Mechanism to avoid double-encryption in mobile networks
一种双重加密、移动节点的技术,应用在通信网络领域,能够解决CPU资源消耗、电池消耗快等问题,达到优化网络性能、高效使用、优化使用的效果
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0049] The method of the invention aims at avoiding redundant double encryption in order to optimize the use of network resources in a wireless network with limited bandwidth. The following terms are used in this specification to describe the present invention.
[0050] Any network with unreliable / unauthenticated nodes, such as the Internet, is called an "unreliable network" or "UN". Sensitive traffic passing over unreliable networks must be encrypted and authenticated. All is typically done at L3 (for corporate networks etc.) or L4 (for bank networks etc.) Encryption. An "Access Network" or "AN" is a local area network to which mobile nodes and base stations belong. IEEE 802.11i requires and specifies L2 encryption of datagrams.
[0051] The term "mobile node" or "MN" refers to a device, such as a laptop, PDA (Personal Digital Assistant), cell phone, etc., used to communicate over a wireless network. The term "base station" or "BS" refers here to the gateway (access poin...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 