A method for secure data transmission and access network, terminal, and core network equipment
A technology for access network equipment and core network equipment, applied in the field of data security transmission, can solve problems such as threats to network slicing security, master key cracking, etc., to improve flexibility and differentiation, achieve security, and ensure security Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0072] figure 2 It exemplarily shows a system architecture applicable to the embodiment of the present invention. Based on the system architecture, the process of secure data transmission can be realized. The system architecture of secure data transmission provided by the embodiment of the present invention may include network equipment 110 and terminal equipment 120.
[0073] Wherein, the network device 110 may include an access network (Radio Access Network, RAN)) device and a core network (Core Network, CN) device communicating with the terminal device 120, and the RAN device may be an access point (ACCESS POINT, AP) in the WLAN. ), a base station (Base Transceiver Station, BTS) in GSM or CDMA, or a base station (NodeB, NB) in WCDMA, or an evolved base station (Evolutional Node B, eNB or eNodeB) in LTE, or a relay station Or access points, or vehicle-mounted devices, wearable devices, and network devices in future 5G networks or network devices in future evolved PLMN netw...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


