The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
Secure two-way radio systems use encryption algorithms and keys to establish their security. Different Secure Systems are based on different proprietary or standard protocols and algorithms.
Motorola Inc. May 2000
English (United States)
This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately
50% of the total text.
SYSTEM KEY PORTING
Hafez and June Shah
two-way radio systems use encryption algorithms and keys to establish their
Secure Systems are based on different proprietary or standard protocols and
systems may become obsolete with time, and customers need to upgrade or deploy
new communication systems.
typical two-way radio communication systems are large in size, upgrades and
deployments occur in phases. When a customer is migrating from one secure
system to another, there is a period of time where the customer has duplicates
of some equipment. Typically, a Key Variable Loader is used to enter and
transfer algorithm keys from the key source to the various secure equipment. In
environment, a dedicated Key Variable Loader may be required for each system.
when the different systems need to co-exist, and communications need to be
facilitated across the different systems, algorithm key variables need to be
common. Although both systems (old and new) share the same encryption key
variables, they have to be duplicated in two different KVL's (Key Variable
Loaders) where each KVL supports one version of the system. Keys will be shared
from one KVL to another using manual methods.
order to manually enter duplicate keys into different equipment, these keys
need to be tracked on paper. This process is cumbersome due to the reentry of
lengthy keys and allows for human errors.