17392020. ENHANCED SECURITY FOR WIRELESS COMMUNICATIONS simplified abstract (QUALCOMM Incorporated)

From WikiPatents
Jump to navigation Jump to search

ENHANCED SECURITY FOR WIRELESS COMMUNICATIONS

Organization Name

QUALCOMM Incorporated

Inventor(s)

Ahmed Elshafie of San Diego CA (US)

Hung Dinh Ly of San Diego CA (US)

ENHANCED SECURITY FOR WIRELESS COMMUNICATIONS - A simplified explanation of the abstract

This abstract first appeared for US patent application 17392020 titled 'ENHANCED SECURITY FOR WIRELESS COMMUNICATIONS

Simplified Explanation

The patent application describes methods, systems, and devices for wireless communications with enhanced security using a secret key. Here is a simplified explanation of the abstract:

  • The wireless device modifies a cyclic redundancy check (CRC) operation based on a secret key to enhance security.
  • Before transmitting data, the first device and the second device obtain a set of key bits for data protection.
  • The first device generates a bit vector using a subset of the key bits and a cyclic redundancy check polynomial.
  • The transmitting device generates an encoded codeword based on the bit vector and transmits it to the second device.
  • The second device decodes the encoded codeword and retrieves the original data using the set of key bits.

Potential applications of this technology:

  • Wireless communication systems that require enhanced security.
  • Secure transmission of sensitive data between devices.
  • Military or government communication networks that demand high levels of security.

Problems solved by this technology:

  • Enhances the security of wireless communications by modifying the CRC operation with a secret key.
  • Protects data from unauthorized access or interception during transmission.

Benefits of this technology:

  • Provides an additional layer of security for wireless communications.
  • Ensures the integrity and confidentiality of transmitted data.
  • Allows for secure communication in sensitive environments.


Original Abstract Submitted

Methods, systems, and devices for wireless communications are described. In some examples, a wireless device may modify a cyclic redundancy check (CRC) generation and attachment operation based on a secret key to support enhanced security. In some examples, a first device may identify a set of data to transmit to a second device and prior to transmitting the set of data, the first device and the second device may obtain a set of key bits for data protection. The first device may generate a bit vector based on a subset of the set of key bits and a cyclic redundancy check polynomial. The transmitting device may then generate an encoded codeword based on the bit vector and transmit the encoded codeword to the second wireless device. The second device may decode the encoded codeword and obtain the set of data based on the set of key bits.