Network identity and timezone (nitz) functionality for non-3gpp devices

ABSTRACT

A system that provisions a multimode mobile or converged device with local time information and network provider identification when the multimode mobile device is operating within the purview of a wireless local area network (WLAN). The system includes components that receive protocol data and that extract network provider identification from the received protocol data as well as utilizing the received protocol data to ascertain the local time.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.11/462,549 entitled “NETWORK IDENTITY AND TIMEZONE (NITZ) FUNCTIONALITYFOR NON-3GPP DEVICES” filed Aug. 4, 2006, the entirety of which isincorporated by reference herein.

BACKGROUND

The mobile telephone industry has been associated with tremendous growthover the last several years. For instance, in the recent past, mobiletelephones were only available to those of highest economic status dueto service costs and costs associated with mobile phones. Moreover,network coverage was not extensive enough to enable robust service. Inparticular, only areas associated with dense population were providedwith extensive wireless network coverage. Still further, the mobilephones that could utilize the networks to communicate were quite bulky,causing portation of the phone over any significant distance to bedifficult at best. In more detail, antennas associated with these phonescould be over a foot in length, thus making it difficult to utilize thephones in automobiles or other congested areas.

In contrast, today's portable phones (and other portable devices) can beutilized as full-service computing machines. For example, many of themost recent and advanced mobile phones can be associated with wordprocessing software, accounting software, and various other types ofsoftware. Furthermore, network coverage has expanded to cover millions,if not billions, of users. Additionally, mobile phones have decreased inboth size and cost. Specifically, modern mobile phones are often smallenough to slip into an individual's pocket without discomforting theindividual. Furthermore, many mobile network service providers offerphones at extremely low cost to customers who contract for service withsuch providers.

Advances in technology relating to mobile devices in general, and mobilephones in particular, continue to occur. For example, recently mobiletelephones have been designed to communicate over disparate networksand/or between licensed and unlicensed spectra. In more detail, amultimode handset can connect to a cellular network to effectuatecommunications between a user of the mobile phone and another phonedevice, and can further connect via WiFi, Bluetooth, and the like andthereafter utilize the Voice over Internet Protocol (VoIP) (or othersuitable protocol) to effectuate communication between users. Use ofVoIP is often desirable to users as it is associated with less cost thanemploying a cellular network. In fact, some users may consider phonecalls made over VoIP (or other IP-based network) completely free,despite the fact that they pay for Internet service.

Implementation of this multimode service is due at least in part to theThird Generation Partnership Project (3GPP), which have createdspecifications that define a mechanism that provides signal integrityfor session initial protocol (SIP) signals between an IP multimediasubsystem (IMS) and user equipment (UE) (e.g., a mobile phone, apersonal digital assistant, . . . ). This integrity prevents identityspoofing, man-in-the-middle attacks, and the like. The IMS represents a3GPP and 3GPP2 effort to define an all-IP-based wireless network as areplacement for the various voice, data, signaling, and control networkelements currently in existence. Furthermore, the IMS enables supportfor IP multimedia applications within the Universal MobileTelecommunications System (UMTS). The UMTS is a 3G broadbandpacket-based transmission of text, digitized voice, video, andmultimedia that offers a consistent set of services to mobile computerand phone users regardless of their physical location.

The telecom industry is currently shifting towards all IP-systems,thereby rendering multimode service handsets an important tool (as theyare compatible with existing cellular systems and emerging IP-systems).This shift is driven by desires to reduce costs and create new streamsof revenue while protecting an operator business model. IMS is a newservice domain that facilitates this shift by enabling convergence ofdata, speech, and network techonology over an IP-based infrastructure.For users, IMS-based services enable transmittal and receipt of variousdata at significantly reduced cost, including voice, text, pictures,video, and/or any combination thereof in a highly personalized andsecure manner. In summary, IMS is designed to bridge the gap betweenexisting, traditional telecommunications technology and Internettechnology that increased bandwidth does not provide.

As stated above, these emerging IP-based technologies have createddemand for multimode services, and thus for multimode handsets. Usingthis technology, users can employ one of the many wireless technologiessupported by the handset to effectuate voice calls, transmission ofdata, and the like. For example, if one of the wireless technologiessupported by the multimode handset is WLAN a user can connect to a LANby way of WLAN. Upon such connection, users can employ services offeredby their service provider.

Currently, when a GSM and/or 3GPP handset operates within a GSM and/or3GPP network the handset is typically provisioned with appropriatenetwork identity, local time, and time zone information. Suchinformation permits users of such handsets to adapt their usage of thesedevices appropriately. For example, today many subscriber usage plansapply different usage rates depending upon the time of day that a userinitiates usage of their handset. For instance, it is not uncommon for asubscriber usage plan to provide deeply discounted usage rates, or atbest free coverage, during weekends and between 9 pm and 6 am on weeknights, and much more expensive coverage during business hours (e.g., 9am-5 pm, Monday to Friday). Thus, users of such handsets, by viewing thetime information displayed on the display, can desist from initiatingusage of their handheld devices and/or timeshift their usage to morefinancially propitious time periods. Similarly, many wireless serviceproviders have arrangements or understandings with one another to allowone service provider's subscribers utilize another service provider'snetwork. This, so called roaming functionality, albeit for additionalfees typically bourne by the subscriber, extends service connectivitybeyond that of the home location where the service is registered, andoccurs when a subscriber of one wireless service provider utilizes thefacilities of another wireless service provider. Thus, for example, inorder to obviate the payment of the additional fees that can beassociated with the roaming functionality, a user of a handset can uponascertaining that the network identity displayed on the displayassociated with the handset desist from initiating usage until such timethat he/she re-enters the established purview of his/her home location.GSM utilizes GSM specific mechanisms to provide such network identityand time information and therefore such functionality, though extant inGSM and/or 3GPP networks, has hitherto not been available in non-3GPPnetworks, leading to situations where when users of multimode devicestransition between GSM and/or 3GPP networks and non-3GPP networks, thenetwork identity and time zone information has at best been incorrectlydisplayed.

SUMMARY

The following presents a simplified summary in order to provide a basicunderstanding of some aspects of the claimed subject matter. Thissummary is not an extensive overview, and it is not intended to identifykey/critical elements of the claimed subject matter or to delineate thescope thereof. Its sole purpose is to present some concepts in asimplified form as a prelude to the more detailed description that ispresented later.

The claimed subject matter relates to providing a multimode portableand/or converged device with network identity, time zone information andlocal time independent of access technology (e.g., irrespective ofwhether the network service provider is employing a GSM network, a 3GPPnetwork, a WLAN network, and the like). GSM networks (or networksadhering to the 3GPP standards and protocols) typically provisioncapable devices with network identity, time zone, and local timeinformation. However, the same is not necessarily the case with regardto many non-3GPP network environments, and in fact, in many non-3GPPnetwork environments the capability to display the network provider nameand local time information cannot be generated for display on multimodedevices. Thus for example, when a multimode mobile device transitionsfrom a GSM network and/or a 3GPP environment to a non-3GPP network, suchas a WLAN environment, the multimode portable device can lose thecapability of updating the network identity and the local timeaccordingly. For instance, where a multimode mobile device has beenoperating within a GSM network the local time and the network providername is conveniently displayed on the multimode device. Thus, should amultimode device operating in a GSM network environment in one time zonetransition to a different time zone and commence operation in a wirelesslocal area network (WLAN) for example, the network identity and thelocal time will not be updated to reflect the current reality—thedisplay in effect will show information that is not reflective of thefact that the mobile device now inhabits a different time zone and isnow being provisioned by a different network provider. Similarly, when amultimode portable device is powered up and utilized entirely in anon-3GPP network environment, the time zone, local time and networkidentity may never be generated and/or displayed.

The claimed subject matter rectifies the aforementioned shortcomingswith respect to providing the correct local time, time zone informationand network identity information for display on multimode portabledevices. The claimed subject matter can facilitate its aims by utilizingone or more extant configuration protocols, such as Session InitiationProtocol (SIP), Network Time Protocol (NTP), Dynamic Host ConfigurationProtocol (DHCP), and the like, to provide the necessary time zone orlocation information necessary to determine the local time to display.Additionally, the subject matter as claimed can for example, employ anetwork identifier, such as the service set identifier (SSID) employedin a wireless LAN or its equivalent for the wireless technology in use(e.g., PLMNID, BSSID, ESSID, etc.), that can be broadcast by allwireless access points to determine the network operator's identity. Inthis manner, the local time and the network provider's identity can bedisplayed on an interface associated with the multimode mobile device.

To the accomplishment of the foregoing and related ends, certainillustrative aspects are described herein in connection with thefollowing description and the annexed drawings. These aspects areindicative, however, of but a few of the various ways in which theprinciples disclosed herein can be employed and is intended to includeall such aspects and their equivalents. Other advantages and novelfeatures will become apparent from the following detailed descriptionwhen considered in conjunction with the drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a high-level block diagram of a system that provides networkidentity and time zone functionality for multimode portable/mobiledevices.

FIG. 2 is another high level block diagram of a system that providesnetwork identity and time zone functionality multimode portable/mobiledevices.

FIG. 3 is a more detailed illustration of a system that provides networkidentity and time zone functionality for multimode portable devices inaccordance with one aspect of the claimed subject matter.

FIG. 4 is a more detailed illustration of an identification componentthat provides network identity information for subsequent utilization bya multimode portable/mobile device.

FIG. 5 is a detailed illustration of a locator component that includesascertains time zone and local time information for subsequent use by amultimode portable/mobile device.

FIG. 6 illustrates an example graphical interface that displays thenetwork identity and time zone information on a multimodeportable/mobile device.

FIG. 7 is a depiction of a multimode mobile device traversing betweentwo time zones.

FIG. 8 is a representative flow diagram of a methodology for obtainingand displaying a humanly readable network name.

FIG. 9 is a representative flow diagram of a methodology for obtainingand displaying time zone information and local time.

FIG. 10 is an example computing environment that can be employed inconnection with various aspects described herein.

FIG. 11 is an example networking environment.

DETAILED DESCRIPTION

The claimed subject matter is now described with reference to thedrawings, wherein like reference numerals are used to refer to likeelements throughout. In the following description, for purposes ofexplanation, numerous specific details are set forth in order to providea thorough understanding of the claimed subject matter. It may beevident, however, that such matter can be practiced without thesespecific details. In other instances, well-known structures and devicesare shown in block diagram form in order to facilitate describing theclaimed subject matter.

As used in this application, the terms “component” and “system” areintended to refer to a computer-related entity, either hardware, acombination of hardware and software, software, or software inexecution. For example, a component can be, but is not limited to being,a process running on a processor, a processor, a hard disk drive,multiple storage drives (of optical and/or magnetic storage medium), anobject, an executable, a thread of execution, a program, and/or acomputer. By way of illustration, both an application running on aserver and the server can be a component. One or more components canreside within a process and/or thread of execution, and a component canbe localized on one computer and/or distributed between two or morecomputers.

FIG. 1 is a high-level block diagram of a system 100 that providesnetwork identity and time zone functionality for multimodeportable/mobile devices. The system 100 includes an interrogator unit110 that can receive and transmit wireless signals to/from a wirelessaccess point 120. The interrogator unit 110 can be a constituent partof, or can be included within, a portable/mobile multimode (e.g.,capable of supporting multiple air interface technologies such as GPRS,WLAN, GSM, CDMA, iDEN, etc.) device such as a cell phone, smart phone,Personal Digital Assistant (PDA), a handheld computing device, notebookcomputer, and the like. Additionally and/or alternatively, theinterrogator unit 110, rather than merely forming a constituent part of,or being included within the portable/mobile multimode device, canitself comprise the portable/mobile multimode device in its entirety.

As depicted in FIG. 1, the interrogator unit 110 is in wirelesscommunication with a wireless access point 120. The wireless accesspoint 120 can be a device that connects wireless communication devices,such as interrogator unit 110, together to form a wireless network. Thewireless access point 120, in addition to connecting wirelesscommunication devices to constitute a wireless network, is itselfusually connected to a wired network, and thus can form an intermediaryor gateway between a wired network and a wireless network. Moreover,several wireless access points 120 can be linked together to form alarger network that can facilitate roaming between the several wirelessaccess points 120.

The wireless access point 120 as illustrated in FIG. 1 can be incommunication with a setup server 130. The setup server 130 can be inwired or wireless communication with wireless access point 120, thoughtypically communication between the setup server 130 and wireless accesspoint 120 will be effectuated through wired means, such as via DSL,ADSL, VDSL, and other broadband propagation modalities. The setup server130, possibly in conjunction with an associated data repository 140,provides setup information necessary to configure the interrogator unit110 to join the wireless network to which the wireless access point 120and the setup server 130 form an integral part. Additionally, the setupserver 130 can also furnish the wireless access point 120 withappropriate setup information wherein such information is stored inand/or retrieved from a data repository 140.

The interrogator unit 110 having received the necessary configurationinformation from the wireless access point 120 and/or setup server 130can utilize such information to appropriately propagate time zone, localtime and network identity of the service provider for further use, forexample, the time zone, local time and the network identity can bedisplayed on an interface associated with the interrogator unit 110.

FIG. 2 is another high-level block diagram of a system 200 that providesnetwork identity and time zone functionality for multimode portabledevices in accordance with another aspect of the claimed subject matter.The system 200 can comprise an interrogator unit 210 that can receiveand transmit wireless signals to/from a wireless router 220 that can bein communication with a setup server 240 and associated data repository250 through a firewall 230. The interrogator unit 210, as noted above,can form a constituent component of, or can be included within, amultimode portable device. In addition and/or in the alternative, theinterrogation unit 210, rather than merely forming an included componentof the multimode mobile device, can comprise the mobile device in itsentirety.

As depicted in FIG. 2, the interrogator unit 210 is in wirelesscommunication with a wireless router 220 that can supply the necessaryconfiguration information to the interrogator unit 210 to form a privatenetwork when the interrogator unit 210 is brought within the proximityof the wireless router 220. The wireless router 220 can employ, forexample, the embedded logical functionality of one or more of severalconfiguration protocols, such as DHCP, NTP, etc. to provide thenecessary configuration information to the interrogation unit 210 and tofacilitate its incorporation within the private wireless network overwhich the wireless router 220 presides.

It should be noted that in this configuration and instance that when thewireless router supplies configuration information via the one or moreconfiguration protocols, that the wireless router 220 is in effectsetting up a private network/environment, for example, a private homenetwork, rather than a network to which the general public haveunfettered access. Thus, this being the case the wireless router 220 inorder to provide external access to networks outside the firewall 230 isalso in communication with setup server 240. The setup server 240,possibly in conjunction with the associated data repository 250,provisions the wireless router 220 with appropriate configurationinformation so that the wireless router 220 and the setup server 240 canform at public network/environment. FIG. 3 depicts a more detailedillustration of a system 300 that provides network identity and timezone functionality for multimode portable devices in accordance with oneaspect of the claimed subject matter. The system 300 includes aninterrogator component 310 that can be included within a multimodemobile/portable device such as a cell phone, laptop computer, tabletcomputer, personal digital assistance (PDA), hand held computer, and thelike. The interrogation unit 310 can comprise an identificationcomponent 320 that ascertains the current identity (or network name) ofthe service provider supplying the wireless signal, and a locatorcomponent 330 that determines the current location within which theinterrogation unit 310 resides.

The identification component 320 and the locator component 330 aresupplied with information by way of a wireless access point or awireless router (FIGS. 1 and 2). The information so provided by thewireless access point or wireless router can be by way of one or more ofseveral configuration protocols the functionality of which can beembedded or encapsulated within the wireless access point or wirelessrouter. Alternatively and/or additionally, the identification component320 and the locator component 340 can be provisioned with information byway of a setup server (FIGS. 1 and 2) that can have executing thereonservices (e.g., DHCP, NTP, SIP, etc.) that can supply information neededto determine network identity, time zone, and local time information, inwhich case the wireless access point or wireless router maintain theirtraditional roles of being pass through devices wherein data packets areforwarded across from a first network to a second network.

The information can be supplied to the identification component 320 andlocator component 330 in the following manner. When the interrogatorunit 310 that can include identification component 320 and locatorcomponent 330, is powered on in the vicinity, or is brought within theproximity, of a wireless access point or router, the interrogator unit310 can listen for an advertisement that can be periodically broadcastby a wireless access point and/or a wireless router. The wireless accesspoint and/or wireless router typically broadcasts as the advertisementits service set identifier (SSID). Thus, the interrogator unit 310listens for a service set identifier (SSID) that it recognizes.Recognition can take the form of ascertaining whether or not the serviceset identifier (SSID) matches a service set identifier (SSID) previouslyprovisioned and/or programmed into the interrogator unit 310. Once theinterrogator unit 310 has determined that there is a correspondencebetween a received service set identifier (SSID) and a service setidentifier (SSID) previously provisioned, the interrogator unit 310determines whether encryption (e.g., WEP, WPA, WPA2, and the like) isnecessary to associate with the wireless access point and/or wirelessrouter, and if so, the interrogator unit 310 can supply this informationto the wireless access point and/or wireless router. Alternatively, ifthe received and recognized service set identifier (SSID) indicates thatno encryption is necessary to associate with the wireless access point,the interrogator unit 310 can automatically associate with the wirelessaccess point and/or wireless router.

It should be noted that for the purposes of ease of explication, andthat while the claimed subject matter as set forth herein has beendescribed in terms, or utilization, of a service set identifier (SSID),that the subject matter as claimed is not so limited. As will beappreciated by those of commensurate skill other equivalent modalitiescan be employed to effectuate the aims and purposes of the claimedsubject matter and as such each and every one of these equivalentmodalities, alone and/or in combination, will fall within the purview ofthe subject matter as claimed.

The service set identifier (SSID) information is a code attached to allpackets on a wireless network to identify each packet as part of thatnetwork. The code consists of a maximum of 32 alpha numeric characters(e.g., 0-32 octets). All wireless devices attempting to communicate witheach other must share the same service set identifier (SSID). Apart fromidentifying each packet, the service set identifier (SSID) also servesto uniquely identify a group of wireless network devices used in a givenservice set. It should be noted that the service set identifier (SSID)can be employed in two contexts, first, in the context of a basicservice set (BSS) which can be considered the fundamental building blockof a wireless local area network (WLAN) such that the coverage of asingle wireless access point comprises the basic service set (BSS). Inthis instance the single wireless access point acts as a master tocontrol the stations within the basic service set (BSS), and each basicservice set (BSS) is identified by a SSID which it typically the 48 bitmedia access control (MAC) address of the access point and/or station.In the second context, the service set identifier (SSID) can be utilizedwherein groups of basic service sets (BSSs) are connected with oneanother via a wired and/or wireless backbone network to form anintegrated local area network such that the single service setidentifier (SSID) describes integrated entirety as a whole. The serviceset identifier (SSID) by convention is commonly set to the name of thenetwork operator, such as a company name. Thus, the identificationcomponent 320 can utilize the fact that the service set identifier(SSID) is commonly set and/or mapped to the name of the network operatorto generate appropriate humanly readable identification information at340.

The locator component 330, like the identification component 320,receives configuration data via a wireless access point or wirelessrouter. The configuration data can include an IP address, subnet mask,DNS server and default gateway information, that can be used to bothuniquely identify the interrogator unit 310 on the wireless network overwhich the wireless access point has dominion. The configuration data canbe received from both the wireless access point itself, oralternatively, the configuration data can be obtained from the setupserver. Typically, the configuration data is generated by a Dynamic HostConfiguration Protocol (DHCP) service that can execute on the wirelessaccess point and/or on a setup server. While a Dynamic HostConfiguration Protocol (DHCP) service conventionally just assigns aclient with an IP address, subnet mask, DNS server and default gatewayinformation, other data, such as timezone information, can also besupplied through one or more options and/or sub-options associated withDHCP. The information supplied by the DHCP service via the DHCP optionand/or sub-option can include time zone information and can be in theform of an offset in seconds from Coordinated Universal Time (UTC). Forexample, UTC-5 hours would indicate a time zone representative ofEastern Standard Time (EST) and cities located therein such as Toronto,Canada and Boston, Massachusetts. Similarly, UTC+1 hour would indicate atime zone indicative of Central European Time (CET) and cities such asParis, France and Berlin, Germany. Thus, the locator component 330 canextract from the DHCP options and sub-options general locationinformation, e.g., the time zone in which the interrogator unit 310currently resides, and thereafter, can utilize this information toascertain the appropriate local time that the interregator unit 310 cansubsequently utilize at 340.

FIG. 4 is a more detailed illustration 400 of an identificationcomponent 410 that includes an extraction component 420 and anassociated data repository 430. The identification component 410receives data by way of a wireless access point. The data that isreceived relates to a service set identifier (SSID) that can be a 32character alphanumeric code that identifies the network operator. Theservice set identifier (SSID) is data that is appended to all packetsthat are transmitted and received in a wireless network, and uniquelyidenties each packet as belonging to that network. Since all wirelessdevices that attempt to communicate with each other must share the sameservice set identifier (SSID) the extractor component 420 can identifythe appropriate fields in the service set identifier (SSID) to obtainthe network operator associated with the service set identifier (SSID).It should be noted however that there may be instances where the serviceset identifier (SSID) is merely numeric characters, or a combination ofnumeric, humanly imperceivable characters and humanly recognisablecharacters. Where the service set identifier (SSID) does not comprise ahumanly recognizable name or is different than the operator name thatshould be displayed to the user, the extraction component 420 can accessa lookup table located in the associated data repository 430 todetermine a suitable transliteration to apply in order to manifest ahumanly recognizable network operator name, e.g., a company name. Oncethe identification component 410 has ascertained from the service setidentifier (SSID) an operator identification, this identificationinformation can be output for subsequent utilization at 440.

Alternatively and/or additionally, where the extractor component 420 isunable to locate a correspondence between a service set identifier(SSID) and an item in the lookup table located in the associated datarepository 430, the extractor component 420 can query a backend server(e.g., setup server) to ascertain the correspondence provided networkconnectivity is available to query the backend server.

FIG. 5 is a more detailed illustration 500 of a locator component 510that includes an analytics component 520 and an extractor component 530.The locator component 510 receives data, for example, from a wirelessaccess point, and determines through utilization of the analyticscomponent 520 and extractor component 530 generates time information 540which can be subsequently utilized, for example, displayed on aninterface associated with a portable/mobile multimode device. The datathat is received by the locator component 510 can be data supplied by aserver running one or more configuration protocol, such as Dynamic HostConfiguration Protocol (DHCP), Session Initiation Protocol (SIP),Network Time Protocol (NTP), Extensible Authentication Protocol (EAP),etc.

The Dynamic Host Configuration Protocol (DHCP) is a client-servernetworking protocol. A DHCP server provides configuration parametersspecific to the DHCP client that requests information required by theclient to participate on an IP network. The DHCP protocol automates theassignment of IP addresses, subnet masks, default routers, and other IPparameters. Assignment of the IP addresses and associated parametersusually occurs when a DHCP client boots up or regains connectivity tothe network. The DHCP client typically sends out a query requestingresponse from a DHCP server on a network. The DHCP server then repliesto the client with an assigned IP address, subnet mask, DNS server anddefault gateway information. Additionally, the DHCP server can alsosupply time zone information that can be in the form of an offset inseconds from Coordinated Universal Time (UTC). Thus, where the analyticscomponent 520 determines that the data being received is DHCPinformation, the analytics component 520 can communicate with anextractor component 530 that can then extract the appropriate timefields (e.g., time zone) from the received data. The extractor component530 can then convey this extracted information to the analysis component520 which can then determine the appropriate information necessary todetermine the local time. The local time can then be output as timeinformation 540.

The Session Initiation Protocol (SIP) is a protocol for initiating,modifying and terminating interactive user sessions that involvemultimedia elements such as video, voice, instant messaging, onlinegames, and virtual reality. While SIP is primarily used in setting upand tearing down voice and video calls, the protocol can also be used inany application where session initiation is a requirement. It should benoted however that unlike DHCP that provides time information at bootupor at the time of dispatching an IP address, SIP can provide timinginformation whenever a SIP session is initiated. Thus if the SIPprotocol is extended it can provide a facility to provide timeinformation. Thus, SIP provides a facility to carry timing informationduring the initiation of voice and/or video calls. Consequently, theanalytics component 520 can detect whether setup information is beingdelivered via SIP, and upon such detection, the analytics component 520can indicate to the extractor component 530 that the protocol beingutilized to set up the multimode portable device is SIP, and as suchthat the extractor component 530 can scan the incoming stream of data todetect data associated with time zone. Once the extractor component 530has located the time zone information, it can convey this information tothe analytics component 520 for further processing. The analyticscomponent 520 can use the time zone information that is passed to it bythe extractor component 530 to generate the local time. The local timeand the time zone indicated in the received SIP data can then be out putas time information 540.

The Network Time Protocol (NTP) is a protocol that can be utilized tosynchronize the clock on a device (e.g., setup server, wireless accesspoint, multimode terminal), and is particularly resistant to the effectsof variable latency. The Network Time Protocol (NTP) employs ahierarchical system of clock strata, wherein each stratum defines adistance from a reference clock and an associated accuracy. Stratum 0 ofthe clock strata can include devices such as GPS clocks or other radioclocks.

Generally stratum 0 devices are not attached to a network but areinstead connected to computers (e.g., via an RS-232 connection using apulse per second signal). Computers that are connected to stratum 0devices are generally known as stratum 1 servers or time servers and canact as servers for timing requests from stratum 2 servers via NTP. Thus,for example the setup server and/or the wireless access point canperiodically access one of these stratum 1 and/or 2 servers tosynchronize its clock with that of one of the established time serversand thereafter communicate this synchronized time to multimode portabledevice. Consequently, the analytics component 520 can periodically beprovisioned with timing information from the setup server and/orwireless access point. Additionally, the setup server and/or thewireless access point can provide location information that can beutilized by the analytics component 520 to ascertain and generate thelocal time in which the multimode portable device is currently residing.The correct local time can then be output as time information 540.

Similarly, the Extensible Authentication Protocol (EAP) is anauthentication protocol that can be employed in wireless networks andpoint-to-point connections, and more typically is utilized in wirelessLAN networks. The Extensible Authentication Protocol (EAP) can typicallybe thought of as an authentication framework rather than a specificauthentication mechanism that provides common functions and anegotiation of a desired authentication mechanism. Such mechanisms canbe called EAP methods and can include, for example, EAP-MDS, EAP-OTP,EAP-GTC, EAP-TLS, EAP-SIM, EAP-AKA, PEAP, LEAP, and various other vendorspecific EAP methods. Conventionally, the Extensible AuthenticationProtocol (EAP) is invoked by an 802.1X device, to provide a secureauthentication mechanism and to negotiate a secure Pair-wise Master Key(PMK). It is possible to extend EAP messages to provide location or timezone information to the terminal as part of the authentication process.Thus, the analytics component 520 can indicate to the extractorcomponent 530 that the Extensible Authentication Protocol (EAP) protocolis being utilized. The extractor component 530 can subsequently scan theincoming stream to detect data associated with time and can convey thistime data to the analytics component 520 for further processing. Theanalytics component 520 can thereafter utilize the time data toascertain the local time and output this information as time information540.

FIG. 6 illustrates an example interface 600 that displays the networkidentity and time zone information on a multimode portable/mobiledevice. As stated supra, when a multimode mobile/portable device isbrought within the ambit of a wireless access point, the wireless accesspoint possibly in conjunction with a setup server can provide networkinformation to configure the multimode portable/mobile device to beincluded in the network. The network information so provided can includethe provider name, the time zone and the local time. Thus interface 600that can be associated with the multimode portable/mobile device candisplay a provider name 610 that is derived by an interrogator unit fromWLAN SSID information that is broadcast by the wireless access point.Additionally, the interface 600 can display time zone information 620and local time 630. The time zone information 620 by convention can beascertained as an offset from some global reference denoted as the PrimeMeridian, such as Greenwich Mean Time (GMT), Coordinated Universal Time(UTC), etc. Moreover, given that the appropriate time zone informationhas been ascertained the local time can also be determined and displayedat 630. In addition, indications as to battery life 640, andconnectivity to a network 650 can also be displayed on the exemplaryinterface 600. It should be noted that while the provider name 610, timezone information 620, and local time 630 have been illustrated asresiding in the respective top left and bottom right corners of theexemplary display 600, the claimed subject matter is not so limited. Aswill be apparent to those conversant with the technology, placement ofthe provider name 610, time zone information 620, and local time 630 canbe made in any location of the exemplary display and as such will fallwithin the purview of the claimed subject matter.

FIG. 7 is a depiction 700 of a multimode mobile device traversingbetween two time zones. As indicated by the arrow 710, the depictionillustrates a multimode Smart phone 720 traveling between two timezones, e.g., Time Zone 1 and Time Zone 2. For the purposes ofillustration and not limitation it is to be assumed that Time Zone 1 andTime Zone 2 are non-contiguous (e.g., Time Zone 1 can represent SanFrancisco, and Time Zone 2 can represent Toronto, Canada), and that theSmart phone 720 is powered off for the duration of the traversal betweenthese two time zones. Additionally, it is further assumed for thepurpose of explication and not limitation that the Smart phone 720 whilein use in Time Zone 1 was operating within a GSM network, and that whenSmart phone 720 arrives in Time Zone 2 will operate within a non-3GPPnetwork, such as a Wireless Local Area Network (WLAN) utilizing, forexample, the suite of IEEE 802.11 networking protocols. Thus, uponarrival in Time Zone 2 the Smart phone 720 having last been configuredin a GSM network will have information as to provider identity, timezone and local time relating to that relate to information that was setin Time Zone 1. Typically, in such instances where a multimodemobile/portable device is relocated from a GSM network to a WLANutilizing the IEEE 802.11 based networking protocols, the settingsprovided by the GSM network as to provider identity, time zone andlocation time information are not updated by the WLAN environment.However, through utilization of the claimed subject matter, the serviceprovider identity, time zone and local time information can be set onthe multimode mobile device. Thus, when the multimode Smart phone 720 ispowered up in time zone 2, the Smart phone 720 can listen for anappropriate service set identifier (SSID) broadcast by one or morewireless access point 730. Based on the service set identifier (SSID),the Smart phone 720 can provide identification and authenticationinformation that can be supplied by a subscriber identification module(SIM) that is included with the Smart phone 720. The subscriberauthentication and identification information supplied by the SIM caneither be utilized by the wireless access point 730 to supplyappropriate information (e.g., IP address, time zone information, localtime information, network access identifier (NAI), etc.) to the Smartphone, or alternatively, the wireless access point 730 can forward thesubscriber information to a setup server 740 and associated datarepository 750, whereupon the setup server 740 can supply theappropriate information to the Smart phone 720 via the wireless accesspoint 730. In this manner the Smart phone 720 can be provisioned withinformation relating to the appropriate service provider name, thecorrect time zone within which the Smart phone currently resides and thelocal time determined, so that each of these pieces of information canbe appropriately displayed on the Smart phone 720, thus overriding thesettings previously set while the Smart phone 720 was in time zone 1 andunder the influence of the GSM network.

Referring to FIGS. 8 and 9, methodologies in accordance with variousaspects of the claimed subject matter are illustrated. While, forpurposes of simplicity of explanation, the methodologies are shown anddescribed as a series of acts, it is to be understood and appreciatedthat the claimed subject matter is not limited by the order of acts, assome acts may occur in different orders and/or concurrently with otheracts from that shown and described herein. For example, those skilled inthe art will understand and appreciate that a methodology couldalternatively be represented as a series of interrelated states orevents, such as in a state diagram. Moreover, not all illustrated actsmay be required to implement a methodology in accordance with theclaimed subject matter. Additionally, it should be further appreciatedthat the methodologies disclosed hereinafter and throughout thisspecification are capable of being stored on an article of manufactureto facilitate transporting and transferring such methodologies tocomputers. The term article of manufacture, as used herein, is intendedto encompass a computer program accessible from any computer-readabledevice, carrier, or media.

Turning to FIG. 8, a methodology 800 for obtaining and displaying ahumanly readable network name is illustrated. The methodology 800 startsat 802, and proceeds to 804 whereupon SSID is obtained from a wirelessaccess point or from a protocol server. The SSID may be obtained when amultimode mobile device is powered up in the vicinity of a wirelessaccess point to which the multimode mobile device is authorized to gainaccess to. At 806 the unique network name is extracted from the SSID andat 808 the extracted network name is utilized to locate within apre-provisioned lookup table a humanly readable network name. At 810 thehumanly readable network name that has been obtained from thepre-provisioned lookup table is displayed on an interface associatedwith the multimode mobile device at which point the methodologyterminates at 812.

With reference to FIG. 9, depicted therein is a methodology 900 forobtaining and displaying time zone information and local time. Themethodology 900 commences at 902, and immediately proceeds to 904 whereprotocol (e.g., DHCP, NTP, SIP, EAP, etc.) data from a protocol serveris received. At 906, depending upon the protocol and implementationpertinent location information can be extracted from the receivedprotocol data. Other protocols and implementations however can proceeddirectly to step 910 or to step 912. At 908, based on the locationinformation that has been extracted from the received protocol data, atime zone is determined. Such a time zone determination can involveutilizing one or more pre-provisioned look up tables, or thedetermination can include computing the appropriate time zone based onthe UTC offset supplied by the received protocol data. At 910 the timezone determined at 908 is employed to determine the correct local timefor subsequent display or for further utilization by a multimodeportable device. At 912 the ascertained time zone information and thegenerated local time is displayed on an interface associated with themultimode portable device, at which point the methodology terminates at916.

Referring now to FIG. 10, there is illustrated a block diagram of acomputer operable to provide network identity and time zone informationfor display on an interface associated with a multimode portable device.While shown through use of a computer or computing components, it isunderstood that the claimed subject matter may be implemented as amethod, apparatus, or article of manufacture using standard programmingand/or engineering techniques to produce software, firmware, hardware,or any combination thereof to control a computing device, such as amobile handset, to implement the disclosed subject matter. The term“article of manufacture” as used herein is intended to encompass acomputer program accessible from any computer-readable device, carrier,or media. For example, computer readable media can include but is notlimited to magnetic storage devices (e.g., hard disk, floppy disk,magnetic strips. . . ), optical disks (e.g., compact disk (CD), digitalversatile disk (DVD) . . . ), smart cards, SIM cards, and flash memorydevices (e.g., card, stick, key drive . . . ). Additionally it should beappreciated that a carrier wave can be employed to carrycomputer-readable electronic data such as those used in transmitting andreceiving electronic mail or in accessing a network such as the Internetor a local area network (LAN). Of course, those skilled in the art willrecognize many modifications may be made to this configuration withoutdeparting from the scope or spirit of the claimed subject matter.

In order to provide additional context for various aspects of theclaimed subject matter, FIG. 10 and the following discussion areintended to provide a brief, general description of a suitable computingenvironment 1000 in which the various aspects described herein can beimplemented. While the description above is in the general context ofcomputer-executable instructions that may run on one or more computers,those skilled in the art will recognize that the claimed subject matteralso can be implemented in combination with other program modules and/oras a combination of hardware and software.

Generally, program modules include routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the inventive methods can be practiced with other computer systemconfigurations, including single-processor or multiprocessor computersystems, minicomputers, mainframe computers, as well as personalcomputers, hand-held computing devices, microprocessor-based orprogrammable consumer electronics, and the like, each of which can beoperatively coupled to one or more associated devices.

The illustrated aspects of the claimed subject matter may also bepracticed in distributed computing environments where certain tasks areperformed by remote processing devices that are linked through acommunications network. In a distributed computing environment, programmodules can be located in both local and remote memory storage devices.

A computer typically includes a variety of computer-readable media.Computer-readable media can be any available media that can be accessedby the computer and includes both volatile and non-volatile media,removable and non-removable media. By way of example, and notlimitation, computer-readable media can comprise computer storage mediaand communication media. Computer storage media includes both volatileand non-volatile, removable and non-removable media implemented in anymethod or technology for storage of information such ascomputer-readable instructions, data structures, program modules orother data. Computer storage media includes, but is not limited to, RAM,ROM, EEPROM, flash memory or other memory technology, CD-ROM, digitalvideo disk (DVD) or other optical disk storage, magnetic cassettes,magnetic tape, magnetic disk storage or other magnetic storage devices,or any other medium which can be used to store the desired informationand which can be accessed by the computer.

Communication media typically embodies computer-readable instructions,data structures, program modules or other data in a modulated datasignal such as a carrier wave or other transport mechanism, and includesany information delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communication media includes wired media such as awired network or direct-wired connection, and wireless media such asacoustic, RF, infrared and other wireless media. Combinations of the anyof the above should also be included within the scope ofcomputer-readable media.

With reference again to FIG. 10, the exemplary environment 1000 forimplementing various aspects includes a computer 1002, the computer 1002including a processing unit 1004, a system memory 1006 and a system bus1008. The system bus 1008 couples system components including, but notlimited to, the system memory 1006 to the processing unit 1004. Theprocessing unit 1004 can be any of various commercially availableprocessors, such a single core processor, a multi-core processor, or anyother suitable arrangement of processors.

The system bus 1008 can be any of several types of bus structure thatmay further interconnect to a memory bus (with or without a memorycontroller), a peripheral bus, and a local bus using any of a variety ofcommercially available bus architectures. The system memory 1006 caninclude read-only memory (ROM), random access memory (RAM), high-speedRAM (such as static RAM), EPROM, EEPROM, and/or the like. Additionallyor alternatively, the computer 1002 can include a hard disk drive, uponwhich program instructions, data, and the like can be retained.Moreover, removable data storage can be associated with the computer1002. Hard disk drives, removable media, etc. can be communicativelycoupled to the processing unit 1004 by way of the system bus 1008.

The system memory 1006 can retain a number of program modules, such asan operating system, one or more application programs, other programmodules, and program data. All or portions of an operating system,applications, modules, and/or data can be, for instance, cached in RAM,retained upon a hard disk drive, or any other suitable location. A usercan enter commands and information into the computer 1002 through one ormore wired/wireless input devices, such as a keyboard, pointing andclicking mechanism, pressure sensitive screen, microphone, joystick,stylus pen, etc. A monitor or other type of interface can also beconnected to the system bus 1008.

The computer 1002 may operate in a networked environment using logicalconnections via wired and/or wireless communications to one or moreremote computers, phones, or other computing devices, such asworkstations, server computers, routers, personal computers, portablecomputers, microprocessor-based entertainment appliances, peer devicesor other common network nodes, etc. The computer 1002 can connect toother devices/networks by way of antenna, port, network interfaceadaptor, wireless access point, modem, and/or the like.

The computer 1002 is operable to communicate with any wireless devicesor entities operatively disposed in wireless communication, e.g., aprinter, scanner, desktop and/or portable computer, portable dataassistant, communications satellite, any piece of equipment or locationassociated with a wirelessly detectable tag (e.g., a kiosk, news stand,restroom), and telephone. This includes at least WiFi and Bluetooth™wireless technologies. Thus, the communication can be a predefinedstructure as with a conventional network or simply an ad hoccommunication between at least two devices.

WiFi, or Wireless Fidelity, allows connection to the Internet from acouch at home, a bed in a hotel room, or a conference room at work,without wires. WiFi is a wireless technology similar to that used in acell phone that enables such devices, e.g., computers, to send andreceive data indoors and out; anywhere within the range of a basestation. WiFi networks use radio technologies called IEEE 802.11 (a, b,g, etc.) to provide secure, reliable, fast wireless connectivity. A WiFinetwork can be used to connect computers to each other, to the Internet,and to wired networks (which use IEEE 802.3 or Ethernet). WiFi networksoperate in the unlicensed 2.4 and 5 GHz radio bands, at an 11 Mbps(802.11a) or 54 Mbps (802.11b) data rate, for example, or with productsthat contain both bands (dual band), so the networks can providereal-world performance similar to the basic 10BaseT wired Ethernetnetworks used in many offices.

Now turning to FIG. 11, such figure depicts a GSM/GPRS/IP multimedianetwork architecture 1100 that includes a GSM core network 1101, a GPRSnetwork 1130 and an IP multimedia network 1138. The GSM core network1101 includes a Mobile Station (MS) 1102, at least one Base TransceiverStation (BTS) 1104 and a Base Station Controller (BSC) 1106. The MS 1102is physical equipment or Mobile Equipment (ME), such as a mobile phoneor a laptop computer that is used by mobile subscribers, with aSubscriber identity Module (SIM). The SIM includes an InternationalMobile Subscriber Identity (IMSI), which is a unique identifier of asubscriber. The MS 1102 includes an embedded client 1102 a that receivesand processes messages received by the MS 1102. The embedded client 1102a may be implemented in JAVA and is discuss more fully below.

The embedded client 1102 a communicates with an application 1102 b thatprovides services and/or information to an end user. One example of theapplication may be navigation software that provides near real-timetraffic information that is received via the embedded client 1102 a tothe end user. The navigation software may provide road conditions,suggest alternate routes, etc. based on the location of the MS 1102.Those of ordinary skill in the art understand that there are manydifferent methods and systems of locating an MS 1102.

Alternatively, the MS 1102 and a device 1102 c may be enabled tocommunicate via a short-range wireless communication link, such asBLUETOOTH. For example, a BLUETOOTH SIM Access Profile may be providedin an automobile (e.g., device 1102 c) that communicates with the SIM inthe MS 1102 to enable the automobile's communications system to pullinformation from the MS 1102. The BLUETOOTH communication system in thevehicle becomes an “embedded phone” that employs an antenna associatedwith the automobile. The result is improved reception of calls made inthe vehicle. As one of ordinary skill in the art would recognize, anautomobile is one example of the device 1102 c. There may be an endlessnumber of devices 1102 c that use the SIM within the MS 1102 to provideservices, information, data, audio, video, etc. to end users.

The BTS 1104 is physical equipment, such as a radio tower, that enablesa radio interface to communicate with the MS. Each BTS may serve morethan one MS. The BSC 1106 manages radio resources, including the BTS.The BSC may be connected to several BTSs. The BSC and BTS components, incombination, are generally referred to as a base station (BSS) or radioaccess network (RAN) 1103.

The GSM core network 1101 also includes a Mobile Switching Center (MSC)1108, a Gateway Mobile Switching Center (GMSC) 1110, a Home LocationRegister (HLR) 1112, Visitor Location Register (VLR) 1114, anAuthentication Center (AuC) 1118, and an Equipment Identity Register(EIR) 1116. The MSC 1108 performs a switching function for the network.The MSC also performs other functions, such as registration,authentication, location updating, handovers, and call routing. The GMSC1110 provides a gateway between the GSM network and other networks, suchas an Integrated Services Digital Network (ISDN) or Public SwitchedTelephone Networks (PSTNs) 1120. In other words, the GMSC 1110 providesinterworking functionality with external networks.

The HLR 1112 is a database or component(s) that comprises administrativeinformation regarding each subscriber registered in a corresponding GSMnetwork. The HLR 1112 also includes the current location of each MS. TheVLR 1114 is a database or component(s) that contains selectedadministrative information from the HLR 1112. The VLR containsinformation necessary for call control and provision of subscribedservices for each MS currently located in a geographical area controlledby the VLR. The HLR 1112 and the VLR 1114, together with the MSC 1108,provide the call routing and roaming capabilities of GSM. The AuC 1116provides the parameters needed for authentication and encryptionfunctions. Such parameters allow verification of a subscriber'sidentity. The EIR 1118 stores security-sensitive information about themobile equipment.

A Short Message Service Center (SMSC) 1109 allows one-to-one ShortMessage Service (SMS) messages to be sent to/from the MS 1102. A PushProxy Gateway (PPG) 1111 is used to “push” (e.g., send without asynchronous request) content to the MS 1102. The PPG 1111 acts as aproxy between wired and wireless networks to facilitate pushing of datato the MS 1102. A Short Message Peer to Peer (SMPP) protocol router 1113is provided to convert SMS-based SMPP messages to cell broadcastmessages. SMPP is a protocol for exchanging SMS messages between SMSpeer entities such as short message service centers. It is often used toallow third parties, e.g., content suppliers such as news organizations,to submit bulk messages.

To gain access to GSM services, such as speech, data, and short messageservice (SMS), the MS first registers with the network to indicate itscurrent location by performing a location update and IMSI attachprocedure. The MS 1102 sends a location update including its currentlocation information to the MSC/VLR, via the BTS 1104 and the BSC 1106.The location information is then sent to the MS's HLR. The HLR isupdated with the location information received from the MSC/VLR. Thelocation update also is performed when the MS moves to a new locationarea. Typically, the location update is periodically performed to updatethe database as location updating events occur.

The GPRS network 1130 is logically implemented on the GSM core networkarchitecture by introducing two packet-switching network nodes, aserving GPRS support node (SGSN) 1132, a cell broadcast and a GatewayGPRS support node (GGSN) 1134. The SGSN 1132 is at the same hierarchicallevel as the MSC 1108 in the GSM network. The SGSN controls theconnection between the GPRS network and the MS 1102. The SGSN also keepstrack of individual MS's locations and security functions and accesscontrols.

A Cell Broadcast Center (CBC) 1133 communicates cell broadcast messagesthat are typically delivered to multiple users in a specified area. CellBroadcast is one-to-many geographically focused service. It enablesmessages to be communicated to multiple mobile phone customers who arelocated within a given part of its network coverage area at the time themessage is broadcast.

The GGSN 1134 provides a gateway between the GPRS network and a publicpacket network (PDN) or other IP networks 1136. That is, the GGSNprovides interworking functionality with external networks, and sets upa logical link to the MS through the SGSN. When packet-switched dataleaves the GPRS network, it is transferred to an external TCP-IP network1136, such as an X.25 network or the Internet. In order to access GPRSservices, the MS first attaches itself to the GPRS network by performingan attach procedure. The MS then activates a packet data protocol (PDP)context, thus activating a packet communication session between the MS.the SGSN, arc the GGSN.

In a GSM/GPRS network, GPRS services and GSM services can be used inparallel. The MS can operate in one three classes: class A, class B, andclass C. A class A MS can attach to the network for both GPRS servicesand GSM services simultaneously. A class A MS also supports simultaneousoperation of GPRS services and GSM services. For example, class Amobiles can receive GSM voice/data/SMS calls and GPRS data calls at thesame time. A class B MS can attach to the network for both GPRS servicesand GSM services simultaneously. However, a class B MS does not supportsimultaneous operation of the GPRS services and GSM services. That is, aclass B MS can only use one of the two services at a given time. A classC MS can attach for only one of the GPRS services and GSM services at atime. Simultaneous attachment and operation of GPRS services and GSMservices is not possible with a class C MS.

A GPRS network 1130 can be designed to operate in three networkoperation modes (NOM1, NOM2 and NOM3). A network operation mode of aGPRS network is indicated by a parameter in system information messagestransmitted within a cell. The system information messages dictates a MSwhere to listen for paging messages and how signal towards the network.The network operation mode represents the capabilities of the GPRSnetwork. In a NOM1 network, a MS can receive pages from a circuitswitched domain (voice call) when engaged in a data call. The MS cansuspend the data call or take both simultaneously, depending on theability of the MS. In a NOM2 network, a MS may not received pages from acircuit switched domain when engaged in a data call, since the MS isreceiving data and is not listening to a paging channel. In a NOM3network, a MS can monitor pages for a circuit switched network whilereceived data and vise versa.

The IP multimedia network 1138 was introduced with 3GPP Release 5,andincludes an IP multimedia subsystem (IMS) 1140 to provide richmultimedia services to end users. A representative set of the networkentities within the IMS 1140 are a call/session control function (CSCF),a media gateway control function (MGCF) 1146, a media gateway (MGW)1148, and a master subscriber database, called a home subscriber server(HSS) 1150. The HSS 1150 may be common to the GSM network 1101, the GPRSnetwork 1130 as well as the IP multimedia network 1138.

The IP multimedia system 1140 is built around the call/session controlfunction, of which there are three types: an interrogating CSCF (I-CSCF)1143, a proxy CSCF (P-CSCF) 1142, and a serving CSCF (S-CSCF) 1144. TheP-CSCF 1142 is the MS's first point of contact with the IMS 1140. TheP-CSCF 1142 forwards session initiation protocol (SIP) messages receivedfrom the MS to an SIP server in a home network (and vice versa) of theMS. The P-CSCF 1142 may also modify an outgoing request according to aset of rules defined by the network operator (for example, addressanalysis and potential modification).

The I-CSCF 1143 forms an entrance to a home network and hides the innertopology of the home network from other networks and providesflexibility for selecting an S-CSCF. The I-CSCF 1143 may contact asubscriber location function (SLF) 1145 to determine which HSS 1150 touse for the particular subscriber, if multiple HSS's 1150 are present.The S-CSCF 1144 performs the session control services for the MS 1102.This includes routing originating sessions to external networks androuting terminating sessions to visited networks. The S-CSCF 1144 alsodecides whether an application server (AS) 1152 is required to receiveinformation on an incoming SIP session request to ensure appropriateservice handling. This decision is based on information received fromthe HSS 1150 (or other sources, such as an application server 1152). TheAS 1152 also communicates to a location server 1156 (e.g., a GatewayMobile Location Center (GMLC)) that provides a position (e.g.,latitude/longitude coordinates) of the MS 1102.

The HSS 1150 contains a subscriber profile and keeps track of which corenetwork node is currently handling the subscriber. It also supportssubscriber authentication and authorization functions (AAA). In networkswith more than one HSS 1150, a subscriber location function providesinformation on the HSS 1150 that contains the profile of a givensubscriber.

The MGCF 1146 provides interworking functionality between SIP sessioncontrol signaling from the IMS 1140 and ISUP/BICC call control signalingfrom the external GSTN networks (not shown). It also controls the mediagateway (MGW) 1148 that provides user-plane interworking functionality(e.g., converting between AMR- and PCM-coded voice). The MGW 1148 alsocommunicates with other IP multimedia networks 1154.

What has been described above includes examples of the claimed subjectmatter. It is, of course, not possible to describe every conceivablecombination of components or methodologies for purposes of describingthe claimed subject matter, but one of ordinary skill in the art mayrecognize that many further combinations and permutations of such matterare possible. Accordingly, the claimed subject matter is intended toembrace all such alterations, modifications and variations that fallwithin the spirit and scope of the appended claims. Furthermore, to theextent that the term “includes” is used in either the detaileddescription or the claims, such term is intended to be inclusive in amanner similar to the term “comprising” as “comprising” is interpretedwhen employed as a transitional word in a claim.

1. A method for ascertaining and displaying time zone information and alocal time, comprising: receiving protocol data from a setup server anda multimode device; extracting location information from the protocoldata; determining a time zone based on the location information; andgenerating the local time based on the time zone.
 2. The method of claim1, further comprising: displaying the generated local time on aninterface associated with the multimode mobile device.
 3. The method ofclaim 1, wherein the receiving comprises obtaining the protocol datafrom a Dynamic Host Configuration Protocol (DHCP) service.
 4. The methodof claim 1, wherein the receiving comprises obtaining the protocol datafrom a Network Time Protocol (NTP) service.
 5. The method of claim 1,wherein the receiving comprises obtaining the protocol data from aSession Initiation Protocol (SIP) service.
 6. The method of claim 1,wherein the receiving comprises obtaining the protocol data from anExtensible Authentication Protocol (EAP) service.
 7. A method forproviding a multimode mobile device with a local time and a networkidentification, comprising: receiving first protocol data and secondprotocol data; extracting the network identification from the firstprotocol data substantially when the multimode mobile device transitionsfrom a mobile wireless environment to a private network environment;determining the local time from the second protocol data substantiallywhen the multimode mobile device transitions from the mobile wirelessenvironment to the private network environment; and transmitting thenetwork identification and the local time to the multimode mobiledevice.
 8. The method of claim 7, wherein the receiving the firstprotocol data further comprises, receiving a network identifiercomprising a service set identification (SSID) that uniquely identifiesat least one of a basic service set (BSS) or an extended service set(ESS).
 9. The method of claim 8, wherein the extracting furthercomprises, comparing the SSID to a lookup table to determine the networkidentification and a human readable network name.
 10. The method ofclaim 9, wherein the transmitting further comprises, transmitting thehuman readable network name.
 11. The method of claim 7, wherein thereceiving further comprises, receiving the second protocol data from atleast one of a Dynamic Host Configuration Protocol (DHCP) service, aSession Initiation Protocol (SIP) service, an Extensible AuthenticationProtocol (EAP) service, or a Network Time Protocol (NTP) service. 12.The method of claim 7, wherein the receiving further comprises,receiving the second protocol data from at least one of a wirelessaccess point, a protocol server, a wireless router, or the multimodedevice.
 13. The method of claim 7, wherein the extracting furthercomprises, extracting a human readable network name.
 14. The method ofclaim 13, wherein the determining further comprises, determining acurrent time zone.
 15. The method of claim 14, wherein the transmittingfurther comprises, transmitting the human readable network name and thecurrent time zone.
 16. The method of claim 15, further comprising:displaying, on an interface associated with the multimode mobile device,the human readable network name, the current time zone and the localtime.
 17. The method of claim 7, wherein the receiving furthercomprises, receiving the second protocol data from a Dynamic HostConfiguration Protocol (DHCP) service, the DHCP service including timezone information in the form of an offset in seconds from CoordinatedUniversal Time (UTC).
 18. The method of claim 7, wherein the receivingfurther comprises, receiving the second protocol data from a SessionInitiation Protocol (SIP) service, the SIP service including a facilityto carry time zone information during the initiation of a session. 19.The method of claim 7, wherein the receiving further comprises,receiving the second protocol data from an Extensible AuthenticationProtocol (EAP) service which provides location or time zone informationas part of the authentication process.
 20. A method for determining ahuman readable network name, comprising obtaining a network identifierfrom a wireless access point; extracting from the network identifier anetwork name; ascertaining the human readable network name based on apre-provisioned database and the network name; and displaying the humanreadable network name.