0% found this document useful (0 votes)
70 views65 pages

KMSEn Guide

The KMS Operation Guide provides detailed instructions for using the Key Management System, including roles, operation flow, and basic operations for both administrators and common users. It covers tasks such as logging in, managing keys, distributing keys to radios, and viewing logs. The document also includes a FAQ section and an appendix with abbreviations.

Uploaded by

canah58184
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views65 pages

KMSEn Guide

The KMS Operation Guide provides detailed instructions for using the Key Management System, including roles, operation flow, and basic operations for both administrators and common users. It covers tasks such as logging in, managing keys, distributing keys to radios, and viewing logs. The document also includes a FAQ section and an appendix with abbreviations.

Uploaded by

canah58184
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

KMS

Operation Guide
Operation Guide Content

Content
Documentation Information ........................................................................................................................ 1
1. Overview ................................................................................................................................................... 3
1.1 Introduction ........................................................................................................................................... 3
1.2 Roles and Operation Flow .................................................................................................................... 3
1.3 Homepage ............................................................................................................................................ 4
2. Basic Operations (Administrator) .......................................................................................................... 7
2.1 Log in to KMS ....................................................................................................................................... 7
2.2 Import Radio File .................................................................................................................................. 8
2.3 (Optional) Enter Service or Programming Password ........................................................................... 9
2.4 Manage TETRA Keys ......................................................................................................................... 10
2.4.1 Manage Keys ........................................................................................................................... 10
2.4.2 Manage Key Pack .................................................................................................................... 24
2.5 Manage DMR Keys ............................................................................................................................ 29
2.5.1 Manage Keys ........................................................................................................................... 29
2.5.2 Manage Key Pack .................................................................................................................... 37
2.6 Manage PDT Keys ............................................................................................................................. 37
2.6.1 Manage Keys ........................................................................................................................... 37
2.6.2 Manage Key Pack .................................................................................................................... 44
2.7 Distribute Keys to Radio ..................................................................................................................... 44
2.8 Manage Account................................................................................................................................. 46
2.8.1 New Account ............................................................................................................................ 46
2.8.2 Other Operations...................................................................................................................... 47
2.9 View Log ............................................................................................................................................. 47
3. Basic Operations (Common Users) ..................................................................................................... 49
3.1 Log in to KMS ..................................................................................................................................... 49
3.2 Distribute Key Pack ............................................................................................................................ 49
3.3 View Log ............................................................................................................................................. 49
4. Common Operations.............................................................................................................................. 51
4.1 Set Language and Radio Type .......................................................................................................... 51
4.2 Change Password .............................................................................................................................. 51
5. FAQ .......................................................................................................................................................... 53
6. Appendix ................................................................................................................................................. 54
7. Abbreviations ......................................................................................................................................... 55

i
Operation Guide Documentation Information

Documentation Information
This section describes the conventions and revision history of this document.

Documentation Conventions
Instruction Conventions
Icon Description

Indicates references that can further describe the related topics.

Indicates situations that could cause data loss or equipment damage.

Notation Conventions
Item Description Example

To save the configuration, click Apply.


Denotes menus, tabs, parameter names,
Boldface window names, dialogue names, and The Log Level Settings dialogue box appears.
hardware buttons.
Press the PTT key.

> Directs you to access a multi-level menu. Go to File > New.

Revision History
Document Software
Release Date Description
Version Version

 Added TEI-K2, K2-Only, and SCKX


00 V3.3 November 2024
 PDC690 is available.

 Updated OTAK Teltronic to OTAK(T).

 Added new features for OTAK:

00 V3.2 May 2024  Added Association between keys.

 Added T, A, and M key type.

 PT890Ex is available.

00 V3.1 July 2023 Added OTAK (Teltronic) E2EE.

00 V3.0 Sep, 2022 PT590 is available.

00 V2.0 July, 2020 Optimized problem.

1
Documentation Information Operation Guide

Document Software
Release Date Description
Version Version

00 V1.5 Jan, 2020 Added devices management.

00 V1.0 Sep, 2019 Initial Release.

2
Operation Guide Overview

1. Overview
1.1 Introduction
Key Management System (KMS) is an encryption key management system for multi-mode advanced radios and
narrowband radios, which can independently complete the production and distribution of keys.

1.2 Roles and Operation Flow


There are two kinds of roles with different permissions.

Role Permission

KMS provides a default administrator (Admin) with password "111111aa".

Administrator has the highest permission for all operations, including managing device, creating
Administrator
users, importing radio files, adding keys, adding key file packs, and generating key packs
(available for Mobile Device Management (MDM) Pro, MDM SE, and KMS respectively).

Common users are created by the administrator and have lower permissions, including
Common users
distributing keys to radios and viewing logs.

The operation flow for administrator and common users to generate key packs are different:

3
Overview Operation Guide

 The administrator can distribute keys to radios, or generate key file pack and send to MDM Pro or MDM SE.

 Common users can only perform key distribution tasks initiated by the administrator.

1.3 Homepage
The KMS homepages are different for the administrator (Admin) and common users.

 Homepage for administrator (Admin)

 Homepage for common user

4
Operation Guide Overview

Area Function

Provide the KMS common operations of Admin and common user:

 : show KMS version and copyright information.

1  : provide KMS operation guide.

 : change the login password of current account, and log out.

 : set the language.

Show the configuration options of KMS:

 Administrator

 Device: import the radio file (.zip) including information of radio, delete keys of radio, write
service password of radio.

 Keys: manage keys.

 Files: create task of distributing keys, and manage key package.

 Tasks: terminate or redo task.


2
 Distribution: distribute keys to radios.

 Account: manage KMS accounts.

 Log: view operation logs of all accounts.

 Common user

 Tasks: terminate or redo task.

 Distribution: distribute keys to radios.

 Log: view operation logs of the current account.

Provide the configuration page:

 Administrator

3  Create and delete encryption keys and encryption card file.

 Add, delete, and import key file packs.

 Distribute keys to radio.

5
Overview Operation Guide

Area Function
 Manage accounts.

 Terminate or redo task.

 View logs.

 Common user

 Terminate or redo task.

 Import and delete key file packs.

 Distribute keys to radio.

 Manage accounts.

 View logs.

6
Operation Guide Basic Operations (Administrator)

2. Basic Operations (Administrator)


2.1 Log in to KMS
Run KMS.

Click Login.

The system automatically logs in to KMS with the account "Admin" and password "111111aa".

Set the database password, and then click OK.

To log in to KMS for the first time, you need to set the database password that is used to migrate KMS data.

7
Basic Operations (Administrator) Operation Guide

 If KMS is idle for more than 10 minutes, KMS will automatically log out.

 For security, it is suggested to change password after first login. See 4.2 Change Password.

2.2 Import Radio File


Contact the customer service to get the radio file.

Click Devices.

Click Import to import radio file.

8
Operation Guide Basic Operations (Administrator)

The radio file pack is a ZIP file containing the radio information used to bind the key to the radio.

2.3 (Optional) Enter Service or Programming Password


When the service password has been set for the multi-mode advanced radio or the programming password has been
set for the narrowband radio, you must enter the same password for the corresponding radio in KMS. Otherwise, the
key pack cannot be distributed.

Click .

Enter service password or programming password.

9
Basic Operations (Administrator) Operation Guide

Click OK.

2.4 Manage TETRA Keys


2.4.1 Manage Keys
2.4.1.1 Add Authentication Keys
In normal case, the terminal is programmed with the K value. You can obtain the TEI-K by providing the Serial
Number (SN) or the Terminal Equipment Identity (TEI) to the customer service.

But if you want to modify the K value and create the authentication key yourself, do as follows:

Choose the key type according to your requirements:

 If you have the radio TEI file, choose New TEI-K.

The TEI-K key is bound to the TEI value. This method is to directly import TEI-K or manually configure TEI
value.

 If you do not have TEI-K and TEI files, choose New K-Only.

The K-Only key is not bound to the TEI value. This method is to directly import K file.

New TEI-K
Click Keys to access the key management page.

Click New.

10
Operation Guide Basic Operations (Administrator)

Enter the key name, set Type as Tetra, and then select the key type.

 If the radio uses first generation algorithm, select TEI-K.

 If the radio uses second generation algorithm, select TEI-K2.

Click OK.

Click New, and then enter TEI and Key.

11
Basic Operations (Administrator) Operation Guide

Parameter Description

TEI It is used to identify the radio and consists of 15-bit hexadecimal characters.

 TEI-K: 128 bits


Key Length
 TEI-K2: 256 bits

Key It is the authentication key and consists of 32-bit hexadecimal characters.

 If you want to add multiple TEIs and Ks, click Add, and then enter the Start TEI and End TEI in the
popped window.

 If you have TEI-K file, click Import TEI-K to import TEIs and Ks.

 Click Export to export configured TEI-K file if necessary.

 Click Update All to update all keys.

Click Save and Exit.

New K-Only
Click Keys to access the key management page.

12
Operation Guide Basic Operations (Administrator)

Click New.

Enter the key name, set Type as Tetra, and then select the key type.

 If the radio uses first generation algorithm, select K-Only.

 If the radio uses second generation algorithm, select K2-Only.

Click OK.

Click New.

The key is automatically generated.

13
Basic Operations (Administrator) Operation Guide

Parameter Description

 K-Only: 128 bits


Key Length
 K2-Only: 256 bits

Key It is the authentication key and consists of 32-bit hexadecimal characters.

 If you have K-Only file, click Import to import keys.

 Click Export to export configured K-Only file.

 If you need to generate multiple keys, click Add, and then enter the quantity of key in the popped
window.

 Click Update All to update all keys.

Click Save and Exit.

2.4.1.2 Add SCK


Click Keys to access the key management page.

14
Operation Guide Basic Operations (Administrator)

Click New.

Enter the key name, set Type as Tetra, and then select the key type.

 If the radio uses first generation algorithm, select SCK.

 If the radio uses second generation algorithm, select SCKX.

Click OK.

Enter the SCK version number in the Version column.

15
Basic Operations (Administrator) Operation Guide

Parameter Description

 SCK: 80 bits
Key Length
 SCKX: 192 bits

The SCK version number must be the same as the one in the TETRA system.
Version
Value range: 0–65535

Key The SCK value consists of 20-bit hexadecimal characters.

 If you have SCK file, click Import to import keys.

 Click Export to export configured key file.

 Click Update All to update all keys.

Click Save and Exit.

2.4.1.3 Add E2EE Keys


You need to configure encryption keys according to the E2EE Type of the radio.

16
Operation Guide Basic Operations (Administrator)

 E2EE: add the E2EE keys when E2EE Type is Private E2EE.

 OTAK: add the KEK, SEK, and TEK keys when E2EE Type is TETRA E2EE.

 OTAK (T): add the KEK and TEK keys when E2EE Type is TETRA E2EE. This applies to Teltronic encryption.

E2EE
Click Keys to access the key management page.

Click New.

Enter the key name, set Type as Tetra, set Key Type as E2EE, and then click OK.

Click New, and then configure the Key Length and Key.

17
Basic Operations (Administrator) Operation Guide

Parameter Description

Key Length The length of E2EE key includes 128 bits and 256 bits.

Hexadecimal E2EE keys. Click to automatically generate keys or manually set the key
Key
value.

Click Save and Exit.

OTAK
Click Keys to access the key management page.

Click New.

Enter the key name, set Type as Tetra, set Key Type as OTAK, and then click OK.

18
Operation Guide Basic Operations (Administrator)

Configure encryption key information.

Parameter Description

TETRA keys includes:

 SEK
Type
 TEK

 KEK

CryptoGroup Key group, range: 0–4094.

19
Basic Operations (Administrator) Operation Guide

Parameter Description
Each group contains three keys. Each encryption rule is identified by a specific key group
number.

The activation status of the key.

 1: Current key
Version
 2: Previous key

 3: Future key

KMMEA Key management algorithm, supporting AES–128 and AES–256.

KEK key in hexadecimal format. Click Random to automatically create key value or
Key
manually enter the key.

Allows you to configure the association between keys in CryptoGroup and the encrypted
private or group number.

 Voice Flag: 1 indicates voice service will be encrypted, and 0 indicates voice service
will not be encrypted.

 Data Flag: 1 indicates data service will be encrypted, and 0 indicates data service will
not be encrypted.

 ISSI Flag: When you want to encrypt private number, set it to 1; otherwise, set it to 0.

 GSSI Flag: When you want to encrypt group number, set it to 1; otherwise, set it to 0.

 Default Mode:

Add  0: Plain only

 1: Default plain

 2: Default encrypted

 3: Encrypted only

 CryptoGroup: Associated key group

 Address Type:

 0: No number limits. When the key group is configured with multiple associations,
the key works for all encrypted services on the radio.

 1: The key only works for lower number.

 2: The key works for numbers between lower number and upper number.

20
Operation Guide Basic Operations (Administrator)

Parameter Description
 3: The key works for lower number, and the corresponding Address Extension of
the number should be provided.

 4: The key works for numbers between lower number and upper number, and the
corresponding Address Extension of the number should be provided.

 Lower GSSI/ISSI: group number or private number. Only valid when Address Type is
set to 1, 2, 3, or 4.

 Upper GIIS/ISSI: group number or private number. Only valid when Address Type is set
to 2 or 4.

 Address Extension: Mobile Country Code (MCC) and Mobile Network Code (MNC).

OTAK key applies to radios from following company:

 T (Teltronic)
E2EE Type
 A

 M

Click Save and Exit.

OTAK_A key made with KMS only applies to third-party key system. For convince, you can save the key to local
path future use.

Select the OTAK_A key, and then click A Key.

21
Basic Operations (Administrator) Operation Guide

Click Browse to import the File Encryption Key (FEK) of A company, and then enter the TEI and Key Id.

To obtain the FEK and corresponding key ID, contact the network administrator of A company.

Click Create.

Select a path, and then click Save.

OTAK (T)
Click Keys to access the key management page.

22
Operation Guide Basic Operations (Administrator)

Click New.

Enter the key name, set Type as Tetra, set Key Type as OTAK(T), and then click OK.

Click Browse to import Teltronic key, and then enter the corresponding FEK.

Click Save and Exit.

 To obtain the Teltronic key and corresponding FEK, contact the Teltronic network administrator.

 The FEK consists of 64 hexadecimal characters. Make sure the key is in the correct format.

2.4.1.4 Other Operations


 Edit the existing key: click to edit the key value in the popped window.

 Delete key(s): click to delete one key; or select keys, and then click to delete multiple keys.

23
Basic Operations (Administrator) Operation Guide

2.4.2 Manage Key Pack


2.4.2.1 New Key Pack
Click Files.

Click New.

Configure key pack.

a. Enter the pack name.

b. Select the model.

c. Select the key type.

d. Select a key.

e. Click Add.

f. Click OK.

24
Operation Guide Basic Operations (Administrator)

2.4.2.2 Export Key Pack


Preparation
File Access Method

The key application form in .reqs format is used to generate key pack.
Key Application Form
It is provided by the administrator of the MDM Pro or MDM SE.

Operation
Click Files.

Select key pack, and then click .

25
Basic Operations (Administrator) Operation Guide

Select the purpose of exporting the key pack.

If You Select… Then… Remarks

Click Browse.

Select key application form. This option indicates that the exported key
MDM
Select the radios, and then click pack is used for MDM Pro or MDM SE.

Export.

 This option indicates that the


Select the radios.
exported key pack is used for KMS.
KMS Enter password of key file.
 The password is required when you
Click Export.
import the key file to KMS.

26
Operation Guide Basic Operations (Administrator)

2.4.2.3 Import Key Pack


Click Files.

Click Import.

Import the key pack.

a. Click Browse, and then select the key file.

b. Enter the password of the key file.

c. Click Import.

27
Basic Operations (Administrator) Operation Guide

2.4.2.4 Other Operations


Check the Details of Key Pack
Click Files.

Click .

Delete the Key Pack


 To delete one key pack, click .

 To delete multiple key packs, select key packs, and then click Delete.

28
Operation Guide Basic Operations (Administrator)

2.5 Manage DMR Keys


2.5.1 Manage Keys
2.5.1.2 Add Authentication Keys
Trunking Authentication Key
Click Keys to access the key management page.

Click New.

Enter the key name, set Type as DMR, set Key Type as K, set Working Mode as Trunking, and then click OK.

29
Basic Operations (Administrator) Operation Guide

Click Brower to import the E_Key file or H_Key file, and then enter the password.

Parameter Description

The file is used to create trunking authentication keys.


E_Key file/H_Key file
The file and corresponding password are provided by the DMR system.

30
Operation Guide Basic Operations (Administrator)

Click Save and Exit.

Conventional Authentication Key


Click Keys to access the key management page.

Click New.

Enter the key name, set Type as DMR, set Key Type as K, set Working Mode as Conventional/XPT, and then
click OK.

Configure the key length and key value.

31
Basic Operations (Administrator) Operation Guide

Parameter Description

Key Length 128 bits by default.

Hexadecimal authentication key, which is automatically generated when the key file is
Key
created. You can manually modify the value or click to regenerate the value.

Click Save and Exit.

2.5.1.3 Add Conventional AIE


Click Keys to access the key management page.

Click New.

32
Operation Guide Basic Operations (Administrator)

Enter the key name, set Type as DMR, set Key Type as AIE, set Model, and then click OK.

Click New, and then configure the key length and value.

33
Basic Operations (Administrator) Operation Guide

Parameter Description

Key Length 128 bits by default.

Hexadecimal authentication key, which is automatically generated when the key file is
Key
created. You can manually modify the value or click to regenerate the value.

 You can directly click Import to import keys if you have AIE key file.

 Click Export to export the configured key file if necessary.

 Click Update All to generate keys randomly.

Click Save and Exit.

2.5.1.4 Add E2EE Keys


Configure conventional E2EE keys and trunking E2EE keys accordingly.

Click Keys to access the key management page.

Click New.

34
Operation Guide Basic Operations (Administrator)

Enter the key name, set Type as DMR, set Key Type as E2EE, set Work Mode as Trunking or
Conventional/XPT accordingly, and then click OK.

 Trunking

 Conventional/XPT

35
Basic Operations (Administrator) Operation Guide

Click New, and then configure E2EE keys.

Parameter Description

ID Index of the key list, which maps each key value. You can use the default value.

Key Length The length of E2EE key includes 40 bits, 128 bits or 256 bits.

Hexadecimal E2EE key, which is automatically generated when the key file is created. You
Key
can manually modify the key value, or click to regenerate the value.

Click Save and Exit.

36
Operation Guide Basic Operations (Administrator)

2.5.2 Manage Key Pack


See 2.4.2 Manage Key Pack.

2.6 Manage PDT Keys


2.6.1 Manage Keys
2.6.1.2 Add Authentication Keys
Trunking Authentication Key
Click Keys to access the key management page.

Click New.

Enter the key name, set Type as PDT, set Key Type as K, set Working Mode as Trunking, and then click OK.

37
Basic Operations (Administrator) Operation Guide

Click Brower to import the E_Key file or H_Key file, and then enter the password.

Parameter Description

E_Key file/H_Key file The file is used to create trunking authentication keys.

38
Operation Guide Basic Operations (Administrator)

Parameter Description
The file and corresponding password are provided by the DMR system.

Click Save and Exit.

Conventional Authentication Key


Click Keys to access the key management page.

Click New.

Enter the key name, set Type as PDT, set Key Type as K, set Working Mode as Conventional, and then click
OK.

Configure the key length and key value.

39
Basic Operations (Administrator) Operation Guide

Parameter Description

Key Length 128 bits by default.

Hexadecimal authentication key, which is automatically generated when the key file is
Key
created. You can manually modify the value or click to regenerate the value.

Click Save and Exit.

2.6.1.3 Add Conventional AIE


Click Keys to access the key management page.

Click New.

Enter the key name, set Type as PDT, set Key Type as AIE, set Model, and then click OK.

40
Operation Guide Basic Operations (Administrator)

Click New, and then configure the key length and value.

Parameter Description

Key Length 128 bits by default.

Hexadecimal authentication key, which is automatically generated when the key file is
Key
created. You can manually modify the value or click to regenerate the value.

41
Basic Operations (Administrator) Operation Guide

 You can directly click Import to import keys if you have AIE key file.

 Click Export to export the configured key file if necessary.

 Click Update All to generate keys randomly.

Click Save and Exit.

2.6.1.4 Add E2EE Keys


Configure conventional E2EE keys and trunking E2EE keys accordingly.

Click Keys to access the key management page.

Click New.

Enter the key name, set Type as PDT, set Key Type as E2EE, set Work Mode as Trunking or
Conventional/XPT accordingly, and then click OK.

 Trunking

42
Operation Guide Basic Operations (Administrator)

 Conventional/XPT

Click New, and then configure E2EE keys.

43
Basic Operations (Administrator) Operation Guide

Parameter Description

ID Index of the key list, which maps each key value. You can use the default value.

Key Length The length of E2EE key includes 40 bits, 128 bits or 256 bits.

Hexadecimal E2EE key, which is automatically generated when the key file is created. You
Key
can manually modify the key value, or click to regenerate the value.

Click Save and Exit.

2.6.2 Manage Key Pack


See 2.4.2 Manage Key Pack.

2.7 Distribute Keys to Radio


Click Files.

44
Operation Guide Basic Operations (Administrator)

Click .

Select radios, and then click OK.

45
Basic Operations (Administrator) Operation Guide

2.8 Manage Account


2.8.1 New Account
Click Account.

Click New.

Enter content in Account and Name.

 Account is used to log in to KMS and the default password is "111111aa".

 Name is used to indicate the user name.

46
Operation Guide Basic Operations (Administrator)

2.8.2 Other Operations


You can also do the following in the Account page.

 Click to change the name of the account user.

 Click to reset the password, and the new password is 111111aa.

 Click to delete an account; or select accounts, and then click to delete multiple accounts.

2.9 View Log


Click Log.

View operation logs of all users.

47
Basic Operations (Administrator) Operation Guide

48
Operation Guide Basic Operations (Common Users)

3. Basic Operations (Common Users)


3.1 Log in to KMS
Run KMS.

Choose the radio type, enter account of common user and password "111111aa" in the login page.

For security, it is suggested to change password after first login. See 4.2 Change Password.

Click Login.

3.2 Distribute Key Pack


After Admin creates the Manage PDT Keys

Manage Keys

3.2.1.2 Add Authentication Keys


Trunking Authentication Key
Click Keys to access the key management page.

Click New.

49
Basic Operations (Common Users) Operation Guide

Enter the key name, set Type as PDT, set Key Type as K, set Working Mode as Trunking, and then click OK.

Click Brower to import the E_Key file or H_Key file, and then enter the password.

50
Operation Guide Basic Operations (Common Users)

Parameter Description

The file is used to create trunking authentication keys.


E_Key file/H_Key file
The file and corresponding password are provided by the DMR system.

Click Save and Exit.

Conventional Authentication Key


Click Keys to access the key management page.

Click New.

51
Basic Operations (Common Users) Operation Guide

Enter the key name, set Type as PDT, set Key Type as K, set Working Mode as Conventional, and then click
OK.

Configure the key length and key value.

52
Operation Guide Basic Operations (Common Users)

Parameter Description

Key Length 128 bits by default.

Hexadecimal authentication key, which is automatically generated when the key file is
Key
created. You can manually modify the value or click to regenerate the value.

Click Save and Exit.

3.2.1.3 Add Conventional AIE


Click Keys to access the key management page.

Click New.

Enter the key name, set Type as PDT, set Key Type as AIE, set Model, and then click OK.

53
Basic Operations (Common Users) Operation Guide

Click New, and then configure the key length and value.

Parameter Description

Key Length 128 bits by default.

Hexadecimal authentication key, which is automatically generated when the key file is
Key
created. You can manually modify the value or click to regenerate the value.

54
Operation Guide Basic Operations (Common Users)

 You can directly click Import to import keys if you have AIE key file.

 Click Export to export the configured key file if necessary.

 Click Update All to generate keys randomly.

Click Save and Exit.

3.2.1.4 Add E2EE Keys


Configure conventional E2EE keys and trunking E2EE keys accordingly.

Click Keys to access the key management page.

Click New.

Enter the key name, set Type as PDT, set Key Type as E2EE, set Work Mode as Trunking or
Conventional/XPT accordingly, and then click OK.

 Trunking

55
Basic Operations (Common Users) Operation Guide

 Conventional/XPT

Click New, and then configure E2EE keys.

56
Operation Guide Basic Operations (Common Users)

Parameter Description

ID Index of the key list, which maps each key value. You can use the default value.

Key Length The length of E2EE key includes 40 bits, 128 bits or 256 bits.

Hexadecimal E2EE key, which is automatically generated when the key file is created. You
Key
can manually modify the key value, or click to regenerate the value.

Click Save and Exit.

3.2.2 Manage Key Pack


See 2.4.2 Manage Key Pack.

Distribute Keys to Radio task, connect the radio to the KMS, the task will be executed automatically.

You can view the task status in Tasks or Distribution.

3.3 View Log


Click Log.

View operation logs of current user.

57
Basic Operations (Common Users) Operation Guide

58
Operation Guide Common Operations

4. Common Operations
4.1 Set Language and Radio Type
Log in to KMS using the account of an administrator or common user.

Select language.

4.2 Change Password


For security, it is suggested to change password after first login.

Log in to KMS using the account of an administrator or common user.

Click and select Change Password.

Enter old password and new password, and then click OK.

59
Common Operations Operation Guide

60
Operation Guide FAQ

5. FAQ
Q: The interface shows "The K-Only file has run out of quota".

A: When this information appears, it is recommended that you re-create and distribute the K-Only key.

61
Appendix Operation Guide

6. Appendix
See the following table for keys that KMS can manage.

Authentication E2EE AIE


Models K- TEI- OTAK
K E2EE OTAK SCK AIE
Only K (Teltronic)

 HR1060 Conventional × × √ √ × × × √

 HP780
XPT × × √ √ × × × ×
 HM780
DMR
Conventional × × √ √ × × × √
 PDC760
XPT × × √ √ × × × ×
 PDC680
Trunking × × √ √ × × × ×

 HR1060

 HP780 Conventional × × √ √ × × × √

 HM780
PDT
 PDC760 Conventional × × √ √ × × × √

 PDC680
Trunking × × √ √ × × × ×
 PDC690

 PTC760
√ √ × √ √ × √ ×
 PTC680
TETRA
PT590 √ √ × √ √ √ √ ×

PT890Ex √ √ × √ √ √ √ ×

62
Operation Guide Abbreviations

7. Abbreviations
Abbreviation Full Name

AIE Air Interface Encryption

CPS Customer Programming Software

DMR Digital Mobile Radio

E2EE End-to-End Encryption

ESN Electronic Serial Number

FEK File Encryption Key

ISSI Individual Short Subscriber Identity

KEK Key Encryption Key

KMS Key Management System

MCC Mobile Country Code

MDM Mobile Device Management

MNC Mobile Network Code

OTAK Over-The-Air-Key Management

PDT Police Digital Trunking

SCK Static Cipher Key

SEK Signaling Encryption Key

TEI Terminal Equipment Identity

TEK Traffic Encryption Key

TETRA Terrestrial Trunked Radio

63

You might also like