Unlock instant, AI-driven research and patent intelligence for your innovation.

Safety telecommunication method

A communication method and secure communication technology, applied in security devices, wireless communication, electrical components, etc., can solve problems such as being vulnerable to attacks, and achieve the effects of low cost, simple functions, and improved reliability

Inactive Publication Date: 2011-11-09
北京智讯伙伴科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As mentioned above, the IBS base station broadcasts the address on the air interface, that is, the IBS's own network address is made public, which is vulnerable to attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety telecommunication method
  • Safety telecommunication method
  • Safety telecommunication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will now be described in detail with reference to the accompanying drawings. In the present invention, the IBS does not broadcast the network address used by the base station's own service, but broadcasts the address of its coexistence agent and its own base station identity. The base station identifier here is any label that can uniquely indicate to the local base station, for example, it can be a fixedly allocated base station identifier, or can be the MAC address of the base station, or even the port number of the proxy.

[0045] figure 2 A flow chart of a communication method according to an embodiment of the present invention is shown. The communication method is used to implement secure communication between at least a first base station and a second base station, the first base station includes at least one first proxy server, and the method includes the following steps: S202, the first base station reports to the first base station Two b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method is used for realizing a security communication between the first base station and second base station. The first base station comprises: at least one first proxy server. It comprises: 202) the first base station sends a first message to the second base station; the first message comprises a first network address of first proxy server and a first ID of the first base station; 204) the second base station responds to the first message, and according to the ID of the first base station, sends a connection request message to the first base station; the first base station responds to the connection request message, and sends a confirmation message to the second base station. By the invention the address of base station is not opened on the public network so as to reduce the possibility of getting a network attack.

Description

technical field [0001] The present invention relates to the field of communication technologies, and in particular, to a secure communication method. Background technique [0002] In recent years, with the continuous advancement of communication technology, the communication industry has developed rapidly. Wireless technology is currently booming, and spectrum resources are at a premium. In order to make full use of the limited spectrum resources, ITU has specially allocated a license-exempt frequency band (LE Band). On the premise of not affecting the normal operation of other devices, LE devices can arbitrarily occupy this frequency band. [0003] The parameters of each LE device in the network, such as its location, occupied resources, and transmit power, are not planned and configured in advance. The devices themselves adapt to the environment and work autonomously. [0004] LE devices work in the LE frequency band and need to adapt to the environment in which they ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/08H04L29/06H04W12/122H04W80/04H04W92/20
Inventor 邬旭永潘众赵泉波
Owner 北京智讯伙伴科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More