Unlock instant, AI-driven research and patent intelligence for your innovation.

Method of discovering intermediate functions and selecting path between two communication devices

A function and path technology, applied in the field of data transmission

Active Publication Date: 2021-03-09
ORANGE SA (FR)
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009]However, this approach is partial: the protocol stack is assembled only from the communication devices that form the end of the connection used to transmit application-related data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of discovering intermediate functions and selecting path between two communication devices
  • Method of discovering intermediate functions and selecting path between two communication devices
  • Method of discovering intermediate functions and selecting path between two communication devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The general principle of the invention is based on discovering basic transport functions hosted in different intermediate nodes of a communication network through which a path is established between a first party communication device and a second party communication device.

[0061] Figure 1A A first system 1 is shown in which the method according to the invention is implemented.

[0062] The system 1 comprises a first party communication device 10, such as a communication device 10 such as residential gateways, "smartphone" type mobile phones, digital decoders or "set-top boxes", etc.

[0063] System 1 includes a plurality of intermediate nodes 11-18 located in one or more communication networks. Such intermediate nodes 11 - 18 are, for example, elements of mobile networks (MEC (Mobile Edge Computing), C-RAN (Cloud Radio Access Network)), routers, gateways providing transport functions or application functions, or proxies. Intermediate nodes 11-18 host one or more ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for carrying out transmission functions hosted by intermediate devices of a path between two communication devices. The end-to-end encryption devices are designed toresist any attempts at surveillance or tampering, since third parties can neither decrypt nor modify the communicated data. A solution is known which, by depending on the requests from applications toopen connections, makes it possible to select and assemble the transport protocols necessary for the application to function. However, this is a local method characterized in that the protocol stackis assembled only at the communication equipment making up the endpoints of the connections. Therefore, the requests emitted by these applications are not transmitted to the intermediate devices hosting the desired functions. The invention makes it possible to restore the cooperation between communication devices, constituting the endpoints of a connection, and intermediate nodes hosting transmission functions.

Description

technical field [0001] The field of the invention is that of data transmission. More specifically, the invention relates to a method that allows the discovery, selection and activation of functions, called transport functions, hosted in intermediate devices of a path established between two communication devices. Background technique [0002] End-to-end encryption (E2EE) is a technique used in communication systems where only communication devices that have established a connection with each other can access the content of some data transferred via this connection, data useful for routing may be unencrypted. [0003] The end-to-end encryption system is designed to resist any attempt to monitor or modify the data, as no third party can decrypt and thus access the passed data without the security keys used for encryption and decryption. [0004] Thus, the content of the message transmitted to the receiver communication device is locally encrypted by the transmitter communicat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/725H04L12/751H04L45/02
CPCH04L45/02H04L45/306
Inventor E.斯蒂芬F.菲奥G.弗罗门图克斯
Owner ORANGE SA (FR)