SECURITY FOR SOFTWARE DEFINED RADIO TERMINALS
First Claim
1. An SDR-protecting module (2) for an SDR terminal (1), said module provided with a confined cryptographic key K and arranged to receive loaded SDR-code, characterized in that the SDR-protecting module is further arranged to derive an integrity protecting key Rk from at least said cryptographic key K, and to provide a periodic integrity protection on-line of generated SDR-functionality messages using said key integrity protecting key Rk, the integrity of said messages to be verified by an integrity checking node (10) in the access network.
1 Assignment
0 Petitions
Accused Products
Abstract
A module (2) for integrity protection of messages transmitted from a mobile software defined radio (SDR) terminal (1), the module provided with a confined cryptographic key K and arranged to receive loaded SDR-code. The module derives an integrity protecting key Rk from at least said cryptographic key K, and provides a periodic integrity protection on-line of generated messages using said key integrity protecting key Rk, and the integrity of said messages is verified by an integrity checking node (10) of the access network.
-
Citations
40 Claims
- 1. An SDR-protecting module (2) for an SDR terminal (1), said module provided with a confined cryptographic key K and arranged to receive loaded SDR-code, characterized in that the SDR-protecting module is further arranged to derive an integrity protecting key Rk from at least said cryptographic key K, and to provide a periodic integrity protection on-line of generated SDR-functionality messages using said key integrity protecting key Rk, the integrity of said messages to be verified by an integrity checking node (10) in the access network.
-
19. A method of integrity protecting SDR-functionality software using an SDR protecting module (2) provided with a confined cryptographic key K, the method characterized by the SDR-protecting module performing the following steps:
-
Receiving (31) loaded SDR code; Deriving (32) an integrity protection key Rk from at least said cryptographic key K; Providing a periodic on-line integrity protection (35) of SDR-functionality messages by the derived integrity protection key Rk, the integrity of the messages to be verified (36) by an integrity checking node in the access network. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
Specification