Method of generating a cryptosynchronism
A cipher and communication session technology, applied in the usage of multiple keys/algorithms, synchronous sending/receiving encryption equipment, synchronous signal speed/phase control, etc., can solve problems such as replay attack damage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0012] For understanding and simplicity of the description, embodiments of the present invention will be described in the context of wireless communications conforming to the series of CDMA2000 standards. However, it should be understood that the method is not limited to this communication standard, or to wireless communication.
[0013] In wireless communications, mobile stations communicate with base stations over the air. A mobile station may be a mobile telephone, a wireless computer, or the like. A base station serves a certain geographic area; that is, serves communications to and from mobile stations in that area. Said communications are usually encrypted. For example in CDMA2000, there are several long-lived keys such as the encryption key (CK) and the integrity key (IK) associated with the mobile station which are used in the encryption process and the messaging integrity protection process respectively. In general, CDMA2000 also provides long-term cryptographic sy...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
