The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
Encrypted data is sent from a sending terminal to a receiving terminal without re-encryption at intermediate points.
English (United States)
This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately
92% of the total text.
Page 1 of 2
Data Encryption in a Multi Terminal System
Encrypted data is sent from a sending terminal to a receiving terminal
without re-encryption at intermediate points.
The algorithm transmits data under its original encipherment. Only the
session key is re-enciphered under each successive node's key throughout the
Controllers C1 and C2 have master keys for all terminals in their domains,
plus domain keys for controller-to-controller communication. Initially, the sending
terminal and controller C1 establish a session with a session key enciphered
under the terminal master key and a random number enciphered under the
session key. Controller C1 saves the session key and the random number in the
original enciphered form. Next, enciphered data is received and logically
associated with the enciphered key and random number in controller C1's
Upon a decision to forward the data to controller C2, the session key is
transformed to be re-enciphered under a cross-domain key, and a session with
controller C2 is established by sending the same enciphered random number
and the re-enciphered session key. Enciphered data is transmitted, and controller
C2 repeats the functions of controller C1. When a decision is made to send data
to terminals 1 and 2, sessions are established with terminals 1 and 2 by
transforming the session key to encipherment under the terminal 1 master key
and terminal 2 master key, respectively, and sending the enciphered random