Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

SELECTIVE REKEY REQUEST

IP.com Disclosure Number: IPCOM000007521D
Original Publication Date: 1995-Nov-01
Included in the Prior Art Database: 2002-Apr-03
Document File: 1 page(s) / 45K

Publishing Venue

Motorola

Related People

Hans Christopher Sowa: AUTHOR

Abstract

The system is conventional Over-The-Air- Rekeying (OTAR) or is trunking OTAR. Radios with encryption may request encryption keys from a Key Management Controller (KMC) by a menu selec- tion that activates a Rekey Request. A Rekey Request data message is sent from the radio to the KMC so the radio can be OTARed the encryption keys that it would normally use.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 97% of the total text.

Page 1 of 1

MOTOROLA Technical Developments

SELECTIVE REKEY REQUEST

by Hans Christopher Sowa

SYSTEM BACKGROUND:

use cannot be stored.

THE SOLUTION:

  The system is conventional Over-The-Air- Rekeying (OTAR) or is trunking OTAR. Radios with encryption may request encryption keys from a Key Management Controller (KMC) by a menu selec- tion that activates a Rekey Request. A Rekey Request data message is sent from the radio to the KMC so the radio can be OTARed the encryption keys that it would normally use.

THE PROBLEM:

  A radio user wants an encryption key for a talk group (TG) or channel that the user would not nor- mally use and thus does not have the encryption key. Key storage in the radio is limited so every encryption key that the user could possibly want to

  The radio should have a Selective Rekey Request (SRR) that would allow the user to request the encryption key for a particular TG or channel. The radio would request the encryption key for the pres- ent TG or channel or the user would be allowed to specify a TG or channel. The SRR data message would include the unit ID and the TG or channel that the encryption key was desired for. The KMC would receive the SRR data message and verify that the radio was authorized to use the encryption key for that TG or channel. Once verified, the KMC would OTAR the desired encryption key to the radio. The radio would select the SRR key in the key select menu in order to be able to use it.

0 Momrola. 1°C. ,995

25 November 1995

[This pag...