Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

39results about How to "Reduce message size" patented technology

Information recording/playback apparatus and method

In a tree-structural key distribution system, renewed data of a master key and medium key are sent along with a key renewal block (KRB). KRB is such that each of devices included as leaves of a tree structure has a leaf key and restricted node key. A specific KRB can be generated for a group identified by a specific node and distributed to the group to restrict a device for which the key can be renewed. Any device not belonging to the group cannot decrypt the key, whereby the security of key distribution can be assured. Especially in a system using a generation-managed master key, a master key renewed with KRB can be distributed.
Owner:SONY CORP

Hardware module-based authentication in intra-vehicle networks

A secure hardware-based module or Security Electronic Control Unit (SECU) for a Controller Area Network (CAN) prevents an attacker from sending malicious messages through the CAN bus to take over control of a vehicle. The SECU shares a unique key and counter with each ECU on the CAN bus. When a legitimate ECU sends a message, it first compresses the message and then generates a MAC of the counter and a secret key. The counter is increased by one for each transmitted message. The ECU then fits the compressed message and the MAC into one CAN frame and sends it onto the CAN bus. The SECU performs the message verification on behalf of the intended receiver(s) of the message. If the verification passes, the receiver(s) simply decompress the message and use it as a normal CAN message. If the verification fails, the SECU will corrupt the CAN frame before it is fully received by the intended receiver(s). The corrupted CAN frame will be ignored by the intended receiver(s) as if it was never received. Therefore, a malicious message generated by an attacker will inflict no damage on the system.
Owner:GEORGE MASON UNIVERSITY

Method and apparatus for efficiently controlling access for system load adjustment in mobile communication systems

The present invention relates to a method and apparatus for efficiently controlling access for system load adjustment in mobile communication systems. In a wireless communication system according to one embodiment, the method for transmitting and receiving data by a terminal including a user equipment (UE) non access stratum (NAS) and a UE access stratum (AS) includes the steps of: receiving by the UE AE, information including emergency call-related information which includes barring information by type for the emergency call, from a base station; transmitting, by the UE NAS, a service request for the emergency call to the UE AS; and determining, by the UE AS, whether to bar the service request on the basis of emergency call-related information. According to one embodiment, during the emergency call transmission, network congestion can be easily controlled by enabling various types of emergency calls to be transmitted, and enabling access to be barred information according to the situation of a communication network and types of emergency calls. Also, even when a specific type of emergency call is barred from access, the terminal can change to another type of emergency call and try for access. Therefore, it is effective in that an emergency call can be transmitted in various schemes even in a state where the network is congested.
Owner:SAMSUNG ELECTRONICS CO LTD

Method and apparatus for efficiently controlling access for system load adjustment in mobile communication systems

The present invention relates to a method and apparatus for efficiently controlling access for system load adjustment in mobile communication systems. In a wireless communication system according to one embodiment, the method for transmitting and receiving data by a terminal including a user equipment (UE) non access stratum (NAS) and a UE access stratum (AS) includes the steps of: receiving by the UE AE, information including emergency call-related information which includes barring information by type for the emergency call, from a base station; transmitting, by the UE NAS, a service request for the emergency call to the UE AS; and determining, by the UE AS, whether to bar the service request on the basis of emergency call-related information. According to one embodiment, during the emergency call transmission, network congestion can be easily controlled by enabling various types of emergency calls to be transmitted, and enabling access to be barred information according to the situation of a communication network and types of emergency calls. Also, even when a specific type of emergency call is barred from access, the terminal can change to another type of emergency call and try for access. Therefore, it is effective in that an emergency call can be transmitted in various schemes even in a state where the network is congested.
Owner:SAMSUNG ELECTRONICS CO LTD

Method and system for geolocating a terminal of a wireless communication system

A method for geolocating a terminal of a wireless communication system. The terminal includes a positioning device for obtaining a precise geographical position of the terminal. An access network of the communication system estimates an approximate geographical position of the terminal. In order to limit the size of the messages exchanged between the terminal and the access network, only a truncated part of the information about the precise geographical position of the terminal is transmitted by the terminal to the access network. The access network determines the precise geographical position of the terminal by combining the truncated information received from the terminal with the approximate geographical position estimated by the access network.
Owner:SIGFOX

System and method for correlating messages within a wireless transaction

A method and system for correlating messages within a wireless transaction, each of the messages requiring a unique message identifier, the method having the steps of: creating a transaction identifier, the transaction identifier being the same for related messages; and adding to the transaction identifier a message index, the message index corresponding to a number of a message within a transaction, whereby the transaction identifier and message index form the unique message identifier for each of the messages.
Owner:RES IN MOTION LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products