Specifications
PRIVATE DATATAC SYSTEM FEATURES
Security Services
R4-11-4G Wireless Data Communications Network 1-9
1.3.4 Security Services
Private DataTAC 2.0.3 also offers data and network security services which
include the following:
• User Authentication
• Data Encryption
• Encryption Key Management
Private DataTAC can optionally be ordered with user authentication and
data encryption over-the-air services. These options require a WNG at the
fixed-end, and MWCS II at the mobile computer.
These services aid in protecting the customer’s network from unauthorized
access through the Private DataTAC wireless network and protect the
confidentiality of user information over-the-air.
1.3.4.1 User Authentication
User authentication is a feature that confirms end user identity to the
network and enhances the system security by denying access to
unauthorized and non-authenticated users. This feature limits an
unauthorized user from cloning an authorized user’s modem and
middleware to gain access to the wired network and system resources.
User authentication is configured on a mobile-by-mobile basis. A portion of
the mobile fleet can require its users to authenticate to the network whereas
the remainder are not required to do this. This configuration allows for a
flexible security policy.
NOTE
All over-the-air user authentication transactions
are encrypted. User authentication can be disabled
for a given user while still allowing that user to use
data encryption.
For more information on data and network security, see Private DataTAC 2.0
Network Capability Specifications.
1.3.4.2 Data Encryption
Data encryption adds system-level user data encryption to provide a higher
level of confidentiality to messages and to enhance the security of the Private
DataTAC system overall. Data encryption is configured on a mobile-by-
mobile basis. Data encryption can be figured in one of three ways:
• always in operation for a mobile
• never in operation for a mobile
• in operation for a mobile that is capable of encryption