Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

AUTOMATED TAMPER DETECTION NOTIFICATION

IP.com Disclosure Number: IPCOM000006083D
Original Publication Date: 2001-Dec-03
Included in the Prior Art Database: 2001-Dec-03
Document File: 2 page(s) / 26K

Publishing Venue

Motorola

Related People

Seema Narikot: AUTHOR

Abstract

AUTOMATED TAMPER DETECTION NOTIFICATION

This text was extracted from a Microsoft Word document.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 68% of the total text.

AUTOMATED TAMPER DETECTION NOTIFICATION

By Seema Narikot

 
 

SYSTEM BACKGROUND

In Motorola’s ASTRO system, the UCM (Universal Crypto Module) is used to provide encryption and decryption services for voice and data traffic in a subscriber radio. When the UCM hardware is tampered with, all of the stored keys are erased. Although this prevents the user from using the radio in secure mode, the user is still able to use the radio in clear mode.

PROBLEM

Presently, a user has to report that a radio has been stolen before it is inhibited. Until this happens, the person who stole the radio can use it in clear mode.

In the case where a radio is stolen, it would be useful if the radio alerted the console that it has been tampered with. The activity on that radio can then be monitored or the radio can be inhibited.

SOLUTION

The sequence of events that occurs during the automated tamper notification process is shown in Figure 1. The first time a user attempts to transmit with a radio containing a tampered UCM (Step 1), a tamper notification message will be sent to the base station (Step 2). The base station then routes this message to the console (Step 3). The console can be configured to perform one of two operations. The console can either inhibit the radio automatically or the console can alert the operator to monitor the activity on the stolen radio (Step 4).  The inhibit or monitor message is then sent back to the radio (Step 5 and Step 6).

                    This invention will prevent a user from using t...