Dismiss
InnovationQ will be updated on Sunday, September 22, from 10am-noon ET. You may experience brief service interruptions during that time.
Browse Prior Art Database

METHODS TO SUPPORT MULTIPLE ENCRYPTION ALGORITHMS IN A TRUNKED RADIO SYSTEM

IP.com Disclosure Number: IPCOM000008056D
Original Publication Date: 1997-Mar-01
Included in the Prior Art Database: 2002-May-15
Document File: 2 page(s) / 103K

Publishing Venue

Motorola

Related People

Authors:
Walt Anderson Sally Jestice

Abstract

In secure, multi-key & multi-algorithm trunked radio systems, infrastructure equipment and sub- scriber radios must have matching encryption algo- rithm types in order to permit secure communica- tions between radios and consoles or between radios and telephone interconnect devices. Many different encryption algorithm types are available, and today's radios and infrastructure units can only support up to two of these algorithms. The problem solved by this invention is that in today's systems, the number and type of different encryption algo- rithms permitted to operate in the system is limited to the maximum number (in this case, two) that can he supported by any given infrastructure Digital Interface Unit (DIU), and each of the DIUs must be equipped with the same encryption algorithms. As customer's needs for security continue to expand, the ability to support multiple encryption algorithms provides important opportunities for flexibility and inter-operability.