摘要 |
Protection of access information in wireless communications is achieved by transmitting access information related to configuration to a terminal, receiving a result of a countermeasure procedure performed by the terminal, deciding whether the configuration is correct or not based on the received result, and if not correct, allowing the terminal to receive access information, or if correct, performing the configuration.
|