Browse Prior Art Database

SELF INHIBIT ON TIME OUT

IP.com Disclosure Number: IPCOM000007819D
Original Publication Date: 1996-Aug-01
Included in the Prior Art Database: 2002-Apr-25
Document File: 2 page(s) / 90K

Publishing Venue

Motorola

Related People

Nhat Quang Pham: AUTHOR

Abstract

Sensitive communication portable equipment such as a "Secure" 2 way radio can be lost or stolen. Lost equipment is a high security risk for a secure communication system, especially if users of such systems do not know that the equipment is lost. Unreported lost or stolen units can be used to mon- itor or disrupt normal communication over a long period of time. This scenario can occur if the unit is a backup unit that is not used in day to day operation.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 50% of the total text.

Page 1 of 2

8 MOlVHDLA Technical Developments

SELF INHIBIT ON TIME OUT

by Nhat Quang Pham

ity to transmit data over-the-air, it can automati- cally send a shut down status to the central. The central then can send a cancel the self inhibit com- mand to the portable unit if it determines that the unit is not lost.

INTRODUCTION:

  Sensitive communication portable equipment such as a "Secure" 2 way radio can be lost or stolen. Lost equipment is a high security risk for a secure communication system, especially if users of such systems do not know that the equipment is lost. Unreported lost or stolen units can be used to mon- itor or disrupt normal communication over a long period of time. This scenario can occur if the unit is a backup unit that is not used in day to day operation.

  Currently, there are two methods of preventing the use of unauthorized equipment: by a lock/pass- word mechanism or by an over-the-air inhibit com- mand. Both of these methods have weak points. In a system where the equipment is shared between multiple users, the password word can be compro- mised. Sometimes, one password is shared with a group of users in the system, or the password might be written down somewhere by the users. The over- the-air inhibit method will only work if the unit is known to be lost or stolen. In addition, if the unit is not able to receive the over-the-air inhibit command in the case that it is out of range or shut off, it will remain in operation.

  The idea ofthis invention is to limit the damage exposure time of a lost or stolen unit to a known period, one or two days, afler which it will automat- ically be disabled.

  When the portable unit is in the proximity of the charger, it can communicate with the charger by several methods:

1. Direct wire connection.
2. Remote connection with LED or low power RE

  The communication can be encrypted for a higher security level. Portable and charger...