会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 46. 发明申请
    • SECURITY ACTIVATION FOR DUAL CONNECTIVITY
    • 双重连接的安全活动
    • WO2014120078A1
    • 2014-08-07
    • PCT/SE2014/050123
    • 2014-01-30
    • TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)
    • WAGER, StefanVIRKKI, VesaTEYEB, OumerJOHANSSON, NiklasNORRMAN, Karl
    • H04W12/00H04W16/32H04W76/02
    • H04L63/20H04L63/205H04W12/00H04W16/32H04W76/15
    • Methods and apparatus for determining a security algorithm to be used for secured communications between a wireless terminal and a second node while the wireless terminal is dually connected to a first node and to the second node. An example method, implemented in the first node, includes determining (610) a first set of security algorithms, the first set including those algorithms supported by the wireless terminal. A second set of security algorithms is also determined (620), where the second set includes those security algorithms that are supported by the second node. In some embodiments, this determining (620) includes receiving information from the second node, the information identifying which security algorithms are supported by the second node. At least one security algorithm is then indicated (630) to the second node, wherein the indicated security algorithm is chosen from the intersection of the first and second sets.
    • 用于确定在无线终端双重连接到第一节点和第二节点时用于无线终端和第二节点之间的安全通信的安全算法的方法和装置。 在第一节点中实现的示例性方法包括确定(610)第一组安全算法,第一组包括由无线终端支持的那些算法。 还确定了第二组安全算法(620),其中第二组包括由第二节点支持的那些安全算法。 在一些实施例中,该确定(620)包括从第二节点接收信息,识别哪些安全算法由第二节点支持的信息。 然后,向第二节点指示至少一个安全算法(630),其中从第一和第二组的交集中选择所指示的安全算法。
    • 50. 发明授权
    • Configuration of HS-DSCH serving cell change improvements
    • 配置改进EWechsel服务HS-DSCH小区
    • EP2253160B1
    • 2011-06-29
    • EP09721596.6
    • 2009-03-06
    • Telefonaktiebolaget L M Ericsson (publ)
    • WAGER, StefanPEISA, Janne
    • H04W36/08
    • H04W36/0055H04W36/0005H04W36/0061H04W36/02H04W36/30
    • The present solution relates to a method in a user equipment (300) for configuring a cell change procedure to be used for handover in a wireless communication network (300). The user equipment (310) is situated in a serving cell (306) and comprises an active set of cells. The active set of cells comprises a list of cells to which the user equipment (310) can move from the serving cell (306). The user equipment (310) sends (501) a request to a network controller (315) comprised in the wireless communication network (300) to add at least one further cell to the active set. The user equipment (310) then receives (502) the requested active set update from the network controller (315). The received active set update comprises the at least one further cell to be added to the active set and a list of cells to which a modified cell change procedure shall be used for handover. A neighbour cell (308) which is stronger than a current serving cell (306) is detected (503). This detected stronger neighbour cell (308) is matching (504) with the received list of modified cell change procedure cells, and the modified cell change procedure for the handover to the stronger neighbour cell (308) is applied (505) if the stronger neighbour cell (308) is found matching a cell on the list.