Protected Keyset for Fast Changeover in Case of Key Compromise
Original Publication Date: 2003-Feb-18
Included in the Prior Art Database: 2003-Feb-18
In a two way radio system consisting of radios (or system infrastructure devices) containing shared encryption key material for the purpose of protecting radio communication, a stolen radio can be used to monitor that radio communication. In this case the stolen radio’s keys must be erased remotely, or the key material that is used to protect the radio traffic must be changed to different key material that the stolen radio user cannot use to monitor the traffic.