Abstract:
Methods for increasing encryption synchronization availability include collecting (302) encryption synchronization data from a first superframe received at a gateway. The encryption synchronization data is for decrypting media in a second superframe also received at the gateway. The encryption synchronization data from the first superframe is used to form (304) a composite encryption synchronization codeword for decrypting media in a third superframe formed by the gateway, wherein the third superframe includes (306) the composite encryption synchronization codeword and at least a portion of the media from the second superframe. The third superframe is sent to a receiving device so that media in the third superframe can be decrypted by the receiving device using the composite encryption synchronization codeword that is included in the same superframe as the media that is being decrypted.
Abstract:
A method of synchronizing a plurality of data streams. A land mobile radio (LMR) data stream can be generated by a LMR communication device. At least one LMR identifier can be communicated from the LMR communication device to a broadband communication device. A broadband data stream can be generated by the broadband communication device. The broadband data stream and the LMR identifier can be communicated from the broadband communication device via an access network. The LMR identifier can enable synchronization of the LMR data stream with the broadband data stream.
Abstract:
An interoperability gateway performs a method for setting Quality of Service for a bearer in response to an emergency event. The method includes the interoperability gateway performing: receiving a indication of an emergency event for a first user, wherein the first user is operating a first device in a first network of a first network type; responsive to receiving the indication, determining a set of devices related to the first user, wherein the set of devices includes the first device and at least a second device operating in a second network of a second network type; instructing the second network to modify at least one Quality of Service setting for the second device.
Abstract:
A PTT bridging gateway (102) between a first PTT system (110) and a second disparate PTT system (120): receives an invitation (152) to a first client (132) to join a first group call for a first group comprising multiple member clients on the first PTT system, wherein the first client is one of the member clients of the first group; determines that the first client is mapped (154) to a second group (142) comprising multiple member clients on the second PTT system; and initiates (156) a second group call to the multiple member clients on the second PTT system.
Abstract:
Techniques are provided for enabling application steering/blocking in a secure network which includes a network entity, and a first tunnel endpoint coupled to the network entity over an encrypted tunnel. The first tunnel endpoint associates at least a first Security Parameter Index (SPI) to a first application identifier to generate first mapping information (MI), communicates the first MI to the network entity, and transmits an encrypted message to the network entity over the encrypted tunnel. The encrypted message includes an encrypted packet and an unencrypted header including the first SPI. The network entity determines the first SPI from the unencrypted header, determines the first application identifier based on the first SPI and the first MI, and identifies a first application associated with the first application identifier. The network entity can still perform application steering/blocking even though traffic passing through the tunnel is encrypted.
Abstract:
Techniques are provided for enabling application steering/blocking in a secure network which includes a network entity, and a first tunnel endpoint coupled to the network entity over an encrypted tunnel. The first tunnel endpoint associates at least a first Security Parameter Index (SPI) to a first application identifier to generate first mapping information (MI), communicates the first MI to the network entity, and transmits an encrypted message to the network entity over the encrypted tunnel. The encrypted message includes an encrypted packet and an unencrypted header including the first SPI. The network entity determines the first SPI from the unencrypted header, determines the first application identifier based on the first SPI and the first MI, and identifies a first application associated with the first application identifier. The network entity can still perform application steering/blocking even though traffic passing through the tunnel is encrypted.
Abstract:
A key management facility for a communication network masquerades as a first device within the communication system during an Internet Key Exchange (IKE) negotiation with a second device within the communication system. The key management facility establishes, on behalf of the first device, a security association with the second device using IKE. After the negotiation is complete, the key management device provides information regarding the security association to the first device such that the first device can engage in an Internet Protocol Security-protected communication with the second device.
Abstract:
A method for location based policy for UE operating in different areas of a shared home LTE system includes: responsive to detecting a trigger, determining a first enterprise operating area (EOA) in which the UE is currently located, wherein the first EOA is one of a plurality of EOAs of the LTE system; determining whether the first EOA is a home EOA or a visited EOA; when the first EOA is the home EOA, selecting a first set of policy rules for the UE; when the first EOA is the visited EOA, selecting a second set of policy rules for the UE that provides a lower Quality of Service (QoS) than the first set of policy rules; if a trust relationship exists, selecting a third set of policy rules for the UE while in the visited EOA, which provides a higher QoS than the second set of policy rules.
Abstract:
A method to transmit a broadband multimedia resource locator using a narrowband communication system embeds the broadband multimedia resource locator into a narrowband audio stream and transmits the narrowband audio stream to one or more receiving communication devices over the narrowband communication system. The receiving communication device(s) subsequently extract the broadband multimedia resource locator from the narrowband audio stream and use the broadband multimedia resource locator to access a broadband communication system to retrieve multimedia content.
Abstract:
A method for enabling group communications includes: establishing a group identity for a communication group comprising a first set of communication devices, and storing an identity for each of the communication devices in the first set; establishing a session to associate a second set of communication devices with the group identity, wherein the communication devices in the second set are different from the communication devices in the first set, wherein the session with the second set of communication devices is set up irrespective of a call being initiated for the communication group; detecting a first event associated with the initiation of a call for the communication group; and in response to detecting the first event, using the stored identities to join at least one of the communication devices in the first set to the session.