Fast-accessing method and apparatus
First Claim
1. A method, comprising:
- establishing, over a first communication connection, a first security connection between a first network node and a user equipment;
obtaining, from a second network node, a first information, the first information comprising at least one of system information of the second network node and an identifier of a security algorithm selected by the second network node for the user equipment;
providing, by the first network node and to the second network node, a second information, the providing being in response to an indication received from the user equipment that the user equipment has detected the second network node, and the second information comprising security information related to the user equipment;
sending the first information to the user equipment; and
establishing, over a second communication connection separate from the first communication connection, a second security connection between the user equipment and the second network node, the establishing of the second security connection being in response to the user equipment deriving, based on the first information, a security key for encoding data over the second communication connection.
2 Assignments
0 Petitions
Accused Products
Abstract
A fast-accessing method may comprise: establishing a first security connection between a first network node and a user equipment; obtaining first information from a second network node, wherein the first information comprises at least one of system information of the second network node and an identifier of a security algorithm selected by the second network node for the user equipment; providing second information to the second network node, in response to an indication of the second network node from the user equipment, wherein the second information comprises security information related to the user equipment; and sending the first information to the user equipment for establishing a second security connection between the user equipment and the second network node.
20 Citations
17 Claims
-
1. A method, comprising:
-
establishing, over a first communication connection, a first security connection between a first network node and a user equipment; obtaining, from a second network node, a first information, the first information comprising at least one of system information of the second network node and an identifier of a security algorithm selected by the second network node for the user equipment; providing, by the first network node and to the second network node, a second information, the providing being in response to an indication received from the user equipment that the user equipment has detected the second network node, and the second information comprising security information related to the user equipment; sending the first information to the user equipment; and establishing, over a second communication connection separate from the first communication connection, a second security connection between the user equipment and the second network node, the establishing of the second security connection being in response to the user equipment deriving, based on the first information, a security key for encoding data over the second communication connection. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An apparatus, comprising:
-
at least one processor; and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to at least; establish, over a first communication connection, a first security connection between the apparatus and a user equipment; obtain, from another apparatus, a first information, the first information comprising at least one of system information of the another apparatus, and an identifier of a security algorithm selected by the another apparatus for the user equipment; provide, to the another apparatus, a second information, the second information provided in response to an indication received from the user equipment that the user equipment has detected the another apparatus, and the second information comprising security information related to the user equipment; send, to the user equipment, the first information for establishing, between the user equipment and the another apparatus, a second security connection over a second communication connection separate from the first communication connection; and establish the second security connection, the establishment of the second security connection being in response to the user equipment deriving, based on the first information, a security key for encoding data over the second communication connection. - View Dependent Claims (7, 8, 9)
-
-
10. A method, comprising:
-
establishing, over a first communication connection, a first security connection between a first network node and a user equipment; sending, to the first network node, an indication that a second network node has been detected; receiving, from the first network node, a first information, the first information comprising at least one of system information of the second network node and an identifier of a security algorithm selected by the second network node for the user equipment; establishing, over a second communication connection separate from the first communication connection, a second security connection between the user equipment and the second network node; and deriving, by the user equipment and based on the first information, a security key for encoding data over the second security connection. - View Dependent Claims (11, 12, 13)
-
-
14. An apparatus, comprising:
-
at least one processor; and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following; establish, over a first communication connection, a first security connection between a first network node and the apparatus; send, to the first network node, an indication that a second network node has been detected by the apparatus; receive, from the first network node, a first information, the first information comprising at least one of system information of the second network node and an identifier of a security algorithm selected by the second network node for the apparatus; derive, based on the first information, a security key for encoding data over a second communication connection between the apparatus and the second network node, the second communication connection separate from the first communication connection; and establish, over the second communication connection, a second security connection between the apparatus and the second network node. - View Dependent Claims (15, 16, 17)
-
Specification