18505391. COMMUNICATION METHOD AND APPARATUS simplified abstract (Huawei Technologies Co., Ltd.)
Contents
COMMUNICATION METHOD AND APPARATUS
Organization Name
Inventor(s)
COMMUNICATION METHOD AND APPARATUS - A simplified explanation of the abstract
This abstract first appeared for US patent application 18505391 titled 'COMMUNICATION METHOD AND APPARATUS
Simplified Explanation
The abstract describes a communication method and apparatus for home network security. The method involves receiving a request from user equipment, sending a request to a network function, receiving a key, and generating a second key for encryption and integrity protection.
- Home network security endpoint receives request from user equipment
- Sends request to first network function
- Receives key from first network function
- Generates second key for encryption and integrity protection
Potential Applications
This technology could be applied in home network security systems, ensuring secure communication between user equipment and network functions.
Problems Solved
This technology solves the problem of unauthorized access to home networks and enhances the security of communication within the network.
Benefits
The benefits of this technology include improved data security, protection against cyber threats, and enhanced privacy for users within the home network.
Potential Commercial Applications
- Secure Home Network Systems: Implementing this technology in home security systems for commercial sale
- Network Security Services: Offering network security services to businesses and individuals to protect their data and communication.
Original Abstract Submitted
A communication method and apparatus are provided. The method includes: A home network security endpoint receives a first request from user equipment, where the first request includes a first identifier of the user equipment. The home network security endpoint then send a second request to a first network function, where the second request includes a second identifier of the user equipment, and receive a first key from the first network function, where the first key is generated based on a cipher key, an integrity key, and a name of a serving network of the user equipment. The home network security endpoint may generate a second key based on the first key, where the second key includes an encryption protection key and/or an integrity protection key.