Abstract:
An access point is provided that bridges a PAN with a LAN. When the access point receives, from a first mobile device, a request to authenticate with the access point for a first network service and a request to establish a second network service, wherein the second network service provides for bridging a PAN with a LAN, the access point determines a credential to be used by mobile devices who wish to join the second network service and, in response to determining that the first mobile device is authorized to make such a request, establishes the second network service. Further, in response to receiving, from a second mobile device, a request to join the second network service, which request includes the credential, the access point joins the second mobile device to the second network service and bridges traffic between the first and second mobile devices using the second network service.
Abstract:
A computer apparatus and computer-implemented apparatus for logging audio to an audio logger. Audio is transmitted from a source communication device. At least one receiving communication device receives the audio. The audio is logged to an audio logger, for example by the source communication device and the receiving communication device. A hash of the audio is computed and the hash of the audio and communication parameters related to the audio are stored in a blockchain.
Abstract:
A communication system is provided for controlling group affiliation in a wireless communication system, wherein a group management server determines, or modifies, a set of one or more group affiliation parameters and group de-affiliation parameters associated with a mobile device based on capabilities of another mobile device and/or a set of one or more group affiliation parameters and group de-affiliation parameters associated with the another mobile device. The mobile devices may be mobile devices of a same user or may be mobile devices of different users. In other embodiments of the present invention, in response to receiving a request to initiate a group call involving a group that includes multiple mobile devices of a same user, the group management server may select only one of the multiple mobile devices to participate in the group call and arrange for only the selected mobile device to participate in the group call.
Abstract:
A collaboration manager server is provided that bridges a PAN with a WAN. When the collaboration manager server receives, from the first mobile device, a request to establish a second network service, wherein the second network service provides for bridging a PAN with a WAN, the collaboration manager server determines a credential to be used by mobile devices who wish to join the second network service and, in response to determining that the first mobile device is authorized to make such a request, establishes the second network service. Further, in response to receiving, from a second mobile device, a request to join the second network service, wherein the request to join the second network service comprises the credential, the collaboration manager server joins the second mobile device to the second network service and bridges traffic between the first mobile device and the second mobile device using the second network service.
Abstract:
Disclosed is a method of rekeying radios for link layer encryption (LLE) in a radio network using a bifurcated crypto period. During a first portion of a first LLE crypto period during which a first LLE key (LEK) is used to LLE encrypt communications between a base station and mobile stations operating within a corresponding coverage area of the base station, a radio network communications device prevents individual ones of the mobile stations from requesting a second LEK to be used during a second LLE crypto period after the first LLE crypto period. During a second portion of the first LLE crypto period, the radio network communications device allows individual ones of the mobile stations to request the second LEK. A mobile station configured to operate in accordance with the bifurcated crypto period, and provide information regarding keys in its possession via an authentication response ISP, is also disclosed.
Abstract:
User personalities are presented for interoperable push to talk (PTT) across a plurality of separate PTT networks. A gateway server device (GSD) maintains a user personality mapping that, for each subscriber device and each of a plurality of separate PTT networks communicatively coupled to the GSD, maps a first unique identifier used to identify the subscriber device in a first PTT network with respective second unique identifiers used to identify the subscriber device in other ones of the plurality of PTT networks. The GSD receives a transmission from a source subscriber device in the first PTT network destined for target subscriber devices in the other PTT networks, and modifies the transmission by replacing the first unique identifier with the respective second unique identifiers as a function of the user personality mapping, and forwards the corresponding modified transmissions to the other PTT networks.
Abstract:
A method for a tethered device to select an external data network includes selecting a desired data network at the tethered device through an associated Access Point Name; sending the associated Access Point Name to a broadband device via a control message over a collaboration interface with the broadband device; and sending data to the broadband device destined for the desired data network over the collaboration interface, wherein the broadband device is configured to send the data to the desired data network based on the associated Access Point Name.
Abstract:
A method, a subscriber unit, and a system provide concurrent voice and data systems and methods that “steal bits” from voice frames for low-speed concurrent data. In this manner, concurrent voice and data is supported over protocols that require voice-only in current operation such as Project 25 (P25). The stealing of bits from voice is done in a manner that is transparent and not noticeable to users. The systems and methods enable replication of signaling on the downlink and wireline segments that is replaced on the uplink, encoding of interleaving blocks that extend across multiple Layer 2 voice logical data units (LDUs), flexibility in replacing voice data in LDUs, indication of the availability of the service and an interleaving schedule, notification of upcoming stealing events via signaling, and the like.
Abstract:
Disclosed is a radio system, method, and device for a mobile station to indicate to an authentication controller, in an authentication response message, which of a plurality of group key link layer encryption keys (GKEK)s it currently has in its possession, and to work with the authentication controller to more intelligently manage multiple GKEKs. The authentication controller can use the information obtained from the authentication response message to determine which of a plurality of GKEKs to advertise in a key announcement broadcast. Furthermore, individual requests for a future LLE key (LEK) to be used for link layer encryption (LLE) encrypting and decrypting inbound and outbound group communications between base station(s) and mobile station(s) are responded to with a broadcast GKEK-encrypted transmission including the future LEK. Only the requesting mobile station transmits an acknowledgment packet in response to the broadcast.
Abstract:
Disclosed is a radio system, method, and device for a mobile station to indicate to an authentication controller, in an authentication response message, which of a plurality of group key link layer encryption keys (GKEK)s it currently has in its possession, and to work with the authentication controller to more intelligently manage multiple GKEKs. The authentication controller can use the information obtained from the authentication response message to determine which of a plurality of GKEKs to advertise in a key announcement broadcast. Furthermore, individual requests for a future LLE key (LEK) to be used for link layer encryption (LLE) encrypting and decrypting inbound and outbound group communications between base station(s) and mobile station(s) are responded to with a broadcast GKEK-encrypted transmission including the future LEK. Only the requesting mobile station transmits an acknowledgment packet in response to the broadcast.