Code encryption
A code value and mask technology, applied in encryption devices with shift registers/memory, user identity/authority verification, network data management, etc. question
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0071] figure 1 A portion of a cellular communication network is shown comprising a first base station 10 serving a cell 12 within which a first wireless communication device (UE1) 14 and a second wireless communication device (UE2) 16 are located.
[0072] figure 2 Illustrated is part of another cellular communication network comprising a first base station 20 serving a first cell 22 and a second base station 26 serving a second cell 28 with a first wireless communication device (UE1) 24 within the cell 22 , and there is a second wireless communication device (UE2) 30 within the cell 28 .
[0073] In the examples described herein, a device participating in a method is described as a user equipment device (UE). It will be understood that this term is used to refer to user-operated portable communication devices such as smartphones, laptops or similar, other portable devices such as tracking devices or similar, and devices that are primarily intended to remain stationary in ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


