Secure communications in a wireless system
First Claim
1. In a communications system comprising a plurality of remote transmitting devices and a receiving station having a receiver associated therewith, a method for determining whether a message received from a transmitting device is encrypted or unencrypted, said method comprising the steps of:
- a) receiving at said receiving station a message from a transmitting device;
b) storing said message in a buffer;
c) analyzing a portion of said stored message to determine if was validly received;
d) further processing said message portion as a validly received unencrypted message when said message portion has been so determined to be validly received;
e) analyzing said stored message to determine if it was validly received when said message portion has been so determined to be not validly received;
f) further processing said stored message as an encrypted message when said stored message has been so determined to be validly received;
g) ignoring said stored message when said stored message has been so determined to be not validly received;
wherein said message portion comprises a message portion cyclic redundancy character, and wherein said message portion analyzing step comprises the step of performing a cyclic redundancy check routine on said message portion and comparing the results thereof to said message portion cyclic redundancy character.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are three major aspects relating to wireless transmission of encrypted data messages in a security system wherein the receiver stores locally an encryption key utilized by the transmitting device to encrypt the data message and the receiver uses the encryption key to decrypt an encrypted data message, and wherein a sequence number generator is used to synchronously track the message sequence at both the transmitter and receiver. A first major aspect involves encrypted device registration (learning) methods that are user-friendly and immune from detection by technically skilled intruders with special RF equipment, and periodic user-friendly changing of the encryption key per encrypted transmitting device in the system. A second major aspect involves encrypted device de-registration (unlearning, or deletion) that is likewise user friendly. A third major aspect of the invention allows the receiver to process encrypted and non-encrypted messages, interchangeably, within the same wireless security system.
-
Citations
4 Claims
-
1. In a communications system comprising a plurality of remote transmitting devices and a receiving station having a receiver associated therewith, a method for determining whether a message received from a transmitting device is encrypted or unencrypted, said method comprising the steps of:
-
a) receiving at said receiving station a message from a transmitting device; b) storing said message in a buffer; c) analyzing a portion of said stored message to determine if was validly received; d) further processing said message portion as a validly received unencrypted message when said message portion has been so determined to be validly received; e) analyzing said stored message to determine if it was validly received when said message portion has been so determined to be not validly received; f) further processing said stored message as an encrypted message when said stored message has been so determined to be validly received; g) ignoring said stored message when said stored message has been so determined to be not validly received;
wherein said message portion comprises a message portion cyclic redundancy character, and wherein said message portion analyzing step comprises the step of performing a cyclic redundancy check routine on said message portion and comparing the results thereof to said message portion cyclic redundancy character. - View Dependent Claims (2, 3, 4)
-
Specification