Communication System, Method for Generating Network Layer Address, and Related Device

    公开(公告)号:US20240406722A1

    公开(公告)日:2024-12-05

    申请号:US18807052

    申请日:2024-08-16

    Abstract: Disclosed are a communication system. All nodes in the communication system belong to a same layer 2 network. Well-known information of the layer 2 network can be obtained by the node. The node obtains the well-known information and forms a well-known key based on the well-known information and a preset key derivation algorithm; obtains a local MAC address of a first node and forms a first random number; forms first plaintext data based on the local MAC address and the first random number; and encrypts the first plaintext data based on the well-known key and a symmetric encryption algorithm, to form a first network layer address. Each node forms the well-known key based on the well-known information and the key derivation algorithm, and forms the network layer address based on the well-known key, the local MAC address, and the symmetric encryption algorithm.

    Packet sending method, network device, and computer-readable storage medium

    公开(公告)号:US11546259B2

    公开(公告)日:2023-01-03

    申请号:US17015503

    申请日:2020-09-09

    Abstract: This application provides wireless communications configuration methods and apparatuses. One method includes: receiving, by a service node of a server, a first packet sent by a client device, wherein a destination address of the first packet is an internet protocol (IP) address of the server; sending, by the service node, a second packet to the client device, wherein the second packet comprises the IP address of the service node; and receiving, by the service node, a third packet sent by the client device, wherein a destination address of the third packet is the IP address of the service node that is different from the destination address of the first packet.

    Data Processing Method and Device

    公开(公告)号:US20220174072A1

    公开(公告)日:2022-06-02

    申请号:US17675282

    申请日:2022-02-18

    Abstract: This application provides a data processing method and a device. In embodiments, a data processing method applied to a network device may include: receiving a first data packet, where the first data packet includes a source IP address and a first verification code; obtaining a first key; generating a second verification code based on the source IP address and the first key; and if the second verification code is the same as the first verification code, determining that the first data packet is valid.

    SECURE ROUTE IDENTIFICATION METHOD AND APPARATUS

    公开(公告)号:US20200267074A1

    公开(公告)日:2020-08-20

    申请号:US16869761

    申请日:2020-05-08

    Abstract: This application provides a secure route identification method and an apparatus. A first AS node receives a first message. The first message is used to indicate a target path for reaching a first route prefix, and the target path is used to indicate a first neighboring relationship between AS nodes on the target path. Then, the first AS node determines, based on the first neighboring relationship and neighbor information of an AS node on the target path that is stored in a blockchain, whether a security threat exists on the target path. The neighbor information of the AS node on the target path includes a second neighboring relationship between the AS node on the target path and another AS node.

    Identity authentication method and apparatus

    公开(公告)号:US12167239B2

    公开(公告)日:2024-12-10

    申请号:US17680980

    申请日:2022-02-25

    Abstract: A method comprises generating, based on identity information of a user by an identity management server, a temporary privacy identity identifier of a terminal device, receiving, from the terminal device, a network access request comprising the temporary privacy identity identifier, generating an authentication key of the temporary privacy identity identifier based on the temporary privacy identity identifier and a primary identity authentication key of a domain to which the terminal device belongs, generating a first message based on the temporary privacy identity identifier and the authentication key, sending the first message to the terminal device, receiving a second message from the terminal device based on the first message, performing authentication on the second message based on the temporary privacy identity identifier and the authentication key, and allowing access to a network device by the terminal device after the authentication succeeds.

    Link-State Advertisement LSA Sending Method, Apparatus, and System

    公开(公告)号:US20200220803A1

    公开(公告)日:2020-07-09

    申请号:US16818606

    申请日:2020-03-13

    Abstract: This application discloses a link-state advertisement LSA sending method, an apparatus, and a system, to reduce a quantity of LSA sending times. The method includes: generating, by a first router, a first path table based on level location information of the first router, level location information of a second router, and level location information of at least one third router; sending, by the first router, a first link state update LSU message to the second router; receiving, by the second router, the first link state update LSU message from the first router; updating, by the second router, a link state database LSDB of the second router based on a first LSA; and sending, by the second router, the first LSA to a router corresponding to an identifier in the first path table.

    Information verification method, apparatus, and device

    公开(公告)号:US12231439B2

    公开(公告)日:2025-02-18

    申请号:US17479931

    申请日:2021-09-20

    Abstract: Embodiments of this application provide an information verification method, apparatus, and device. The method includes: sending a first message to a server that includes a target domain name and first indication information, which indicates a status of first verification information stored in a client, the first verification information is verification information generated based on multiple domain names and owner information of the multiple domain names, the first verification information verifies the owner information of the multiple domain names, and the multiple domain names include a target domain name; receiving a second message sent by the server based on the first message, where the second message indicates target first verification information, which is used by the client to verify owner information of the target domain name; and verifying the obtained owner information of the target domain name based on the second message.

    Packet transmission method, apparatus, device, and readable storage medium

    公开(公告)号:US12192110B2

    公开(公告)日:2025-01-07

    申请号:US18161247

    申请日:2023-01-30

    Abstract: This application discloses a packet transmission method, an apparatus, a device, and a readable storage medium, and relates to the field of communication technologies. The method applied to a second network device includes: First, a first packet sent by a first network device is received, and then a second packet, a first dwell time period, and a second dwell time period are obtained based on the first packet. Then, a time difference between the second dwell time period and the first dwell time period is determined. Then, a third dwell time period and a fourth dwell time period are determined, to encapsulate the third dwell time period, the fourth dwell time period, and the second packet to obtain a third packet.

    Secure route identification method and apparatus

    公开(公告)号:US11388083B2

    公开(公告)日:2022-07-12

    申请号:US16869761

    申请日:2020-05-08

    Abstract: This application provides a secure route identification method and an apparatus. A first AS node receives a first message. The first message is used to indicate a target path for reaching a first route prefix, and the target path is used to indicate a first neighboring relationship between AS nodes on the target path. Then, the first AS node determines, based on the first neighboring relationship and neighbor information of an AS node on the target path that is stored in a blockchain, whether a security threat exists on the target path. The neighbor information of the AS node on the target path includes a second neighboring relationship between the AS node on the target path and another AS node.

Patent Agency Ranking