TIME OF DAY ENCRYPTION USING TDMA TIMING
First Claim
Patent Images
1. A method for encrypting data in a TDMA communication system at a transmitting terminal, the method comprising:
- receiving a transmit TDMA timeslot assignment, with a TDMA time value, from a TDMA controller;
receiving data from a user;
calculating a one-time key-stream from at least the TDMA time value using a controller;
encrypting the data using the one-time key-stream to produce encrypted data with the controller; and
transmitting the encrypted data to a receiver.
5 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the invention provide for encryption and decryption of data in a TDMA network using TDMA time values. In some embodiments, TDMA time values can be transmitted to terminals from a network controller using a burst time plan. These TDMA time values along with other data and/or counters can be combined to create a one-time key, which can be used to both encrypt data and/or decrypt data. Embodiments of the invention can decrease communication overhead by using the TDMA time value for TDMA purposes as well as for encryption purposes.
-
Citations
24 Claims
-
1. A method for encrypting data in a TDMA communication system at a transmitting terminal, the method comprising:
-
receiving a transmit TDMA timeslot assignment, with a TDMA time value, from a TDMA controller; receiving data from a user; calculating a one-time key-stream from at least the TDMA time value using a controller; encrypting the data using the one-time key-stream to produce encrypted data with the controller; and transmitting the encrypted data to a receiver. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for decrypting data in a TDMA communication system at a TDMA controller, the method comprising:
-
receiving a receive TDMA timeslot assignment that includes a TDMA time value, from a TDMA controller; receiving data from a transmitting terminal; calculating a one-time key-stream from at least a TDMA time value using a controller; decrypting, with the controller the encrypted data using the one-time key-stream producing decrypted data; and transmitting the decrypted data to a user. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method for decrypting data in a communication network, the method comprising:
-
transmitting a burst time plan to both the transmitting and the receiving terminals within a network of terminals, the burst time plan including at least a TDMA time value and specifying a timeslot within which the transmitting terminal should transmit data; receiving encrypted data from the transmitting terminal within the timeslot specified by the burst time plan; creating a counter value from at least the TDMA time value using a controller calculating a one-time key-stream from the counter value using the controller; and decrypting, with the controller, the encrypted data using the one-time key-stream. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A method for encrypting data in a communication network, the method comprising:
-
receiving a TDMA time value; receiving data from a source distinct from the source of the TDMA time value; calculating, with a controller, a one-time key-value from at least the TDMA time value; encrypting the data, with the controller, using the one-time key-value; and transmitting the encrypted data. - View Dependent Claims (21)
-
-
22. A communication modem comprising:
-
a user port configured to receive data from a user; a network port; a controller communicatively coupled with the user port and the network communications port; and memory communicatively coupled with the controller, the memory including instructions executable by the processor, wherein the instructions include; instructions to receive user data through the user port; instructions to receive a burst time plan and store at least portions of the burst time plan in memory, wherein the burst time plan includes a global time value; instructions to calculate a one-time key-value from the global time value; instructions to encrypt the user data with the one-time key-value; and instructions to send the encrypted user data to the communications network using the network communications port. - View Dependent Claims (23, 24)
-
Specification