Method for automatically assigning enctyption information to a group of radios
First Claim
Patent Images
1. A method for adding a radio to a radio talk group in a radio communication system which has a plurality of radios assigned to radio talk groups and encryption rekey groups, comprising the steps of:
- (a) removing said radio from its assigned encryption rekey group;
(b) assigning the radio to said radio talk group;
(c) determining if an encryption rekey group exists in the radio communication system which has the same combination of radio talk groups as said radio has assigned to it; and
(d) adding said radio to the encryption rekey group if one is determined to exist in step (c).
2 Assignments
0 Petitions
Accused Products
Abstract
This invention provides for a method for automatically assigning encryption keys to radios in a communication system. The radio users need only specify which radio units should be able to communicate with each other. The system takes care of automatically mapping traffic keys to subscribers in order to accomplish the desired radio groupings, thereby simplifying the process of assigning encryption information in a communication system.
-
Citations
16 Claims
-
1. A method for adding a radio to a radio talk group in a radio communication system which has a plurality of radios assigned to radio talk groups and encryption rekey groups, comprising the steps of:
-
(a) removing said radio from its assigned encryption rekey group; (b) assigning the radio to said radio talk group; (c) determining if an encryption rekey group exists in the radio communication system which has the same combination of radio talk groups as said radio has assigned to it; and (d) adding said radio to the encryption rekey group if one is determined to exist in step (c). - View Dependent Claims (2, 3, 4)
-
-
5. In a radio communication system which has a plurality of radios assigned to radio talk groups and encryption rekey groups, a method for removing one of said radios from one of its assigned radio talk groups, comprising the steps of:
-
(a) removing said one radio from its assigned encryption rekey group; (b) removing the one radio talk group from the one radio'"'"'s radio talk group assignment list; (c) determining if an encryption rekey group exists in the radio communication system which has the same combination of radio talk groups as the one assigned to said one radio; and (d) adding said one radio to the encryption rekey group if one is determined to exist in step (c). - View Dependent Claims (6, 7, 8, 9)
-
-
10. A method for adding a radio talk group in a radio communication system which has a plurality of radios assigned to radio talk groups and encryption rekey groups, comprising the steps of:
-
(a) generating a unique traffic encryption key for said radio talk group that is to be added; and (b) for each radio that is to be added to said radio talk group perform the following steps; (c) removing said radio from its assigned encryption rekey group; (d) assigning the radio to said radio talk group; (e) determining if an encryption rekey group exists in the radio communication system which has the same combination of radio talk groups as said radio has assigned to it; and (f) adding said radio to the encryption rekey group if one is determined to exist in step (e). - View Dependent Claims (11, 12)
-
-
13. A method for deleting a radio talk group in a radio communication system which has a plurality of radios assigned to radio talk groups and encryption rekey groups, comprising the steps of:
-
(a) determining all of the radios from among the plurality which are assigned to the radio talk group that is to be deleted; and (b) for each radio that is determined to be assigned to the radio talk group that is to be deleted perform the following steps; (c) removing said one radio from its assigned encryption rekey group; (d) removing the one radio talk group from the one radio'"'"'s radio talk group assignment list; (e) determining if an encryption rekey group exists in the radio communication system which has the same combination of radio talk groups as the one assigned to said one radio; and (f) adding said one radio to the encryption rekey group if one is determined to exist in step (e). - View Dependent Claims (14, 15, 16)
-
Specification