![]() system and method for point-to-point authorization through non-access extract procedures
专利摘要:
SYSTEM AND METHOD FOR POINT-TO-POINT AUTHORIZATION THROUGH STRATUM NON-ACCESS PROCEDURES.A point-to-point (P2P) authorization by a mobile entity of a wireless communication system may include receiving a message to accept P2P authorization from a management entity through a non-access layer (NAS), receiving a request of a P2P Radio Resource Control (RRC) configuration message from a network entity, and send a complete RRC P2P configuration message to the network entity through an access layer. The management entity that receives a P2P authorization request message from a mobile entity can perform a P2P authorization check based on the received P2P authorization request message and, if the entity is authorized, send a message to accept P2P authorization to the mobile entity through the NAS. Alternatively, a P2P authorization by a mobile entity may include sending a registration message that includes a P2P authorization request to a core network, and receiving from the core network a message to accept registration that includes an initial context establishment request and a response of P2P authorization. 公开号:BR112013017579A2 申请号:R112013017579-6 申请日:2012-01-11 公开日:2021-05-18 发明作者:Miguel Griot;Gavin Bernard Horn;Sai Yiu Duncan Ho 申请人:Qualcomm Incorporated; IPC主号:
专利说明:
“SYSTEM AND METHOD FOR POINT-TO-POINT AUTHORIZATION THROUGH STRATUM NON-ACCESS PROCEDURES”. This application claims priority, in accordance with 35 U.S.C. S$119(e), for the provisional U.S. Serial No. 61/431 765, filed January 11, 2011, which is incorporated herein by reference in its entirety. Field of the Invention The present application relates generally to wireless communications and more specifically to the authorization of wireless apparatus for point-to-point communication. Description of the Prior Art The Long Term Evolution (LTE) of the 3rd Generation Partnerships Project (3GP) represents a major advance in cellular technology and is the next step forward in 3G cellular services as a natural evolution of the Global System for Mobile communications ( GSM) and the Universal Mobile Telecommunications System (UMTS). The physical layer (PHY) LTE is a highly efficient means of transmitting both data and control information between an evolved NodeB (eNB) and mobile entities such as, for example, access terminals (ATs) or user equipment (UE) . PHY LTE employs some advanced technologies that are new to mobile applications. They include Orthogonal Frequency Division Multiplexing (OFDM) and Multiple Input and Multiple Output (MIMO) data transmission. In addition, PHY LTE uses Orthogonal Frequency Division Multiple Access (OFDMA) on the downlink (DL) and Single Carrier Frequency Division Multiple Access (SC-FDMA) on the uplink (UL). OFDMA allows data to be directed to or from multiple users on a sub-carrier by sub-carrier basis for a specified number of symbol periods. Examples of older wireless communication systems widely deployed to provide various types of communication content, such as voice and data, include Code Division Multiple Access (CDMA) systems, including CDMAZ000, Broadband CDMA, Global System for Mobile communications (GSM) and Universal Mobile Telecommunications System (UMTS). These wireless communication systems and LTE systems generally use different radio access technologies (RATs) and communication protocols, operate in different frequency bands, provide different Quality of Service (Q0S) and offer different types of service and applications to users of the systems. In a direct wireless connection, a first mobile entity transmits a wireless signal directly to a second mobile entity, which receives and processes the wireless signal. Examples of direct wireless connections include connections from a mobile entity to NOSB on LTE or other wireless communication protocols, Or point-to-point (P2P) connections between mobile entities as used in non-cellular protocols such as WiFi Direct or Bluetooth. Wireless cellular communication systems typically do not include direct connections between mobile entities. Instead, mobile entities typically communicate indirectly with each other through one or more NODES and associated network infrastructure. In this context, there is a need to effectively manage the authorization of mobile entities for P2P communication. Summary of the Invention In a cellular wireless communication system, it may be desirable to implement P2P communications within a system that also uses cellular communication between base stations (e.g., NodesBs) and mobile entities. As used herein, "P2P" refers to communication or signaling between peer mobile entities, in contrast to "cellular", which refers to wireless communications between mobile entities and base stations. P2P, as used herein, excludes communications between peer base stations or other peer nodes of the wireless communication system. P2P communications, as defined above, may sometimes be referred to as device-to-device, abbreviated as “D2D”. Mobile entities as a group are distinguished from base stations and can be distinguished from base stations by various factors known in the art; for example, a base station typically includes a return transport channel connection to the core network and support for related interface components, while mobile entities lack such components and are generally portable. In other respects, mobile entities may include components also found in base stations, for example, processor, memory AND transceiver components. When a wireless communication system that supports both cellular and P2P communications in one or more overlapping areas, issues related to interference between cellular and P2P wireless signaling in an area can arise. Several control methodologies can be used to coordinate P2P and cellular signaling in an area in order to minimize interference between these communication nodes. One aspect of such control methodologies may include authorizing a mobile entity to initiate a communication session in which the mobile entity operates in a P2P mode with another mobile entity. Such authorization may be referred to here as P2P authorization. It should be understood that, unless authorized to operate in P2P mode, the mobile entity may generally operate in a cellular mode. P2P authorization can be performed by one or more entities of a wireless communication system, in cooperation with other entities of the system. In one aspect, the first method for point-to-point (P2P) authorization by a mobile entity may include receiving a message to accept P2P authorization from a management entity through a non-access layer (NAS). "First method", "second method", etc., are used merely as convenient labels to refer to different methods for P2P authorization and do not describe or suggest any temporal order, order of preference or priority or other relationship between the various methods. The first method may also include receiving, by the mobile entity, a P2P Radio Resource Control (RRC) configuration request from a network entity. The first method may also include sending, from the mobile entity, a complete P2P RRC configuration message to the network entity via an access layer. Under an aspect of the first method, the mobile entity may be, or may include, a user equipment (UE), the management entity may comprise a mobile management entity (MME) and the network entity may comprise an evolved NODE ( eNB). In a related aspect, the first method may include sending, by the mobile entity, to the managing entity via the NAS a P2P authorization request message. The first method may also include the transmission, by the mobile entity, of a complete P2P authorization message to the management entity via the NAS. In one aspect, the P2P entitlement comprises an entitlement to discovery; that is, the mobile entity may be authorized by it to discover another peer mobile entity for prospective P2P communications. In another aspect, P2P authorization may include an authorization for direct communication. That is, P2P authorization can authorize P2P communication between 2 mobile entities and another peer device. In an aspect of the first method, receiving the message to accept P2P authorization may include receiving, by the mobile entity, an active default Evolved Packet System (EPS) bearer context message. In such a case, the first method may also include transmission, by the mobile entity to the managing entity via the NAS, of a message to accept active default EPS carrier context from the mobile entity via the NAS. Under another aspect of the first method, receiving the message to accept P2P authorization may include receiving an active dedicated EPS carrier context message. In such a case, the first method may also include transmitting to the management entity via the NAS an active dedicated EPS carrier context message. A second method can be related to a P2P authorization by a management entity. The second method may include the receipt, by the management entity, of a P2P authorization request message from a mobile entity through the NAS. The second method may also include performing, by the management entity, at least one P2P authorization check of the mobile entity based, at least in part, on the received P2P authorization request message. The second method may also include, in response to at least one verification being successful, sending, by the management entity, from a message to accept P2P authorization to a mobile entity through the NAS. Under an aspect of the second method, the mobile entity may comprise a UE and the managing entity may comprise an MME. In another aspect of the second method, performing at least one verification may include determining whether the specific ID or specific prefix associated with the mobile entity associates a signature of the mobile entity. Alternatively, or in addition, performing at least one verification may include determining that the specific ID or specific prefix associated with the mobile entity is unexpired. as in the first method, the P2P authorization in the second —“method can include an authorization to discover. Alternatively, or in addition, the P2P authorization may include an authorization for direct communication. Under an aspect of the second method, receiving the P2P authorization request message may include the receipt, by the management entity, of a Packet Data Network (PDN) connectivity request message. In addition, sending a message to accept P2P authorization may include sending, by the management entity, an active default EPS carrier context message. The second method may also include oThe receipt, by the managing entity, from the mobile entity through the NAS, of a message to accept active default EPS carrier context from the mobile entity through the NAS. Under an aspect of the second method, receiving the P2P authorization request message may include receiving a bearer resource allocation request message at the management entity. Furthermore, sending the message to accept P2P authorization may include sending from the management entity an active dedicated EPS carrier context message. In another aspect, the second method may include receiving, by the management entity, a message to accept from active dedicated EPS carrier context through the NAS. A third method for P2P authorization by a mobile entity may include sending to a core network, by the mobile entity, a registration message, the registration message comprising a P2P authorization request. The third method may also include receiving, by the mobile entity, the message to accept registration from the core network, the message to accept registration comprising an initial context establishment request and a P2P authorization response. In an aspect of the third method, sending the network registration message by the mobile entity may include sending the registration message to a network entity, the network entity forwarding the registration message to the core network. The network entity may include an eNB, In another aspect of the third method, the P2P authorization response may include a message to accept P2P authorization, in response to a P2P authorization check from the mobile entity succeeding in the core network. In another aspect of the third method, sending the registration message may include sending an attached request message. In addition, receiving the message to accept registration may include receiving a message to accept attachment. In another aspect of the third method, sending the log message may include sending a tracking area update request (TAU) message. In addition, receiving the message to accept registration may include receiving a message to accept TAU. Under another aspect of the third method, the P2P authorization can include a general P2P authorization, and the mobile authority can be, or can include, a UE. In this regard, the third method may also include sending the registration message to the core network MME. A fourth method for P2P authorization can be performed by the managing entity of a core network. The fourth method may include receiving, by the management entity, a registration message from a mobile entity, the registration message comprising a P2P authorization request. The fourth method may also include performing, by the management entity, at least one identification verification of the mobile entity. The fourth method may also include, in response to at least one identification check being successful, sending a message to accept registration to the mobile entity, the message to accept registration comprising an initial context establishment request and a P2P authorization response. Under an aspect of the fourth method, the management entity may receive the registration message from a network entity in operational communication with the mobile entity. The network entity can be, or can include, an eNB. Under another aspect of the fourth method, the P2P authorization response may be a message to accept P2P authorization, issued in response to a P2P authorization check from the mobile entity being successful in the core network. Under one aspect of the fourth method, receiving the registration message may include receiving an attached request message. In addition, sending the message to accept registration may include sending a message to accept attachments. As an alternative aspect, receiving the registration message may include receiving a request message from TAU, and sending the message to accept registration may include sending a message to accept TAU. Under another aspect of the fourth method, the P2P authorization can include a general P2P authorization and the management entity can be, or can include, a mobile management entity (MME). In such a case, the MME can receive the registration message from a user equipment (UE). Under related aspects, a wireless communication apparatus can be provided to perform any of the methods and aspects of the methods summarized above. An apparatus may include, for example, a processor coupled to memory, wherein the memory holds instructions for execution by the processor to cause the apparatus to perform the operations described above. Certain aspects of such apparatus (eg hardware aspects) can be exemplified by shore equipment such as mobile entities, management entities or base stations of various types used in wireless communications. Similarly, an article of manufacture may be provided which includes a non-transient computer readable storage medium holding encoded instructions which, when executed by a processor, cause a wireless communication apparatus to perform the methods and aspects of the methods. summarized above. Other aspects, modalities and details concerning methods and an apparatus for authorizing P2P communications in the context of cellular wireless communication systems are described in the detailed description that follows. Brief Description of the Figures The characteristics, nature and advantages of the present description will become more evident from the detailed description set out below when taken in conjunction with the figures described below. In all figures and in the detailed description, the same references are used to identify the same elements that appear in one or more of the figures. Figure 1 - illustrates a multiple access wireless communication system. Figure 2 - illustrates a block diagram of a communication system. Figure 3 - illustrates a cellular wireless communication system configured to support multiple users. Figure 4 - illustrates mobile entities in communication through a radio access network and through direct wireless connections. Figure 5 is a call flow diagram for an improved wireless network modality for P2P authorization based on new ESM procedures. Figure 6 is a call flow diagram for an improved wireless network modality for authorization PS2 for discovery based on existing ESM procedures. Figure 7 is a call flow diagram for a wireless network modality enhanced for P2P authorization for direct communication based on existing EPS procedures. Figure 8 is a call stream diagram for a wireless network modality enhanced for general P2P authorization based on an attached EMM procedure. Figure 9 - illustrates an exemplary methodology for P2P authorization based on ESM procedures, performed in a mobile entity. Figure 10 - shows other aspects of the methodology in Figure 9. Figure 11 - illustrates an exemplary methodology for P2P authorization based on ESM procedures, performed in a management entity. Figure 12 - shows other aspects of the methodology in Figure 11. Figure 13 - illustrates an exemplary mobile device for P2P authorization based on ESM procedures, in accordance with the methodologies in Figures 9-10. Figure 14 - illustrates an exemplary management apparatus for P2P authorization based on ESM procedures, in accordance with the methodologies in Figures 11-12. Figure 15 - illustrates an exemplary methodology for P2P authorization based on EMM procedures, performed in a mobile entity. Figure 16 - shows other aspects of the methodology in Figure 15. Figure 17 - illustrates an exemplary methodology for P2P authorization based on EMM procedures, performed in a management entity. Figure 18 - shows other aspects of the methodology in Figure 17. Figure 19 - illustrates an exemplary mobile device for P2P authorization based on EMM procedures, in accordance with the methodologies of Figures 15-16. Figure 20 - illustrates an exemplary management apparatus for P2P authorization based on EMM procedures, in accordance with the methodologies in Figures 17-18. Detailed Description of the Invention Several embodiments are now described with reference to the figures, in which the same reference numerals are used to refer to the same elements throughout. In the following description, for the purpose of explanation, numerous specific details are set up in order to obtain a complete understanding of one or more aspects. It may be evident, however, that such modality(s) can be put into practice without these specific details. In other cases, well-known structures and apparatus are shown in block diagram form in order to facilitate the description of one or more modalities. The techniques described herein can be used in various wireless communication networks, such as Code Division Multiple Access (CDMA) networks, Time Division Multiple Access (TDMA) networks, Frequency Division Multiple Access networks ( FDMA), Orthogonal FDMA networks (OFDMA), Single Carrier FDMA networks, etc. The terms “networks” and “systems” are often used interchangeably. A CDMA network can implement a radio technology such as Universal Terrestrial Radio Access (UTRAj, CDMAZ000 or other radio technologies. UTRA includes Wideband CDMA (W-CDMA) and Low Chip Rate (LCR) The CDMA2000 covers 1S-2000, I1IS-95 and I1IS-856 standards A TDMA network can implement a radio technology such as Global System for Mobile Communications (GSM) An OFDMA network can implement a radio technology such as Evolved UTRA (E-UTRA), TEEE 802.11, IEEE 802.16, IEEE 802.20, Flash-OFDMO, etc. UTRA, E-UTRA and GSM are part of the Universal Mobile Telecommunications System (UMTS). Long Term Evolution (LTE) is a version of UMTS that uses E-UTRA UTRA, E-UTRA, GSM, UMTS and LTE are described in documents from an organization called the “3rd Generation Partnership Project” ” (3GPP). The CDMAZ2000 is described in documents from an organization called “3rd Generation Partnership Project 2” (3GPP2). audio and patterns can represent cellular wireless technologies that are known in the art. For the sake of brevity and clarity, terminology associated with the W-CDMA and LTE standards, promulgated in accordance with the 3GPP standards by the International Telecommunications Union (ITU) is used. It should be emphasized that the technologies described here are applicable to other technologies, such as the technologies and standards mentioned above. Single Carrier Frequency Division Multiple Access (SC-FDMA), which uses single carrier modulation and frequency domain equalization, has similar performance and essentially the same overall complexity as OFDMA systems. An SC-FDMA signal has a lower peak-to-average power ratio (PAPR) because of its inherent single-carrier structure. SC-FDMA has attracted a great deal of attention, especially in uplink communications, where a lower PAPR considerably benefits the mobile terminal in terms of transmission power efficiency. SC-FDMA is used in uplink multiple access in LTE 3GPP or evolved UTRA. Referring to Figure 1, a multiple access wireless communication system according to an embodiment is illustrated. An access point 100 (e.g., base station, evolved NOB (eNB) or the like) includes multiple antenna groups, one including 104 and 106, another including 108 and 110, and an additional group including 112 and 114. two antennas are shown for each antenna group, however more or less antennas can be used for each antenna group. A mobile entity 116 is in communication with antennas 112 and 114, where antennas 112 and 114 transmit information to mobile entity 116 over a forward link 120 and receive information from mobile entity 116 over a reverse link 118. A mobile entity 122 is in communication with antennas 104 and 106, where antennas 104 and 106 transmit information to the mobile entity 122 over a forward link 126 and receive information from the mobile entity 122 over a reverse link 124. In a Frequency Division Dual (FDD) system, the communication links 118, 120, 124 and 126 may use different frequencies for communication. For example, forward link 120 may use a different frequency than that used by reverse link 118. Each group of antennas and/or the area in which they are designed to communicate is often referred to as an access point sector. In certain embodiments, the antenna groups are each designed to communicate with mobile entities in a sector of the areas covered by access point 100. In communication over the forward links 120 and 126, the transmit antennas of the access point 100 can use beamforming to improve the signal-to-noise ratio of the forward links to the different mobile entities 116 and 122. In addition, an access point that uses beamforming to transmit to randomly dispersed mobile entities across its coverage causes less interference from mobile entities in neighboring cells than an access point transmitting through a single antenna to all of its mobile entities. An access point can be a fixed station used to communicate with the terminals and can also be referred to as an access point, a NODE, an eNodeB or some other terminology. A mobile entity may also be referred to as an access terminal (AT), a user equipment (UE), a mobile station, a wireless communication device, terminal or the like. Figure 2 is a block diagram of one embodiment of a transmitter system 210 (also known as an access point) and a receiver system 250 (also known as a mobile entity) in a MIMO system 200. The transmitter system 210 and the receiver system 250 may include other components that are not shown in Figure 2. For example, transmitter system 210 may include a wired and/or wireless interface for a return transport channel connection, while receiver system 250 may be devoid of any return transport carnal interface and may be configured for portability, for example, by the inclusion of a portable battery system, a battery charging system and energy conservation components. In contrast, transmitter system 210 may be devoid of a portable battery system or related components and may be configured to connect to an external power source. Under such an interpretation, system 200 can be understood as illustrating a cellular communications configuration that includes a base station 210 and a mobile entity 250. It should also be appreciated that System 200 can also be interpreted as peer mobile entities depicted in a configuration. P2P, with transmitter system 210 being a first even mobile entity and receiving system 250 being a second even mobile entity. Figure 2 can therefore be interpreted as depicting a cellular or P2P configuration and is not incompatible with a P2P-cellular dual configuration. In transmitter system 210, traffic data for a number of data streams is provided from a data source 212 to a transmission data processor (TX) 214. In one embodiment, each data stream is transmitted through a respective transmit antenna. Data processor TX 214 formats, encodes and interleaves the traffic data stream for each data stream based on the particular encoding scheme selected for that data stream to provide encoded data. The encoded data for each data stream can be multiplexed with pilot data using OFDM techniques. Pilot data typically constitutes a known data pattern that is processed in a known manner and can be used in the receiving system to estimate the channel response. The multiplexed coded and pilot data for each data stream is then modified (eg, mapped symbols) based on a particular modulation scheme (eg, Binary Phase Shift Switching (BPSK), Phase Shift Switching by Quadrature (QOPSK), M-ary Phase Shift Keying (M-PSK) or Multi-Level Quadrature Amplitude Modulation (M-OAM)) selected for this data stream to provide modulation symbols. The data rate, encoding, and modulation for each data stream can be determined by instructions carried out by a processor 230, which can be in operative communication with a memory 232. The modulation symbols for the data streams can then be provided to a MIMO TX 220 processor, which can also process the modulation symbols (e.g. for OFDM). The MIMO processor TX 220 then provides Nf modulation symbol streams at Nf transmitters (TMTRs) 222a to 222t. In certain modes, the processor MIMO TX 220 applies beamforming weights to the symbols in the data streams and to the antenna from which the symbol is being transmitted. Each transmitter 222 receives and processes a respective stream of symbols to provide one or more analog signals and also conditions (e.g., amplifies, filters, and upconverts) the analog signals to provide a modulated signal suitable for transmission over the MIMO channel. No-modulated signals from transmitters 222a to 222t are transmitted from N antennas 224a to 1324t, respectively. In receiver system 250, the transmitted modulated signals are received by Nx antennas 252a to 252r, & The signal received from each antenna 252 is provided to a respective receiver (RCVR) 254a to 254r. Each receiver 254 conditions (eg, filters, amplifies, and downconverts) a respective received signal, digitizes the conditioned signal to provide samples, and also processes the samples to provide a corresponding "received" symbol stream. An RX data processor 260 then receives and processes the Nx symbol streams received from the Ns receivers 254 based on a particular receiver processing technique to provide Nf "detected" symbol streams. The RX data processor 260 then demodulates, deinterleaves and decodes each detected symbol stream to retrieve the traffic data for the data stream. The processing by the RX 260 data processor is complementary to that performed by the MIMO TX 220 processor and by the TX 2i4 data processor in the transmitting system 210. A processor 270 periodically determines which precoding matrix to use. Processor 270 formulates a reverse link message comprising a matrix index portion and a rank value portion and may be in operative communication with a memory 272. Processor 270 may be operatively coupled to memory 272. Memory 272 may retain instructions and/or program data which, when executed by processor 270, cause receiver 250 to perform one or more of the P2P authorization technologies described in more detail later in the report for performance by a mobile entity. The reverse link message may comprise different types of information relating to the communication link and/or the received data stream. The reverse link message is then processed by a TX data processor 238, which also receives traffic data for a number of data streams from a data source 236, modulated by a modulator 280, conditioned by transmitters 254a to 254r, and transmitted back to the transmitter system 210. At transmitter system 210, modulated signals from receiver system 250 are received by antennas 224, conditioned by receivers 222, demodulated by demodulator 240, and processed by RX data processor 242 to extract the reverse link message transmitted by receiver system 250. Processor 230 then determines which precoding matrix to use to determine the beamforming weights, then processes the extracted message. Processor 230 may be operatively coupled to memory 232. Memory 232 may hold instructions and/or program data which, when executed by processor 230, cause transmitter 210 to perform the operations of a network entity, e.g., a base station, as described in more detail later in the report. Alternatively, if system 200 is interpreted as portraying a P2P configuration between peer mobile entities, memory 232 may hold instructions and/or program data which, when executed by processor 230, cause transmitter 210 to perform one or more of P2P authorization to be performed by a mobile entity, as described in more detail later in the report. Figure 3 shows a wireless communication system 300, configured to support a number of users, in which the present teachings can be implemented. System 300 provides communication for multiple cells 302, such as, for example, macro cells 3022-3029, with each cell being serviced by a corresponding access node 304 (e.g., access nodes 304a-3049). As shown in Figure 3, mobile entities 306 (for example, mobile entities 3062-3061) can be dispersed at various locations throughout the system over time. Each mobile entity 306 may communicate with one or more access nodes 304 on a forward link ("EL") and/or a reverse link ("RL") at a given time, depending on whether the mobile entity 306 is and if it is in soft handoff (if applicable), for example. Wireless communication system 300 can provide service over a large geographic region. For example, the 302a-302g macrocells can cover a few blocks in an urban or suburban neighborhood or a few square miles in a rural setting. Each of the access nodes 304a-304g may include a return transport channel interface for connecting to a core network (not shown). The core network may include a number of network entities to control the operation of system 300 and interoperations with other networks, for example, the core network may include an MME, which may be configured as a computer server which includes configured processing modules for mobility management functions. In one respect, these functions can include P2P authorization methodologies, as revealed in more detail later in the report. In accordance with the subject aspects of this description, a wireless network (eg a 3GPP network) is provided which has a feature to utilize a spectrum provider (eg an LTE network provider) for point-to-point communication. point (P2P) and, more particularly, to manage the spectrum in order to enable or improve the concurrent use of P2P and cellular within a common area. In this context, P2P communication is a direct communication between two or more mobile entities without the need to transport the data communicated through an access node or core network node. As noted above, in a cellular system, P2P communication can supplement, but not entirely replace, the cellular mode of communication most commonly used between mobile entities and base stations for voice and data communication. Figure 4 shows an embodiment of a communication system 400 comprising mobile entities 406, 408, 410 in communication via eNBs 402, 404 of a radio access network (RAN) and via direct wireless connections. The pictured example illustrates even discovery for (1) UEs 408, 410 camped in a cell in the same eNB 404 and (2) UEsS 406, 410 camped in cells for respective different eNBs 402, 404. Peer discovery is a procedure by which UEsS detect the availability of other services advertised on UEs within a radio frequency (RF) proximity and may generally involve peer announcements by mobile entities and peer detection by mobile entities of services advertised by peer mobile entities. Peer mobile entities can perform detection, whereby authorized mobile entities can receive information in order to be able to perform detection (eg security keys or the like). Furthermore, peer mobile entities can perform announcement, in which authorized mobile entities can receive information in order to be able to announce a discovery identifier (for example, security keys). Each mobile entity refrains from announcing a discovery identifier for which it has not been authorized. In addition, peer mobile entities can perform direct communication, in which each mobile entity refrains from establishing direct communication with an advertisement for a discovery identifier for which it was not authorized. The core network may control authorization for P2P operations, including, for example, peer detection, peer announcement and P2P communication, using one or more mobile entities, for example, an MME, A network or spectrum provider may authorize a mobile entity to use the network spectrum to carry out the P2P communication procedures described above. The mobile entity may not be provisioned with P2P parameters and may be expected to request authorization for each procedure or set of procedures. For example, the mobile entity can request authorization for detection, detection and advertisement and/or direct communication. Authorization based on the techniques described here can be: (a) by tracking area for tracking area update (TAU) procedures; (b) while attached for attached procedures; and/or (c) based on the lifetime of carriers reserved for Evolved Packet System (EPS) session management (ESM) procedures. In accordance with one or more aspects of the modalities described herein, techniques are provided for P2Z2P authorization using stratum no-access (NAS) procedures. As known in the art, an access layer refers to a functional layer in a telecommunications stack (eg UMTS or LTE) between the radio network and the UE used for radio access and communication. A non-access stratum similarly refers to a functional layer in a telecommunications stack (eg UMTS or LTE) between the core network and the UE used for control functions, eg mobility management, call control , session management Or identity management. Accordingly, a NAS procedure refers to a procedure that uses the NAS. For P2P authorization using NAS procedures, two general types of technique can be used. The first type of technique can include ESM procedures, including P2P authorization based on new ESM procedures and P2P authorization based on existing ESM procedures. The second type of technique can include P2P authorization based on P2P EPS Mobility Management (EMM) procedures. In related aspects, P2P subscription data for a given mobile entity can be delivered to a management entity, such as, for example, an MME, by a native subscriber server (HSS) or the like using a procedure of the type insertion of subscriber data. Regarding first P2P authorization based on new ESM procedures, this procedure can be used to request authorization to announce each discovery identifier or to establish each direct peer communication from a management entity (eg MME). This P2P authorization procedure can also be applied to a single general authorization for P2P service. Referring to Figure 5, in one embodiment, a system 500 may comprise at least one mobile entity (e.g., a UE 502), at least one network entity (e.g., an eNB 504), and at least one management entity. (eg an MME 506,) from a core network. As shown, the UE 502 can optionally send a P2P authorization request message 510 to the MME 506 via the NAS at time t'. The P2P authorization message can be, or can include, one or more identifiers or other data signals that are recognizable by the network entity as a request to perform one or more P2P operations. At t, if the UE 502 requests authorization for a specific discovery identifier, the MME 506 can verify that the discovery identifier is contained in a signature of the UE 502 and/or verify that the discovery identifier is not expired. If the discovery identifier is not present or expired, the MME 506 may send a corresponding NAS reject message to the UE 502 with a corresponding cause value (e.g., not authorized for this discovery identifier). If all checks are successful, the MME 506 can send a message to accept P2P authorization 512 to the UE 502 (via the NAS) and/or the eNB 504 (via the access layer). The message to accept P2P authorization can be, or can include, one or more identifiers or other data signals that are recognizable by the mobile entity as an authorization to carry out one or more operations. P2P. At t;3, the eNB 504 may send a P2P Radio Resource Control (RRC) Configuration Request 514 to UE 502. The P2P RRC Configuration Request 514 may be piggybacked the message to accept authorization 512. In ts, the UE 502 may send a complete RRC configuration message 516 to the eNB 504. At ts, the UE 502 may optionally send a complete P2P authorization message 518 to the MME 506 via the NAS. The new ESM procedure described above can be initiated by the network and accepted by the UE 502. The UE 502 can trigger the ESM procedure by sending a specific ESM message with a certain procedure transaction ID (PTI) or the like. The behavior of the UE 502 and the network for timer expirations, retransmissions and/or other abnormal scenarios can be handled in a way that is similar to existing ESM procedures. In related aspects, the UE 502 may initiate a P2P modification request, such as, for example, to add/replace advertisement or connection establishment of new/existing discovery identifiers, or to modify parameters such as quality of service (QoS) . In other related aspects, the MME 506 may initiate a request to disable P2P, which may be initiated, for example, by changing the signature data in the HSS or the like. With respect to P2P authorization based on existing ESM procedures, this procedure may use a Packet Data Network (PDN) connectivity request and EPS bearer context messages (for example, by activating a context request from default EPS carrier, by modifying an EPS carrier context request, etc.). This P2P authorization procedure can be used to request authorization to announce each discovery identifier or to establish each direct peer communication from an MME or similar, and can also apply to a single general authorization for P2P service. It is observed that P2P authorization based on existing ESM procedures may result in core network resources being reserved for P2P service due to activation of the corresponding carriers. In related aspects, a P2P authorization for discovery is provided which involves the use of existing ESM procedures. Referring to Figure 6, in one embodiment, system 600 may comprise at least one mobile entity (e.g., a UE 602), at least one network entity (e.g., an eNB 604), and at least one management entity. (eg MME 606). The call flow shown in Figure 6 is substantially similar to the call flow shown in Figure 5 for The new ESM procedure. As shown in Figure 6, UE 602 can optionally send a connectivity request message from PDN 610 to MME 606 via the NAS at time t1. At t, if the P2P authorization checks are successful, the MME 606 can send a default active EPS 612 carrier context message to the UE 602 (via the NAS) and/or the eNB 604 (via the access layer) . At t;, the eNB 604 may send a P2P Radio Resource Control (RRC) configuration request 614 to the UE 602. The P2P configuration request of RRC 614 may be carried in the active default EPS carrier context message 612. In ta. The UE 602 may send a complete RRC configuration message 616 to the eNB 604. In ts, the UE 602 may optionally send a message to accept default active EPS carrier context 618 to the MME 606 via the NAS. PDN connectivity request reuse can be advantageous in situations where the UE 602 is trying to request connectivity to a particular PDN Gateway (P-GW) for P2P services. Unnecessary overhead can result if specific parameters, such as, for example, EPS Carrier ID, Access Point Name (APN), P-GW address, or EPS QoS, are not requested. In other related aspects, a P2P authorization for direct communication involving the use of existing ESM procedures is provided. Referring to Figure 7, in one embodiment, system 700 may comprise at least one mobile entity! (e.g., a UE 702), at least one network entity (e.g., an eNB 704), and at least one management entity (e.g., the MME 706). The call flow shown in Figure 7 is substantially similar to the call flows shown in Figures 5 and 6. As shown in Figure 7, the UE 702 may optionally send a bearer resource allocation request message 710 to the MME 76 via the NAS at time t,. At t, if the P2P authorization checks are successful, the MME 706 can send an active dedicated EPS carrier context message 712 to the UE 702 (via the NAS) and/or the eNB 704 (via the access layer) . At t;, the eNB 704 may send a P2P Radio Resource Control (RRC) configuration request 714 to the UE 702. The RRC 714 P2P configuration request may be carried in the active dedicated EPS carrier context message 712. At ts, UE 702 may send a complete RRC configuration message 716 to eNB 704. At ts, UE 702 may optionally send a message to accept active dedicated EPS carrier context 718 to MME 706 through the NAS. P2P authorization for direct communication can be linked to the activation of a dedicated carrier with its corresponding QoS, which can be useful for session mobility between a link and direct P2P communication through an Extended Area Network (WAN). Alternatively, or in addition, the announcement of additional discovery identifiers may be linked to the use of dedicated carriers. With respect now to P2P authorization based on existing EMM procedures, P2P authorization can be carried in attachment and/or in TAU procedures, which may involve the addition of new information elements (TES) with P2P specific information. The implementation of EMM procedures can mainly be used for a single general authorization for P2P service. Referring to Figure 8, a call flow for a general P2P authorization is provided based on an attached procedure. In one embodiment, a system 800 may comprise at least one mobile entity (e.g., a UE 802), at least one network entity (eg an eNB 804), a first management entity (eg a new MME 806), a second management entity (eg an old MME/SGSN (GPRS (radio) service support node) general packet service))) 808, a first core network entity (eg an Equipment Identity Register (EIR) 810) and a second core network entity (eg an HSS 812,) in operative communication a with the other. aspects involving identifier verification, authentication and authorization are a part of the normal attached procedure; thus, Figure 8 shows the aspects related to the registry. In ti, the UE 802 can include a P2P authorization request (e.g., P2P authorization request or discovery IE) in a registration message (e.g., append request message 820), such as, by example, for the new MME 806 through “the NAS. Known UE identifier and authentication checks — can be performed up to t;. At t;, the new MME 806 can verify P2P signature data for the UE 802 and can provide a P2P authorization response (e.g., P2P authorization response IE) in a message to accept registration (e.g., the message to accept appends 830) to the UE 802. In related respects, the same or similar IEs can be included in a TAU procedure. For example, the TAU procedure may involve including the P2P authorization request IE in a TAU request message from a UE to an MME, as well as including the P2P authorization response IE in a message to accept TAU from the MME to o EU. In other related aspects, P2P authorization can be for the list of tracking areas included in the message to accept attachments or in the message to accept TAU. In view of the exemplary systems shown and described here, the methodologies that can be implemented according to the subject revealed will be better appreciated with reference to several flowcharts. Although, for the purpose of simplifying the explanation, the methodologies are shown and described as a series of acts/blocks, it should be understood and appreciated that the claimed subject matter is not limited by the number or order of blocks, as some blocks may occur in different orders and/or substantially at the same time with other blocks that is shown and described here. Furthermore, not all blocks illustrated may be required to implement the methodologies described here. It should be understood that functionality associated with blocks may be implemented by software, hardware, a combination of them, or any other suitable mechanism (eg device, system, process or component). In addition, it should be appreciated that the methodologies disclosed throughout this report may be stored in the form of encoded instructions in an article of manufacture, for example, a non-transient computer-readable medium, to facilitate the transport and transfer of such methodologies. for multiple devices. When encoded instructions are executed by a processor, the processor can cause a device that the processor controls to carry out the methodology. Those skilled in the art will understand and appreciate that a methodology can alternatively be represented as a series of interrelated states or events, such as in a state diagram. In accordance with one or more subject matter aspects of this description, methods for P2P authorization based on ESM procedures are provided. Referring to Figure 9, a methodology 900 that may be performed in a wireless communication apparatus such as a mobile entity (e.g., a UE) is illustrated. The elements of the 900 methodology can be shown alternatively to the call flow diagram shown in Figure 5. All operations listed in Figure 9 can be performed by the mobile entity or similar device to engage in F2P communications with another peer device. P2P authorization can be for P2P communications - distinct from cellular communications between the mobile entity and a base station - in a wireless communication system that also makes use of cellular communications between base stations and mobile entities. P2P authorization can operate under a control scheme in which it is necessary for each mobile entity to be required to obtain P2P authorization prior to the commencement of certain P2P operations, including P2P discovery and/or P2P communication. In the absence of P2P authorization, such a control scheme may require the mobile entity to refrain from performing any P2P operations that might interfere with cellular operation, and the mobile entity may therefore be limited to operating in a cellular mode until the P2P authorization is completed. Method 900 may involve, at 910, the mobile entity receiving a message to accept P2P authorization from a management entity (eg, an MME) via a NAS. The message to accept P2P authorization may include one or more data or identifiers that are recognized by the mobile entity as authorizing one or more operations to allow or support a P2P operation. Method 900 may involve, at 920, the mobile entity receiving a P2P RRC configuration request from a network entity (e.g., an eNB). The P2P configuration request may comprise a wireless data signal which the mobile entity recognizes as requesting the mobile entity to configure a P2P operation in a specified manner. Method 900 may involve, at 930, the mobile entity sending a complete RRC P2P configuration message to the network entity via an access layer. The P2P configuration complete message can include data that indicates that a specified P2P configuration is complete. Figure 10 illustrates additional operations or aspects that may be performed in association with or as part of method 900. One or more of the additional operations shown in Figure 10 may optionally be performed by the mobile entity as part of method 900, describe an aspect modifying one of the method elements 900 or a more detailed algorithm to perform one of the elements of method 900. These elements can be performed in any operative order or can be encompassed by a development algorithm without needing a particular chronological performance order. Operations are performed independently and are not mutually exclusive. Therefore, any such operation can be performed regardless of whether another downstream or upstream operation is performed. For example, if method 900 includes at least one of the operations 940-972, then method 900 can terminate after at least one operation, without necessarily having to include any subsequent downstream operations that may be illustrated(s). Referring to Figure 10, method 900 may also involve, at 940, sending by the mobile entity a P2P authorization request message to the managing entity via the NAS. This operation 940 can be performed prior to receiving the message to accept P2P authorization 910, as also shown at 510 in Figure 5. Method 900 may also involve, at 950, the transmission by the mobile entity of a complete P2P authorization message to the management entity through the NAS. This operation 959 can be performed by the mobile entity after sending a complete RRP P2P configuration message to the network entity, as shown in block 930 of Figure 9. In related aspects, and again referring to Figure 10, method 900 for P2P authorization may comprise an authorization to discover on one or more peer devices within a common area of a cellular wireless communication system. For example, receiving the message to accept P2P authorization 910 may involve, at 960, the receipt by the mobile entity of an active default EPS carrier context message. Method 900 may also involve, at 962, transmitting a message to accept active default EPS carrier context to the management entity through the NAS, in response to the active default EPS carrier context message. In other related aspects, P2P authorization can comprise an authorization for direct communication. Receiving the message to accept P2P authorization 910 may involve, at 970, receiving an active dedicated EPS carrier context message. Method 900 may also involve, at 972, transmitting a message to accept active dedicated EPS carrier context to the managing entity through the NAS. In accordance with one or more aspects of the modalities described herein, Figure 11 shows a 1100 P2P authorization methodology based on ESM procedures, where the 1100 methodology can be performed at a management entity such as an MME or similar. Elements of the 900 methodology can be illustrated in an alternative to the call flow diagram shown in Figure 5. All operations listed can be performed by MME or similar apparatus to authorize P2P communications in a cellular communications network. As noted above, FP2P communications between mobile entities are distinct from cellular communications between each mobile entity and a base station. P2P authorization can operate under a control scheme in which each mobile entity is required to obtain P2P authorization prior to the initiation of certain P2P operations, including 'P2P discovery and/or P2P communication. In the absence of P2P authorization, such a control scheme may require the mobile entity to refrain from performing any P2P operations that might interfere with cellular operation, and the mobile entity may therefore be restricted to operating in a cellular mode until P2P authorization is completed. Method 1100 may involve, at 1110, receiving a P2P authorization request message from a mobile entity via a NAS. Method 1100 may involve, at 1120, performing at least one P2P authorization check of the mobile entity based at least in part on the received P2P authorization request message. Method 1100 may involve, at 1130, sending a message to accept P2P authorization to a mobile entity via the NAS, in response to at least one verification being successful. Figure 12 illustrates additional operations or aspects that may be performed in association with or as part of method 1100. One or more of the additional operations shown in Figure 12 may optionally be performed by the management entity as part of method 1100, describe a aspect that modifies one of the elements of method 1100 or a more detailed algorithm to perform one of the elements of method 1100. These elements can be performed in any operative order or can be encompassed by a development algorithm without requiring a particular chronological performance order. Transactions are performed independently and are not mutually exclusive. Therefore, any such operation can be performed regardless of whether Another downflow or upstream operation is performed. For example, if method 1100 includes at least one of the operations 1140-1164, then method 1100 can terminate after at least One Operation, without necessarily having to include any subsequent downstream operations that may be illustrated(s). Referring to Figure 12, performing at least one verification 1120 may involve, at 1140, determining whether the specific ID or specific prefix associated with the mobile entity associates a signature of the mobile-entity. Alternatively, or in addition, performing the at least one check may involve, at 1142, determining whether the specific TD or specific prefix associated with the mobile entity is unexpired. In related aspects, P2P authorization can comprise an authorization for discovery. In such cases, receiving P2P authorization request message 1110 may involve, at 1150, receiving a PDN connectivity request message. Sending the message to accept P2P authorization 1130 may involve, at 1152, sending an active default EPS carrier context message to the mobile entity. Method 1100 may also involve, at 1154, receiving a message to accept default active EPS carrier context from the mobile entity through the NAS, in response to the default active EPS carrier context message. In other related aspects, P2P authorization can comprise an authorization for direct communication. In such cases, receiving the P2P authorization request message may involve, at 1160, receiving a carrier resource allocation request message from the mobile entity. Sending the message to accept P2P authorization may involve, at 1162, sending an active dedicated EPS bearer context message to the mobile entity. Method 1100 may also involve, at 1164, receiving a message to accept active dedicated EPS carrier context from the mobile entity through the NAS, in response to the active dedicated EPS carrier context message. In accordance with one or more aspects of the embodiments described herein, devices and apparatus are provided for P2P authorization based on ESM procedures, as described above with reference to Figures 9-10. Referring to Figure 13, there is provided an exemplary mobile device 1300 that may be configured as a mobile entity in a wireless network, or as a processor or similar device for use within the mobile entity. Apparatus 1300 may include function blocks that may represent functions implemented by a processor, softvare, or combination thereof (eg, firmware). As illustrated, in one embodiment the apparatus 1300 may comprise an electrical component or module 1302 for receiving the message to accept P2P authorization from a management entity through a NAS. Component 1302 can be, or can include, a control processor coupled to a receiver and a memory, wherein the memory holds coded instructions to cause a mobile entity to receive a message to accept P2P authorization from a management entity through of a NAS. Component 1302 can be, or can include, mechanisms for receiving a message to accept P2P authorization from a management entity through a NAS. The mechanisms can be or can include the at least one control processor that operates an algorithm. The algorithm may include receiving data through the NAS and recognizing an indication that a specified P2P authorization request was accepted by the managing entity, based on the data. The algorithm may alternatively or in addition include one or more of the detailed 960-972 operations discussed above. Apparatus 1300 may comprise an electrical component 1304 for receiving a P2P RRC configuration request from a network entity. Component 1304 may be, or may include, a control processor coupled to a receiver and a memory, wherein the memory holds encoded instructions for causing a mobile entity to receive a P2P RRC configuration request from a network entity . Component 1304 may be, or may include, a device for receiving a P2P RRC configuration request from a network entity. The mechanisms can be or can include the at least one control processor operating an algorithm. The algorithm may include receiving data from a base station via an RRC and recognizing an indication that a specified P2P configuration is requested based on the data received via the RRC. Apparatus 1300 may comprise an electrical component 1306 for sending a complete RRC P2P configuration message to the network entity via an access layer. Component 1306 can be, or can include, a control processor coupled to a transmitter and a memory, wherein the memory holds coded instructions for causing a mobile entity to send a complete RRC P2P configuration message to the network entity. through an access stratum. Component 1306 may be, OR may include, mechanisms for sending a complete RRC P2P configuration message to the network entity via an access layer. The mechanisms can be or can include the at least one control processor operating an algorithm. The algorithm may include encoding a response to the RRC P2P configuration request configured as a complete RRC P2P configuration message and transmitting the data to a base station via an access layer. In related aspects, apparatus 1300 may optionally include a processor component 1310 having at least one processor, in the case of apparatus 1300 configured as a mobile entity. In such a case, processor 1310 may be in operative communication with components 1302-1306 through a bus 1312 or similar communication coupling. Processor 1310 can perform the initiation and programming of processes or functions performed by electrical components 1302-1306. In other aspects, apparatus 1300 may include a radio transceiver component 1314. An independent receiver and/or independent transmitter may be used in place of or in conjunction with the transceiver. 1314. Apparatus 1300 may optionally include a component for storing information, such as, for example, a memory device/component 1316. The computer readable medium or memory component 1316 may be operatively coupled to the other components of apparatus 1316 through of bus 1312 or similar. Memory component 1316 may be adapted to store computer readable instructions and data to carry out the processes and behavior of components 1302-1306 and sub-components thereof, or processor 1310 or the methods disclosed herein. Memory component 1316 may hold instructions to perform functions associated with components 1302-1306. Although shown to be external to memory 1316, it is to be understood that components 1302-1306 may exist within memory 1316. In accordance with one or more aspects of the embodiments described herein, devices and apparatus for P2P authorization based on ESM procedures are provided. , as described above with reference to Figures 11-12. With reference to Figure 14, an exemplary management apparatus 1400 is provided which may be configured as a management entity (e.g., an MME) of a core network, or a processor or similar device for use within the management entity. As illustrated, in one embodiment the apparatus 1400 may comprise an electrical component or module 1402 for receiving a P2P authorization request message from a mobile entity via a NAS. Component 1402 can be, or can include, a control processor coupled to a receiver and a memory, in which the memory holds coded instructions for receiving a 15) FP2P authorization request message from a management entity through a NAS . Component 1402 can be, or can include, mechanisms for receiving a P2P authorization request message from a mobile entity through a NAS. The mechanisms can be or can include the at least one control processor operating an algorithm. The algorithm may include receiving data through the NAS, and recognizing an indication of a specified P2P authorization request from a mobile entity, based on the data. The algorithm may alternatively or in addition include one or more of the detailed operations 1150-1162 discussed above. The apparatus 1400 may comprise an electrical component 1404 for performing at least one P2P authorization check of the mobile entity, based on at least part, in the received P2P authorization request message. Component 1404 may be, or may include, a control processor coupled to a memory, wherein the memory holds coded instructions for causing a mobile entity to perform at least one mobile entity P2P authorization check based on at least part, in the received P2P authorization request message. Component 1404 may be, or may include, mechanisms for performing at least one P2P authorization check of the mobile entity based at least in part on the received P2P authorization request message. The mechanisms can be or can include the at least one control processor operating an algorithm. The algorithm can include the more detailed operations 1140 or 1150 discussed above. Additionally, or alternatively, oThe algorithm may include determining the current level of resources available for a contemplated P2P operation and determining an authorization based on the current level of resources available. Apparatus 1400 may comprise an electrical component 1406 for sending a message to accept P2P authorization to a mobile entity via the NAS, in response to at least one verification being successful. Component 1406 may be, or may include, a control processor coupled to a transmitter and a memory, wherein the memory holds encoded instructions for causing a mobile entity to send a message to accept P2P authorization to a mobile entity via the NAS, in response to at least one verification being successful. Component 1306 may be, or may include, mechanisms for sending the message to accept authorization to a mobile entity via the NAS, in response to at least one verification being successful. Mechanisms can be Or can include the at least one control processor operating an algorithm. The algorithm may include determining the result of a P2P authorization check, formatting a message to accept P2P authorization based on the result, and transmitting the message to accept P2P authorization to a mobile entity through a NAS. In related aspects, apparatus 1400 may optionally include a processor component 1410 having at least one processor, in the case of apparatus 1400 configured as a management entity for the core network of a wireless communication system. Processor 1410, in such a case, may be in operative communication with components 1402-146 via a bus 1412 or similar communication coupling. Processor 1410 can initiate and program the processes or functions performed by electrical components 1402-1406. In other related aspects, apparatus 1400 may include a radio transceiver component 1414. An independent receiver and/or an independent transmitter may be used in place of or in conjunction with transceiver 1414. The apparatus 1400 may optionally include a component to store information such as, for example, a memory device/component 1416. The computer readable medium or memory component 1416 may be operatively coupled to the other components of apparatus 1400 via bus 1412 or the like. Memory component 1416 may be adapted to store computer readable instructions and data to carry out the processes and behavior of components 1402-1406 and sub-components thereof, or processor 1410 or the methods disclosed herein. Memory component 1416 may hold instructions to perform functions "associated with components 1402-1406. Although shown to be external to memory 11416, it is to be understood that components 1402-1406 may exist within memory 1416. In accordance with one or more aspects of the subject matter of this description, methods for P2P authorization based on EMM procedures are provided. Referring to Figure 15, a methodology 1500 is illustrated that may be performed in a wireless communication apparatus, such as, for example, a mobile entity. All operations listed may be performed by the mobile entity or similar device, and the P2P authorization “may” take place within the context and may have the meaning explained in connection with the alternative methods set out herein above. Method 1500 may involve, at 1510, sending a registration message to a core network, the registration message comprising a P2Pr authorization request. Method 1500 may involve, at 1520, receiving a message to accept registration from the core network, to the message to accept registration comprising an initial context establishment request and a P2P authorization response. In related aspects, the P2P authorization response may comprise a message to accept P2P authorization, in response to a P2P authorization check from the mobile entity being successful in the core network. Figure 16 illustrates additional operations or aspects that may be performed in association with or as part of method 1500. One or more of the additional operations shown in Figure 16 may optionally be performed by the mobile entity as part of method 1500, or describe a aspect that modifies one of the elements of method 1500 or a more detailed algorithm to realize one of the elements of method 1500. These elements can be performed in any operative order or can be encompassed by a development algorithm without the need for a particular chronological performance order . Operations are performed independently and are not mutually exclusive. Therefore, any such operation can be performed regardless of whether another downstream or upstream operation is performed. For example, if method 1600 includes at least one of operations 1530-1552, then method 1500 can terminate after the at least one operation, without necessarily having to include any subsequent downstream operations that can be illustrated. Referring to Figure 16, sending 1510 may involve, at 1530, sending the registration message to a network entity, the network entity sending the registration message to the core network. In related respects, sending registration message 1510 may involve, in 1540, sending an attached request message. Receiving message to accept record 1520 may involve, in 1542, receiving message to accept attachment. In other related aspects, sending registration message 1510 may involve, at 1550, sending a TAU request message. Receiving the message to accept record 1520 may involve, in 1552, receiving a message to accept TAU. According to one or more aspects of the modalities described here, Figure 17 illustrates a 1700 P2P authorization methodology based on ESM procedures, where the 1700 methodology can be performed at a management entity. All operations listed may be performed by the management entity or similar apparatus, and P2P authorization may take place within the context and have the meaning explained above in connection with the alternative methods set forth herein. Method 1700 may involve, at 1710, receiving a registration message from a mobile entity, the registration message comprising a P2F authorization request. Method 1700 may involve, at 1720, performing at least one identification check of the mobile entity. Method 1700 may involve, at 1730, sending a message to accept registration to the mobile entity, in response to at least one identification check being successful, the message to accept registration comprising an Initial Context Establishment Request and an authorization response P2P. In related aspects, the P2P authorization response may comprise a message to accept P2P authorization, in response to the P2P authorization check of the mobile entity being successful in the core network. Figure 18 illustrates additional operations or aspects that may be performed in association with or as part of method 1700. One or more of the additional operations shown in Figure 18 may optionally be performed by the mobile entity as part of method 1700, or describe a aspect that modifies one of the elements of the 1700 method or a more detailed algorithm to perform one of the elements of the 1700 method. These elements can be performed in any operative order or can be encompassed by a development algorithm without the need for a particular chronological performance order . Operations are performed independently and are not mutually exclusive. Therefore, any such operation can be performed regardless of whether another downstream or upstream operation is performed. For example, if method 1600 includes at least one of the operations 1740-1762, then method 1500 can terminate after the at least one operation, without necessarily having to include any subsequent downstream operations that may be shown(s). Referring to Figure 18, receiving 1710 may involve, at 1740, receiving the registration message from a network entity in operative communication with the mobile entity. In related respects, receiving registration message 1710 may involve, in 1750, receiving an attached request message. In such cases, sending the message to accept record 1730 may involve, in 1732, sending a message to accept attachments. In other related respects, receiving the 1710 registration message may involve, in 1760, receiving a TAU request message. In such cases, sending the message to accept registration 1730 may involve, in 1762, sending a message to accept TAU. In accordance with one or more aspects of the embodiments described herein, devices and apparatus are provided for P2P authorization based on EMM procedures, as described above 15) with reference to Figures 15-16. Referring to Figure 19, there is provided an exemplary mobile device 1900 that may be configured as a mobile entity or as a processor or similar device for use within the mobile entity. Apparatus 1900 may include functional blocks that may represent functions implemented by a processor, software, or combination thereof (eg, firmware). As illustrated, in one embodiment, apparatus 1900 may comprise an electrical component or module 19302 for sending a registration message to a core network, the registration message comprising a P2P authorization request. Component 1902 may be, or may include, a control processor coupled to a receiver and a memory, wherein the memory holds encoded instructions for causing a mobile entity to send a registration message to a core network, to the message. registration comprising a P2P authorization request. Component 1902 may be, or may include, mechanisms for sending a registration message to a core network, the registration message comprising a P2P authorization request. Engines can be or can include the at least one control processor that drives an algorithm. The algorithm may include configuring a registration message as a P2P authorization request and transmitting the registration message to a core network component. The algorithm may alternatively vu further include one or more of the detailed operations 1530, 1540 or 1550 discussed above. Apparatus 1900 may comprise an electrical component 1904 for receiving a message to accept registration from the core network, the message to accept registration comprising an initial context establishment request and a P2P authorization response. Component 1904 may be, or may include, a control processor coupled to a receiver and a memory, wherein the memory holds encoded instructions to cause a mobile entity to receive a message to accept registration from the core network, the message to accept registration comprising an initial context establishment request and a P2P authorization response. Component 1904 may be, or may include, mechanisms for receiving a message to accept registration from the core network, the message to accept registration comprising an initial context establishment request and a P2P authorization response. The mechanisms can be or can include the at least one control processor operating algorithm. The algorithm may include receiving a data signal from a core network component, and recognizing a message to accept P2P record in the data signal which includes at least an initial context establishment request and a P2P authorization response. The algorithm may alternatively or in addition include one or more of the detailed operations 1542 or 1552 discussed above. In related aspects, apparatus 1900 may optionally include a processor component 1910 having at least one processor, "the case of apparatus 1900 configured as a mobile entity. In such a case, Processor 1910 may be in operative communication with components 1902-1904 through a 1912 bus or similar communication coupling. The 1910 processor can initiate and program the processes or functions performed by the 1902-1904 electrical components. In other related aspects, apparatus 1900 may include a radio transceiver 1914 component. An independent receiver and/or a separate transmitter may be used in place of or in conjunction with transceiver 1914. Apparatus 1900 may optionally include a component for storage information, such as, for example, a memory device/component 1916. The computer readable medium or memory component 1916 may be operatively coupled to the other components of apparatus 1900 via bus 1912 or the like. Memory component 1916 may be adapted to store computer readable instructions and data to effect the processes and behavior of components 1902-1904 and sub-components thereof, or processor 1910 or the methods disclosed herein. The 1916 memory component may hold instructions to perform the functions associated with the 1902-1904 components. Although shown to be external to memory 1916, it is to be understood that components 1902-1904 may exist within memory 1916. In accordance with one or more aspects of the embodiments described herein, devices and apparatus for P2P authorization based on EMM procedures are provided. , as described above with reference to Figures 17-18. Referring to Figure 20, an exemplary management apparatus 2000 is provided which may be configured as a management entity, or as a processor or similar device for use within the management entity. In one embodiment, apparatus 2009 may comprise an electrical component or module 2002 for receiving a registration message from a mobile entity, the registration message comprising a P2P authorization request. Component 2002 can be, or can include, a control processor coupled to a receiver and a memory, in which the memory holds coded instructions to cause a management entity to receive a registration message from a mobile entity, the message. registry comprising a P2P authorization request. Component 2002 may be, or may include, mechanisms for receiving a registration message from a mobile entity, the registration message comprising a P2P authorization request. The mechanisms can be or can include the at least one control processor operating an algorithm. The algorithm may include receiving a data signal from a mobile entity, and recognizing a P2P authorization request message in the data signal. The algorithm may alternatively or in addition include one or more of the detailed operations 1740, 1750 or 1760 discussed above. Apparatus 2000 may comprise an electrical component 2004 for performing at least one identification check of the mobile entity. Component 2004 may be, or may include, a control processor coupled to a receiver and a memory, wherein the memory holds coded instructions for causing a management entity to perform at least one identification check of the mobile entity. Component 2004 can be, or can include, mechanisms to perform at least one identification check of the mobile entity. The mechanisms can be or can include the at least one control processor operating an algorithm. The algorithm may include receiving a data signal from a mobile entity, recognizing an identifier for the mobile entity in the data signal, performing a data search to retrieve current authorization data based on the identifier, and returning the result of the identification based in the search for data. Apparatus 2000 may comprise an electrical component 2006 for sending a message to accept registration to the mobile entity, in response to at least one identification verification being successful, the message to accept registration comprising an initial context establishment request and a response of P2P authorization. Component 2006 can be, or can include, a control processor coupled to a receiver and a memory, where the memory holds coded instructions to cause a management entity to send a message to accept registration to the mobile entity in response. the at least one identification check being successful, the message to accept registration comprising an initial context establishment request and a P2P authorization response. Component 2006 may be, or may include, mechanisms for sending a message to accept P2P registration to the mobile entity, in response to the at least one identification check being successful, to the message to accept registration comprising an initial context establishment request and a P2P authorization response. The mechanisms can be or can include the at least one control processor operating an algorithm. The algorithm may include configuring a data signal to indicate a message to accept registration that includes at least an initial context establishment request and an authorization to perform one or more P2P operations. The algorithm may alternatively or in addition include one or more of the detailed operations 1752 or 1762 discussed above. In related aspects, apparatus 2000 may optionally include a processor component 2010 that has at least one processor, in the case of apparatus 2000 configured as a management entity for the core network of a wireless communication system. In such a case, the 2010 processor can be in operative communication with the 2002-2006 components via a 2012 bus or similar communication coupling. The 2010 processor can perform the initiation and programming of processes or functions performed by electrical components 2002-2006. In other related aspects, apparatus 2000 may include a radio transceiver 2020 component. An independent receiver and/or an independent transmitter may be used in place of or in conjunction with transceiver 2020. Apparatus 2000 may optionally include a component for storing information, such as, for example, a memory device/component 2016. The computer readable medium or memory component 2016 can be operably coupled to the other components of the 2000 device via bus 2012 or similar. The memory component 2016 can be adapted to store instructions and computer-readable data to effect the processes and behavior of the components. 2002-2006 and its sub-components, or the 2010 processor, or the methods disclosed herein. The 2016 memory component can hold instructions to perform functions associated with the 2002-2096 components. Although shown to be external to 2016 memory, it should be understood that 2002-2006 components may exist within 2016 memory. It should be understood that the specific order or hierarchy of steps in the disclosed processes is merely an example of approaches to P2P authorization within a cellular wireless communication system. Based on project preferences, it is understood that the specific order or hierarchy of steps in the processes can be reorganized, remaining outside the scope of this description. The accompanying method claims present elements of the various steps in a sample order and are not intended to be limited to the specific order or hierarchy presented. Those skilled in the art would understand that information and signals can be represented using any of a number of different technologies and techniques. For example, data, instructions, commands, information, signals, bits, symbols and chips can be referred to throughout the above description can be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles Or any combination of them. Those skilled in the art would also appreciate that the various illustrative logic blocks, modules, circuits, and algorithm steps described in connection with the embodiments disclosed herein can be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, several components, blocks, modules, circuits, and illustrative steps have been described above in general in terms of their functionality. Whether such functionality is implemented as hardware or software depends on the particular application and design constraints imposed on the system as a whole. Those skilled in the art can implement the described functionality in a variety of ways for each particular application, but such implementation decisions should not be construed as detracting from the scope of the present description. The various illustrative logic blocks, modules and circuits described in connection with the embodiments disclosed herein can be implemented or realized with a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), an arrangement field-programmable gate (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general purpose processor can be a microprocessor, but alternatively the processor can be any “conventional” processor, controller, microcontroller, or state machine. A processor can also be implemented as a combination of computing device, for example, a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors together with a DSP core, or any other such configuration. In one or more exemplary embodiments, the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, functions can be stored in or transmitted via one or more instructions or code in a computer-readable medium. Non-transient computer readable media may include computer storage media. A storage medium can be any available medium that can be accessed by a computer. By way of example, and not limitation, such computer readable medium may comprise RAM, ROM, EEPROM, CD-ROM or any other optical disk storage, magnetic disk storage or other magnetic storage devices or any other medium that may be used to carry or store desired program codes in the form of instructions or data structures and which can be accessed by a computer. Disc (disk and disc), as used herein, includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disc, and blu-ray disc, on which discs (disks) usually reproduce data magnetically , while discs reproduce data optically with lasers. Combinations of them must also be included within the scope of the computer-readable medium. The foregoing description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present description. Various modifications in these embodiments will be readily apparent to those skilled in the art, and the general principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present description is not intended to be limited to the modalities shown here, but must receive the widest scope compatible with the original principles and characteristics disclosed herein.
权利要求:
Claims (70) [1] 1. Method for point-to-point (P2P) authorization by a mobile entity, comprising: - receiving a message to accept P2P authorization from a management entity through a non-access layer (NAS); - receive a P2P Radio Resource Control (RRC) configuration request from a network entity; and - send a P2P RRC configuration completion message to the network entity through an access layer. [2] The method according to claim 1, further comprising sending a P2P authorization request message to the management entity via the NAS. [3] The method according to claim 1, further comprising transmitting a P2P authorization termination message to the management entity via the NAS. [4] The method of claim 1, wherein the P2P entitlement comprises an entitlement to discover. [5] The method of claim 1, wherein receiving the message to accept P2P authorization comprises receiving an active default Evolved Packet System (EPS) bearer context message. [6] The method according to claim 5, further comprising transmitting a message to accept active default EPS carrier context to the managing entity via the NAS. [7] The method according to claim 1, wherein the P2P authorization comprises an authorization for direct communication. [8] The method of claim 1, wherein receiving the message to accept P2P authorization comprises receiving an active dedicated EPS bearer context message. [9] The method of claim 8, further comprising transmitting a message to accept active dedicated EPS carrier context. [10] Method according to claim 1, in which: - the mobile entity comprises a user equipment (UE); - the management entity comprises a mobile management entity (MME); and - the network entity comprises an evolved NODE (eNB). [11] 11. Apparatus, comprising: - at least one processor configured to: receive a message to accept P2P authorization from a management entity via a non-access layer (NAS); receiving a P2P Radio Resource Control (RRC) configuration request from a network entity; and sending a P2P RRC configuration completion message to the network entity through an access layer; and - a memory coupled to at least one processor for storing data. [12] Apparatus according to claim 11, wherein at least one processor sends a P2P authorization request message to the managing entity via the NAS. [13] The apparatus of claim 11, wherein at least one processor transmits a P2P authorization termination message to the managing entity via the NAS. [14] Apparatus according to claim 11, wherein the P2P authorization comprises an authorization to discover. [15] The apparatus of claim 11, wherein the at least one processor receives the message to accept P2P authorization by receiving an active default Evolved Packet System (EPS) bearer context message. [16] The apparatus of claim 15, wherein at least one processor transmits a message to accept active default EPS carrier context to the managing entity via the NAS. [17] Apparatus according to claim 11, wherein the P2P authorization comprises an authorization for direct communication. [18] The apparatus of claim 11, wherein the at least one processor receives the message to accept P2P authorization by receiving an active dedicated EPS bearer context message. [19] The apparatus of claim 18, wherein the at least one processor transmits a message to accept active dedicated EPS carrier context. [20] 20. Apparatus, comprising: - mechanisms for receiving a message to accept point-to-point (P2P) authorization from a management entity through a non-access layer (NAS); - mechanisms for receiving a P2P Radio Resource Control (RRC) configuration request from a network entity; and - mechanisms to send a P2P RRC configuration completion message to the network entity through an access layer. [21] 21. A computer program product, comprising: - a non-transient computer readable medium comprising codes for causing a computer to operate to: - receive a message to accept point-to-point (P2P) authorization from a management entity through a non-access stratum (NAS); - receive a radio resource control (RRC) PZ2P configuration request from a network entity; and - send a P2P RRC configuration completion message to the network entity through an access layer. [22] 22. A method for point-to-point (P2P) authorization by a management entity, comprising: - receiving a P2P authorization request message from a mobile entity via a non-access layer (NAS); - performing at least one P2P authorization check of the mobile entity based at least in part on the received P2P authorization request message; and - sending a message to accept P2P authorization to a mobile entity via the NAS, in response to at least one verification being successful. [23] The method of claim 22, wherein performing at least one verification comprises determining whether a specific ID or specific prefix associated with the mobile entity associates with a mobile entity's signature. [24] The method of claim 22, wherein performing at least one check comprises determining whether a specific ID or specific prefix associated with the mobile entity is unexpired. [25] The method of claim 22, wherein the P2P entitlement comprises an entitlement to discover. [26] The method of claim 22, wherein: - receiving the P2P authorization request message comprises receiving a Packet Data Network (PDN) connectivity request message; and - sending the message to accept P2P authorization comprises sending an active default Evolved Packet System (EPS) bearer context message. [27] The method of claim 26, further comprising receiving a message to accept active default EPS carrier context from the mobile entity via the NAS. [28] The method of claim 22, wherein the P2P authorization comprises an authorization for direct communication. [29] The method of claim 22, wherein: - receiving the P2P authorization request message comprises a bearer resource allocation request message; and - sending the message to accept P2P authorization comprises sending an active dedicated EPS carrier context message. [30] The method of claim 28, further comprising receiving a message to accept active dedicated EPS carrier context from the mobile entity through the NAS. [31] The method according to claim 22, wherein: - the mobile entity comprises a user equipment (UE); and - the management entity comprises a mobile management entity (MME). [32] 32. Apparatus, comprising: - at least one processor configured to: receive a point-to-point authorization request (P2P) message from a mobile entity via a non-access layer (NAS); performing at least one P2P authorization check of the mobile entity based at least in part on the received P2P authorization request message; and sending a message to accept P2P authorization to a mobile entity via the NAS, in response to at least one verification being successful; and - a memory coupled to at least one processor for storing data. [33] The apparatus of claim 32, wherein the at least one processor performs at least one check in determining whether a specific ID or specific prefix associated with the mobile entity associates with a signature of the mobile entity. [34] The apparatus of claim 32, wherein the at least one processor performs at least one check in determining whether a specific ID or specific prefix associated with the mobile entity is unexpired. [35] The apparatus of claim 32, wherein the P2P authorization comprises an authorization to discover. [36] The apparatus of claim 32, wherein: - at least one processor receives the P2P authorization request message by receiving a Packet Data Network (PDN) connectivity request message; and - at least one processor sends the message to accept P2P authorization by sending an active default Evolved Packet System (EPS) bearer context message. [37] The apparatus of claim 35, wherein the at least one processor receives a message to accept active default EPS carrier context from the mobile entity via the NAS. [38] The apparatus of claim 32, wherein the P2P authorization comprises an authorization for direct communication. [39] The apparatus of claim 32, wherein: - at least one processor receives the P2P authorization request message by receiving a bearer resource allocation request message; and - at least one processor sends the message to accept P2P authorization by sending an active dedicated EPS carrier context message. [40] The apparatus of claim 39, wherein the at least one processor receives a message to accept active dedicated EPS carrier context from the mobile entity via the NAS. [41] 41. Apparatus, comprising: - mechanisms for receiving a point-to-point authorization request (P2P) message from a mobile entity through a non-access layer (NAS); - mechanisms for performing at least one P2P authorization check of the mobile entity based at least in part on the received P2P authorization request message; and - mechanisms for sending a message to accept P2P authorization to a mobile entity via the NAS, in response to at least one verification being successful. [42] 42. A computer program product, comprising: - a non-transient computer readable medium comprising codes for making a computer operate to: - receive a point-to-point (P2P) authorization request message from a mobile entity through a non-access stratum (NAS); - performing at least one P2P authorization check of the mobile entity based at least in part on the received PFP2P authorization request message; and - sending a message to accept P2P authorization to a mobile entity via the NAS, in response to at least one verification being successful. [43] 43. A method for point-to-point (P2P) authorization by a mobile entity, comprising: - sending a registration message to a core network, the registration message comprising a P2P authorization request; and - receiving a registration accept message from the core network, the registration accept message comprising an initial context configuration request and a P2P authorization response. [44] The method of claim 43, wherein sending comprises sending the registration message to a network entity, the network entity forwarding the registration message to the core network. [45] The method of claim 44, wherein the network entity comprises an evolved NODEB (eNB). [46] The method of claim 43, wherein the P2P authorization response comprises a message to accept P2P authorization, in response to a P2P authorization check of the mobile entity being successful in the core network. [47] The method of claim 43, wherein: - sending the registration message comprises sending an attached request message; and - receiving the message to accept registration comprises receiving a message to accept attachments. [48] 48. The method of claim 43, wherein: - sending the registration message comprises sending a tracking area update request (TAU) message; and - receiving the message to accept registration comprises receiving a message to accept TAU. [49] The method of claim 43, wherein: - the P2P authorization comprises a general P2P authorization; - the mobile entity comprises a user equipment (UE); and - sending comprises sending the registration message to a mobile management entity (MME) of the core network. [50] 50. Apparatus, comprising: - at least one processor configured to: send a registration message to a core network, the registration message comprising a point-to-point (P2P) authorization request; and receiving a registration accept message from the core network, the registration accept message comprising an initial context configuration request and a P2P authorization response; and - a memory coupled to at least one processor for storing data. [51] The apparatus of claim 50, wherein the at least one processor sends the registration message to a network entity, the network entity forwarding the registration message to the core network. [52] The apparatus of claim 50, wherein the P2P authorization response comprises a message to accept P2P authorization, in response to a P2P authorization check from the mobile entity being successful in the core network. [53] The apparatus of claim 50, wherein: - at least one processor sends the registration message by sending an attached request message; € - at least one processor receives the message to accept registration when receiving a message to accept attachments. [54] The apparatus of claim 50, wherein: - at least one processor sends the log message when sending a tracking area update request (TAU) message; and - at least one processor receives the message to accept registration when receiving the message to accept TAU. [55] 55. Apparatus, comprising: - mechanisms for sending a registration message to a core network, to the registration message comprising a point-to-point (P2P) authorization request; and - mechanisms for receiving a message to accept registration from the core network, to the message to accept registration comprising an initial context configuration request and a P2P authorization response. [56] 56. A computer program product, comprising: - a non-transient computer readable medium comprising codes for causing a computer to operate to: - send a registration message to a core network, the registration message comprising an authorization request peer-to-peer (P2P); and - receiving a registration accept message from the core network, the registration accept message comprising an initial context configuration request and a P2P authorization response. [57] 57. Method for point-to-point (P2P) authorization by a management entity of a core network, comprising: - receiving a registration message from a mobile entity, the registration message comprising a P2P authorization request; - perform at least one identification verification of the mobile entity; and - sending a message to accept registration to the mobile entity, the message to accept registration comprising an initial context configuration request and a P2P authorization response, in response to at least one successful identification check. [58] The method of claim 57, wherein receiving comprises receiving the registration message from a network entity in operative communication with the mobile entity. [59] The method of claim 58, wherein the network entity comprises an evolved NODE (eNB). [60] The method of claim 57, wherein the P2P authorization response comprises a message to accept P2P authorization, in response to a P2P authorization check of the mobile entity being successful in the core network. [61] The method of claim 57, wherein: - receiving the registration message comprises receiving an attached request message; and - sending the message to accept registration comprises sending a message to accept attachments. [62] 62. The method of claim 57, wherein: - receiving the registration message comprises receiving a tracking area update request (TAU) message; and - sending the message to accept registration comprises sending a message to accept TAU. [63] The method of claim 57, wherein: - the P2P authorization comprises a general P2P authorization; - the management entity comprises a mobile management entity (MME); and - receiving comprises receiving the registration message from a user equipment (UE). [64] 64. An apparatus, comprising: - at least one processor configured to: receive a registration message from a mobile entity, the registration message comprising a point-to-point (P2P) authorization request; performing at least one identification verification of the mobile entity; and sending a registration accept message to the mobile entity, the registration accept message comprising an initial context configuration request and a P2P authorization response, in response to at least one successful identification check; and - a memory coupled to at least one processor for storing data. [65] The apparatus of claim 64, wherein the at least one processor receives the registration message from a network entity in operative communication with the mobile entity. [66] The apparatus of claim 64, wherein the P2P authorization response comprises a message to accept P2P authorization, in response to a P2P authorization check from the mobile entity being successful in the core network. [67] The apparatus of claim 64, wherein the at least one processor: - receives the registration message by receiving an attached request message; and - send the message to accept registration when sending a message to accept attachment. [68] 68. Apparatus according to claim 64, wherein the at least one processor: - receives the registration message by receiving a tracking area update request (TAU) message; and - sends the message to accept registration when sending a message to accept TAU. [69] 69. An apparatus, comprising: - mechanisms for receiving a registration message from a mobile entity, the registration message comprising a point-to-point (P2P) authorization request; - mechanisms for performing at least one identification verification of the mobile entity; and - mechanisms for sending a message to accept registration to the mobile entity, the message to accept registration comprising an initial context configuration request and a P2P authorization response, in response to at least one successful identification check. [70] 70. A computer program product, comprising: - a non-transient computer readable medium comprising codes for causing a computer to operate to: - receive a registration message from a mobile entity, the registration message comprising an authorization request peer-to-peer (P2P); - perform at least one identification verification of the mobile entity; and . 15/15 - sending a message to accept registration to the mobile entity, to the message to accept registration comprising an initial context configuration request and a P2P authorization response, in response to at least one identification check being successful.
类似技术:
公开号 | 公开日 | 专利标题 BR112013017579A2|2021-05-18|system and method for point-to-point authorization through non-access extract procedures JP5989852B2|2016-09-07|System and method for network provisioning of mobile entities for peer-to-peer services JP6141239B2|2017-06-07|Dynamic home network allocation ES2774185T3|2020-07-17|Mobility management based on radio link failure report BR112020007608A2|2020-09-29|mechanism to enable interworking between network slicing and evolved packet core connectivity BRPI0921095B1|2020-11-10|reports on radio link failures US11160014B2|2021-10-26|Connection gateway selection in a mobile communications device BR112012002747A2|2020-08-11|identify a domain for delivering message service information KR20200073268A|2020-06-23|Wireless access network notification area configuration and management WO2012116051A1|2012-08-30|Apparatus and method for third- party assisted peer-to- peer communication KR20160002868A|2016-01-08|Mechanism for gateway discovery layer-2 mobility KR20180051585A|2018-05-16|Multi-radio access technology synchronization signal WO2010144516A2|2010-12-16|Providing an indicator of presence of a first access network that is capable of interworking with a second access network BR112013015852B1|2021-10-26|CONFIGURING USER EQUIPMENT FOR PAIR-TO-PAIR COMMUNICATION
同族专利:
公开号 | 公开日 EP2664171B1|2018-05-30| CN103416083A|2013-11-27| WO2012097075A3|2012-11-22| KR101631995B1|2016-06-21| JP5735136B2|2015-06-17| TW201511586A|2015-03-16| KR101874568B1|2018-07-04| EP2664171A2|2013-11-20| TWI474726B|2015-02-21| TW201234876A|2012-08-16| US20120179789A1|2012-07-12| KR20150034823A|2015-04-03| CN110225521A|2019-09-10| JP2014506078A|2014-03-06| KR20140019782A|2014-02-17| TWI544815B|2016-08-01| US9826404B2|2017-11-21| WO2012097075A2|2012-07-19|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 WO2006003739A1|2004-06-30|2006-01-12|Yoshida Kamagasako, Inc.|Peer-to-peer communication device and computer program| CN1735224A|2004-08-10|2006-02-15|皇家飞利浦电子股份有限公司|Method and device for limiting P2P communication interfere| CN1735264A|2004-08-10|2006-02-15|皇家飞利浦电子股份有限公司|Method and device for point-to-point opposite communication| CN1735256A|2004-08-10|2006-02-15|皇家飞利浦电子股份有限公司|Reuse method and device for dynamic frequency| CN1735222A|2004-08-10|2006-02-15|皇家飞利浦电子股份有限公司|Method and device for off-line point-to-point opposite communication| CN1703023A|2005-06-08|2005-11-30|武汉虹信通信技术有限责任公司|CHINAMDN based wireless transparent D2D system transmission method| US8576846B2|2005-10-05|2013-11-05|Qualcomm Incorporated|Peer-to-peer communication in ad hoc wireless network| US20080076419A1|2006-09-22|2008-03-27|Amit Khetawat|Method and apparatus for discovery| US8855099B2|2007-03-19|2014-10-07|Qualcomm Incorporated|Selective phase connection establishment| US8122482B2|2008-01-24|2012-02-21|Cisco Technology, Inc.|Cryptographic peer discovery, authentication, and authorization for on-path signaling| US9276909B2|2008-08-27|2016-03-01|Qualcomm Incorporated|Integrity protection and/or ciphering for UE registration with a wireless network| US8548467B2|2008-09-12|2013-10-01|Qualcomm Incorporated|Ticket-based configuration parameters validation| US8554200B2|2008-09-12|2013-10-08|Nokia Corporation|Method and apparatus for providing interference measurements for device to-device communication| EP2324616A1|2008-09-12|2011-05-25|Nokia Corporation|Session initiation for device-to-device communication| US10743251B2|2008-10-31|2020-08-11|Qualcomm Incorporated|Support for multiple access modes for home base stations| US9320067B2|2008-11-24|2016-04-19|Qualcomm Incorporated|Configuration of user equipment for peer-to-peer communication| US8493887B2|2008-12-30|2013-07-23|Qualcomm Incorporated|Centralized control of peer discovery pilot transmission| WO2010080966A1|2009-01-09|2010-07-15|Interdigital Patent Holdings, Inc.|Data flow mobility| US8501721B2|2009-01-16|2013-08-06|Kao Corporation|Postprandial hyperglycemia-improving agent| US8571550B2|2009-02-09|2013-10-29|Qualcomm Incorporated|Managing access control to closed subscriber groups| US8532056B2|2009-04-13|2013-09-10|Qualcomm Incorporated|Device mobility for split-cell relay networks| WO2011038352A1|2009-09-26|2011-03-31|Cisco Technology, Inc.|Providing offloads in a communication network| CN102196453B|2010-03-16|2013-10-23|普天信息技术研究院有限公司|Communication mode selection method|US8576846B2|2005-10-05|2013-11-05|Qualcomm Incorporated|Peer-to-peer communication in ad hoc wireless network| US8850196B2|2010-03-29|2014-09-30|Motorola Solutions, Inc.|Methods for authentication using near-field| ITTO20110284A1|2011-03-29|2011-06-28|Sisvel Technology Srl|COOPERATIVE LOCATION PROCEDURE AND ITS APPARATUSES| SG194059A1|2011-04-01|2013-11-29|Interdigital Patent Holdings|Method and apparatus for controlling connectivity to a network| US9030995B2|2011-04-12|2015-05-12|Lg Electronics Inc.|Method and apparatus for transmitting paging message in wireless communication system| KR20140043484A|2011-08-01|2014-04-09|인텔 코포레이션|Method and system for network access control| KR101867089B1|2011-09-14|2018-06-15|삼성전자주식회사|Method for using legacy wi-fi and wi-fi p2p simultaneously| US20140335791A1|2011-12-13|2014-11-13|Lg Electronics Inc.|Method and device for providing a proximity service in a wireless communication system| GB2497741A|2011-12-19|2013-06-26|Renesas Mobile Corp|A verification system for use in requesting access to a D2D communication service| CN103209412B|2012-01-17|2016-03-02|华为技术有限公司|Apparatus for establishing is to the method, apparatus and system of equipment connection| US20130201870A1|2012-02-06|2013-08-08|Vivek Gupta|Handling dual priority applications in a wireless communication network| EP2842355A2|2012-04-27|2015-03-04|Interdigital Patent Holdings, Inc.|Methods and apparatuses for optimizing proximity data path setup| EP3897016A3|2012-04-27|2021-11-24|Interdigital Patent Holdings, Inc.|Method and apparatus for provisioning of d2d policies for a wireless transmit receive unit | US9232391B2|2012-05-07|2016-01-05|Industrial Technology Research Institute|Authentication system for device-to-device communication and authentication method therefor| US10616065B2|2012-06-21|2020-04-07|Nokia Solutions And Networks Oy|Network assisted proximity service session management| US9648638B2|2012-07-20|2017-05-09|Lg Electronics Inc.|Method and apparatus for transmitting device-to-device related information in wireless communication system| CN103581890B|2012-08-08|2017-02-08|电信科学技术研究院|Terminal control method, equipment and system| US9591679B2|2012-09-17|2017-03-07|Blackberry Limited|Initiation of inter-device communication in wireless communication systems| US8934632B2|2012-09-18|2015-01-13|Futurewei Technologies, Inc.|System and method for device-to-deviceassisted dynamic traffic control for cellular networks| US9826381B2|2012-09-18|2017-11-21|Blackberry Limited|Device handshake/discovery for inter-device communication in wireless communication systems| US8982895B2|2012-09-21|2015-03-17|Blackberry Limited|Inter-device communication in wireless communication systems| US9014113B2|2012-09-21|2015-04-21|Blackberry Limited|User equipment architecture for inter-device communication in wireless communication systems| US10154467B2|2012-09-26|2018-12-11|Blackberry Limited|Transmit power adjustment for inter-device communication in wireless communication systems| GB2506610B|2012-10-02|2015-07-01|Broadcom Corp|Direct communication among devices| US9137836B2|2012-10-15|2015-09-15|Blackberry Limited|Inter-device communication authorization and data sniffing in wireless communication systems| US9532224B2|2012-11-05|2016-12-27|Electronics And Telecommunications Research Institute|Method of device-to-device discovery and apparatus thereof| EP2918134A4|2012-11-06|2016-07-06|Nokia Technologies Oy|Method and apparatus for device-to-device communication| EP2928255A4|2012-11-28|2016-07-13|Fujitsu Ltd|Information configuration method, method for reporting connection establishment request, apparatus and system| US9820133B2|2012-12-12|2017-11-14|Lg Electronics Inc.|Method and user equipment for performing D2D service in wireless communication system| US8806205B2|2012-12-27|2014-08-12|Motorola Solutions, Inc.|Apparatus for and method of multi-factor authentication among collaborating communication devices| US8955081B2|2012-12-27|2015-02-10|Motorola Solutions, Inc.|Method and apparatus for single sign-on collaboraton among mobile devices| US9332431B2|2012-12-27|2016-05-03|Motorola Solutions, Inc.|Method of and system for authenticating and operating personal communication devices over public safety networks| US8782766B1|2012-12-27|2014-07-15|Motorola Solutions, Inc.|Method and apparatus for single sign-on collaboration among mobile devices| JP6294351B2|2013-01-03|2018-03-14|エルジー エレクトロニクス インコーポレイティド|Service conversion method and apparatus in wireless communication system| EP2947952A4|2013-01-17|2016-08-24|Fujitsu Ltd|Information report method for device-to-device communication, user equipment, and base station| KR102096895B1|2013-02-13|2020-04-03|삼성전자주식회사|A method and apparatus for initial entry in a radio communication system| CN105052050B|2013-03-11|2018-09-14|Lg 电子株式会社|Method and apparatus of the executive device to device service in a wireless communication system| JP6506685B2|2013-03-21|2019-04-24|シャープ株式会社|UE, UE communication method, ProSe server, and ProSe server communication method| US10516984B2|2013-03-26|2019-12-24|Sharp Kabushiki Kaisha|Terminal device, base station device, and control device| WO2014157392A1|2013-03-27|2014-10-02|京セラ株式会社|Communication control method and processor| KR20140119544A|2013-04-01|2014-10-10|삼성전자주식회사|Method and apparatus of message routing for proximity service in a mobile communication system| DE112013007452B3|2013-04-02|2020-10-15|Avago Technologies International Sales Pte. Ltd.|Method and device for determining devices and application users| US20160044726A1|2013-04-02|2016-02-11|Sharp Kabushiki Kaisha|Terminal device, base station device, and control device| CN104185208B|2013-05-20|2017-06-20|华为终端有限公司|Close to business authorization method and device, system| US9210536B2|2013-05-21|2015-12-08|Google Technology Holdings LLC|Method for establishing device-to-device communication| JP6838789B2|2013-06-28|2021-03-03|日本電気株式会社|UE and its communication method| KR102083322B1|2013-08-22|2020-03-03|삼성전자주식회사|Apparatus and method for providing service to isolated user equipment in device-to-device communication system| US10117224B2|2013-09-20|2018-10-30|Qualcomm Incorporated|MAC subheader for D2D broadcast communication for public safety| KR102301801B1|2013-09-24|2021-09-15|삼성전자주식회사|Apparatus and method for establishing network controlled direct connection in communication system based device to device scheme| WO2015105183A1|2014-01-10|2015-07-16|シャープ株式会社|Communication control method, position management device, base station device, terminal device, and communication system| US9832804B2|2014-02-03|2017-11-28|Sony Corporation|Device and method for wireless communication| CN104918233A|2014-03-14|2015-09-16|北京三星通信技术研究有限公司|UE configuration method in proximate service| WO2015159756A1|2014-04-16|2015-10-22|京セラ株式会社|Communication control method, radio communication device, and resource management device| US9820328B2|2014-06-24|2017-11-14|Intel Corporation|Apparatuses, methods, and systems to reduce handover latency in an integrated wireless local area network and cellular network| US10681767B2|2016-02-05|2020-06-09|Lg Electronics Inc.|Method and apparatus for performing RRC connection resume in wireless communication system| CN109548097B|2017-08-14|2021-01-12|华为技术有限公司|Bearer establishment method and device|
法律状态:
2021-05-25| B08F| Application fees: application dismissed [chapter 8.6 patent gazette]|Free format text: REFERENTE AS 8A E 9A ANUIDADES. | 2021-09-14| B08K| Patent lapsed as no evidence of payment of the annual fee has been furnished to inpi [chapter 8.11 patent gazette]|Free format text: EM VIRTUDE DO ARQUIVAMENTO PUBLICADO NA RPI 2629 DE 25-05-2021 E CONSIDERANDO AUSENCIA DE MANIFESTACAO DENTRO DOS PRAZOS LEGAIS, INFORMO QUE CABE SER MANTIDO O ARQUIVAMENTO DO PEDIDO DE PATENTE, CONFORME O DISPOSTO NO ARTIGO 12, DA RESOLUCAO 113/2013. |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 US201161431765P| true| 2011-01-11|2011-01-11| US61/431,765|2011-01-11| US13/347,547|US9826404B2|2011-01-11|2012-01-10|System and method for peer-to-peer authorization via non-access stratum procedures| US13/347,547|2012-01-10| PCT/US2012/020956|WO2012097075A2|2011-01-11|2012-01-11|System and method for peer-to-peer authorization via non-access stratum procedures| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|