Method for generating traffic encryption key
An encryption key and key technology, applied in the field of traffic encryption key generation, can solve problems such as interruption of traffic data transmission and reduction of communication service quality.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] The embodiments described below are only used to illustrate the implementation of the present invention and explain the technical features of the present invention, and are not intended to limit the scope of the present invention. Any changes or equivalence arrangements that can be easily accomplished by those skilled in the art belong to the scope of the present invention, and the scope of rights of the present invention should be determined by the claims.
[0023] figure 1 Shown is a schematic diagram of a network topology of a wireless communication system according to an embodiment of the present invention. like figure 1 As shown, the wireless communication system 100 includes one or more base stations (base station 101 and base station 102) located in one or more sections (section 105 and section 106), and the base station 101 and base station 102 receive wireless communication signals , send, repeat (repeat) and other operations, and provide multiple services to...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 