Abstract:
A method and apparatus is provided for connecting a communication device to a deployable system. The deployable system obtains at least one deployable key derived on a fixed system for the deployable system based on an existing key stored on a database of the fixed system, wherein the existing key is used to authenticate a communication device. The deployable system stores the derived key. Subsequent to the storing, the deployable system is activated to provide communication resources to communication devices disconnected from the fixed system. The activated deployable system is not connected to the fixed system. The activated deployable system receives an authentication request from the communication device requesting connection to the deployable system; generates authentication vectors using the at least one derived deployable key; and authenticates an authentication response received from the communication device using the authentication vectors.
Abstract:
Disclosed herein are methods and systems for allocating resources from component carriers to a public-safety mobile radio. An embodiment takes the form of a process that is carried out by carried out by a Long-Term Evolution (LTE) Evolved Node B (eNodeB). The eNodeB makes a first determination to allocate resources to a given mobile radio. The eNodeB makes a second determination that the given mobile radio is a public-safety mobile radio. In response to making the first and second determinations, the eNodeB selects, based on one or more public-safety-communication criteria, a component carrier from among a plurality of component carriers managed by the eNodeB. The eNodeB allocates resources on the selected eNodeB component carrier to the given mobile radio.
Abstract:
A method and apparatus is provided for connecting a communication device to a deployable system. The deployable system obtains at least one deployable key derived on a fixed system for the deployable system based on an existing key stored on a database of the fixed system, wherein the existing key is used to authenticate a communication device. The deployable system stores the derived key. Subsequent to the storing, the deployable system is activated to provide communication resources to communication devices disconnected from the fixed system. The activated deployable system is not connected to the fixed system. The activated deployable system receives an authentication request from the communication device requesting connection to the deployable system; generates authentication vectors using the at least one derived deployable key; and authenticates an authentication response received from the communication device using the authentication vectors.
Abstract:
A broadband device (105) can detect a proximate narrowband transmission (152) from a narrowband communication device (145). The narrowband transmission (152) can be in close enough proximity (155) to at least one bearer channel of the broadband device (105) to result in interference on the narrowband reception (152) when the broadband device (105) is transmitting and the narrowband communication device (145) is concurrently receiving. Responsive to the detecting, the broadband device (105) can gate a broadband transmission (142) to ensure the broadband transmission (142) does not interfere with the proximate narrowband reception (152). In absence of detecting the narrowband transmission (152), the broadband transmission (142) from the broadband device (105) would not be gated.