End-to-end authentication and key negotiation method, device and system
A technology of key negotiation and authentication algorithm, applied in the field of end-to-end authentication and key negotiation, to achieve the effect of improving communication security, simple protocol interaction, and high transmission efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0081] The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings.
[0082] The embodiment of this application provides a method for end-to-end authentication and key agreement applicable to the ION network architecture based on identity and location separation. The method can be applied to figure 1 The ION network architecture shown. refer to figure 1 As shown, the ION network architecture includes communication devices (also referred to as node devices) and generic identity services (generic resilient id services, GRIDS). Communication devices can be understood as the data plane of the ION network architecture, and communication devices in the ION network architecture can perform end-to-end communication, such as figure 1 The first communication device may perform end-to-end communication with the second communication device through a radio access network (radio access network, RAN), a user plan...
PUM

Abstract
Description
Claims
Application Information

- Generate Ideas
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com