Method for realizing access layer security, user equipment, and small radio access network node
An access layer security and wireless access technology, applied in security devices, access restrictions, wireless communication, etc., can solve problems such as no specific implementation technical solutions
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0130] In order to make the objectives, technical solutions and advantages of the present invention clearer, the embodiments of the present invention will be described in detail below with reference to the accompanying drawings. It should be noted that, the embodiments in the present application and the features in the embodiments may be arbitrarily combined with each other if there is no conflict.
[0131] In order to meet the expectation of thousands of times of business volume growth in the next 10 years, UDN will be widely deployed to undertake a large amount of business traffic. UDN can be deployed in indoor, outdoor hotspot areas or any area with heavy traffic demand. image 3Schematic diagram of ultra-dense network deployment in a certain area in the future, taking into account the infrastructure limitations of the actual deployed network, such as the limited number of wired network ports in the area shown, as well as not increasing the CAPEX and OPEX of deploying and o...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap