×

Forbidden tracking area optimization for private/home networks

  • US 8,116,736 B2
  • Filed: 02/08/2008
  • Issued: 02/14/2012
  • Est. Priority Date: 02/09/2007
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • determining by an apparatus whether access verification is to be done using an identifier of a first length or is to be done using an identifier of a second length;

    examining a node address by the apparatus;

    performing by the apparatus access verification by comparing a field of the received node address against a locally stored access list, wherein the field compared against the locally stored access list is of either the first or the second length, depending on whether a determination was made to do access verification using an identifier of the first length or a determination was made to do access verification using an identifier of the second length; and

    adding by the apparatus at least the compared field of the node address to a locally stored list of cell selection candidate nodes for the case where the access list comprises a list of allowed identifiers, or excluding the compared field of the node address from the locally stored list of cell selection candidate nodes for the case where the access list comprises a list of restricted identifiers.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×