Secure communication for emergency responders
A German university developed a procedure to improve speed and security of communication tools used by emergency responders (police, fire brigade etc.). The procedure enables a secure communication with insecure devices, such as smartphones. The university offers a lisence agreement.
The university offers a lisence agreement to producers of TETRA devices (radio units) and the required infrastructure. Other suitable partners are procurement agencies at police authorities or hospitals. The partners would integrate the technology in their communication systems.
Authorities and organzisations with security tasks require wireless communication systems that guarantee a particularly high degree of reliability against unauthorized interception or even manipulation of transmitted data by third parties. For this purpose the digital trunked radio system TETRA (Terrestrial Trunked Radio) is being introduced. Unfortunately it has a low data rate (about 15.6 kbit/s). Therefore it is not capable of transmitting large amounts of data such as maps, videos and other data which are relevant for emergency services. Therefore the combination of TETRA with commercially available systems such as WLAN or UMTS / LTE is envisaged. Future communication facilities of emergency services face two challenges: large data amounts to be transmitted and security requirements. Additional challenges are the security requirements. Publicly operated networks present potential security vulnerability, since the authentication / encryption mechanisms used by the networks and the associated keys are accessible to the operators of these networks, potentially allowing operators to potentially gain access to the confidential data. Against this background, it is imperative to perform additional encryption. The challenge is to distribute the keys for this additional encryption as well as to manage the access permissions. A German university developed a novel procedure: highly secure groupe key management, short HISEC- GKM. It enables the secure use of public networks as well as the transmission of group hierarchies through a specific combination of the different procedures. The university offers a lisence agreement to producers of TETRA devices. They should implement the technology. Below the functionalities of the invention are described. Please have a look at the graph that will help to understand the technique. If conventional communication devices are to be integrated into secure communication with TETRA, a key is requested from a TETRA device (1). The key is created by the group key management service centre (GKMSC) (2) and sent as a QR code to one or more TETRA terminals (3). The access device in the insecure network (NU) scans the code (4) and thus gets access to the secure network (NS) (5). If an ad hoc network based on a commercial available technology (eg WLAN) is set up by an organization (eg the fire brigade) and the access key is stored in the GKMSC in order to provide this high data rate, members of the organization can use the ad hoc network (1:1 figure of the groups) if they have access to the GKMSC. By means of the same access, then, if necessary, the secure network NS can also be accessed by means of a special gateway. If now an organization- spreading group is to be developed (police and fire- brigade) a common group key is requested over the GKMSC (1:n illustration of the groups). If the requesting agent is authorized for group aggregation, a new group key is generated for both subgroups and distributed via a push service. The use of push services within NS thus enables efficient management of the required keys and credentials. These can be replaced quickly if necessary. In addition, a single member of a secure network acting group GNS may request a key or credential for a new network acting group GUS, which is then distributed to all members of the authorized groups GNS. Using a virtual interface between NS and NU makes it easier to protect the keys as it cannot simply be copied / noted. Errors due to a manual adjustment of the keys are avoided. A time- consuming operation of a keyboard is eliminated, e.g. by using a helmet camera, the code displayed on the Tetra device can be transferred directly to the multimedia- enabled device by fire fighter in use.
Advantages and innovations
A novel solution to the challenges communication facilities are facing is offered. The devices currently used for encrypted communication for emergency services are basically technically obsolete and much too slow. By assigning keys, with this invention even modern terminal devices can communicate with the security customary in the TETRA standard. In addition to the safe use of insecure networks with high data rates by the emergency services themselves, there are multitude of other scenarios in which HISEC- GKM can be great of benefit. In this way, volunteers can be given temporary access to relevant data in disaster situations and integrated into TETRA communication. The use of hierarchies and the division into groups can be used for organizational purposes. This can also be very helpful in organizing folder services at major events (e.g. in football stadiums) or searches. In particular, persons classified as unreliable may be excluded from communication by revoking the old and distributing a new key.
Prototype available for demonstration
Intellectual Property Rights (IPR)
Patent(s) applied for but not yet granted
Register your interest
How it works
- Tell us about yourself
- We’ll discuss with you
- We put the right partners in touch
EEN help you find the right partner, rather than you going it alone.
Our role is to review and collate the most suitable submissions, and then send them to the client who posted the opportunity. We consult with you, and the client, to make the process professional and easy.
These are live opportunities. Your registration of interest on the site is just like a professional approach to a business at a networking event. To stand the best chance of success, make your submission really sing. Sell why the client who posted the opportunity should work with you. Excite them. Ask questions. Try and avoid copy and pasting words from elsewhere.
Once the client has chosen their partner, we'll introduce them over email and keep in touch with both parties to see how it's going. Sometimes things progress quickly. Sometimes because of changing priorities for either party, things progress slowly, but you never know - your next big business break could start right here.
First we need to check you’re human.
Thank you for verifying your email. We have sent you a confirmation email containing a 6 digit verification code to unlock the form below