Abstract:
A computer apparatus and computer-implemented apparatus for logging audio to an audio logger. Audio is transmitted from a source communication device. At least one receiving communication device receives the audio. The audio is logged to an audio logger, for example by the source communication device and the receiving communication device. A hash of the audio is computed and the hash of the audio and communication parameters related to the audio are stored in a blockchain.
Abstract:
Disclosed is a radio system, method, and device for a mobile station to indicate to an authentication controller, in an authentication response message, which of a plurality of group key link layer encryption keys (GKEK)s it currently has in its possession, and to work with the authentication controller to more intelligently manage multiple GKEKs. The authentication controller can use the information obtained from the authentication response message to determine which of a plurality of GKEKs to advertise in a key announcement broadcast. Furthermore, individual requests for a future LLE key (LEK) to be used for link layer encryption (LLE) encrypting and decrypting inbound and outbound group communications between base station(s) and mobile station(s) are responded to with a broadcast GKEK-encrypted transmission including the future LEK. Only the requesting mobile station transmits an acknowledgment packet in response to the broadcast.
Abstract:
A method and apparatus for connecting a Bluetooth device is provided herein. During operation a priority list is used by a Bluetooth piconet master. The Bluetooth piconet master will receive feedback from all slave devices, and then control connections among devices within the piconet based on the priority list and the feedback. The Bluetooth piconet master controls the piconet such that when a first Bluetooth device is connected to a lower-priority Bluetooth device, connection to a higher-priority Bluetooth device will only take place if the higher-priority Bluetooth device becomes “active” (as determined from the feedback). Therefore, as long as the higher-priority Bluetooth device remains “inactive”, the connection to the lower-priority Bluetooth device will remain.
Abstract:
A method, a subscriber unit, and a system provide concurrent voice and data systems and methods that “steal bits” from voice frames for low-speed concurrent data. In this manner, concurrent voice and data is supported over protocols that require voice-only in current operation such as Project 25 (P25). The stealing of bits from voice is done in a manner that is transparent and not noticeable to users. The systems and methods enable replication of signaling on the downlink and wireline segments that is replaced on the uplink, encoding of interleaving blocks that extend across multiple Layer 2 voice logical data units (LDUs), flexibility in replacing voice data in LDUs, indication of the availability of the service and an interleaving schedule, notification of upcoming stealing events via signaling, and the like.
Abstract:
A method of interoperating link layer encrypted (LLE) and non-LLE communications in a radio network include receiving, at a radio controller (RC), a new call request for an LLE call, determining that there are one or more currently active non-LLE calls, and causing a message to be transmitted on each channel carrying one of the one or more currently active non-LLE calls informing mobile stations (MSs) participating in the non-LLE calls that a new LLE call has been or is-to-be granted. MSs participating in one of the non-LLE calls and receiving the message determine from the message or via a call grant obtained via a control channel, whether the new LLE call is of interest, and if so, switching to a channel assigned to the new LLE call and participating in the new LLE call.