality of mode-dependent identifiers used
to identify the access terminal for communication over the air interface.
4. The method of claim 1, wherein allocating the fixed length identifier to the access terminal comprises
associating the fixed length identifier with at least one context defined for the access terminal.
5. The method of claim 1, comprising identifying the access terminal in at least one message transmitted
to at least one element in the network using the fixed length identifier and identifying the access terminal in at
least one message transmitted over the air interface using one of the plurality of mode-dependent identifiers
selected based upon the operational mode of the access terminal.
6. A method, comprising:
receiving a message from a network, wherein the message comprises a header comprising a fixed
length identifier associated with an access terminal;
mapping the fixed length identifier to one of a plurality of mode-dependent identifiers associated with
the access terminal, wherein said one of the plurality of mode-dependent identifiers is selected based upon an
operational mode of the access terminal; and
807821 17
transmitting information in the message over an air interface towards the access terminal using said one
of the plurality of mode-dependent identifiers.
7. The method of claim 6, comprising allocating the fixed length identifier to the access terminal on initial
entry of the access terminal to the network.
8. The method of claim 6, wherein transmitting information in the message over the air interface
comprises forming a header that comprises said one of the plurality of mode-dependent identifiers and forming a
message body that comprises at least a portion of the message received from the network.
9. A method, comprising:
receiving a message over an air interface from an access terminal, wherein the message comprises a
header comprising one of a plurality of mode-dependent identifiers associated with the access terminal, wherein
said one of the plurality of mode-dependent identifiers is selected based upon an operational mode of the access
terminal;
mapping said one of the plurality of mode-dependent identifiers to a fixed length identifier associated
with the access terminal; and
transmitting information in the message to at least one entity in the network using the fixed length
identifier to identify the access terminal.
10. The method of claim 9, comprising allocating the fixed length identifier to the access terminal on initial
entry of the access terminal to the network.
11. The method of claim 9, wherein transmitting information in the message to said at least one entity in
the network comprises forming a header that comprises the fixed length identifier and forming a message body
that comprises at least a portion of the message received over the air interface.

Documents

Application Documents

# Name Date
1 10447-CHENP-2012 POWER OF ATTORNEY 14-12-2012.pdf 2012-12-14
1 10447-CHENP-2012-AbandonedLetter.pdf 2019-04-23
2 10447-CHENP-2012 FORM-5 14-12-2012.pdf 2012-12-14
2 10447-CHENP-2012-FER.pdf 2018-10-18
3 10447-CHENP-2012-FORM 3 [05-01-2018(online)].pdf 2018-01-05
3 10447-CHENP-2012 FORM-3 14-12-2012.pdf 2012-12-14
4 10447-CHENP-2012-FORM 3 [12-08-2017(online)].pdf 2017-08-12
4 10447-CHENP-2012 FORM-2 FIRST PAGE 14-12-2012.pdf 2012-12-14
5 Form 3 [24-11-2016(online)].pdf 2016-11-24
5 10447-CHENP-2012 FORM-18 14-12-2012.pdf 2012-12-14
6 Form 3 [23-11-2016(online)].pdf 2016-11-23
6 10447-CHENP-2012 FORM-1 14-12-2012.pdf 2012-12-14
7 10447-CHENP-2012-Correspondence-F3-290216.pdf 2016-07-04
7 10447-CHENP-2012 DRAWINGS 14-12-2012.pdf 2012-12-14
8 10447-CHENP-2012-Form 3-290216.pdf 2016-07-04
8 10447-CHENP-2012 DESCRIPTION (COMPLETE) 14-12-2012.pdf 2012-12-14
9 10447-CHENP-2012 CORRESPONDENCE OTHERS 14-12-2012.pdf 2012-12-14
9 Form 3 [02-06-2016(online)].pdf 2016-06-02
10 10447-CHENP-2012 CLAIMS SIGNATURE LAST PAGE 14-12-2012.pdf 2012-12-14
10 10447-CHENP-2012-Correspondence-151015.pdf 2016-03-18
11 10447-CHENP-2012 CLAIMS 14-12-2012.pdf 2012-12-14
11 10447-CHENP-2012-Form 3-151015.pdf 2016-03-18
12 10447-CHENP-2012 CORRESPONDENCE OTHERS 10-06-2015.pdf 2015-06-10
12 10447-CHENP-2012 PCT PUBLICATION 14-12-2012.pdf 2012-12-14
13 10447-CHENP-2012 FORM-3 10-06-2015.pdf 2015-06-10
13 10447-CHENP-2012.pdf 2012-12-17
14 10447-CHENP-2012 CORRESPONDENCE OTHERS 24-01-2013.pdf 2013-01-24
14 10447-CHENP-2012 FORM-3 20-10-2014.pdf 2014-10-20
15 10447-CHENP-2012 ASSIGNMENT 24-01-2013.pdf 2013-01-24
15 10447-CHENP-2012 CORRESPONDENCE OTHERS 20-10-2014.pdf 2014-10-20
16 10447-CHENP-2012 FORM-3 24-01-2013.pdf 2013-01-24
16 10447-CHENP-2012 CORRESPONDENCE OTHERS 14-08-2014.pdf 2014-08-14
17 10447-CHENP-2012 FORM-3 14-08-2014.pdf 2014-08-14
17 10447-CHENP-2012 FORM-13 24-01-2013.pdf 2013-01-24
18 10447-CHENP-2012 FORM-1 24-01-2013.pdf 2013-01-24
18 10447-CHENP-2012 CORRESPONDENCE OTHERS 01-07-2014.pdf 2014-07-01
19 10447-CHENP-2012 FORM-3 19-06-2013.pdf 2013-06-19
19 abstract10447-CHENP-2012.jpg 2014-04-21
20 10447-CHENP-2012 CORRESPONDENCE OTHERS 19-06-2013.pdf 2013-06-19
20 10447-CHENP-2012 CORRESPONDENCE OTHERS 10-02-2014.pdf 2014-02-10
21 10447-CHENP-2012 FORM-3 10-02-2014.pdf 2014-02-10
22 10447-CHENP-2012 CORRESPONDENCE OTHERS 19-06-2013.pdf 2013-06-19
22 10447-CHENP-2012 CORRESPONDENCE OTHERS 10-02-2014.pdf 2014-02-10
23 10447-CHENP-2012 FORM-3 19-06-2013.pdf 2013-06-19
23 abstract10447-CHENP-2012.jpg 2014-04-21
24 10447-CHENP-2012 CORRESPONDENCE OTHERS 01-07-2014.pdf 2014-07-01
24 10447-CHENP-2012 FORM-1 24-01-2013.pdf 2013-01-24
25 10447-CHENP-2012 FORM-3 14-08-2014.pdf 2014-08-14
25 10447-CHENP-2012 FORM-13 24-01-2013.pdf 2013-01-24
26 10447-CHENP-2012 FORM-3 24-01-2013.pdf 2013-01-24
26 10447-CHENP-2012 CORRESPONDENCE OTHERS 14-08-2014.pdf 2014-08-14
27 10447-CHENP-2012 ASSIGNMENT 24-01-2013.pdf 2013-01-24
27 10447-CHENP-2012 CORRESPONDENCE OTHERS 20-10-2014.pdf 2014-10-20
28 10447-CHENP-2012 CORRESPONDENCE OTHERS 24-01-2013.pdf 2013-01-24
28 10447-CHENP-2012 FORM-3 20-10-2014.pdf 2014-10-20
29 10447-CHENP-2012 FORM-3 10-06-2015.pdf 2015-06-10
29 10447-CHENP-2012.pdf 2012-12-17
30 10447-CHENP-2012 CORRESPONDENCE OTHERS 10-06-2015.pdf 2015-06-10
30 10447-CHENP-2012 PCT PUBLICATION 14-12-2012.pdf 2012-12-14
31 10447-CHENP-2012 CLAIMS 14-12-2012.pdf 2012-12-14
31 10447-CHENP-2012-Form 3-151015.pdf 2016-03-18
32 10447-CHENP-2012 CLAIMS SIGNATURE LAST PAGE 14-12-2012.pdf 2012-12-14
32 10447-CHENP-2012-Correspondence-151015.pdf 2016-03-18
33 10447-CHENP-2012 CORRESPONDENCE OTHERS 14-12-2012.pdf 2012-12-14
33 Form 3 [02-06-2016(online)].pdf 2016-06-02
34 10447-CHENP-2012 DESCRIPTION (COMPLETE) 14-12-2012.pdf 2012-12-14
34 10447-CHENP-2012-Form 3-290216.pdf 2016-07-04
35 10447-CHENP-2012 DRAWINGS 14-12-2012.pdf 2012-12-14
35 10447-CHENP-2012-Correspondence-F3-290216.pdf 2016-07-04
36 Form 3 [23-11-2016(online)].pdf 2016-11-23
36 10447-CHENP-2012 FORM-1 14-12-2012.pdf 2012-12-14
37 Form 3 [24-11-2016(online)].pdf 2016-11-24
37 10447-CHENP-2012 FORM-18 14-12-2012.pdf 2012-12-14
38 10447-CHENP-2012-FORM 3 [12-08-2017(online)].pdf 2017-08-12
38 10447-CHENP-2012 FORM-2 FIRST PAGE 14-12-2012.pdf 2012-12-14
39 10447-CHENP-2012-FORM 3 [05-01-2018(online)].pdf 2018-01-05
39 10447-CHENP-2012 FORM-3 14-12-2012.pdf 2012-12-14
40 10447-CHENP-2012-FER.pdf 2018-10-18
40 10447-CHENP-2012 FORM-5 14-12-2012.pdf 2012-12-14
41 10447-CHENP-2012-AbandonedLetter.pdf 2019-04-23
41 10447-CHENP-2012 POWER OF ATTORNEY 14-12-2012.pdf 2012-12-14

Search Strategy

1 10447chenp2012searchstd_15-10-2018.pdf