Secure bootstrapping for wireless communications
A self-starting, mobile terminal technology, applied in the direction of wireless communication, security devices, radio/inductive link selection arrangements, etc., can solve the problems of breaching security, unavailability, and GSM protocol is vulnerable to replay attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] In the following description, specific details are given to provide a thorough understanding of the embodiments. It will be understood, however, by one skilled in the art that the described embodiments may be practiced without these specific details. For example, circuits may be shown in block diagrams in order not to obscure the embodiments in unnecessary detail. In other instances, well-known circuits, structures and techniques have not been shown in detail in order not to obscure the embodiments.
[0030] Also, note that embodiments may be described as processes that are depicted as flowcharts, procedure diagrams, block diagrams, or block diagrams. Although a flowchart might describe operations as a sequential process, many of these operations can be performed in parallel or simultaneously. Additionally, the order of operations may be rearranged. When the operation of a process is complete, the operation is terminated. A procedure may correspond to a method, func...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com