Abstract:
A device, system and method for preventing audio loss is provided. A device receives scheduling data, for a plurality of timeslots, indicative of when different communication types are to occur in a present voicecall, the plurality of timeslots including at least one data timeslot for transmitting data on the present voicecall. When a state of the present voicecall associated with a potential collision with the data for transmission in the at least one data timeslot is determined, the device cancels transmission of the data in the at least one data timeslot.
Abstract:
Disclosed is a radio system, method, and device for a mobile station to indicate to an authentication controller, in an authentication response message, which of a plurality of group key link layer encryption keys (GKEK)s it currently has in its possession, and to work with the authentication controller to more intelligently manage multiple GKEKs. The authentication controller can use the information obtained from the authentication response message to determine which of a plurality of GKEKs to advertise in a key announcement broadcast. Furthermore, individual requests for a future LLE key (LEK) to be used for link layer encryption (LLE) encrypting and decrypting inbound and outbound group communications between base station(s) and mobile station(s) are responded to with a broadcast GKEK-encrypted transmission including the future LEK. Only the requesting mobile station transmits an acknowledgment packet in response to the broadcast.
Abstract:
Disclosed is a method of rekeying radios for link layer encryption (LLE) in a radio network using a bifurcated crypto period. During a first portion of a first LLE crypto period during which a first LLE key (LEK) is used to LLE encrypt communications between a base station and mobile stations operating within a corresponding coverage area of the base station, a radio network communications device prevents individual ones of the mobile stations from requesting a second LEK to be used during a second LLE crypto period after the first LLE crypto period. During a second portion of the first LLE crypto period, the radio network communications device allows individual ones of the mobile stations to request the second LEK. A mobile station configured to operate in accordance with the bifurcated crypto period, and provide information regarding keys in its possession via an authentication response ISP, is also disclosed.