Secure communication system
First Claim
1. A secure communication system for concealing a communication between a wireless network control device that can terminate a wireless protocol, and a mobile device that can also terminate a wireless protocol and communicates with a base station by transmitting/receiving a radio wave, comprising:
- a determination unit for determining whether or not to require a security process for transmitted/received data; and
a partial encryption unit for restricting a data range to be concealed of the data according to a determination made by said determination unit, and for encrypting only the restricted range of the dada.
1 Assignment
0 Petitions
Accused Products
Abstract
A reception part receives RLC-PDU from an RLC processing part to extract information to be used for determining whether security is required. This information is sent to a security management part, which determines whether security is required. Data outputted from the reception part is stored into a data buffer via a data management part. The data, which is regarded by the security management part as requiring security, is read by the data management part from the data buffer, then encrypted by a security calculation part, and then stored back into the data buffer again. Concealed or non-concealed data is read from the data buffer and sent to an FP processing part via a transmission part.
-
Citations
21 Claims
-
1. A secure communication system for concealing a communication between a wireless network control device that can terminate a wireless protocol, and a mobile device that can also terminate a wireless protocol and communicates with a base station by transmitting/receiving a radio wave, comprising:
-
a determination unit for determining whether or not to require a security process for transmitted/received data; and
a partial encryption unit for restricting a data range to be concealed of the data according to a determination made by said determination unit, and for encrypting only the restricted range of the dada. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A secure communication method for concealing a communication between a wireless network control device that can terminate a wireless protocol, and a mobile device that can also terminate a wireless protocol and communicates with a base station by transmitting/receiving a radio wave, comprising:
-
determining whether or not to require a security process for transmitted/received data; and
restricting a data range to be concealed of the data according to a determination made by said determination step, and encrypting only the restricted range of the dada. - View Dependent Claims (19, 20, 21)
-
Specification