18064522. METHOD AND APPARATUS FOR ESTABLISHING END-TO-END SECURITY IN WIRELESS COMMUNICATION SYSTEM simplified abstract (Samsung Electronics Co., Ltd.)
Contents
METHOD AND APPARATUS FOR ESTABLISHING END-TO-END SECURITY IN WIRELESS COMMUNICATION SYSTEM
Organization Name
Inventor(s)
METHOD AND APPARATUS FOR ESTABLISHING END-TO-END SECURITY IN WIRELESS COMMUNICATION SYSTEM - A simplified explanation of the abstract
This abstract first appeared for US patent application 18064522 titled 'METHOD AND APPARATUS FOR ESTABLISHING END-TO-END SECURITY IN WIRELESS COMMUNICATION SYSTEM
Simplified Explanation
The patent application describes a method for establishing secure communication between terminals in a 5G or 6G network. Here are the key points:
- The first terminal sends a request message to a first entity, asking for information needed to establish security between terminals.
- The first entity responds with a message containing the required security information.
- Based on the response, the first terminal generates its own security information.
- The first terminal then sends a second request message, including its security information, to a relay terminal.
- The relay terminal establishes security with the first terminal and responds with security information for a second terminal.
- Using the received security information for the second terminal, an end-to-end session key is generated between the terminals.
Potential applications of this technology:
- This method can be used in 5G or 6G communication systems to support higher data transmission rates.
- It can enhance the security of communication between terminals in wireless networks.
- The method can be applied in various industries that rely on secure and high-speed communication, such as healthcare, finance, and transportation.
Problems solved by this technology:
- The method addresses the need for establishing secure communication between terminals in a 5G or 6G network.
- It simplifies the process of exchanging security information between terminals and relay terminals.
- The method ensures the confidentiality and integrity of data transmitted between terminals.
Benefits of this technology:
- The method enables faster and more secure communication between terminals in a 5G or 6G network.
- It reduces the complexity and overhead associated with establishing security between terminals.
- The method enhances the overall performance and reliability of wireless communication systems.
Original Abstract Submitted
The disclosure relates to a 5G or 6G communication system for supporting a higher data transmission rate. Disclosed is a method of a first terminal in a wireless communication system including transmitting a first request message for information required for establishing security between terminals to a first entity, receiving a first response message including the information required for establishing security between terminals from the first entity in response to the first request message, generating security information for the first terminal, based on the response message, transmitting a second request message including the security information for the first terminal to a relay terminal, establishing security with the relay terminal, receiving a second response message including security information for a second terminal from the relay terminal in response to the second request message, and generating an end-to-end session key between terminals, based on the received security information for the second terminal.