18530043. SECURITY HANDLING FOR RRC RESUME FROM INACTIVE STATE simplified abstract (Telefonaktiebolaget LM Ericsson (publ))
Contents
- 1 SECURITY HANDLING FOR RRC RESUME FROM INACTIVE STATE
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 SECURITY HANDLING FOR RRC RESUME FROM INACTIVE STATE - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
SECURITY HANDLING FOR RRC RESUME FROM INACTIVE STATE
Organization Name
Telefonaktiebolaget LM Ericsson (publ)
Inventor(s)
Gunnar Mildh of SOLLENTUNA (SE)
Icaro L. J. Da Silva of SOLNA (SE)
SECURITY HANDLING FOR RRC RESUME FROM INACTIVE STATE - A simplified explanation of the abstract
This abstract first appeared for US patent application 18530043 titled 'SECURITY HANDLING FOR RRC RESUME FROM INACTIVE STATE
Simplified Explanation
The communication system described in the abstract involves a host computer that sends user data to a cellular network for transmission to a user equipment (UE) via a base station. The base station processes the data, including verifying security tokens and managing security contexts, before transmitting the user data to a host application.
- The host computer forwards user data to a cellular network for transmission to a UE.
- The base station processes the data, including verifying security tokens and managing security contexts.
- The base station transmits the user data to a host application.
Potential Applications
This technology could be applied in various industries such as telecommunications, IoT, and mobile applications where secure data transmission is crucial.
Problems Solved
This technology solves the problem of securely transmitting user data over a cellular network by efficiently managing security contexts and verifying security tokens.
Benefits
The benefits of this technology include enhanced data security, improved communication reliability, and streamlined data transmission processes.
Potential Commercial Applications
One potential commercial application of this technology could be in the development of secure communication systems for mobile devices and IoT devices.
Possible Prior Art
One possible prior art for this technology could be existing communication systems that utilize security protocols for data transmission over cellular networks.
Unanswered Questions
How does this technology compare to existing security protocols in terms of efficiency and reliability?
This article does not provide a direct comparison between this technology and existing security protocols in terms of efficiency and reliability. Further research and testing would be needed to determine the advantages and disadvantages of this technology in comparison to existing protocols.
What are the potential limitations or vulnerabilities of this technology in terms of data security?
This article does not address the potential limitations or vulnerabilities of this technology in terms of data security. Additional analysis and testing would be required to identify and address any weaknesses in the system.
Original Abstract Submitted
A communication system including a host computer is provided herein. The host computer may include processing circuitry configured to provide user data and a communication interface configured to forward the user data to a cellular network for transmission to a user equipment (UE). The cellular network comprises a base station having a radio interface and base station processing circuitry. The base station processing circuitry configured to store a previously active security context for the UE, receive from the UE an RRCResumeRequest message including a security token, generate a temporary security context for the UE, use the temporary security context to verify the security token, send an RRC message to the UE, if no response to the RRC message is received from the UE, discard the temporary security context and retrieve the previously active security context. Thereafter, the base station transmits the user data for a host application.