DYNAMIC SUBSCRIBER CONFIGURATION
Original Publication Date: 1999-Jan-01
Included in the Prior Art Database: 2002-Jul-31
Motorola tmnked systems use system IDS, talk- group IDS and individual IDS to control system access. Unauthorized users, equipped with valid IDS, may compromise the privacy and even the reli- ability of a trunked system. Encrypted radio com- munication can be a solution, but price and export regulatory barriers limit the viability of this solution. The trunked two-way radio system owner needs an inexpensive mechanism for protecting the identity of users and talkgroups. This paper proposes a method of Dynamic Subscriber Configuration as one solution to the problem of unauthorized system access.