Unlock instant, AI-driven research and patent intelligence for your innovation.

Code encryption

A code value and mask technology, applied in encryption devices with shift registers/memory, user identity/authority verification, network data management, etc. question

Pending Publication Date: 2022-04-15
TELEFON AB LM ERICSSON (PUBL)
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this case, the receiving UE may not be able to generate a Temp ID value that matches the Temp ID value generated by the transmitting device, and thus it will not be able to identify the device that transmitted the discovery message

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Code encryption
  • Code encryption
  • Code encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] figure 1 A portion of a cellular communication network is shown comprising a first base station 10 serving a cell 12 within which a first wireless communication device (UE1) 14 and a second wireless communication device (UE2) 16 are located.

[0072] figure 2 Illustrated is part of another cellular communication network comprising a first base station 20 serving a first cell 22 and a second base station 26 serving a second cell 28 with a first wireless communication device (UE1) 24 within the cell 22 , and there is a second wireless communication device (UE2) 30 within the cell 28 .

[0073] In the examples described herein, a device participating in a method is described as a user equipment device (UE). It will be understood that this term is used to refer to user-operated portable communication devices such as smartphones, laptops or similar, other portable devices such as tracking devices or similar, and devices that are primarily intended to remain stationary in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A device receives a privacy template from a network node. The apparatus forms a temporary privacy mask using the time-varying value and the privacy template; and encrypting the code value using the temporary privacy mask. The device transmits the encrypted code value. A receiving device receives the encrypted code value and forms a temporary privacy mask using a privacy template and a time-varying value that it also receives from the network node. The receiving device can then decrypt the code value using the temporary privacy mask. The code may identify an individual or group, and may be protected using an individual or group specific privacy template.

Description

technical field [0001] This application deals with encryption of codes. In some examples, the code is a ProSe (Proximity Services) code transmitted by the wireless communication device. Background technique [0002] Proximity Services (ProSe) is a service that may be provided by the 3GPP system based on UEs being in proximity to each other. One of these services is ProSe Discovery. ProSe services are described in 3GPP TS 22.278 and 3GPP TS 23.303. [0003] Regardless of whether a ProSe-capable UE is using the Evolved-UMTS Terrestrial Radio Access Network (E-UTRAN) or the Extended Packet Core (EPC) network, ProSe discovers the use of the Evolved-UMTS Terrestrial Radio Access (E-UTRAN) -UTRA) recognizes that these UEs are adjacent to each other. Proximity criteria can be configured by the operator. [0004] The ProSe discovery process involves sending discovery messages by one device and receiving them by the other. The discovery message sent by the device includes an id...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W8/00H04L9/32H04L9/40
CPCH04L9/0643H04L9/3234H04L63/0414H04W12/02H04L2209/04H04W8/005H04L9/06
Inventor V·托尔维南M·维夫韦松V·莱托弗塔K·普费弗
Owner TELEFON AB LM ERICSSON (PUBL)