Security key generation for dual connectivity
A security key and dual-connection technology, which is applied in the field of security keys in dual-connection scenarios
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] The inventive concept will now be described more fully hereinafter with reference to the accompanying drawings, in which examples of embodiments of the inventive concept are shown. These inventive concepts may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the inventive concept to those skilled in the art. It should also be noted that these embodiments are not mutually exclusive. Components from one embodiment may be implicitly assumed to be present in, or used in, another embodiment.
[0040] For purposes of illustration and explanation only, these and other aspects of the inventive concept are described herein in the context of operating in a radio access network (RAN) communicating with mobile terminals (also referred to as wireless terminals or UEs) over radio comm...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


