18592062. COMMUNICATION METHOD, APPARATUS, AND SYSTEM simplified abstract (HUAWEI TECHNOLOGIES CO., LTD.)

From WikiPatents
Jump to navigation Jump to search

COMMUNICATION METHOD, APPARATUS, AND SYSTEM

Organization Name

HUAWEI TECHNOLOGIES CO., LTD.

Inventor(s)

Qingchun He of Shenzhen (CN)

Mingchao Li of Beijing (CN)

Yong Wang of Shenzhen (CN)

Xingqing Cheng of Beijing (CN)

COMMUNICATION METHOD, APPARATUS, AND SYSTEM - A simplified explanation of the abstract

This abstract first appeared for US patent application 18592062 titled 'COMMUNICATION METHOD, APPARATUS, AND SYSTEM

Simplified Explanation

This patent application describes a method for communication authentication between two nodes using different keys.

Key Features and Innovation

  • Obtaining a second key for communication authentication with a second node.
  • Receiving a release request for a communication connection from the second node.
  • Sending a connection establishment request to establish a connection based on the second key.

Potential Applications

This technology can be applied in secure communication systems, IoT devices, and network infrastructure.

Problems Solved

This technology addresses the need for secure communication authentication in multi-node scenarios.

Benefits

  • Enhanced security in communication connections.
  • Efficient establishment of connections using different keys.
  • Improved authentication procedures in complex communication scenarios.

Commercial Applications

The technology can be utilized in industries such as telecommunications, cybersecurity, and smart devices for secure data transmission.

Prior Art

Readers can explore prior patents related to communication authentication methods and key exchange protocols.

Frequently Updated Research

Stay updated on the latest advancements in communication technologies, encryption methods, and network security protocols.

Questions about Communication Authentication

How does this technology improve communication security?

This technology enhances security by using different keys for authentication between nodes, reducing the risk of unauthorized access.

What are the potential drawbacks of using multiple keys for authentication?

Using multiple keys may increase complexity in managing authentication processes, but it also enhances security by adding an extra layer of protection.


Original Abstract Submitted

This application discloses a communication method, apparatus, and system, and relates to the field of communication technologies. The method includes: obtaining a second key used for communication authentication with a second node, where the second key is different from a preconfigured first key; receiving, from the second node, a release request for a first communication connection, where the first key is used for communication authentication on the first communication connection; and sending a connection establishment request to the second node, where the connection establishment request is used to request to establish a connection based on the second key. The method provides a technical solution in which the first node and the second node release a connection after determining an updated key, and establish a connection by using the new key, to implement an authentication procedure in a multi-communication scenario convergence scenario.