Huawei technologies co., ltd. (20240305983). COMMUNICATION METHOD AND APPARATUS simplified abstract

From WikiPatents
Jump to navigation Jump to search

COMMUNICATION METHOD AND APPARATUS

Organization Name

huawei technologies co., ltd.

Inventor(s)

Yizhuang Wu of Beijing (CN)

Ao Lei of Beijing (CN)

He Li of Shanghai (CN)

COMMUNICATION METHOD AND APPARATUS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240305983 titled 'COMMUNICATION METHOD AND APPARATUS

Simplified Explanation: This patent application focuses on ensuring security in proximity-based service relay communication. It involves using authentication information provided by a data management network element to authenticate a remote terminal and a network, generating a proximity-based service key for communication. The communication protection key is derived for a PC5 connection between the remote terminal and a relay terminal, ensuring security and avoiding user information leakage.

  • Proximity-based service relay communication security
  • Authentication of remote terminal and network
  • Generation of proximity-based service key for communication
  • Derivation of communication protection key for PC5 connection
  • Avoidance of user information leakage

Potential Applications: This technology can be applied in various fields where secure communication between remote terminals and relay terminals is essential, such as:

  • Internet of Things (IoT) devices
  • Smart home systems
  • Industrial automation
  • Healthcare monitoring systems

Problems Solved: This technology addresses the following problems:

  • Ensuring security in proximity-based service relay communication
  • Preventing user information leakage
  • Authenticating remote terminals and networks

Benefits: The benefits of this technology include:

  • Enhanced communication security
  • Prevention of unauthorized access
  • Secure data transmission between devices

Commercial Applications: Title: Secure Proximity-Based Communication Technology for IoT Devices This technology can be commercially used in:

  • IoT device communication systems
  • Secure data transfer applications
  • Network security solutions

Prior Art: Readers interested in prior art related to this technology can explore research papers, patents, and publications in the field of secure communication protocols for IoT devices and network security.

Frequently Updated Research: Researchers are continually exploring advancements in secure communication protocols for IoT devices and network security. Stay updated on the latest developments in this field for cutting-edge solutions.

Questions about Proximity-Based Service Relay Communication Security: 1. How does this technology ensure secure communication between remote terminals and relay terminals?

  - This technology uses authentication information and proximity-based service keys to establish secure communication channels.

2. What are the potential applications of this technology beyond IoT devices?

  - This technology can be applied in various fields such as smart home systems, industrial automation, and healthcare monitoring for secure communication needs.


Original Abstract Submitted

this application provides a communication method and apparatus, and relates to the communication field, to ensure proximity based service relay communication security. in the method, proximity based service authentication information #1 provided by a data management network element is used, so that a remote terminal and a network may authenticate each other and generate a proximity based service key used for communication between the remote terminal and a relay terminal. further, the remote terminal device and the relay terminal device derive a communication protection key for a pc5 connection (namely, a connection between the remote terminal and the relay terminal) based on the proximity based service key, which may include at least one of an encryption key and an integrity protection key, so that proximity based service relay communication security is ensured, and a case such as user information leakage caused by an attack is avoided.