发明名称
摘要 <p>Techniques are disclosed for use in securing communications in environments such as those employing relay nodes. For example, in a communication network wherein a first computing device comprises a user node, a second computing device comprises a relay node, and a third computing device comprises a network access node, and wherein the relay node comprises: a first module for connecting the user node to the communication network; and a second module for connecting the relay node to the network access node, a method comprises the following steps. At least one packet is received at the first module of the relay node from the user node over an interface established between the user node and the relay node. At least one packet is sent from the first module of the relay node to the second module of the relay node via a secure channel established by the first module in accordance with a secure communication protocol. The at least one packet is sent from the second module of the relay node to the network access node via the secure channel and over an interface established between the relay node and the network access node.</p>
申请公布号 JP2013528020(A) 申请公布日期 2013.07.04
申请号 JP20130503771 申请日期 2011.03.23
申请人 发明人
分类号 H04W12/08;H04W16/26 主分类号 H04W12/08
代理机构 代理人
主权项
地址