Method and apparatus for storing and distributing encryption keys
First Claim
Patent Images
1. A method comprising the steps of:
- generating, by a first infrastructure system device, a first encryption key associated with traffic encryption for group communications;
forwarding the first encryption key from the first infrastructure system device to a second infrastructure system device;
storing the first encryption key at the second infrastructure system device;
generating, by the second infrastructure system device, a second encryption key associated with traffic encryption for group communications by combining the first encryption key with a third encryption key; and
forwarding the second encryption key to a third infrastructure system device other than the first and second infrastructure system devices, wherein the second encryption key is used for encrypting messages for communicating over an air interface.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of key distribution includes generating, by a first system device (101), key material and forwarding the key material from the first system device (101) to a second system device (107). It is determined whether a mobile station (401), for which the key material is directed, is active on the system. When the mobile station is active, the key material is forwarded to a base station (115) where the mobile station (401) is active, and the base station (115) forwards the key material to the mobile station (401).
63 Citations
22 Claims
-
1. A method comprising the steps of:
-
generating, by a first infrastructure system device, a first encryption key associated with traffic encryption for group communications; forwarding the first encryption key from the first infrastructure system device to a second infrastructure system device; storing the first encryption key at the second infrastructure system device; generating, by the second infrastructure system device, a second encryption key associated with traffic encryption for group communications by combining the first encryption key with a third encryption key; and forwarding the second encryption key to a third infrastructure system device other than the first and second infrastructure system devices, wherein the second encryption key is used for encrypting messages for communicating over an air interface. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
2. A method comprising the steps of:
-
receiving, in a first infrastructure system device, a first encryption key generated in a second infrastructure system device, wherein the first encryption key is associated with traffic encryption for group communications; storing the first encryption key at the first infrastructure system device; generating, by the first infrastructure system device, a second encryption key associated with traffic encryption for group communications by combining the first encryption key with a third encryption key; and forwarding the second encryption key to a third infrastructure system device other than the first and second infrastructure system devices, wherein the second encryption key is used for encrypting messages for communicating over an air interface.
-
Specification