18168228. COMMUNICATION METHOD, APPARATUS, AND SYSTEM simplified abstract (Huawei Technologies Co., Ltd.)

From WikiPatents
Jump to navigation Jump to search

COMMUNICATION METHOD, APPARATUS, AND SYSTEM

Organization Name

Huawei Technologies Co., Ltd.

Inventor(s)

He Li of Shanghai (CN)

Rong Wu of Shenzhen (CN)

Yizhuang Wu of Beijing (CN)

Ao Lei of Beijing (CN)

COMMUNICATION METHOD, APPARATUS, AND SYSTEM - A simplified explanation of the abstract

This abstract first appeared for US patent application 18168228 titled 'COMMUNICATION METHOD, APPARATUS, AND SYSTEM

Simplified Explanation

The abstract describes a communication method, apparatus, and system for improving the security of a V2X PC5 establishment procedure. Here are the key points:

  • The method involves a first terminal device obtaining a first security protection method, determined during a discovery procedure between the first terminal device and a second terminal device.
  • The first terminal device then determines a second security protection method for the PC5 connection between the first and second terminal devices.
  • The second security protection method is chosen in a way that ensures its security level is not lower than the security level of the first security protection method.
  • This communication method is specifically designed for the V2X (vehicle-to-everything) communication field.

Potential applications of this technology:

  • V2X communication systems: This method can be applied to enhance the security of communication between vehicles and other entities in V2X systems, such as infrastructure or pedestrians.
  • Intelligent transportation systems: The method can be utilized to secure communication between vehicles and traffic management systems, improving the overall safety and efficiency of transportation networks.
  • Connected and autonomous vehicles: By implementing this method, the security of communication between connected and autonomous vehicles can be strengthened, ensuring the integrity and privacy of data exchanged.

Problems solved by this technology:

  • In V2X communication, establishing secure connections between devices is crucial to prevent unauthorized access, data tampering, or other security threats.
  • This method addresses the challenge of determining an appropriate security protection method for the PC5 connection, ensuring that the chosen method is at least as secure as the method used during the discovery procedure.
  • By providing a systematic approach to security protection in V2X communication, this technology helps mitigate the risks associated with insecure connections.

Benefits of this technology:

  • Enhanced security: The method ensures that the security level of the chosen security protection method for the PC5 connection is not compromised, providing a higher level of security for V2X communication.
  • Simplified implementation: By utilizing the first security protection method determined during the discovery procedure, the method simplifies the process of selecting an appropriate security protection method for the PC5 connection.
  • Compatibility: The method ensures that the second security protection method is compatible with the first method, allowing for seamless and secure communication between the first and second terminal devices.


Original Abstract Submitted

Embodiments of this application provide a communication method, apparatus, and system, to improve security of a V2X PC5 establishment procedure. The method includes: A first terminal device obtains a first security protection method, where the first security protection method is a security protection method determined in a discovery procedure between the first terminal device and a second terminal device; and the first terminal device determines a second security protection method according to the first security protection method, where the second security protection method is a security protection method for a PC5 connection between the first terminal device and the second terminal device. For example, a security level of the second security protection method is not lower than a security level of the first security protection method. The communication method is applicable to the V2X communication field.