Safety telecommunication method

A communication method and technology of secure communication, which is applied in the direction of security device, wireless communication, radio/inductive link selection arrangement, etc., can solve problems such as being vulnerable to attacks, and achieve the effect of low cost, simple function, and improved reliability

Inactive Publication Date: 2007-09-05
北京智讯伙伴科技有限公司
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As mentioned above, the IBS base station broadcasts the address on the air interface,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety telecommunication method
  • Safety telecommunication method
  • Safety telecommunication method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0045] The present invention will now be explained in detail with reference to the drawings. In the present invention, the IBS does not broadcast the network address used by the base station's own service, but broadcasts the address of its coexistence agent and its own base station identification. The base station identifier here is any mark that can uniquely indicate the base station, for example, it can be a fixedly allocated base station identifier, it can also be the MAC address of the base station, or even the port number of the agent.

[0046] Fig. 2 shows a flowchart of a communication method according to an embodiment of the present invention. The communication method is used to realize secure communication between at least a first base station and a second base station. The first base station includes at least one first proxy server, and includes the following steps: S202, the first base station sends the The second base station sends a first message, where the first mess...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method is used for realizing a security communication between the first base station and second base station. The first base station comprises: at least one first proxy server. It comprises: 202) the first base station sends a first message to the second base station; the first message comprises a first network address of first proxy server and a first ID of the first base station; 204) the second base station responds to the first message, and according to the ID of the first base station, sends a connection request message to the first base station; the first base station responds to the connection request message, and sends a confirmation message to the second base station. By the invention the address of base station is not opened on the public network so as to reduce the possibility of getting a network attack.

Description

Technical field [0001] The present invention relates to the field of communication technology, in particular, to a secure communication method. Background technique [0002] In recent years, with the continuous progress of communication technology, the communication industry has developed rapidly. Wireless technology is currently booming, and spectrum resources are very precious. In order to make full use of the limited spectrum resources, the ITU has specifically allocated a license-free frequency band (LE Band). Without affecting the normal operation of other devices, LE devices can occupy this frequency band arbitrarily. [0003] For each LE device in the network, its location, occupied resources, transmission power and other parameters are not planned and configured in advance. The device itself adapts to the environment and works autonomously. [0004] LE devices work in the LE frequency band and need to adapt to their environment, that is, they can detect and avoid interfer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04Q7/38H04L29/06H04W12/08H04W12/122H04W80/04H04W92/20
Inventor 邬旭永潘众赵泉波
Owner 北京智讯伙伴科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products