18371729. Method And Apparatus For Ensuring Secure Transmission In Mobile Communications simplified abstract (MEDIATEK INC.)
Contents
- 1 Method And Apparatus For Ensuring Secure Transmission In Mobile Communications
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 Method And Apparatus For Ensuring Secure Transmission In Mobile Communications - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 How does this technology compare to existing secure transmission methods in mobile communications?
- 1.11 What potential challenges or limitations could arise from implementing this technology in real-world mobile communication systems?
- 1.12 Original Abstract Submitted
Method And Apparatus For Ensuring Secure Transmission In Mobile Communications
Organization Name
Inventor(s)
Chun-Fan Tsai of Hsinchu City (TW)
Method And Apparatus For Ensuring Secure Transmission In Mobile Communications - A simplified explanation of the abstract
This abstract first appeared for US patent application 18371729 titled 'Method And Apparatus For Ensuring Secure Transmission In Mobile Communications
Simplified Explanation
The abstract describes a patent application related to secure transmission in mobile communications. The invention involves a User Equipment (UE) receiving an RRC reconfiguration message from a master network node, evaluating triggering conditions for candidate cells, and performing conditional cell change procedures based on these conditions. Additionally, the UE derives a security key using a counter value and a key from the master network node.
- UE receives RRC reconfiguration message from master network node
- Message includes information on candidate cells and predefined reconfigurations
- UE evaluates triggering conditions for candidate cells
- Performs conditional cell change procedures based on triggering conditions
- Derives security key using counter value and key from master network node
Potential Applications
The technology described in this patent application could be applied in various mobile communication systems to enhance security and optimize cell switching procedures.
Problems Solved
This technology addresses the need for secure transmission in mobile communications, as well as efficient cell change procedures for User Equipment.
Benefits
The benefits of this technology include improved security measures, streamlined cell switching processes, and enhanced overall performance of mobile communication systems.
Potential Commercial Applications
One potential commercial application of this technology could be in the development of advanced mobile devices and network infrastructure that prioritize security and efficiency in communication protocols.
Possible Prior Art
One possible prior art for this technology could be existing methods for secure transmission and cell switching in mobile communication systems.
Unanswered Questions
How does this technology compare to existing secure transmission methods in mobile communications?
The article does not provide a direct comparison to existing secure transmission methods in mobile communications.
What potential challenges or limitations could arise from implementing this technology in real-world mobile communication systems?
The article does not address potential challenges or limitations that could arise from implementing this technology in real-world mobile communication systems.
Original Abstract Submitted
Examples pertaining to secure transmission in mobile communications are described. A UE receives an RRC reconfiguration message from a master network node. The RRC reconfiguration message comprises information regarding candidate cells and predefined reconfigurations, and each candidate cell is associated with one predefined reconfiguration. The UE evaluates a triggering condition for at least one candidate cell to determine whether to trigger a conditional cell change procedure and performs the conditional cell change procedure to switch a PSCell associated with the apparatus to a target cell in an event that the triggering condition for the target cell is met. The UE derives a security key according to a counter value and a key of the master network node. The counter value is obtained from a sequence of distinct counter values of the target cell or of a target secondary node stored by the processor or is generated by the processor.