Abstract:
A method and computing device for integrating a key management system with a Pre-Shared Key (PSK)-authenticated Internet Key Exchange (IKE). The method comprises the following: An IKE Identification Payload including an Identification Data field is generated via a first computing device. The Identification Data field comprises: a user identifier (ID) field uniquely identifying one or more of a user of the first computing device and the first computing device; a key ID field uniquely identifying a PSK; and a separator between the user ID field and the key ID field. The IKE Identification Payload is transmitted from the first computing device to a second computing device as part of the IKE.
Abstract:
A method and system for dynamically managing wireless pairing of a portable radio device and an accessory are provided. A multi-stage wireless pairing mode applies a first BT pairing stage that utilizes NFC and BT communication, while disabling low-priority, high-current communications of the portable radio device. The second BT pairing stage turns off the NFC pairing, maintains BT, and re-enables the low-priority, high-current communications. Any occurrence of a high-priority, high-current mission critical event disables the multi-stage pairing mode and services the event. User notifications and are dynamically managed to avoid user interference during the pairing.
Abstract:
A method, apparatus, and system are provided for authentication of collaborative mobile devices. A first mobile device receives a challenge message, derives a first mobile device authentication result based on the challenge message, and conveys, to a second mobile device of a user of the first mobile device, a first short-range wireless signal comprising the challenge message. The second mobile device receives the challenge message from the first mobile device, derives a second mobile device authentication result based on the challenge message, and conveys, to the first mobile device, a first short-range wireless signal comprising the second mobile device authentication result. The first mobile device receives the second mobile device authentication result and authenticates one or more of the first mobile device, the second mobile device, and the user by conveying, to an authenticator device, the first mobile device authentication result and the second mobile device authentication result.
Abstract:
A Public Key Infrastructure (PM) device receives a certificate signing request (CSR) from an end entity. The PKI device obtains at least one of: a controlling attribute of at least one PKI device associated with processing of the certificate signing request and a controlling attribute associated with the CSR. The PKI device obtains an end entity policy object (EEPO) to be associated with the end entity based on at least one obtained controlling attribute. Based on the obtained EEPO, the PKI device determines at least one attribute and at least one value associated with the attribute this is to be included in a certificate and issues, to the end entity, the certificate including the at least one attribute.
Abstract:
A wireless method and apparatus for late entry in frequency hopping systems that, during call setup, computes a random permutation sequence through a hop set of frequencies, chooses preamble frequencies to omit data thereon in lieu of preamble data, and swaps frequencies in the random permutation sequence such that synchronization frequencies lie next to the preamble frequencies with an expected delay such that late entrants can join. The wireless method and apparatus meets the FCC requirement of maintaining a pseudorandom hopping pattern and equal distribution of all frequencies in a hop set while guaranteeing late entry and having no effect on battery performance of radios.