18452575. COMMUNICATION METHOD AND APPARATUS simplified abstract (Huawei Technologies Co., Ltd.)

From WikiPatents
Jump to navigation Jump to search

COMMUNICATION METHOD AND APPARATUS

Organization Name

Huawei Technologies Co., Ltd.

Inventor(s)

He Li of Shanghai (CN)

Ao Lei of Beijing (CN)

Rong Wu of Shenzhen (CN)

COMMUNICATION METHOD AND APPARATUS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18452575 titled 'COMMUNICATION METHOD AND APPARATUS

Simplified Explanation: This patent application describes a method and apparatus for communication that verifies the authorization of a network element to request operations on terminal devices, reducing the impact of potential attacks and enhancing system security.

Key Features and Innovation:

  • Method involves receiving request messages from network elements to perform operations on terminal devices.
  • Determines authorization of the requesting network element based on the request message.
  • Verifies if the requesting network element is an attacker by checking authorization.
  • Enhances system security by reducing the impact of unauthorized requests.

Potential Applications: This technology can be applied in various communication systems, network security protocols, and IoT devices to prevent unauthorized access and attacks.

Problems Solved: This technology addresses the issue of unauthorized requests from network elements, reducing the risk of system vulnerabilities and potential attacks.

Benefits:

  • Improved system security and protection against unauthorized access.
  • Reduced impact of attacks on system services.
  • Enhanced verification process for network element authorization.

Commercial Applications: The technology can be utilized in telecommunications, cybersecurity, and IoT industries to enhance network security and protect terminal devices from unauthorized operations.

Prior Art: Readers can explore prior research on network security protocols, communication methods, and authorization verification processes to understand the background of this technology.

Frequently Updated Research: Stay updated on advancements in network security, communication protocols, and authorization verification methods to enhance the effectiveness of this technology.

Questions about Communication Security: 1. How does this technology verify the authorization of network elements to request operations on terminal devices? 2. What are the potential applications of this communication security technology in different industries?


Original Abstract Submitted

This application provides a communication method and apparatus. The method includes: A first network element receives a first request message from a second network element, where the first request message is used to request to perform a first operation on a first terminal device. The first network element determines, based on the first request message, whether the second network element is authorized to request to perform the first operation on the first terminal device. Whether a network element that sends a request message is authorized to request to perform a related operation is verified, to determine whether the network element is an attacker. This reduces impact on a system service resulting from requests of an attacker and improves system security.