Encryption; Remote Updates - Iridium SHOUT ns General Description Manual

Table of Contents

Advertisement

sensor has a variety of settings that impact its detection sensitivity. The motion sensor can
be enabled or disabled (see Section 6.2.2.1 General Profile Settings).

5.6 Encryption

The SHOUT ns can be configured to encrypt/decrypt all transmitted and received data
using 256-bit AES encryption. To enable encryption, the user needs to assign a cryptographic
administrator for the device who will be responsible for modifying the encryption and
decryption keys and setting the device to use encryption (see Section 6.2.2.3 Additional Setup
Parameters). The 256-bit AES encryption algorithms implemented here comply with NIST
FIPS140-2 (see documents Security Requirements for Cryptographic Modules, FIPS PUB 140-
2, US Department of Commerce, National Institute of Standards and Technology, May 25
2001 and Security Requirements for Cryptographic Modules, Annex A: Approved Security
Functions for FIPS PUB 140-2, US Department of Commerce, National Institute of Standards
and Technology, February 19

5.7 Remote Updates

Using the configurable required remote update password, the SHOUT ns can be configured
over the air through the use of remote update option. This allows for remote unattended
trackers to be reconfigured without requiring direct access to the device. All of the tracking
profile parameters and most of the general parameters can be configured via remote updates
(see Section 6.2.2.3 Additional Setup Parameters). NAL Research provides two software
applications that can be used to compose and transmit remote updates: Server for Trackers
and Remote Configure. These programs can be downloaded from the NAL Research's website
(http://www.nalresearch.com/Downloads.html).
applications for the list of remotely configurable parameters.
NAL Research Corporation (451-01001.B)
th
, 2003).
Users
are
referred
th
,
to
the
software
26

Advertisement

Table of Contents
loading

Table of Contents