Abstract:
PROBLEM TO BE SOLVED: To provide a method and apparatus for secure data transmission in a mobile communication system.SOLUTION: There are provided a method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, in which the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.
Abstract:
PROBLEM TO BE SOLVED: To solve the problem that a user may be charged upon receipt of a broadcast access key (BAK) regardless of whether the user is actually viewing the broadcast content from broadcast-multicast services (BCMCS) at a mobile station of a wireless communication system. SOLUTION: A count value (SKCount) is determined based upon the number of generated short-term keys (SK) that are used to decrypt particular content from the BCMCS. The amount of time, in which the particular content is viewed at the mobile station, may be determined as a function of the count value (SKCount) and the period (SKPeriod) between the generation of the short-term keys. This provides information about a user's actual content view time since the short-term key is needed to view the particular content broadcast to the mobile station. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method, apparatus and system provide for efficient use of communication resources for providing broadcast services in a communication system. SOLUTION: A receiver receives a first broadcast controller identification from a first base station 101, and a second broadcast controller identification from a second base station 160. A controller coupled to the receiver determines whether the first and second broadcast controller identifications are associated with use of a common set of broadcast parameters. A transmitter transmits a request for transmission of a new set of broadcast parameters when the first and second broadcast controller identifications are not associated with use of the common set of broadcast parameters. After receiving the new set of broadcast parameters, the receiver uses the new set of broadcast parameters for receiving broadcast services. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a system and a method for reliably broadcasting content to a plurality of users and facilitating distribution of parts of the broadcast content that either were not received by particular users, or were received with errors. SOLUTION: The wireless communication system is configured to broadcast content from a content source to a plurality of user devices. The content source is configured to provide the content to a base station. The base station parses the content into a plurality of segments and associates sequential identifiers with each of the segments. The content is then broadcast to each of the user devices. An identifier of an alternative data source is also provided to the user devices. When a mobile station receives the segments, it examines the segment identifiers to identify missing segments. The segments are then retrieved from the alternative data source identified by the base station. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method and apparatus providing message integrity regardless of the operating version of an authentication center or an interface between the authentication center and a mobile switching center, in a communication system. SOLUTION: The method includes generating a cellular message encryption algorithm (CMEA) key, and generating a CMEA-key-derived integrity key (CIK) based on the CMEA key for message integrity between a mobile station and a base station. The mobile station transmits a registration message to the base station, and determines an operating version of the authentication center in communication with the base station based on whether the mobile station receives a registration accepted order or some elements of an authentication vector from the base station. The CIK is generated based on the CMEA key, if the mobile station receives a valid registration accepted order from the base station. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide for message integrity regardless of the operating version of an authentication center or an interface between the authentication center and a mobile switching center, in a communication system.SOLUTION: The method includes generating a cellular message encryption algorithm (CMEA) key 397, and generating an integrity key (CIK) derived from a CMEA key 397 on the basis of the CMEA key 397 for message integrity between a mobil station and a base station (398). The mobile station transmits a registration message to the base station, and determines an operating version of an authentication center in communication with the base station on the basis of whether the mobile station receives a registration accepted order or some elements of an authentication vector from the base station. The CIK is generated on the basis of the CMEA key (380), if the mobile station receives a valid registration accepted order from the base station.
Abstract:
PROBLEM TO BE SOLVED: To provide an apparatus and a method that can be used by a person for securely authenticating his identity by issuing a secure identifier.SOLUTION: An authentication apparatus 200 has a processor 208, at least one activator 204 coupled to the processor 208, an internal clock 212, a random number generator 216, an optional additional static memory 220 and a signal output 224, and generates a digital signature using a current time (time identifier), an identified secrete key, and a generated random number, which are called secure identifiers, and issues it. A receiver receives the issued secure identifiers to verify that the secure identifiers have been appropriately sent. The secret key corresponding to a transmitted key identifier is accessed, the validity of the secure identifier is determined using the accessed key, and that the time indicated in the received secure identifier is verified to be within acceptable time tolerances.
Abstract:
PROBLEM TO BE SOLVED: To provide a signal synchronous acquisition in one-to-one spread spectrum communication. SOLUTION: A method for transmitting, receiving and processing one to one communication signal without a base station or a network element, and a mobile station are provided. A mobile station for transmission can switch two or at least three long code masks for generating one or at least two pseudo noise (PN) codes for spreading data for transmission. A mobile station for reception achieves synchronization with the mobile station that receives and transmits the spread data. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
"método e equipamento para integridade de mensagem em sistema de comunicação cdma". em um sistema de comunicação (100) , um método e um equipamento proporcionam integridade de mensagem independentemente da versão operacional de um centro de autenticação (198) ou de uma interface (197) entre o centro de autenticação (198) e um centro de comutação móvel (199). o método e o equipamento incluem gerar uma chave de algoritmo de criptografação de mensagens celulares (cmea) e gerar uma chave de integridade (cik) obtida da chave cmea com base na chave cmea para integridade de mensagem entre uma estação móvel e uma estação base. a estação móvel transmite uma mensagem de registro à estação base e determina uma versão operacional do centro de autenticação (198) em comunicação com a estação base com base em se a estação móvel recebe um pedido de registro aceito ou alguns elementos de um vetor de autenticação da estação base. a cik é gerada com base na chave cmea, se a estação móvel receber um pedido de registro aceito válido da estação base.