18559392. PERFORMING SECURITY UPDATES WITHOUT RESYNCHRONIZATION simplified abstract (Nokia Technologies Oy)
Contents
- 1 PERFORMING SECURITY UPDATES WITHOUT RESYNCHRONIZATION
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 PERFORMING SECURITY UPDATES WITHOUT RESYNCHRONIZATION - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Key Features and Innovation
- 1.6 Potential Applications
- 1.7 Problems Solved
- 1.8 Benefits
- 1.9 Commercial Applications
- 1.10 Prior Art
- 1.11 Frequently Updated Research
- 1.12 Questions about Security Update Technology
- 1.13 Original Abstract Submitted
PERFORMING SECURITY UPDATES WITHOUT RESYNCHRONIZATION
Organization Name
Inventor(s)
Henri Markus Koskinen of Espoo (FI)
Ilkka Antero Keskitalo of Oulu (FI)
Jedrzej Stanczak of Wroclaw (PL)
PERFORMING SECURITY UPDATES WITHOUT RESYNCHRONIZATION - A simplified explanation of the abstract
This abstract first appeared for US patent application 18559392 titled 'PERFORMING SECURITY UPDATES WITHOUT RESYNCHRONIZATION
Simplified Explanation
A base station sends a command to a user equipment (UE) to update its security configuration and specifies a time for the update. The UE then performs the security update without needing to go through a random-access procedure.
- The base station communicates with the UE to initiate a security update.
- The UE receives the command and performs the security update at the specified time.
- The security update is done without the need for a random-access procedure.
Key Features and Innovation
- Command sent by base station for security update.
- Specific time specified for security update.
- Security update performed without random-access procedure.
Potential Applications
This technology can be used in various communication systems where secure and efficient security updates are required.
Problems Solved
- Streamlining security updates for UE.
- Enhancing security protocols without disrupting communication.
Benefits
- Improved security for communication.
- Efficient and timely security updates.
- Seamless transition to new security configurations.
Commercial Applications
This technology can be applied in telecommunications, IoT devices, and other wireless communication systems to ensure secure and reliable connections.
Prior Art
Further research can be conducted on similar technologies in the field of wireless communication and security protocols.
Frequently Updated Research
Stay updated on advancements in wireless communication security protocols and UE security updates.
Questions about Security Update Technology
How does this technology improve security for communication systems?
This technology enhances security by ensuring timely and efficient security updates for user equipment without disrupting communication.
What are the potential applications of this technology beyond wireless communication systems?
This technology can also be applied in IoT devices and other wireless systems that require secure and efficient security updates.
Original Abstract Submitted
A base station, in communication with a UE using a first serving cell, determines a need to perform a security update for the UE and sends a command including information to perform the security update and indication of a time to execute the security update to change to a new security configuration. In response to the time occurring, a security update is performed to a new security configuration for use for communication with the UE using a second serving cell. The UE receives the information and the indication and performs, without performing a random-access procedure, the security update to the new security configuration to use for communication with the second serving cell.