发明名称 Method for identifying corrupt encryption keys within a secure communication system
摘要 A resource allocator (108) receives, from a first communication unit, a request to establish secure communications with at least a second communication unit. A key identifier is retrieved by the resource allocator and transmitted to at least the second communication unit. Based upon the transmitted key identifier, the second communication unit retrieves an identified encryption key and, at least when the identified encryption key is corrupt, transmits a corrupt key indication to the resource allocator. In response, the resource allocator can assign a default key identifier for use in the secure communication. In this manner, missed communications due to encryption key failures are reduced.
申请公布号 US5442703(A) 申请公布日期 1995.08.15
申请号 US19940250318 申请日期 1994.05.27
申请人 MOTOROLA, INC. 发明人 KIM, CHARLES C.;WOODHOUSE, ROBERT D.
分类号 H04L9/08;(IPC1-7):H04L9/00 主分类号 H04L9/08
代理机构 代理人
主权项
地址
您可能感兴趣的专利