Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

DYNAMIC SUBSCRIBER CONFIGURATION

IP.com Disclosure Number: IPCOM000009012D
Original Publication Date: 1999-Jan-01
Included in the Prior Art Database: 2002-Jul-31
Document File: 2 page(s) / 147K

Publishing Venue

Motorola

Related People

James Street: AUTHOR [+2]

Abstract

Motorola tmnked systems use system IDS, talk- group IDS and individual IDS to control system access. Unauthorized users, equipped with valid IDS, may compromise the privacy and even the reli- ability of a trunked system. Encrypted radio com- munication can be a solution, but price and export regulatory barriers limit the viability of this solution. The trunked two-way radio system owner needs an inexpensive mechanism for protecting the identity of users and talkgroups. This paper proposes a method of Dynamic Subscriber Configuration as one solution to the problem of unauthorized system access.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 40% of the total text.

Page 1 of 2

Technical Developments

DYNAMIC SUBSCRIBER CONFIGURATION

by James Street and Erik Hesler

ABSTRACT

  Motorola tmnked systems use system IDS, talk- group IDS and individual IDS to control system access. Unauthorized users, equipped with valid IDS, may compromise the privacy and even the reli- ability of a trunked system. Encrypted radio com- munication can be a solution, but price and export regulatory barriers limit the viability of this solution. The trunked two-way radio system owner needs an inexpensive mechanism for protecting the identity of users and talkgroups. This paper proposes a method of Dynamic Subscriber Configuration as one solution to the problem of unauthorized system access.

THE IDEA

  The trunked radio system employing Dynamic Subscriber Configuration contains the following elements:

fixed alias, such as "Police Unit 3" or "Refuse Collection West". Membership in talkgroups is maintained through aliases. For example, "Joe Jones is a member of Fiie Station 45 talkgroup."

  Prior to the start of a,shift, the central user data- base assigns the individual IDS and the talkgroup IDS for all of the users and talkgroups active in the upcoming shift. In this !,application the individual IDS and talkgroup IDS are generated at random. The users of the system do not know what IDS are in use; the infrastructure resolves the aliases for them. For example, console operator positions select the "Police Unit 3" talkgroup, not talkgroup "EOl".

  At the start of the shift, users arrive at the hold- ing area and pick up any :!available radio. The radio is unusable at this point because only the universal system information is programmed in the radio. Each user proceeds to the secure programming area. The user inputs their fixed individual identity and verification (a password,1 bio-metric, PIN, or other) into the radio programming station. The user places his generic radio in the iprogramming fixture. At this point the user's personality, including the ran- domly generated individual and talkgroup ID's, is downloaded into the radio. The personality data is also time-stamped with the programming time. The user begins the shift with a fully programmed radio.

  At the end of the shift, the user returns the radio to the holding area. At a predetermined time after the programming time-stamp (such as 12 hours), the validity of their personality data is voided. The per- sonality data is deleted if the radio is on when the timestamp expires, or the personality data is deleted the next time the radio is turned on. After the per- sonality data is deleted,: the personality program- ming process must be repeated.

  This cycle can be repeated hourly, daily, weekly, or monthly, depending' on the level of privacy required.

l

   A central user database that contains the sub- scriber personality information (individual ID, fail- soft frequency, interconnect options, scan lists, etc.) for each user in the system. The central user data- base also maintains the indivi...