会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 44. 发明申请
    • SECURITY ACTIVATION FOR DUAL CONNECTIVITY
    • 双重连接的安全活动
    • WO2014120078A1
    • 2014-08-07
    • PCT/SE2014/050123
    • 2014-01-30
    • TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)
    • WAGER, StefanVIRKKI, VesaTEYEB, OumerJOHANSSON, NiklasNORRMAN, Karl
    • H04W12/00H04W16/32H04W76/02
    • H04L63/20H04L63/205H04W12/00H04W16/32H04W76/15
    • Methods and apparatus for determining a security algorithm to be used for secured communications between a wireless terminal and a second node while the wireless terminal is dually connected to a first node and to the second node. An example method, implemented in the first node, includes determining (610) a first set of security algorithms, the first set including those algorithms supported by the wireless terminal. A second set of security algorithms is also determined (620), where the second set includes those security algorithms that are supported by the second node. In some embodiments, this determining (620) includes receiving information from the second node, the information identifying which security algorithms are supported by the second node. At least one security algorithm is then indicated (630) to the second node, wherein the indicated security algorithm is chosen from the intersection of the first and second sets.
    • 用于确定在无线终端双重连接到第一节点和第二节点时用于无线终端和第二节点之间的安全通信的安全算法的方法和装置。 在第一节点中实现的示例性方法包括确定(610)第一组安全算法,第一组包括由无线终端支持的那些算法。 还确定了第二组安全算法(620),其中第二组包括由第二节点支持的那些安全算法。 在一些实施例中,该确定(620)包括从第二节点接收信息,识别哪些安全算法由第二节点支持的信息。 然后,向第二节点指示至少一个安全算法(630),其中从第一和第二组的交集中选择所指示的安全算法。