Data protection method, device and system
A data and security protection technology, applied in the field of communication systems, can solve the problem that data security protection needs to be further optimized
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0084] The technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention. figure 1 Provided is a network structure that can be applied to a next generation communication system. The following is a brief introduction to each component of the network structure as follows:
[0085] Terminal equipment: can include various handheld devices, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to a wireless modem with wireless communication functions, as well as various forms of terminals, mobile stations (mobilestation, MS), terminals (terminal), user equipment (user equipment, UE), soft terminal, etc., such as water meters, electricity meters, sensors, etc.
[0086] Access network node: Similar to the base station in the traditional network, it provides network access functions for authorized users in a specific area, and can use trans...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com