Abstract:
A method and system for authenticating a communication device with an application server. The application server includes a gateway registration port, a gateway server port, and an electronic processor. The electronic processor is configured to receive, via the gateway registration port, a registration request, including a unique identifier, from a first device over a first communications network that operates in accordance with a first modality and receive, at the gateway server port, an access request including an identifier from an unknown device over a second communications network that operates in accordance with a second modality. The electronic processor is configured to compare the second identifier with the first identifier to determine if the identifiers match, grant the unknown device access when the identifiers match, and deny the unknown device access when the identifiers do not match.
Abstract:
A collaboration manager server is provided that bridges a PAN with a WAN. When the collaboration manager server receives, from the first mobile device, a request to establish a second network service, wherein the second network service provides for bridging a PAN with a WAN, the collaboration manager server determines a credential to be used by mobile devices who wish to join the second network service and, in response to determining that the first mobile device is authorized to make such a request, establishes the second network service. Further, in response to receiving, from a second mobile device, a request to join the second network service, wherein the request to join the second network service comprises the credential, the collaboration manager server joins the second mobile device to the second network service and bridges traffic between the first mobile device and the second mobile device using the second network service.
Abstract:
A method and system for authenticating a communication device with an application server. The application server includes a gateway registration port, a gateway server port, and an electronic processor. The electronic processor is configured to receive, via the gateway registration port, a registration request, including a unique identifier, from a first device over a first communications network that operates in accordance with a first modality and receive, at the gateway server port, an access request including an identifier from an unknown device over a second communications network that operates in accordance with a second modality. The electronic processor is configured to compare the second identifier with the first identifier to determine if the identifiers match, grant the unknown device access when the identifiers match, and deny the unknown device access when the identifiers do not match.
Abstract:
Methods and systems for controlling inter-agency, incident scene communications. One method includes storing, in a memory of a first dispatch device of a first agency, subscription information from a second agency. The method further includes establishing a geo-fence surrounding an incident and a talk group that allows communication devices to communicate with each other within the geo-fence. The method further includes identifying the second agency based on the geo-fence and transmitting a request to the second agency based on incident information and the subscription information. The request includes role information based on the incident information. The method further includes receiving information relating to an available communication device affiliated with the second agency. The available communication device is selected based on the role information. The method further includes transmitting instructions to the available communication device to control the available communication device to join the talk group.
Abstract:
Disclosed is a method of rekeying radios for link layer encryption (LLE) in a radio network using a bifurcated crypto period. During a first portion of a first LLE crypto period during which a first LLE key (LEK) is used to LLE encrypt communications between a base station and mobile stations operating within a corresponding coverage area of the base station, a radio network communications device prevents individual ones of the mobile stations from requesting a second LEK to be used during a second LLE crypto period after the first LLE crypto period. During a second portion of the first LLE crypto period, the radio network communications device allows individual ones of the mobile stations to request the second LEK. A mobile station configured to operate in accordance with the bifurcated crypto period, and provide information regarding keys in its possession via an authentication response ISP, is also disclosed.
Abstract:
A communication system is provided for controlling group affiliation in a wireless communication system, wherein a group management server determines, or modifies, a set of one or more group affiliation parameters and group de-affiliation parameters associated with a mobile device based on capabilities of another mobile device and/or a set of one or more group affiliation parameters and group de-affiliation parameters associated with the another mobile device. The mobile devices may be mobile devices of a same user or may be mobile devices of different users. In other embodiments of the present invention, in response to receiving a request to initiate a group call involving a group that includes multiple mobile devices of a same user, the group management server may select only one of the multiple mobile devices to participate in the group call and arrange for only the selected mobile device to participate in the group call.
Abstract:
An access point is provided that bridges a PAN with a LAN. When the access point receives, from a first mobile device, a request to authenticate with the access point for a first network service and a request to establish a second network service, wherein the second network service provides for bridging a PAN with a LAN, the access point determines a credential to be used by mobile devices who wish to join the second network service and, in response to determining that the first mobile device is authorized to make such a request, establishes the second network service. Further, in response to receiving, from a second mobile device, a request to join the second network service, which request includes the credential, the access point joins the second mobile device to the second network service and bridges traffic between the first and second mobile devices using the second network service.
Abstract:
Methods and systems for LLE encrypting and decrypting voice message streams (VMSs) already supporting eTe encryption are disclosed. In one example, LLE and eTe encryption initialization vectors (EIVs) are interleaved such that an LLE EIV retrieved from one of a header and a data unit is used to LLE decrypt both the header or data unit and a subsequent data unit. A recovered eTe EIV is used to eTe decrypt voice payloads in one or more subsequent data units. In another example, a base station dynamically LLE encrypts a VMS already supporting eTe encrypting by determining whether a received VMS is eTe encrypted, and ii it is not generating a new LLE EIV, and if it is, re-using the pre-existing eTe EIV for LLE encryption. The LLE encrypted (and perhaps eTe encrypted) VMS is then sent over the air to one or more mobile stations.
Abstract:
Disclosed is a radio system, method, and device for a mobile station to indicate to an authentication controller, in an authentication response message, which of a plurality of group key link layer encryption keys (GKEK)s it currently has in its possession, and to work with the authentication controller to more intelligently manage multiple GKEKs. The authentication controller can use the information obtained from the authentication response message to determine which of a plurality of GKEKs to advertise in a key announcement broadcast. Furthermore, individual requests for a future LLE key (LEK) to be used for link layer encryption (LLE) encrypting and decrypting inbound and outbound group communications between base station(s) and mobile station(s) are responded to with a broadcast GKEK-encrypted transmission including the future LEK. Only the requesting mobile station transmits an acknowledgment packet in response to the broadcast.
Abstract:
Upon connecting to the broadband and narrowband networks, a communication device registers with a broadband wireless network via a broadband interface and with a narrowband wireless network via a narrowband interface. One of (i) a first change in status indication is provided from the broadband interface to the narrowband interface reflecting a change in status between the broadband interface and the broadband network, and (ii) a second change in status indication is provided from the narrowband interface to the broadband interface reflecting a change in status between the narrowband interface and the narrowband network. The communication device transmits one of (i) the first change in status indication and a narrowband status indication to a network component via the narrowband interface, and (ii) the second change in status indication and a broadband status indication to the network component via the broadband interface.