18505391. COMMUNICATION METHOD AND APPARATUS simplified abstract (Huawei Technologies Co., Ltd.)

From WikiPatents
Jump to navigation Jump to search

COMMUNICATION METHOD AND APPARATUS

Organization Name

Huawei Technologies Co., Ltd.

Inventor(s)

Fei Li of Shenzhen (CN)

COMMUNICATION METHOD AND APPARATUS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18505391 titled 'COMMUNICATION METHOD AND APPARATUS

Simplified Explanation

The abstract describes a communication method and apparatus for home network security. The method involves receiving a request from user equipment, sending a request to a network function, receiving a key, and generating a second key for encryption and integrity protection.

  • Home network security endpoint receives request from user equipment
  • Sends request to first network function
  • Receives key from first network function
  • Generates second key for encryption and integrity protection

Potential Applications

This technology could be applied in home network security systems, ensuring secure communication between user equipment and network functions.

Problems Solved

This technology solves the problem of unauthorized access to home networks and enhances the security of communication within the network.

Benefits

The benefits of this technology include improved data security, protection against cyber threats, and enhanced privacy for users within the home network.

Potential Commercial Applications

  • Secure Home Network Systems: Implementing this technology in home security systems for commercial sale
  • Network Security Services: Offering network security services to businesses and individuals to protect their data and communication.


Original Abstract Submitted

A communication method and apparatus are provided. The method includes: A home network security endpoint receives a first request from user equipment, where the first request includes a first identifier of the user equipment. The home network security endpoint then send a second request to a first network function, where the second request includes a second identifier of the user equipment, and receive a first key from the first network function, where the first key is generated based on a cipher key, an integrity key, and a name of a serving network of the user equipment. The home network security endpoint may generate a second key based on the first key, where the second key includes an encryption protection key and/or an integrity protection key.