Device, method, system, and program relating to beam and security enhancement, and recording medium
A device and beam technology, applied in security devices, transmission systems, digital transmission systems, etc., can solve the problem that the security key is not easy to decrypt.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0088] 3.1. System structure
[0089] 3.2. The structure of the base station
[0090] 3.3. Structure of terminal equipment
[0091] 3.4. Structure of core network nodes
[0092] 3.5. Technical features
[0093] 4. Modified example of the first embodiment
[0094] 4.1. The first modified example
[0095] 4.2. Second modified example
[0096] 4.3. The third modified example
[0097] 4.4. Fourth modified example
[0098] 4.5. Others
[0099] 5. The second embodiment
[0100] 5.1. System structure
[0101] 5.2. Structure of the base station
[0102] 5.3. Structure of terminal equipment
[0103] 5.4. Technical features
[0104] >
[0105] As technologies related to the description of the embodiments and modifications to be described below, first, an example of the architecture of a mobile communication system, beamforming, and dual connectivity will be described.
[0106] (1) Architecture of the mobile system
[0107] figure 1 It is an explanatory diagram for expla...
no. 2 example
[0654] Next, refer to Figure 48 ~ Figure 52 A second embodiment of the present invention will be described. The above-described first embodiment is a specific embodiment, while the second embodiment is a more general embodiment.
[0655]
[0656] will refer to Figure 48 An example of the structure of the system 6 according to the second embodiment will be described. Figure 48 is an explanatory diagram showing an example of the schematic configuration of the system 6 according to the second embodiment. according to Figure 48 , the system 6 includes a base station 800 and a terminal device 900 .
[0657] For example, System 6 is a system conforming to the 3GPP standard. More specifically, the system 1 may be an LTE / LTE-Advanced compliant system, or may be a 5th generation (5G) standard compliant system. System 1 is obviously not limited to these examples.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


