Patent classifications
H04W12/0433
Telecommunications apparatus and methods
A method of operating a second network access node comprises configuring the second network access node to act as a secondary network access node for a dual connectivity mode for a terminal device in which a first network access node acts as a master network access node. The method further comprises establishing, while acting as a secondary network access node for the dual connectivity mode, that the second network access node should switch to acting as a master network access node, deriving a new master network access node security key for use by the second network access node when switched to acting as a master network access node for the dual connectivity mode, and configuring the second network access node to act a master network access node for the dual connectivity mode using the new master network access node security key.
Telecommunications apparatus and methods
A method of operating a second network access node comprises configuring the second network access node to act as a secondary network access node for a dual connectivity mode for a terminal device in which a first network access node acts as a master network access node. The method further comprises establishing, while acting as a secondary network access node for the dual connectivity mode, that the second network access node should switch to acting as a master network access node, deriving a new master network access node security key for use by the second network access node when switched to acting as a master network access node for the dual connectivity mode, and configuring the second network access node to act a master network access node for the dual connectivity mode using the new master network access node security key.
Low power RRC operating method and device
Disclosed are a communication technique of merging, with IoT technology, a 5G communication system for supporting a data transmission rate higher than that of a 4G system, and a system therefor. The disclosure can be applied to intelligent services (for example, smart home, smart building, smart city, smart car or connected car, health care, digital education, retail, security and safety related services, and the like) on the basis of 5G communication technology and IoT related technology. According to one embodiment of the present invention, a communication method of a base station comprises the steps of: determining an RRC state transition condition of a terminal; and transmitting information on the RRC state transition condition to the terminal, wherein the RRC state transition condition can include at least one timer for the transition between RRC states and/or information indicating an RRC state to be changed.
Low power RRC operating method and device
Disclosed are a communication technique of merging, with IoT technology, a 5G communication system for supporting a data transmission rate higher than that of a 4G system, and a system therefor. The disclosure can be applied to intelligent services (for example, smart home, smart building, smart city, smart car or connected car, health care, digital education, retail, security and safety related services, and the like) on the basis of 5G communication technology and IoT related technology. According to one embodiment of the present invention, a communication method of a base station comprises the steps of: determining an RRC state transition condition of a terminal; and transmitting information on the RRC state transition condition to the terminal, wherein the RRC state transition condition can include at least one timer for the transition between RRC states and/or information indicating an RRC state to be changed.
Key obtaining method and device, and communications system
A method for security handling in a mobility of a terminal device, where the method includes: a target access and mobility management function (AMF) entity receiving a first message for registering a terminal device; the target AMF entity sending a second message to a source AMF entity after receiving the first message; the source AMF entity deriving a first key based on a key between the source AMF entity and the terminal device; the source AMF entity sending the first key to the target AMF entity; the target AMF entity determining to use the first key based on security related information after receiving the first key; and the target AMF entity determining a communication key between the target AMF entity and the terminal device based on the first key after determining to use the first key.
Key obtaining method and device, and communications system
A method for security handling in a mobility of a terminal device, where the method includes: a target access and mobility management function (AMF) entity receiving a first message for registering a terminal device; the target AMF entity sending a second message to a source AMF entity after receiving the first message; the source AMF entity deriving a first key based on a key between the source AMF entity and the terminal device; the source AMF entity sending the first key to the target AMF entity; the target AMF entity determining to use the first key based on security related information after receiving the first key; and the target AMF entity determining a communication key between the target AMF entity and the terminal device based on the first key after determining to use the first key.
Distributed management of secure Wi-Fi network
Generally described, the presently disclosed technology utilizes managed Wi-Fi networks pre-installed throughout an MDU property to provide user-specific passphrases that can be used to access the single-SSID wireless network at the property and to provide a cloud portal that can enable convenient access to the functionalities (both by the resident and the manager) provided by the Wi-Fi controller and the Wi-Fi access points. By doing so, the Wi-Fi network management solutions described herein allow the users to experience the benefits of a shared Wi-Fi infrastructure, such as not having to set up and maintain their own Wi-Fi routers, while also allowing them to easily change their Wi-Fi settings from their connected devices.
Distributed management of secure Wi-Fi network
Generally described, the presently disclosed technology utilizes managed Wi-Fi networks pre-installed throughout an MDU property to provide user-specific passphrases that can be used to access the single-SSID wireless network at the property and to provide a cloud portal that can enable convenient access to the functionalities (both by the resident and the manager) provided by the Wi-Fi controller and the Wi-Fi access points. By doing so, the Wi-Fi network management solutions described herein allow the users to experience the benefits of a shared Wi-Fi infrastructure, such as not having to set up and maintain their own Wi-Fi routers, while also allowing them to easily change their Wi-Fi settings from their connected devices.
Notification method and device for execution of PDCP data recovery
A notification method and device for the execution of PDCP data recovery, and same is used to notify an SN to execute a PDCP data recovery process. The notification method for the execution of packet data convergence protocol (PDCP) data recovery comprises: a primary base station sending an inter-node signaling message between the primary base station and a secondary base station to the secondary base station to notify the secondary base station of the execution of a PDCP data recovery process, and the inter-node signaling message is used to instruct the secondary base station to execute a PDCP data recovery process. The method for executing packet data convergence protocol (PDCP) data recovery comprises: the secondary base station receiving the inter-node signaling message sent by the primary base station.
Notification method and device for execution of PDCP data recovery
A notification method and device for the execution of PDCP data recovery, and same is used to notify an SN to execute a PDCP data recovery process. The notification method for the execution of packet data convergence protocol (PDCP) data recovery comprises: a primary base station sending an inter-node signaling message between the primary base station and a secondary base station to the secondary base station to notify the secondary base station of the execution of a PDCP data recovery process, and the inter-node signaling message is used to instruct the secondary base station to execute a PDCP data recovery process. The method for executing packet data convergence protocol (PDCP) data recovery comprises: the secondary base station receiving the inter-node signaling message sent by the primary base station.