Methods, apparatuses, and computer program products for providing multi-hop cryptographic separation for handovers
A computer program and equipment technology, applied in the field of computer program products, can solve problems such as inability to derive encryption keys, lack of encryption key separation security, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] Embodiments of the present invention will now be described more fully with reference to the accompanying drawings, in which some, but not all embodiments of the invention are shown. Indeed, the invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will satisfy applicable legal requirements. Like reference numerals refer to like elements throughout.
[0024] figure 1A block diagram of a mobile terminal 10 that would benefit from embodiments of the present invention is shown. It should be understood, however, that the mobile telephone shown and hereinafter described is merely exemplary of one type of mobile terminal that would benefit from embodiments of the present invention and, therefore, should not be taken to limit the scope of embodiments of the present invention. Although one embodiment of a mobile terminal 10 is shown and hereina...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 