Enabling emergency access to secure wireless communications networks
First Claim
1. A system, comprising:
- a memory storing an encrypted key repository that stores a universal encryption key (UEK) and a public safety encryption key (PSKey) associated with the UEK that enables public safety personnel to access a secure private wireless communications (PWC) network, wherein the UEK is a key established by a certificate authority separate from the system;
one or more processors configured to execute a PWC controller module, an authentication module, a PWC network gateway application module, and an alert module;
the PWC controller module configured to control one or more wireless transceivers for accessing the secure PWC network and communicating with a user wireless device of the public safety personnel;
the authentication module coupled to the PWC controller module and configured to determine whether a PSKey received from the user wireless device, via the one or more wireless transceivers, by comparing the received PSKEY to the stored PSKey which is associated with the UEK stored in the encrypted key repository;
the PWC network gateway application module coupled to the PWC controller module and the authentication module, and configured to communicatively connect the user device to the secure PWC network upon a determination that the received PSKey is associated with the stored UEK; and
the alert module configured to activate a public safety mode of the system that initiates authentication procedures to enable the user wireless device to immediately access the secure PWC network upon receiving information indicating an emergency,wherein the authentication module is further configured to request additional information from a user operating the user wireless device to validate the identity of the user of the user wireless device requesting access to the secure PWC network, andwherein the additional information is received from a separate device, module, or application comprising a common access card, a personal identification card-reader verification system, a visual or biometric identification system, or a token verification system.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments include a system, method, and computer program product for improving public safety communications and real-time information sharing to enable a public safety user to access available, secure private wireless communications (PWC) networks within a vicinity of an emergency for communications and data-sharing purposes. In an embodiment, a universal encryption key (UEK) is stored on a public safety access device. The public safety access device is providing access to a secure PWC network. The UEK is a key established by a certificate authority that enables public safety personnel to access the secure PWC network. Then, a public safety encryption key (PSKey) is received by the public safety access device from a user communication device. The public safety access device enables access for the user communication to access the secure PWC network upon a determination that the received PSKey is associated with the UEK.
8 Citations
25 Claims
-
1. A system, comprising:
-
a memory storing an encrypted key repository that stores a universal encryption key (UEK) and a public safety encryption key (PSKey) associated with the UEK that enables public safety personnel to access a secure private wireless communications (PWC) network, wherein the UEK is a key established by a certificate authority separate from the system; one or more processors configured to execute a PWC controller module, an authentication module, a PWC network gateway application module, and an alert module; the PWC controller module configured to control one or more wireless transceivers for accessing the secure PWC network and communicating with a user wireless device of the public safety personnel; the authentication module coupled to the PWC controller module and configured to determine whether a PSKey received from the user wireless device, via the one or more wireless transceivers, by comparing the received PSKEY to the stored PSKey which is associated with the UEK stored in the encrypted key repository; the PWC network gateway application module coupled to the PWC controller module and the authentication module, and configured to communicatively connect the user device to the secure PWC network upon a determination that the received PSKey is associated with the stored UEK; and the alert module configured to activate a public safety mode of the system that initiates authentication procedures to enable the user wireless device to immediately access the secure PWC network upon receiving information indicating an emergency, wherein the authentication module is further configured to request additional information from a user operating the user wireless device to validate the identity of the user of the user wireless device requesting access to the secure PWC network, and wherein the additional information is received from a separate device, module, or application comprising a common access card, a personal identification card-reader verification system, a visual or biometric identification system, or a token verification system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method, comprising:
-
storing, by a communication device, a universal encryption key (UEK) and a public safety encryption key (PSKey) associated with the UEK in an encrypted key repository, wherein the association enables public safety personnel to access a secure private wireless communications (PWC) network, and the UEK is a key established by a certificate authority separate from the communication device; receiving, by the communication device, from one or more wireless transceivers, a PSKey from a user wireless device of the public safety personnel; determining, by the communication device, whether the received PSKey is the stored PSKey associated with the stored UEK; enabling, by the communication device, the user wireless device to access the secure PWC network through the one or more wireless transceivers upon a determination that the received PSKey is associated with the UEK; storing, by the communication device, policy rules including parameters that must be met by the user wireless device to enable access of the user wireless device to the secure PWC network; and upon receiving the PSKey, requesting, by the communication device, additional information from the user wireless device to validate the identity of the user of the user wireless device requesting access to the secure PWC network based on the stored policy rules, wherein the additional information is received from a separate device, module, or application comprising a common access card, a personal identification card-reader verification system, a visual or biometric identification system, or a token verification system, and wherein the additional information used to validate access comprise one or more of user name, badge number, or agency affiliation. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
-
25. A non-transitory computer-readable device having instructions stored thereon that, when executed by at least one computing device, causes the at least one computing device to perform operations comprising:
-
storing, by a communication device, a universal encryption key (UEK) and a public safety encryption key (PSKey) associated with the UEK in an encrypted key repository, wherein the association enables public safety personnel to access a secure private wireless communications (PWC) network, and the UEK is a key established by a certificate authority separate from the communication device; receiving, by the communication device, from one or more wireless transceivers, a PSKey from a user wireless device of the public safety personnel; determining, by the communication device, whether the received PSKey is the stored PSKey associated with the stored UEK; enabling, by the communication device, the user wireless device to access the secure PWC network through the one or more wireless transceivers upon a determination that the received PSKey is associated with the UEK; storing, by the communication device, policy rules including parameters that must be met by the user wireless device to enable access of the user wireless device to the secure PWC network; and upon receiving the PSKey, requesting, by the communication device, additional information from the user wireless device to validate the identity of the user of the user wireless device requesting access to the secure PWC network based on the stored policy rules, wherein the additional information is received from a separate device, module, or application comprising a common access card, a personal identification card-reader verification system, a visual or biometric identification system, or a token verification system, and wherein the additional information used to validate access comprise one or more of user name, badge number, or agency affiliation.
-
Specification