End-to-end authentication and key negotiation method, device and system
A technology of key negotiation and authentication algorithm, applied in the field of end-to-end authentication and key negotiation, to achieve the effect of improving communication security, simple protocol interaction, and high transmission efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0081] The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings.
[0082] The embodiment of this application provides a method for end-to-end authentication and key agreement applicable to the ION network architecture based on identity and location separation. The method can be applied to figure 1 The ION network architecture shown. refer to figure 1 As shown, the ION network architecture includes communication devices (also referred to as node devices) and generic identity services (generic resilient id services, GRIDS). Communication devices can be understood as the data plane of the ION network architecture, and communication devices in the ION network architecture can perform end-to-end communication, such as figure 1 The first communication device may perform end-to-end communication with the second communication device through a radio access network (radio access network, RAN), a user plan...
PUM

Abstract
Description
Claims
Application Information

- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2023 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap