Secure transmission method and device
A technology of secure transmission and secure protocol, applied in the field of secure communication, can solve the problems of low message transmission efficiency and high hardware processing capability requirements
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0088] The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings.
[0089] The technical solutions of the embodiments of the present application can be applied to various communication systems, for example: long term evolution (long termevolution, LTE) system, frequency division duplex (frequency division duplex, FDD), time division duplex (time division duplex, TDD) system, Worldwide interoperability formicrowave access (WiMAX) communication system, fifth generation (5th generation, 5G) system or new radio (newradio, NR), sixth generation (6th generation, 6G) system or future communication system Wait. The 5G mobile communication system described in this application includes a non-standalone (NSA) 5G mobile communication system or a standalone (standalone, SA) 5G mobile communication system. The communication system may also be a public land mobile network (PLMN), a device-to-device (D2D) communi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


