Key processing method and device
A processing method and key technology, applied in the field of communication, can solve the problems of inability to provide protection in a secure context and affecting the smooth progress of business
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.
[0025] In this embodiment, a key processing method is provided, figure 1 is a flowchart of a key processing method according to an embodiment of the present invention, such as figure 1 As shown, the process includes the following steps:
[0026] Step S102, obtaining a first key corresponding to the authentication type of the source network according to the authentication type of the source network, for example, the source network may be the Global System for Mobile Communications (GSM);
[0027] Step S104, obtain one or more second keys corresponding to the authentication type of the target network according to the above-mentioned first key, for example, the target network may be the Universal Mobi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


