-
公开(公告)号:US20210160182A1
公开(公告)日:2021-05-27
申请号:US17162660
申请日:2021-01-29
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Chongyang HU
IPC: H04L12/741 , H04L12/721 , H04L12/46
Abstract: A communications method includes receiving, by a first provider edge (PE) device, a data packet from a second PE device and avoiding, by the first PE device, sending the data packet to the second PE device in response to determining that a source address of the data packet is the same as an address of the second PE device in an entry. The source address of the data packet is the same as the address of the second PE in the entry stored in the first PE device. A customer edge (CE) device is multi-homed to the first PE device and the second PE device in an all-active mode. The CE device is connected to the first PE device through a first connection and the second PE device through a second connection. The first connection and the second connection belonging to a same Ethernet segment.
-
公开(公告)号:US20250097017A1
公开(公告)日:2025-03-20
申请号:US18969560
申请日:2024-12-05
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Chongyang HU , Changting LI , Siying MA , Yue ZHANG
Abstract: One example method includes binding a controlling device and an accessory device to negotiate a first credential and a second credential, the first credential is non-distributable and is used to authenticate the controlling device, and the second credential is distributable and is used to authenticate an authorized device. The controlling device sends, in response to a sharing operation for the second credential, the second credential to the authorized device when an attribute of the second credential is distributable. The authorized device sends an authentication request, first information, and verification information to the accessory device, where the verification information is obtained by processing the first information based on the second credential stored in the controlling device. The accessory device verifies the verification information based on the local second credential. When the verification succeeds, the authorized device is successfully authenticated.
-