Tetrapol / Explore capabilities

Security

Designed to protect

TETRAPOL is purpose-built for public safety users, so security and safety is paramount.

Key security features in TETRAPOL

  • Mutual authentication stops illegal terminals from registering with the network and enables terminals to ensure they are not signing on to a fake network created by criminals.
  • End-to-end encryption means that voice is encrypted in the transmitting terminal and de-crypted in the receiving terminal. Eavesdropping or tapping is impossible over the air or in the transmission network.
  • End-to-end encryption saves money because the transmission network does not require extra security to prevent tapping.
  • Over-the-air re-keying (OTAR) allows encryption keys to be changed remotely. Frequent updating enhances security.
  • Lost or stolen terminals can be disabled.

Key features for user safety

  • Pre-emptive emergency calls contact help fast. Emergency calls always take priority, disconnecting lower-priority users where necessary.
  • Multi-level priorities promote access when the network is congested. This includes user-level priorities and department- or agency-level priorities.
  • If a user does not respond, the dispatcher can discreetly turn on the user's TETRAPOL radio to check whether there is a hostage situation.
  • TETRAPOL terminals transmit only when the push-to-talk button is pressed. This makes it difficult for criminals to detect TETRAPOL traffic in the area. It also makes TETRAPOL suitable for military users.

Keep in touch whatever happens

  • Direct mode operation (DMO) enables radio-to-radio communication beyond the network coverage area.
  • DMO includes dual-watch, so that users can monitor network communication while working in DMO. This ensures that users are not cut off from the network where the coverage may come and go, for example, in a basement.
  • Should the link between a TETRAPOL switch and base station fail, the base station continues to serve users in fall-back mode. TETRAPOL supports both trunked fall-back, similar to normal network operation and no-trunked fallback, where the base station operates like a repeater in a conventional PMR system.