Method of handling security in srvcc handover and related communication device
A wireless voice call and wireless communication technology, applied in security devices, wireless communication, electrical components, etc., can solve problems such as key inconsistency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] Please refer to figure 1 , figure 1 It is a schematic diagram of a wireless communication system 10 according to an embodiment of the present invention. exist figure 1 Among them, a serving network 12 and a target network 14 respectively use different radio access technologies (Radio Access Technology, RAT), and the mobile device supports the radio access technologies of the two serving networks. The service network 12 can support multiple service domains, and can be a Universal Mobile Telecommunications System (UMTS for short), a Global System for Mobile Communications (GSM for short), an enhanced data rate GSM evolution wireless Access network (GSM / EDEG Radio Access Network, hereinafter referred to as GERAN) lu mode system network or code division multiple access (Code Division Multiple Access, hereinafter referred to as CDMA) communication system, which supports both packet switching (Packet Switched, PS) and line Exchange (Circuit Switched, CS) servo domain. The...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 