METHOD OF AUTOMATICALLY POPULATING A LIST OF MANAGED SECURE COMMUNICATIONS GROUP MEMBERS
First Claim
1. A method to automatically associate a mobile communication device having a device identifier with a secure group established to provide security information between subscribers of the secure group, the method comprising:
- receiving identification information of the secure group at a key variable loader;
providing a group identifier for the secure group at the key variable loader;
setting a first key for the secure group at the key variable loader, the first key corresponding to an encryption algorithm;
automatically downloading the device identifier of the mobile communication device to the key variable loader from the communication device over a short range connection connecting the communication device and the key variable loader; and
after downloading the device identifier, uploading the group identifier and the first key for the secure group to the communication device via the short range connection, and automatically associating the downloaded device identifier with the secure group at the key variable loader.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods of automatically populating a secure group list in a key variable loader and of providing keys to a secure group are presented. After a user selects a secure group and encryption algorithm using inputs of the loader, the loader provides a group identifier and corresponding key for the group. The group identifier, encryption algorithm, and key are transmitted to a portable communication device over a physical connection between the two while a device identifier of the communication device is transmitted concurrently to the loader. The key variable loader automatically populates a stored list of subscribers of the group with the device identifier. When it is desired to transmit a new key to all of or fewer than all of the subscribers, one of the subscribers is connected with the loader and used to wirelessly transmit a new key to the remaining subscribers.
-
Citations
20 Claims
-
1. A method to automatically associate a mobile communication device having a device identifier with a secure group established to provide security information between subscribers of the secure group, the method comprising:
-
receiving identification information of the secure group at a key variable loader; providing a group identifier for the secure group at the key variable loader; setting a first key for the secure group at the key variable loader, the first key corresponding to an encryption algorithm; automatically downloading the device identifier of the mobile communication device to the key variable loader from the communication device over a short range connection connecting the communication device and the key variable loader; and after downloading the device identifier, uploading the group identifier and the first key for the secure group to the communication device via the short range connection, and automatically associating the downloaded device identifier with the secure group at the key variable loader. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of providing security information between a mobile communication device and a secure group established to provide security information between subscribers of the secure group, the method comprising:
-
a portable key variable loader; providing a group identifier for the secure group; providing an encryption algorithm corresponding to a selected type of encryption; downloading a device identifier of the communication device through a first short range connection connecting the communication device and the key variable loader; automatically associating the downloaded device identifier with the secure group; providing a key for the encryption algorithm; and transmitting the group identifier and the key to the communication device through a second short range connection connecting the communication device and the key variable loader; and transmitting the key to at least some subscribers of the secure group from the communication device over a wireless connection. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification