Unlock instant, AI-driven research and patent intelligence for your innovation.

Device, method, system, and program relating to beam and security enhancement, and recording medium

A device and beam technology, applied in security devices, transmission systems, digital transmission systems, etc., can solve the problem that the security key is not easy to decrypt.

Active Publication Date: 2019-04-02
NEC CORP
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, efforts are made to make the security key not easily decryptable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device, method, system, and program relating to beam and security enhancement, and recording medium
  • Device, method, system, and program relating to beam and security enhancement, and recording medium
  • Device, method, system, and program relating to beam and security enhancement, and recording medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0088] 3.1. System structure

[0089] 3.2. The structure of the base station

[0090] 3.3. Structure of terminal equipment

[0091] 3.4. Structure of core network nodes

[0092] 3.5. Technical features

[0093] 4. Modified example of the first embodiment

[0094] 4.1. The first modified example

[0095] 4.2. Second modified example

[0096] 4.3. The third modified example

[0097] 4.4. Fourth modified example

[0098] 4.5. Others

[0099] 5. The second embodiment

[0100] 5.1. System structure

[0101] 5.2. Structure of the base station

[0102] 5.3. Structure of terminal equipment

[0103] 5.4. Technical features

[0104] >

[0105] As technologies related to the description of the embodiments and modifications to be described below, first, an example of the architecture of a mobile communication system, beamforming, and dual connectivity will be described.

[0106] (1) Architecture of the mobile system

[0107] figure 1 It is an explanatory diagram for expla...

no. 2 example

[0654] Next, refer to Figure 48 ~ Figure 52 A second embodiment of the present invention will be described. The above-described first embodiment is a specific embodiment, while the second embodiment is a more general embodiment.

[0655]

[0656] will refer to Figure 48 An example of the structure of the system 6 according to the second embodiment will be described. Figure 48 is an explanatory diagram showing an example of the schematic configuration of the system 6 according to the second embodiment. according to Figure 48 , the system 6 includes a base station 800 and a terminal device 900 .

[0657] For example, System 6 is a system conforming to the 3GPP standard. More specifically, the system 1 may be an LTE / LTE-Advanced compliant system, or may be a 5th generation (5G) standard compliant system. System 1 is obviously not limited to these examples.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

To strengthen security for the case where beam forming is used. A first device according to the present invention is provided with an information acquisition unit for acquiring information pertainingto beam selection, and a key generation unit for generating a security key for wireless communication between a base station and a terminal device on the basis of the information pertaining to the beam selection.

Description

technical field [0001] The present invention relates to devices, methods, systems, programs and recording media related to beams and security enhancement. Background technique [0002] In recent years, communication traffic in mobile communication systems has increased. So to speak, this phenomenon is due to the fact that many communication devices use Long Term Evolution (LTE) as an access technology and various applications operate on the smartphone. For example, operators of mobile communication systems and national agencies related to mobile communication systems are discussing countermeasures such as additional allocation of used frequencies. In particular, additional allocations of high frequency bands (eg, 6 GHz to 100 GHz) where wider bandwidths are expected to be available are discussed. In addition, research and development on access technologies of mobile communication systems have been continuously conducted to cope with the increase in communication traffic. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/08H04W12/04H04W16/28H04L9/08
CPCH04L9/08H04W16/28H04L9/0866H04L9/0875H04L2209/80H04W12/65H04W12/0431H04W12/041H04W12/009H04L9/0861H04W88/06H04W88/08
Inventor 林贞福二木尚阿南德·普拉萨德
Owner NEC CORP