Method and device for security system
A security, algorithmic technology, applied in the field of security systems, that can solve problems such as large computational complexity and storage, increased wireless device cost, size or power consumption
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0041] Referring to the drawings, the reference numerals in the drawings are clear.
[0042] traditional stream cipher system
[0043] Attached figure 1 A high-level block diagram of the physical (PHY) and media access control (MAC) layers for a stream cipher system is shown in . The input to the MAC layer is the data the user wants to send, also known as plaintext. The encryption process takes place at the MAC layer, and the output of the MAC is encrypted data, also known as ciphertext, which is passed to the PHY layer for transmission. At the receiver end, data is processed by the PHY and an estimate of the transmitted data (ciphertext) is obtained. The PHY performs a parity check on the decrypted data, and if there is a mismatch, the packet is discarded. The ciphertext continues to be passed to the MAC. The MAC decrypts the data and passes it to higher layers.
[0044] If the input to the MAC is denoted as m(n) (n is the number of samples). After passing through the ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com