FIELD: information technology.
SUBSTANCE: methods for concealing temporary identifiers (ID) assigned to user equipment (UE) by a wireless communication system are described. At a network entity, a first ID assigned to UE and possibly a salt value are transformed, for example, based on a hash function, in order to obtain a second ID for the UE. An output message directed to the UE is generated based on an input message, the second ID, and the salt value (if present). The output message is sent via a common channel shared by the UE and other UE. At the UE, a message is received via the common channel, and a salt value (if sent) is obtained from the received message. The first ID and the salt value are transformed to obtain the second ID, which is used to determine whether the received message is intended for the UE.
EFFECT: protection from intrusion into a message while using very low computational power.
36 cl, 11 dwg
Authors
Dates
2011-08-20—Published
2007-02-09—Filed