Unlock instant, AI-driven research and patent intelligence for your innovation.

Adaptive security method and apparatus

A safety device and self-adaptive technology, applied in safety devices, safety communication devices, transmission systems, etc., can solve problems such as continuous noise and achieve the effect of eliminating continuous noise

Inactive Publication Date: 2014-08-13
MEDIATEK INC
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When a TRHHO or RNC change occurs in the UMTS system, if the resend duration of the response message in the TRHHO process is too long, the UMTS Terrestrial Radio Access Network (UTRAN) uses The Hyper Frame Number (Hyper Frame Number, HFN) of the user equipment (User Equipment, UE) may be different from the HFN used by the user equipment (User Equipment, UE), and this will cause continuous noise during communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Adaptive security method and apparatus
  • Adaptive security method and apparatus
  • Adaptive security method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Certain terms are used in the description and claims to refer to particular elements. Those skilled in the art should understand that hardware manufacturers may use different terms to refer to the same component. The specification and claims do not use the difference in name as a way to distinguish components, but use the difference in function of components as a criterion for distinguishing. "Includes" mentioned throughout the specification and claims is an open term, so it should be interpreted as "including but not limited to". In addition, the term "coupled" herein includes any direct and indirect means of electrical connection. Therefore, if it is described that the first device is coupled to the second device, it means that the first device may be directly electrically connected to the second device, or indirectly electrically connected to the second device through other devices or connection means.

[0018] The following description is the best embodiment for r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided are adaptive security method and apparatus. The adaptive security apparatus is arranged for updating a security parameter in a database. The adaptive security apparatus includes a message receiver, a data processor, a security processor, and an adaptive parameter processor. The message receiver is arranged for receiving a message. The data processor is coupled to the receiver, arranged for receiving the message from the message receiver and a security parameter from the database. The security processor is coupled to the data processor, arranged for performing a deciphering process and a decoding process according to an output of the data processor. The adaptive parameter processor is coupled to the security processor, arranged for updating the security parameter. The adaptive security method and apparatus may remove continuous noise during communications.

Description

technical field [0001] The present invention relates to wireless communication, and in particular to an adaptive security system comprising a message receiver, a data processor, a security processor and an adaptive parameter processor. means, wherein the above-mentioned adaptive security means can be configured for updating the security parameters in the database. Background technique [0002] In the Universal Mobile Telecommunications System (UMTS) and the Time Division Synchronous Code Division Multiple Access (TD-SCDMA) system, when receiving the ) / unacknowledged mode (Unacknowledged Mode, UM) radio bearer (Radio Bearer, RB) new message, or when the connection frame number (Connection Frame Number, CFN) is transparent mode (Transparent Mode, TM) RB changes, or When a Timing Re-initialized Hard Handover (TRHHO) or Radio Network Controller (RNC) change occurs in the UMTS system, or when a security command is received to start using a new key , the encryption parameter (ci...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00
CPCH04L9/28H04W88/00H03M13/00H04L1/00H04L9/0891
Inventor 欧道圣
Owner MEDIATEK INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More