KMSEn Guide
KMSEn Guide
Operation Guide
Operation Guide Content
Content
Documentation Information ........................................................................................................................ 1
1. Overview ................................................................................................................................................... 3
1.1 Introduction ........................................................................................................................................... 3
1.2 Roles and Operation Flow .................................................................................................................... 3
1.3 Homepage ............................................................................................................................................ 4
2. Basic Operations (Administrator) .......................................................................................................... 7
2.1 Log in to KMS ....................................................................................................................................... 7
2.2 Import Radio File .................................................................................................................................. 8
2.3 (Optional) Enter Service or Programming Password ........................................................................... 9
2.4 Manage TETRA Keys ......................................................................................................................... 10
2.4.1 Manage Keys ........................................................................................................................... 10
2.4.2 Manage Key Pack .................................................................................................................... 24
2.5 Manage DMR Keys ............................................................................................................................ 29
2.5.1 Manage Keys ........................................................................................................................... 29
2.5.2 Manage Key Pack .................................................................................................................... 37
2.6 Manage PDT Keys ............................................................................................................................. 37
2.6.1 Manage Keys ........................................................................................................................... 37
2.6.2 Manage Key Pack .................................................................................................................... 44
2.7 Distribute Keys to Radio ..................................................................................................................... 44
2.8 Manage Account................................................................................................................................. 46
2.8.1 New Account ............................................................................................................................ 46
2.8.2 Other Operations...................................................................................................................... 47
2.9 View Log ............................................................................................................................................. 47
3. Basic Operations (Common Users) ..................................................................................................... 49
3.1 Log in to KMS ..................................................................................................................................... 49
3.2 Distribute Key Pack ............................................................................................................................ 49
3.3 View Log ............................................................................................................................................. 49
4. Common Operations.............................................................................................................................. 51
4.1 Set Language and Radio Type .......................................................................................................... 51
4.2 Change Password .............................................................................................................................. 51
5. FAQ .......................................................................................................................................................... 53
6. Appendix ................................................................................................................................................. 54
7. Abbreviations ......................................................................................................................................... 55
i
Operation Guide Documentation Information
Documentation Information
This section describes the conventions and revision history of this document.
Documentation Conventions
Instruction Conventions
Icon Description
Notation Conventions
Item Description Example
Revision History
Document Software
Release Date Description
Version Version
PT890Ex is available.
1
Documentation Information Operation Guide
Document Software
Release Date Description
Version Version
2
Operation Guide Overview
1. Overview
1.1 Introduction
Key Management System (KMS) is an encryption key management system for multi-mode advanced radios and
narrowband radios, which can independently complete the production and distribution of keys.
Role Permission
Administrator has the highest permission for all operations, including managing device, creating
Administrator
users, importing radio files, adding keys, adding key file packs, and generating key packs
(available for Mobile Device Management (MDM) Pro, MDM SE, and KMS respectively).
Common users are created by the administrator and have lower permissions, including
Common users
distributing keys to radios and viewing logs.
The operation flow for administrator and common users to generate key packs are different:
3
Overview Operation Guide
The administrator can distribute keys to radios, or generate key file pack and send to MDM Pro or MDM SE.
Common users can only perform key distribution tasks initiated by the administrator.
1.3 Homepage
The KMS homepages are different for the administrator (Admin) and common users.
4
Operation Guide Overview
Area Function
Administrator
Device: import the radio file (.zip) including information of radio, delete keys of radio, write
service password of radio.
Common user
Administrator
5
Overview Operation Guide
Area Function
Manage accounts.
View logs.
Common user
Manage accounts.
View logs.
6
Operation Guide Basic Operations (Administrator)
Click Login.
The system automatically logs in to KMS with the account "Admin" and password "111111aa".
To log in to KMS for the first time, you need to set the database password that is used to migrate KMS data.
7
Basic Operations (Administrator) Operation Guide
If KMS is idle for more than 10 minutes, KMS will automatically log out.
For security, it is suggested to change password after first login. See 4.2 Change Password.
Click Devices.
8
Operation Guide Basic Operations (Administrator)
The radio file pack is a ZIP file containing the radio information used to bind the key to the radio.
Click .
9
Basic Operations (Administrator) Operation Guide
Click OK.
But if you want to modify the K value and create the authentication key yourself, do as follows:
The TEI-K key is bound to the TEI value. This method is to directly import TEI-K or manually configure TEI
value.
If you do not have TEI-K and TEI files, choose New K-Only.
The K-Only key is not bound to the TEI value. This method is to directly import K file.
New TEI-K
Click Keys to access the key management page.
Click New.
10
Operation Guide Basic Operations (Administrator)
Enter the key name, set Type as Tetra, and then select the key type.
Click OK.
11
Basic Operations (Administrator) Operation Guide
Parameter Description
TEI It is used to identify the radio and consists of 15-bit hexadecimal characters.
If you want to add multiple TEIs and Ks, click Add, and then enter the Start TEI and End TEI in the
popped window.
If you have TEI-K file, click Import TEI-K to import TEIs and Ks.
New K-Only
Click Keys to access the key management page.
12
Operation Guide Basic Operations (Administrator)
Click New.
Enter the key name, set Type as Tetra, and then select the key type.
Click OK.
Click New.
13
Basic Operations (Administrator) Operation Guide
Parameter Description
If you need to generate multiple keys, click Add, and then enter the quantity of key in the popped
window.
14
Operation Guide Basic Operations (Administrator)
Click New.
Enter the key name, set Type as Tetra, and then select the key type.
Click OK.
15
Basic Operations (Administrator) Operation Guide
Parameter Description
SCK: 80 bits
Key Length
SCKX: 192 bits
The SCK version number must be the same as the one in the TETRA system.
Version
Value range: 0–65535
16
Operation Guide Basic Operations (Administrator)
E2EE: add the E2EE keys when E2EE Type is Private E2EE.
OTAK: add the KEK, SEK, and TEK keys when E2EE Type is TETRA E2EE.
OTAK (T): add the KEK and TEK keys when E2EE Type is TETRA E2EE. This applies to Teltronic encryption.
E2EE
Click Keys to access the key management page.
Click New.
Enter the key name, set Type as Tetra, set Key Type as E2EE, and then click OK.
Click New, and then configure the Key Length and Key.
17
Basic Operations (Administrator) Operation Guide
Parameter Description
Key Length The length of E2EE key includes 128 bits and 256 bits.
Hexadecimal E2EE keys. Click to automatically generate keys or manually set the key
Key
value.
OTAK
Click Keys to access the key management page.
Click New.
Enter the key name, set Type as Tetra, set Key Type as OTAK, and then click OK.
18
Operation Guide Basic Operations (Administrator)
Parameter Description
SEK
Type
TEK
KEK
19
Basic Operations (Administrator) Operation Guide
Parameter Description
Each group contains three keys. Each encryption rule is identified by a specific key group
number.
1: Current key
Version
2: Previous key
3: Future key
KEK key in hexadecimal format. Click Random to automatically create key value or
Key
manually enter the key.
Allows you to configure the association between keys in CryptoGroup and the encrypted
private or group number.
Voice Flag: 1 indicates voice service will be encrypted, and 0 indicates voice service
will not be encrypted.
Data Flag: 1 indicates data service will be encrypted, and 0 indicates data service will
not be encrypted.
ISSI Flag: When you want to encrypt private number, set it to 1; otherwise, set it to 0.
GSSI Flag: When you want to encrypt group number, set it to 1; otherwise, set it to 0.
Default Mode:
1: Default plain
2: Default encrypted
3: Encrypted only
Address Type:
0: No number limits. When the key group is configured with multiple associations,
the key works for all encrypted services on the radio.
2: The key works for numbers between lower number and upper number.
20
Operation Guide Basic Operations (Administrator)
Parameter Description
3: The key works for lower number, and the corresponding Address Extension of
the number should be provided.
4: The key works for numbers between lower number and upper number, and the
corresponding Address Extension of the number should be provided.
Lower GSSI/ISSI: group number or private number. Only valid when Address Type is
set to 1, 2, 3, or 4.
Upper GIIS/ISSI: group number or private number. Only valid when Address Type is set
to 2 or 4.
Address Extension: Mobile Country Code (MCC) and Mobile Network Code (MNC).
T (Teltronic)
E2EE Type
A
M
OTAK_A key made with KMS only applies to third-party key system. For convince, you can save the key to local
path future use.
21
Basic Operations (Administrator) Operation Guide
Click Browse to import the File Encryption Key (FEK) of A company, and then enter the TEI and Key Id.
To obtain the FEK and corresponding key ID, contact the network administrator of A company.
Click Create.
OTAK (T)
Click Keys to access the key management page.
22
Operation Guide Basic Operations (Administrator)
Click New.
Enter the key name, set Type as Tetra, set Key Type as OTAK(T), and then click OK.
Click Browse to import Teltronic key, and then enter the corresponding FEK.
To obtain the Teltronic key and corresponding FEK, contact the Teltronic network administrator.
The FEK consists of 64 hexadecimal characters. Make sure the key is in the correct format.
Delete key(s): click to delete one key; or select keys, and then click to delete multiple keys.
23
Basic Operations (Administrator) Operation Guide
Click New.
d. Select a key.
e. Click Add.
f. Click OK.
24
Operation Guide Basic Operations (Administrator)
The key application form in .reqs format is used to generate key pack.
Key Application Form
It is provided by the administrator of the MDM Pro or MDM SE.
Operation
Click Files.
25
Basic Operations (Administrator) Operation Guide
Click Browse.
Select key application form. This option indicates that the exported key
MDM
Select the radios, and then click pack is used for MDM Pro or MDM SE.
Export.
26
Operation Guide Basic Operations (Administrator)
Click Import.
c. Click Import.
27
Basic Operations (Administrator) Operation Guide
Click .
To delete multiple key packs, select key packs, and then click Delete.
28
Operation Guide Basic Operations (Administrator)
Click New.
Enter the key name, set Type as DMR, set Key Type as K, set Working Mode as Trunking, and then click OK.
29
Basic Operations (Administrator) Operation Guide
Click Brower to import the E_Key file or H_Key file, and then enter the password.
Parameter Description
30
Operation Guide Basic Operations (Administrator)
Click New.
Enter the key name, set Type as DMR, set Key Type as K, set Working Mode as Conventional/XPT, and then
click OK.
31
Basic Operations (Administrator) Operation Guide
Parameter Description
Hexadecimal authentication key, which is automatically generated when the key file is
Key
created. You can manually modify the value or click to regenerate the value.
Click New.
32
Operation Guide Basic Operations (Administrator)
Enter the key name, set Type as DMR, set Key Type as AIE, set Model, and then click OK.
Click New, and then configure the key length and value.
33
Basic Operations (Administrator) Operation Guide
Parameter Description
Hexadecimal authentication key, which is automatically generated when the key file is
Key
created. You can manually modify the value or click to regenerate the value.
You can directly click Import to import keys if you have AIE key file.
Click New.
34
Operation Guide Basic Operations (Administrator)
Enter the key name, set Type as DMR, set Key Type as E2EE, set Work Mode as Trunking or
Conventional/XPT accordingly, and then click OK.
Trunking
Conventional/XPT
35
Basic Operations (Administrator) Operation Guide
Parameter Description
ID Index of the key list, which maps each key value. You can use the default value.
Key Length The length of E2EE key includes 40 bits, 128 bits or 256 bits.
Hexadecimal E2EE key, which is automatically generated when the key file is created. You
Key
can manually modify the key value, or click to regenerate the value.
36
Operation Guide Basic Operations (Administrator)
Click New.
Enter the key name, set Type as PDT, set Key Type as K, set Working Mode as Trunking, and then click OK.
37
Basic Operations (Administrator) Operation Guide
Click Brower to import the E_Key file or H_Key file, and then enter the password.
Parameter Description
E_Key file/H_Key file The file is used to create trunking authentication keys.
38
Operation Guide Basic Operations (Administrator)
Parameter Description
The file and corresponding password are provided by the DMR system.
Click New.
Enter the key name, set Type as PDT, set Key Type as K, set Working Mode as Conventional, and then click
OK.
39
Basic Operations (Administrator) Operation Guide
Parameter Description
Hexadecimal authentication key, which is automatically generated when the key file is
Key
created. You can manually modify the value or click to regenerate the value.
Click New.
Enter the key name, set Type as PDT, set Key Type as AIE, set Model, and then click OK.
40
Operation Guide Basic Operations (Administrator)
Click New, and then configure the key length and value.
Parameter Description
Hexadecimal authentication key, which is automatically generated when the key file is
Key
created. You can manually modify the value or click to regenerate the value.
41
Basic Operations (Administrator) Operation Guide
You can directly click Import to import keys if you have AIE key file.
Click New.
Enter the key name, set Type as PDT, set Key Type as E2EE, set Work Mode as Trunking or
Conventional/XPT accordingly, and then click OK.
Trunking
42
Operation Guide Basic Operations (Administrator)
Conventional/XPT
43
Basic Operations (Administrator) Operation Guide
Parameter Description
ID Index of the key list, which maps each key value. You can use the default value.
Key Length The length of E2EE key includes 40 bits, 128 bits or 256 bits.
Hexadecimal E2EE key, which is automatically generated when the key file is created. You
Key
can manually modify the key value, or click to regenerate the value.
44
Operation Guide Basic Operations (Administrator)
Click .
45
Basic Operations (Administrator) Operation Guide
Click New.
46
Operation Guide Basic Operations (Administrator)
Click to delete an account; or select accounts, and then click to delete multiple accounts.
47
Basic Operations (Administrator) Operation Guide
48
Operation Guide Basic Operations (Common Users)
Choose the radio type, enter account of common user and password "111111aa" in the login page.
For security, it is suggested to change password after first login. See 4.2 Change Password.
Click Login.
Manage Keys
Click New.
49
Basic Operations (Common Users) Operation Guide
Enter the key name, set Type as PDT, set Key Type as K, set Working Mode as Trunking, and then click OK.
Click Brower to import the E_Key file or H_Key file, and then enter the password.
50
Operation Guide Basic Operations (Common Users)
Parameter Description
Click New.
51
Basic Operations (Common Users) Operation Guide
Enter the key name, set Type as PDT, set Key Type as K, set Working Mode as Conventional, and then click
OK.
52
Operation Guide Basic Operations (Common Users)
Parameter Description
Hexadecimal authentication key, which is automatically generated when the key file is
Key
created. You can manually modify the value or click to regenerate the value.
Click New.
Enter the key name, set Type as PDT, set Key Type as AIE, set Model, and then click OK.
53
Basic Operations (Common Users) Operation Guide
Click New, and then configure the key length and value.
Parameter Description
Hexadecimal authentication key, which is automatically generated when the key file is
Key
created. You can manually modify the value or click to regenerate the value.
54
Operation Guide Basic Operations (Common Users)
You can directly click Import to import keys if you have AIE key file.
Click New.
Enter the key name, set Type as PDT, set Key Type as E2EE, set Work Mode as Trunking or
Conventional/XPT accordingly, and then click OK.
Trunking
55
Basic Operations (Common Users) Operation Guide
Conventional/XPT
56
Operation Guide Basic Operations (Common Users)
Parameter Description
ID Index of the key list, which maps each key value. You can use the default value.
Key Length The length of E2EE key includes 40 bits, 128 bits or 256 bits.
Hexadecimal E2EE key, which is automatically generated when the key file is created. You
Key
can manually modify the key value, or click to regenerate the value.
Distribute Keys to Radio task, connect the radio to the KMS, the task will be executed automatically.
57
Basic Operations (Common Users) Operation Guide
58
Operation Guide Common Operations
4. Common Operations
4.1 Set Language and Radio Type
Log in to KMS using the account of an administrator or common user.
Select language.
Enter old password and new password, and then click OK.
59
Common Operations Operation Guide
60
Operation Guide FAQ
5. FAQ
Q: The interface shows "The K-Only file has run out of quota".
A: When this information appears, it is recommended that you re-create and distribute the K-Only key.
61
Appendix Operation Guide
6. Appendix
See the following table for keys that KMS can manage.
HR1060 Conventional × × √ √ × × × √
HP780
XPT × × √ √ × × × ×
HM780
DMR
Conventional × × √ √ × × × √
PDC760
XPT × × √ √ × × × ×
PDC680
Trunking × × √ √ × × × ×
HR1060
HP780 Conventional × × √ √ × × × √
HM780
PDT
PDC760 Conventional × × √ √ × × × √
PDC680
Trunking × × √ √ × × × ×
PDC690
PTC760
√ √ × √ √ × √ ×
PTC680
TETRA
PT590 √ √ × √ √ √ √ ×
PT890Ex √ √ × √ √ √ √ ×
62
Operation Guide Abbreviations
7. Abbreviations
Abbreviation Full Name
63