Determination method of safety algorithm and apparatus thereof
A technology of security algorithm and determination method, applied in the field of determination method and device of security algorithm, can solve the problems of complex implementation process of encryption security protection, and achieve the effect of reducing complexity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.
[0038] figure 2 is a flowchart of a method for determining a security algorithm according to an embodiment of the present invention. Such as figure 2 As shown, the method may include the following processing steps:
[0039] Step S202: the slave base station receives a request message from the master base station;
[0040] Step S204: The secondary base station determines the security algorithm to be used by itself according to the security capability information of the UE carried in the request message, whether the request message carries a security algorithm recommended by the primary base station to the secondary base station, and the security algorithms supported by the secondary base station ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 