ENERGY SAVING IN WIRELESS DEVICES
1 Assignment
0 Petitions
Accused Products
Abstract
A method of authorizing a message received at a node in a wireless network is disclosed. The message from a sender device is formed by a plurality of symbols and includes a first message integrity indicator located at a predetermined distance from the start of the message such that further symbols of the message are included after the first message integrity indicator. The position of the first message integrity indicator in the message is determined, and a cryptographic operation is performed on at least some of the symbols of the message before the first message integrity indicator so as to generate a second message integrity indicator before the first message integrity indicator is received. The first and second message integrity indicators are compared, and an indication that the message is not authorized is provided if the second message integrity indicator does not match the first message integrity indicator.
11 Citations
44 Claims
-
1. (canceled)
- 13. The node of 43, wherein the memory further contains instructions to cause the processor to carry out the cryptographic operation on only a sequence number contained in the header of the message to generate the second message integrity indicator.
-
19. (canceled)
-
21. A method of authorizing a message received at a node in a wireless network, the method comprising:
-
receiving the message using radio reception from a sender device in the network, the message being formed by a plurality of symbols and including a first message integrity indicator located at a predetermined distance from the start of the message such that further symbols of the message are included after the first message integrity indicator; determining the position of the first message integrity indicator in the message; performing a cryptographic operation on at least some of the symbols of the message before the first message integrity indicator so as to generate a second message integrity indicator before the first message integrity indicator is received; comparing the second message integrity indicator with the first message integrity indicator; and indicating that the message is not authorized responsive to when the second message integrity indicator does not match the first message integrity indicator. - View Dependent Claims (22, 23, 24, 39)
-
-
25. (canceled)
-
34. (canceled)
-
35. A method of sending a message in a wireless network, comprising:
-
generating a message for one or more receiver devices, the message being formed by a plurality of symbols; performing a cryptographic operation on at least some of the symbols of the message before the verification point so as to generate a first message integrity indicator for insertion into the message at a predetermined distance from the start of the message such that the symbols used in the generation of the first message integrity indicator are located before the first message integrity indicator and some of the symbols of the message are located after the message integrity indicator, and sending the message towards the one or more receiver devices. - View Dependent Claims (36, 37)
-
-
40-42. -42. (canceled)
-
43. A node for use in a wireless network, comprising:
-
a processor and a memory, said memory containing instructions executable by said processor to cause the processor to; receive a message using radio reception from a sender device in the network, the message being formed by a plurality of symbols and including a first message integrity indicator located at a predetermined distance from the start of the message such that further elements of the message are included after the message integrity indicator; determine the position of the first message integrity indicator in the message; perform a cryptographic operation on at least some of the symbols of the message so as to generate of a second message integrity indicator before the first message integrity indicator is received; compare the second message integrity indicator with the first message integrity indicator; and indicate that the message is not authorized responsive to when the second message integrity indicator does not match the first message integrity indicator. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 15, 16, 17, 18, 20, 38)
-
-
44. A node for use in a wireless network, comprising:
-
a processor and a memory, said memory containing instructions executable by said processor to cause the processor to; generate a message for one or more receiver devices, the message being formed by a plurality of symbols; perform a cryptographic operation on at least some of the symbols of the message so as to generate a first message integrity indicator for insertion into the message at a predetermined distance from the start of the message such that the symbols used in the generation of the first message integrity indicator are located before the first message integrity indicator and some of the symbols of the message are located after the message integrity indicator; and send the message towards the one or more receiver devices. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33)
-
Specification