发明名称 Security Activation for Dual Connectivity
摘要 Methods and apparatus for determining a security algorithm to be used for secured communications between a wireless terminal and a second node while the wireless terminal is dually connected to a first node and to the second node. An example method, implemented in the first node, includes determining (610) a first set of security algorithms, the first set including those algorithms supported by the wireless terminal. A second set of security algorithms is also determined (620), where the second set includes those security algorithms that are supported by the second node. In some embodiments, this determining (620) includes receiving information from the second node, the information identifying which security algorithms are supported by the second node. At least one security algorithm is then indicated (630) to the second node, wherein the indicated security algorithm is chosen from the intersection of the first and second sets.
申请公布号 US2016277445(A1) 申请公布日期 2016.09.22
申请号 US201414373665 申请日期 2014.01.30
申请人 Telefonaktiebolaget L M Ericsson (publ) 发明人 Wager Stefan;Johansson Niklas;Norrman Karl;Teyeb Oumer;Virkki Vesa
分类号 H04L29/06;H04W76/02 主分类号 H04L29/06
代理机构 代理人
主权项 1. A method, in a first node, for determining a security algorithm to be used for secured communications between a wireless terminal and a second node while the wireless terminal is dually connected to the first node and to the second node, the method comprising: determining a first set of security algorithms, wherein the first set is supported by the wireless terminal; determining a second set of security algorithms, wherein the second set is supported by the second node; and indicating a security algorithm to the second node, wherein the security algorithm is chosen from the intersection of the first and second sets.
地址 Stockholm SE
您可能感兴趣的专利