METHODS, BASE UNITS AND REMOTE UNITS OF BASE STATION SYSTEMS OF A WIRELESS COMMUNICATION NETWORK

    公开(公告)号:US20200028639A1

    公开(公告)日:2020-01-23

    申请号:US16086900

    申请日:2016-03-23

    摘要: A method is disclosed performed by a base unit (230), of a base station system (200) of a wireless communication network. The base station system further comprises a remote unit (220) connected via a wired transmission line (225) to the base unit (230), the remote unit (220) being arranged for transmitting signals wirelessly to a wireless communication device (240). The method comprises modulating received Media Access Control, MAC, data packets onto a plurality of sub-frequency bands of a frequency band of the transmission line, and transmitting, to the remote unit, the modulated MAC data packets over the transmission line. Further, a corresponding method performed by a remote unit is disclosed.

    GENERATING CRYPTOGRAPHIC CHECKSUMS
    5.
    发明申请

    公开(公告)号:US20170244564A1

    公开(公告)日:2017-08-24

    申请号:US15504604

    申请日:2014-08-19

    IPC分类号: H04L9/32 H04L9/06

    摘要: A method (500) of generating a cryptographic checksum for a message M(x) is provided. The method comprises pseudo-randomly selecting (502) at least two irreducible polynomials pi(x). Each irreducible polynomial pi(x) is selected based on a first cryptographic key from the set of irreducible polynomials of degree ni over a Galois Field. The method further comprises calculating (503) a generator polynomial p(x) of degree n=formula (I) as a product of the N irreducible polynomials formula (II), and calculating (505) the cryptographic checksum as a first function g of a division of a second function of M(x), ƒ(M(x)), modulo p(x), i.e., g(ƒ(M(x)) mod p(x)). By replacing a standard checksum, such as a Cyclic Redundancy Check (CRC), with a cryptographic checksum, an efficient message authentication is provided. The proposed cryptographic checksum may be used for providing integrity assurance on the message, i.e., for detecting random and intentional message changes, with a known level of security. Further, a corresponding computer program, a corresponding computer program product, and a checksum generator for generating a cryptographic checksum, are provided. Σ i = 1 N  n i ( I ) p i  ( x ) , p  ( x ) = Π i = 1 N  p i  ( x ) , ( II )