18154073. TRUSTED COMMUNICATION METHOD AND RELATED APPARATUS simplified abstract (HUAWEI TECHNOLOGIES CO., LTD.)

From WikiPatents
Jump to navigation Jump to search

TRUSTED COMMUNICATION METHOD AND RELATED APPARATUS

Organization Name

HUAWEI TECHNOLOGIES CO., LTD.

Inventor(s)

Yan Zhou of Shanghai (CN)

Chengdong He of Shenzhen (CN)

Qingchun Lin of Shenzhen (CN)

TRUSTED COMMUNICATION METHOD AND RELATED APPARATUS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18154073 titled 'TRUSTED COMMUNICATION METHOD AND RELATED APPARATUS

Simplified Explanation

The abstract describes a trusted communication method that improves the security of a communication system. Here are the key points:

  • The method involves a core network device that detects abnormal non-access stratum (NAS) messages or user data passing through it.
  • Trusted policy information is used to determine whether the NAS message or user data is abnormal.
  • If an abnormality is detected, the NAS message or corresponding service may be notified or blocked.
  • Exception information notification signaling is sent to a trusted control node, which can update the trusted policy information or notify other network elements to take protective measures.
  • This method enhances the security of the communication system by identifying and addressing abnormal messages or data.

Potential applications of this technology:

  • Telecommunication networks: The method can be applied in telecommunication networks to enhance the security of communication between devices and networks.
  • Internet of Things (IoT): As IoT devices become more prevalent, ensuring the security of communication between devices and networks becomes crucial. This method can be used to detect and address abnormal messages or data in IoT networks.

Problems solved by this technology:

  • Security vulnerabilities: By detecting and addressing abnormal messages or data, this method helps prevent security breaches and unauthorized access to communication systems.
  • Timely response: The method allows for timely updates to trusted policy information and notification of network elements, enabling quick protective measures to be taken.

Benefits of this technology:

  • Enhanced security: By detecting and addressing abnormal messages or data, the method improves the overall security of a communication system.
  • Proactive protection: The method allows for proactive measures to be taken, such as blocking abnormal messages or notifying network elements, to prevent potential security threats.
  • Efficient updates: The trusted control node can update the trusted policy information in a timely manner, ensuring that the communication system remains secure.


Original Abstract Submitted

Embodiments of this application disclose a trusted communication method. A core network device may detect, based on trusted policy information, whether a non-access stratum NAS message or user data that passes through the core network device is abnormal. When it is detected that the NAS message or the user data is abnormal, the NAS message or a service corresponding to the user data may be notified or blocked, and exception information notification signaling may be reported to a trusted control node (an independent network function entity, an existing control network element, or an existing management network element). In this way, the trusted control node can update the trusted policy information in a timely manner, or notify each network element to take a trusted protection operation. This effectively improves security of a communication system.