18159188. DATA TRANSMISSION METHOD AND RELATED DEVICE simplified abstract (Huawei Technologies Co., Ltd.)

From WikiPatents
Jump to navigation Jump to search

DATA TRANSMISSION METHOD AND RELATED DEVICE

Organization Name

Huawei Technologies Co., Ltd.

Inventor(s)

Dagang Zhang of Dongguan (CN)

Zhilong Zheng of Shenzhen (CN)

DATA TRANSMISSION METHOD AND RELATED DEVICE - A simplified explanation of the abstract

This abstract first appeared for US patent application 18159188 titled 'DATA TRANSMISSION METHOD AND RELATED DEVICE

Simplified Explanation

The present disclosure is about data transmission methods and devices. It describes a method involving a primary network device, a secondary network device, and a terminal device. When there is a change in the carrier (such as adding, deleting, or changing the secondary network device), the primary network device sends a message to the terminal device. The message instructs the terminal device to continue performing data encryption and decryption using the key of the primary network device, even after the carrier change.

  • The patent application describes a method for seamless data transmission during carrier changes.
  • The method involves a primary network device, a secondary network device, and a terminal device.
  • When a carrier change occurs, the primary network device sends a message to the terminal device.
  • The message instructs the terminal device to continue using the key of the primary network device for data encryption and decryption.
  • This ensures that data transmission remains secure and uninterrupted during carrier changes.

Potential Applications

This technology has potential applications in various fields where secure data transmission is crucial, such as:

  • Telecommunications industry
  • Internet of Things (IoT) devices
  • Mobile networks
  • Wireless communication systems

Problems Solved

This technology solves the following problems:

  • Ensures secure data transmission during carrier changes
  • Eliminates the need for re-establishing encryption keys after carrier changes
  • Prevents interruptions or vulnerabilities in data transmission during carrier changes

Benefits

The benefits of this technology include:

  • Seamless and uninterrupted data transmission during carrier changes
  • Enhanced security by using the same encryption key before and after carrier changes
  • Simplified process for maintaining data encryption and decryption during carrier changes


Original Abstract Submitted

The present disclosure relates to data transmission methods and devices. One example data transmission method relates to a primary network device, a secondary network device, and a terminal device. When a carrier change occurs (for example, the secondary network device is to be added, the secondary network device is to be deleted, or the secondary network device is to be changed), the primary network device sends a first message to the terminal device. Before the carrier change, the terminal device performs data encryption and decryption by using a key of the primary network device. The first message indicates the terminal device to still perform, after the carrier change, data encryption and decryption by using the key that is of the primary network device and that is stored in the terminal device.