Remote key manipulations for over-the-air re-keying
First Claim
Patent Images
1. A method for remotely changing an original voice encryption key in a secure radio, comprising:
- storing said original voice encryption key in said secure radio;
transmitting by a central controller to said secure radio a digital word representing only a selective operation selectable from a plurality of different key operations to be performed on said original voice encryption key alone without changing an encryption polynomial; and
performing only said operation on said original voice encryption key alone in said secure radio to generate a current voice encryption key alone in response to said digital word.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of remotely changing an original voice encryption key in a secure radio (10) is provided which includes a central controller (20) transmitting to the secure radio a digital word (42) representing a selective operation to be performed on the original voice encryption key stored in the radio (10). In response to the digital word (42), the radio (10) performs the operation on the original voice encryption key to generate a current voice encryption key.
-
Citations
20 Claims
-
1. A method for remotely changing an original voice encryption key in a secure radio, comprising:
-
storing said original voice encryption key in said secure radio; transmitting by a central controller to said secure radio a digital word representing only a selective operation selectable from a plurality of different key operations to be performed on said original voice encryption key alone without changing an encryption polynomial; and performing only said operation on said original voice encryption key alone in said secure radio to generate a current voice encryption key alone in response to said digital word. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method of remotely changing an original voice encryption key in a secure radio, comprising:
-
storing said original voice encryption key in said secure radio; transmitting by a central controller to said secure radio a digital word representing a selective operation to be performed on said original voice encryption key; performing said operation on said original voice encryption key in said secure radio to generate a current voice encryption key in response to said digital word, wherein said performing step comprises one'"'"'s complementing said original voice encryption key to generate said current voice encryption key.
-
-
18. A method of remotely changing an original voice encryption key in a secure radio, comprising:
-
storing said original voice encryption key in said secure radio; transmitting by a central controller to said secure radio a digital word representing a selective operation to be performed on said original voice encryption key; performing said operation on said original voice encryption key in said secure radio to generate a current voice encryption key in response to said digital word, wherein said performing step comprises two'"'"'s complementing said original voice encryption key to generate said current voice encryption key.
-
-
19. A method of remotely changing on an original voice encryption key in a secure radio, comprising:
-
storing said original voice encryption key in said secure radio; transmitting by a central controller to said secure radio a digital word representing a selective operation to be performed on said original voice encryption key; performing said operation on said original voice encryption key in said secure radio to generate a current voice encryption key in response to said digital word, wherein said performing step comprises subtracting said original from said current voice encryption key to generate a new voice encryption key.
-
-
20. In a trunked communication system including at least one control unit and plurality of secure subscriber units, a method for remotely changing an original voice encryption key in a secure subscriber unit, comprising:
-
in said secure subscriber unit; storing said original voice encryption key; transmitting to said control unit a key change request; receiving a key change command from said control unit; and performing a selective operation selectable from a plurality of different key operations on said original voice encryption key alone in said secure radio to generate only a current voice encryption key in response to said key change command; and in said control unit; receiving said key change request; and transmitting to said secure subscriber unit said key change command representing only said selective operation to be performed on said original voice encryption key alone without changing an encryption polynomial.
-
Specification