METHOD OF AND SYSTEM FOR AUTHENTICATING AND OPERATING PERSONAL COMMUNICATION DEVICES OVER PUBLIC SAFETY NETWORKS
First Claim
1. A method of enabling a public safety (PS) person having a PS communications device operative over a PS network, to authenticate and authorize operation of a non-PS, personal communications device over the PS network, the method comprising:
- generating a challenge;
issuing the challenge over a first, wireless channel by operation of the PS device;
issuing a response to the challenge over a second, wireless channel different from the first channel by operation of the personal device;
verifying the response;
generating a conditional token having specified conditions under which the personal device is permitted to be operated over the PS network;
sending the conditional token to the personal device for acknowledgement;
capturing information at an incident scene by operation of the personal device; and
attaching the conditional token to the captured information, and uploading the captured information with the attached conditional token to permit distribution of the captured information in accordance with the specified conditions of the attached conditional token.
1 Assignment
0 Petitions
Accused Products
Abstract
A public safety (PS) person having a PS communications device is able to authenticate and authorize operation of a non-PS, personal communications device over a PS network. The PS device issues a challenge, and the personal device responds to the challenge, when the devices are in close proximity. A conditional token having specified conditions is sent to the personal device, which captures information at an incident scene. The personal device attaches the conditional token to the captured information, and uploads the captured information with the attached token to the PS device to permit distribution of the captured information in accordance with the specified conditions of the attached conditional token.
-
Citations
19 Claims
-
1. A method of enabling a public safety (PS) person having a PS communications device operative over a PS network, to authenticate and authorize operation of a non-PS, personal communications device over the PS network, the method comprising:
-
generating a challenge; issuing the challenge over a first, wireless channel by operation of the PS device; issuing a response to the challenge over a second, wireless channel different from the first channel by operation of the personal device; verifying the response; generating a conditional token having specified conditions under which the personal device is permitted to be operated over the PS network; sending the conditional token to the personal device for acknowledgement; capturing information at an incident scene by operation of the personal device; and attaching the conditional token to the captured information, and uploading the captured information with the attached conditional token to permit distribution of the captured information in accordance with the specified conditions of the attached conditional token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for enabling a public safety (PS) person having a PS communications device operative over a PS network, to authenticate and authorize operation of a non-PS, personal communications device over the PS network, the system comprising:
-
the PS device being operated for issuing a challenge over a first, wireless channel; the personal device being operated for issuing a response to the challenge over a second, wireless channel different from the first channel; the system being operative for verifying the response, for generating a conditional token having specified conditions under which the personal device is permitted to be operated over the PS network, and for sending the conditional token to the personal device for acknowledgement; the personal device being operated for capturing information at an incident scene; and the personal device being operated for attaching the conditional token to the captured information, and for uploading the captured information with the attached conditional token to permit distribution of the captured information in accordance with the specified conditions of the attached conditional token. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification