Unlock instant, AI-driven research and patent intelligence for your innovation.

Proxied device security

A device and security technology, applied in the field of security mechanism of the proxy device

Active Publication Date: 2020-09-04
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In wireless environments with many battery-constrained devices such as wearables and many machine type communication (MTC / Internet of things (IoT)) devices, scaling of traditional wireless services quickly becomes problematic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proxied device security
  • Proxied device security
  • Proxied device security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The following description is made with reference to the accompanying drawings, which form a part of the description and show by way of illustration specific embodiments in which the invention may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention and it is to be understood that other embodiments may be utilized and structural, logical, electrical changes may be made without departing from the scope of the present invention. . The following description of example embodiments is therefore not to be taken as limiting the scope of the invention as defined by the appended claims.

[0059] In one embodiment, the functions or algorithms described herein may be implemented by software or a combination of software and human-implemented programs. The software may consist of computer-executable instructions stored on a computer-readable medium or computer-readable storage device including one or more non...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method comprising: a mobile device in a wireless network establishing an indirect connection of a first device to a node in the wireless network using the mobile device as an intermediate node for wireless transmission; and the mobile device via a first wireless link data over the indirect connection, the first wireless link comprising a direct device connection between the first device and the mobile device, and a second wireless link comprising the A direct 3rd Generation Partnership Project (3rd Generation Partnership Project, 3GPP) connection between the mobile device and the wireless network. The indirect connection supports security of communications between the node in the wireless network and the first device based at least in part on an active security context maintained in the wireless network for communication via at least one message protocol A layer is in communication with at least said first device.

Description

[0001] Related Applications Cross Application [0002] This application claims priority to a prior application to U.S. Nonprovisional Patent Application No. 15 / 358,345, filed November 22, 2016, entitled "Security for Proxied Devices," which Priority is also claimed to U.S. Provisional Patent Application No. 62 / 259,345, filed November 24, 2015, entitled "Security for Proxied Devices," both applications The contents are incorporated into this text by reference. technical field [0003] The present invention relates to a proxy device, in particular to a security mechanism of the proxy device. Background technique [0004] Wearable devices (WD) use cellular phones or other cellular-enabled devices, such as tablets and laptops, commonly referred to as user equipment (UE), as relays to cellular networks. In wireless environments with many battery-constrained devices such as wearables and many machine type communication (MTC / Internet of things (IoT)) devices, scaling of tradition...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00
CPCH04L63/0281H04L63/0428H04L63/08H04L63/102H04W4/80H04W76/14H04W88/04H04W12/08H04W12/06H04W12/037H04W12/033H04W12/80H04W88/182H04L63/18
Inventor 纳坦·爱德华·坦尼金辉
Owner HUAWEI TECH CO LTD