18530043. SECURITY HANDLING FOR RRC RESUME FROM INACTIVE STATE simplified abstract (Telefonaktiebolaget LM Ericsson (publ))

From WikiPatents
Jump to navigation Jump to search

SECURITY HANDLING FOR RRC RESUME FROM INACTIVE STATE

Organization Name

Telefonaktiebolaget LM Ericsson (publ)

Inventor(s)

Gunnar Mildh of SOLLENTUNA (SE)

Icaro L. J. Da Silva of SOLNA (SE)

SECURITY HANDLING FOR RRC RESUME FROM INACTIVE STATE - A simplified explanation of the abstract

This abstract first appeared for US patent application 18530043 titled 'SECURITY HANDLING FOR RRC RESUME FROM INACTIVE STATE

Simplified Explanation

The communication system described in the abstract involves a host computer that sends user data to a cellular network for transmission to a user equipment (UE) via a base station. The base station processes the data, including verifying security tokens and managing security contexts, before transmitting the user data to a host application.

  • The host computer forwards user data to a cellular network for transmission to a UE.
  • The base station processes the data, including verifying security tokens and managing security contexts.
  • The base station transmits the user data to a host application.

Potential Applications

This technology could be applied in various industries such as telecommunications, IoT, and mobile applications where secure data transmission is crucial.

Problems Solved

This technology solves the problem of securely transmitting user data over a cellular network by efficiently managing security contexts and verifying security tokens.

Benefits

The benefits of this technology include enhanced data security, improved communication reliability, and streamlined data transmission processes.

Potential Commercial Applications

One potential commercial application of this technology could be in the development of secure communication systems for mobile devices and IoT devices.

Possible Prior Art

One possible prior art for this technology could be existing communication systems that utilize security protocols for data transmission over cellular networks.

Unanswered Questions

How does this technology compare to existing security protocols in terms of efficiency and reliability?

This article does not provide a direct comparison between this technology and existing security protocols in terms of efficiency and reliability. Further research and testing would be needed to determine the advantages and disadvantages of this technology in comparison to existing protocols.

What are the potential limitations or vulnerabilities of this technology in terms of data security?

This article does not address the potential limitations or vulnerabilities of this technology in terms of data security. Additional analysis and testing would be required to identify and address any weaknesses in the system.


Original Abstract Submitted

A communication system including a host computer is provided herein. The host computer may include processing circuitry configured to provide user data and a communication interface configured to forward the user data to a cellular network for transmission to a user equipment (UE). The cellular network comprises a base station having a radio interface and base station processing circuitry. The base station processing circuitry configured to store a previously active security context for the UE, receive from the UE an RRCResumeRequest message including a security token, generate a temporary security context for the UE, use the temporary security context to verify the security token, send an RRC message to the UE, if no response to the RRC message is received from the UE, discard the temporary security context and retrieve the previously active security context. Thereafter, the base station transmits the user data for a host application.