Browse Prior Art Database

EXTENSION OF ENCRYPTION OF INTERCONNECT SERVICES FROM MOBILE TO TRANSCODER

IP.com Disclosure Number: IPCOM000009019D
Original Publication Date: 1999-Jan-01
Included in the Prior Art Database: 2002-Aug-01
Document File: 2 page(s) / 94K

Publishing Venue

Motorola

Related People

Mike Kloos: AUTHOR

Abstract

In the current iDEN system, it is desirable to add encryption to interconnect voice and circuit data services. Adding encryption over the air interface would be an obvious next step. Because of the architecture of the iDEN system, this encryption would probably be added from the subscriber unit to the Base Radio (BR). However, it would be desir- able to continue the encryption through the infra- structure as far as possible. This is not currently possible due to the logistics of session key distribu- tion to the Transcoder (XCDR), as well as handover issues for end-to-end encryption.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 50% of the total text.

Page 1 of 2

MO7WROLA Technical Developments

@

EXTENSION OF ENCRYPTION OF INTERCONNECT SERVICES FROM MOBILE TO TRANSCODER

by Mike Kloos

BACKGROUND

  In the current iDEN system, it is desirable to add encryption to interconnect voice and circuit data services. Adding encryption over the air interface would be an obvious next step. Because of the architecture of the iDEN system, this encryption would probably be added from the subscriber unit to the Base Radio (BR). However, it would be desir- able to continue the encryption through the infra- structure as far as possible. This is not currently possible due to the logistics of session key distribu- tion to the Transcoder (XCDR), as well as handover issues for end-to-end encryption.

SOLUTION

  This invention would provide a method of extending encryption into the iDEN infrastructure from the BR through to the XCDR. It is assumed that encryption from the SU to the BR is already accomplished. Once the call is established, either initially or after handover, encrypted voice is pre- sent only over the air; the path from BR to the XCDR is in clear mode. Then, using public-key or private-key encryption, the BR would encrypt the private session key with the XCDR public key (or private key if private key encryption is used to pass the session key). The private session key would then be transmitted to the XCDR in the voice packet header. The XCDR would then use the XCDR pri- vate key to obtain the session key. Once the key is obtained, a message would be sent from the XCDR to the BR that the session key has been received. The BR would then cease decryption and pass

encrypted voice all the way to the XCDR for decryption. The BR would also notify the XCDR in the packet header whether the voice pack...