Huawei technologies co., ltd. (20240224039). COMMUNICATION METHOD AND APPARATUS simplified abstract

From WikiPatents
Jump to navigation Jump to search

COMMUNICATION METHOD AND APPARATUS

Organization Name

huawei technologies co., ltd.

Inventor(s)

Weiyu Jiang of Beijing (CN)

Fei Yang of Beijing (CN)

Chuang Wang of Shenzhen (CN)

Juanna Dang of Beijing (CN)

COMMUNICATION METHOD AND APPARATUS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240224039 titled 'COMMUNICATION METHOD AND APPARATUS

Simplified Explanation

The method described in the patent application involves receiving a packet from a terminal and sending a packet to another network device with security information encapsulated within it to indicate trustworthiness.

  • The method involves receiving a packet from a terminal.
  • The received packet is then sent to a second network device.
  • Security information is encapsulated within the packet to indicate that it is a trusted packet.
  • The trustworthiness of the packet is determined by the first network device.

Key Features and Innovation

  • Encapsulation of security information within packets.
  • Indication of trustworthiness through security information.
  • Determination of trusted packets by the first network device.

Potential Applications

This technology can be applied in secure communication systems, data transfer protocols, and network security solutions.

Problems Solved

This technology addresses the need for secure and trusted communication between network devices.

Benefits

  • Enhanced security in data transfer.
  • Improved trustworthiness of network communication.
  • Prevention of unauthorized access to network data.

Commercial Applications

The technology can be utilized in industries such as cybersecurity, telecommunications, and information technology for secure data transmission and network protection.

Questions about the Technology

1. How does the encapsulation of security information enhance network security? 2. What are the potential implications of using trusted packets in network communication?


Original Abstract Submitted

in accordance with an embodiment, a method applied to a first network device includes receiving a first packet from a terminal; and sending a second packet to a second network device, where the second packet is obtained by encapsulating security information in the first packet, and the security information indicates that the second packet is a trusted packet determined by the first network device.