COMMUNICATION METHOD, COMMUNICATIONS DEVICE, AND COMMUNICATIONS SYSTEM

    公开(公告)号:US20210160182A1

    公开(公告)日:2021-05-27

    申请号:US17162660

    申请日:2021-01-29

    Inventor: Chongyang HU

    Abstract: A communications method includes receiving, by a first provider edge (PE) device, a data packet from a second PE device and avoiding, by the first PE device, sending the data packet to the second PE device in response to determining that a source address of the data packet is the same as an address of the second PE device in an entry. The source address of the data packet is the same as the address of the second PE in the entry stored in the first PE device. A customer edge (CE) device is multi-homed to the first PE device and the second PE device in an all-active mode. The CE device is connected to the first PE device through a first connection and the second PE device through a second connection. The first connection and the second connection belonging to a same Ethernet segment.

    DEVICE AUTHORIZATION METHOD, ELECTRONIC DEVICE, AND SYSTEM

    公开(公告)号:US20250097017A1

    公开(公告)日:2025-03-20

    申请号:US18969560

    申请日:2024-12-05

    Abstract: One example method includes binding a controlling device and an accessory device to negotiate a first credential and a second credential, the first credential is non-distributable and is used to authenticate the controlling device, and the second credential is distributable and is used to authenticate an authorized device. The controlling device sends, in response to a sharing operation for the second credential, the second credential to the authorized device when an attribute of the second credential is distributable. The authorized device sends an authentication request, first information, and verification information to the accessory device, where the verification information is obtained by processing the first information based on the second credential stored in the controlling device. The accessory device verifies the verification information based on the local second credential. When the verification succeeds, the authorized device is successfully authenticated.

Patent Agency Ranking