Abstract:
Methods and systems for connecting a wireless communications device to a deployable wireless communications network. The method includes receiving, from the wireless communications device via a mobile management entity (MME) configured to operate as an extensible authentication protocol (EAP) authenticator, an extensible authentication protocol packet. The method further includes authenticating the wireless communications device based on the extensible authentication protocol packet. The method further includes establishing a first wireless connection between the wireless communications device and a deployable subscription bootstrapping service of the deployable wireless communications network. The method further includes generating a subscription profile for the wireless communications device, and communicating the subscription profile to the wireless communications device via the first wireless connection. The method further includes discontinuing the first wireless connection, and establishing a second wireless connection between the wireless communications device and the deployable wireless communications network using the subscription profile.
Abstract:
Method and system for authenticating a session on a communication device. One method includes determining a use context of the communication device and an authentication status of the communication device. The method further includes determining a predetermined period of time based on at least one of the use context and the authentication status. The method further includes generating biometric templates based on at least one of the use context and the authentication status. The method further includes selecting a matching threshold for the biometric templates based on at least one of the use context and the authentication status. The method further includes comparing a match score of each of the biometric templates to the matching threshold to determine a passing amount of biometric templates with match scores that meet or exceed the matching threshold. The method further includes authenticating the session on the communication device.
Abstract:
A collaboration manager server is provided that bridges a PAN with a WAN. When the collaboration manager server receives, from the first mobile device, a request to establish a second network service, wherein the second network service provides for bridging a PAN with a WAN, the collaboration manager server determines a credential to be used by mobile devices who wish to join the second network service and, in response to determining that the first mobile device is authorized to make such a request, establishes the second network service. Further, in response to receiving, from a second mobile device, a request to join the second network service, wherein the request to join the second network service comprises the credential, the collaboration manager server joins the second mobile device to the second network service and bridges traffic between the first mobile device and the second mobile device using the second network service.
Abstract:
A method and apparatus for bootstrapping secure connections between wireless devices and deployable wireless communications networks. Using the method, a wireless device establishes a connection to an auxiliary network, and then establishes a connection with a deployable subscription bootstrapping service. The deployable subscription bootstrapping service generates a temporary subscription profile, including a temporary shared symmetric key, for the wireless device, writes the temporary profile to a deployable home subscriber server, and communicates the temporary profile to the wireless device, which stores the temporary profile. The wireless device then terminates the connection to the auxiliary network, and initiates a connection with the deployable wireless communications network using the temporary subscription profile.
Abstract:
Disclosed herein are methods and systems for maintaining routing tables in an ad-hoc wireless network. In an embodiment, a first node receives, from a second node having a second network address, a first data packet having a third network address as the source address and a fourth network address as the destination address. The first node determines that its server routing table (i) contains a stored server route to the fourth network address and (ii) does not contain a server route to the third network address, and responsively adds, to its server-to-client routing table, a server-to-client route to the third network address with the second network address as the associated next hop. The first node transmits, to the second node at the second network address, a second data packet that has the third network address as the destination address.
Abstract:
A system for, and method of, single sign-on collaboration among a plurality of mobile devices, includes a server for issuing a first identity token to subsequently authenticate a user of a first of the mobile devices to a service provider, and for generating and sending a collaboration credential to the first device based on the first identity token or user authentication. The first device sends the collaboration credential generated by the server to a second device paired with the first device. The server also issues a second identity token to subsequently authenticate to the service provider the user of the second device based on the collaboration credential received from the first device, to support single sign-on collaboration for the user across the plurality of mobile devices.
Abstract:
A system for managing incidents includes an electronic display, an electronic processor coupled to the electronic display, and memory coupled to the electronic processor and storing instructions. The instructions, when executed by the electronic processor, cause the system to display an incident card on the electronic display, display first incident information on a front side of the incident card, receive a first user input indicating to flip to a back side of the incident card, determine user focus information, generate second incident information based on the user focus information, and display a back side of the card responsive to receiving the first user input. The back side includes the second incident information.
Abstract:
A system for managing incidents includes an electronic display, an electronic processor coupled to the electronic display, and memory coupled to the electronic processor and storing instructions. The instructions, when executed by the electronic processor, cause the system to display an incident card on the electronic display, display first incident information on a front side of the incident card, receive a first user input indicating to flip to a back side of the incident card, determine user focus information, generate second incident information based on the user focus information, and display a back side of the card responsive to receiving the first user input. The back side includes the second incident information.
Abstract:
A method and apparatus for bootstrapping secure connections between wireless devices and deployable wireless communications networks. Using the method, a wireless device establishes a connection to an auxiliary network, and then establishes a connection with a deployable subscription bootstrapping service. The deployable subscription bootstrapping service generates a temporary subscription profile, including a temporary shared symmetric key, for the wireless device, writes the temporary profile to a deployable home subscriber server, and communicates the temporary profile to the wireless device, which stores the temporary profile. The wireless device then terminates the connection to the auxiliary network, and initiates a connection with the deployable wireless communications network using the temporary subscription profile.
Abstract:
An access point is provided that bridges a PAN with a LAN. When the access point receives, from a first mobile device, a request to authenticate with the access point for a first network service and a request to establish a second network service, wherein the second network service provides for bridging a PAN with a LAN, the access point determines a credential to be used by mobile devices who wish to join the second network service and, in response to determining that the first mobile device is authorized to make such a request, establishes the second network service. Further, in response to receiving, from a second mobile device, a request to join the second network service, which request includes the credential, the access point joins the second mobile device to the second network service and bridges traffic between the first and second mobile devices using the second network service.