Method and apparatus for authenticating alert messages in a network
A device and message technology, used in network data management, emergency/dangerous communication services, security devices, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0052] Although the above methods cover various modifications and alternative implementations (for example, in user equipment (UE) forms of transmitting and receiving devices, computer programs, and computer program products including computer programs), they are shown in the accompanying drawings Examples are described and will be described in detail below. However, it will be understood that the detailed description and drawings are not intended to limit the general inventive idea to the specific form disclosed.
[0053] In general, it is described that the receiver of the message (for example, UE / mobile terminal) can display the message without using the received authentication information associated with the message to verify the authenticity of the message when the receiver is in a specific configuration. A system for messaging (or sending some other form of notification to the user). After the receiver obtains the new configuration from the configuration function, the rece...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 