Method for point-to-point communications within secure communication systems
DC CAFCFirst Claim
1. In a secure communication system that includes a plurality of communication units, wherein each communication unit of the plurality of communication, units stores a limited set of encryption key variables, a method for providing a point-to-point communication within the secure communication system, the method comprises the steps of:
- a) receiving, by a first communication unit of the plurality of communication units, a request for the point-to-point communication from an operator of the first communication unit, wherein the request identifies at least one destination communication unit;
b) generating, by the first communication unit, a private;
call key variable by modifying an encryption key variable of the limited set of encryption key variables based on a predetermined function;
c) transmitting, by the first communication unit to the at least one destination communication unit, identity of the encryption key variable and information pertaining to the predetermined function;
d) generating, by the at least one destination communication unit, the private call key variable based on the encryption key variable and the information pertaining to the predetermined function; and
e) privately communicating between the first communication unit and the at least one destination communication unit using the private call key variable.
4 Assignments
Litigations
0 Petitions
Accused Products
Abstract
In a secure communication system, a secure point-to-point communication may be accomplished in the following manner. A first communications unit receives a request from an operator for a point-to-point communication identifying at least one destination communication unit. In response, the first communication unit generates a private call key variable by modifying an encryption key variable through the use of a predetermined function. Identity of the encryption key variable and information pertaining to the predetermined function is transmitted by the first communication unit to the destination communication unit. Upon receiving the identity of the encryption key variable and information pertaining to the predetermined function, the destination communication unit generates the private call key variable. When the private call key variable has been determined by the first communication unit and the destination communication unit, both communication units can engage in the secure point-to-point communication.
-
Citations
18 Claims
-
1. In a secure communication system that includes a plurality of communication units, wherein each communication unit of the plurality of communication, units stores a limited set of encryption key variables, a method for providing a point-to-point communication within the secure communication system, the method comprises the steps of:
-
a) receiving, by a first communication unit of the plurality of communication units, a request for the point-to-point communication from an operator of the first communication unit, wherein the request identifies at least one destination communication unit; b) generating, by the first communication unit, a private;
call key variable by modifying an encryption key variable of the limited set of encryption key variables based on a predetermined function;c) transmitting, by the first communication unit to the at least one destination communication unit, identity of the encryption key variable and information pertaining to the predetermined function; d) generating, by the at least one destination communication unit, the private call key variable based on the encryption key variable and the information pertaining to the predetermined function; and e) privately communicating between the first communication unit and the at least one destination communication unit using the private call key variable. - View Dependent Claims (2, 3, 4, 5)
-
-
6. In a secure communication system that includes a plurality of communication units, wherein each communication unit of the plurality of communication units stores a limited set of encryption key variables, a method for providing a point-to-point communication within the secure communication system, the method comprises the steps of:
-
a) receiving, by a first communication unit of the plurality of communication units, a request for a point-to-point communication from an operator Of the first communication unit, wherein the request identifies at least one destination communication unit; b) generating, by the first communication unit, a private call key variable by modifying an encryption key variable of the limited set of encryption key variables based on a predetermined function; c) transmitting, by the first communication unit, encrypted information, wherein the encrypted information is, at least in part, encrypted with the private call key variable; d) receiving, by the plurality of communication units, the encrypted information; e) decrypting, by each unit of the plurality of communication units, the encrypted information based on a stored predetermined function and unique communication unit information; and f) when the decrypting of step (e) is successful, communicating, by at least one of the plurality of communication units, with the first communication unit using the private call key variable. - View Dependent Claims (7, 8)
-
-
9. In a secure communication system that includes a plurality of communication units, wherein each communication unit of the plurality of communication units stores a limited set of encryption key variables, a method for a communication unit of the plurality of communication units to participate in a point-to-point communication within the secure communication system, the method comprises the steps of:
-
a) when initiating the point-to-point communication, receiving, by the communication unit, a request for a point-to-point communication from an operator of the communication unit, wherein the request identifies at least one destination communication unit; b) when initiating the point-to-point communication, generating, by the communication unit, a private call key valuable by modifying an encryption key variable of the limited set of encryption key variables based on a predetermined function; c) when initiating the point-to-point communication, transmitting, by the communication unit to the at least one destination communication unit, identity of the encryption key valuable and information pertaining to the predetermined function; d) when acting as a destination communication unit in the point-to-point communication, receiving, by the communication unit, identity of the encryption key variable and the information pertaining to the predetermined function, wherein the identity of the encryption key variable and information pertaining to the predetermined function have been transmitted by a transmitting communication unit; e) when acting as the destination communication unit in the point-to-point communication, generating, by the communication unit, the private call key variable based on the encryption key variable and the information pertaining to the predetermined function; and f) when acting as the destination communication unit in the point-to-point communication, privately communicating between the communication unit and the transmitting communication unit. - View Dependent Claims (10, 11)
-
-
12. In a secure communication system that includes a plurality of communication units, wherein each communication unit of the plurality of communication units stores a limited set of encryption key variables, a method for a communication unit of the plurality of communication units to receive a point-to-point communication within the secure communication system, the method comprises the steps of:
-
a) receiving, by the communication unit, identity of an encryption key variable and information pertaining to a predetermined function, wherein the identity of the encryption key variable and information pertaining to the predetermined function have been transmitted by a transmitting communication unit; b) generating, by the communication unit, a private call key variable based on the encryption key variable and the information pertaining to the predetermined function; and c) utilizing the private call key variable to privately communicate with the transmitting communication unit. - View Dependent Claims (13, 14)
-
-
15. In a secure communication system that includes a plurality of communication units, wherein each communication unit of the plurality of communication units stores a limited set of encryption key variables, a method for a communication unit of the plurality of communication units to participate in a point-to-point communication within the secure communication system, the method comprises the steps of:
-
a) when initiating the point-to-point communication, receiving, by the communication unit, a request for a point-to-point communication from an operator of the communication unit, wherein the request identifies at least one destination communication unit; b) when initiating the point-to-point communication, generating, by the communication unit, a private call key variable by modifying an encryption key variable of the limited set of encryption key variables based on a predetermined function; c) when initiating the point-to-point communication, transmitting, by the communication unit, encrypted information, wherein the encrypted information is, at least in part, encrypted with the private call key variable; d) when acting as a destination communication unit in the point-to-point communication, receiving, by the communication unit, encrypted information, wherein the encrypted information has been encrypted using the private call key variable by a transmitting communication unit; e) when acting as the destination communication unit in the point-to-point communication, decrypting, by the communication unit the encrypted information i based on a stored predetermined function and unique communication unit information and f) when acting as the destination communication unit in the point-to-point communication, when the decanting of step (e) is successful, communicating, by the communication unit, with the transmitting communication unit using the private call key variable. - View Dependent Claims (16)
-
-
17. In a secure communication system that includes a plurality of communication units, wherein each communication unit of the plurality of communication units stores a limited set of encryption key variables, a method for a communication unit of the plurality of communication units to receive a point-to-point communication within the secure communication system, the method comprises the steps of:
-
a) receiving, by the communication unit, encrypted information, wherein the encrypted information has been encrypted using a private call key variable by a transmitting communication unit; b) decrypting, by the communication unit, the encrypted information based on a stored predetermined function and unique communication unit information; and c) when the decrypting of step (b) is successful, communicating, by the communication unit, with the transmitting communication unit using the private call key variable. - View Dependent Claims (18)
-
Specification