-
公开(公告)号:US20240357360A1
公开(公告)日:2024-10-24
申请号:US18762930
申请日:2024-07-03
Applicant: Huawei Technologies Co., Ltd.
Inventor: Christopher J.P. Newton , Liqun Chen , Fei Liu , Loganathan Parthipan , Donghui Wang , Yurong Song
IPC: H04W12/40
CPC classification number: H04W12/40
Abstract: This application provides a communication method integrated with trusted measurement and an apparatus. The method includes: A first network element sends a first request message, where the first request message is for requesting to verify whether terminal device is trusted. The first network element receives a first response message, where the first response message is for verifying whether the terminal device is trusted.
-
公开(公告)号:US12105877B2
公开(公告)日:2024-10-01
申请号:US17373380
申请日:2021-07-12
Applicant: Huawei Technologies Co., Ltd.
Abstract: The disclosure relates to technology for haptic stimulation. According to one aspect of the present disclosure, there is provided a haptic stimulation system comprising a haptic stimulation interface comprising a pattern of stimulation elements configured to stimulate receptors in skin of a user. The haptic stimulation system further comprises a control circuit configured to present information in the haptic stimulation interface in accordance with a presentation mode that is tailored to the user.
-
公开(公告)号:US10897712B2
公开(公告)日:2021-01-19
申请号:US16240710
申请日:2019-01-05
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Lichun Li , Fei Liu , Marco Spini
Abstract: Embodiments of the present invention disclose a cyber security management system, method, and apparatus. The system includes user equipment (UE), an access network (AN), a network function selection module, and at least two authentication modules. The UE is configured to send a first service request to the network function selection module, where the first service request carries authentication protocol information. The network function selection module is configured to: select a target authentication module based on the authentication protocol information, and send a second service request to the target authentication module. The target authentication module is configured to perform mutual authentication with the UE. The target authentication module is further configured to: determine a first security configuration according to a specified security policy, and send the first security configuration to the AN.
-
公开(公告)号:US20190141524A1
公开(公告)日:2019-05-09
申请号:US16237902
申请日:2019-01-02
Applicant: Huawei Technologies Co., Ltd.
Inventor: Haiguang Wang , Fei Liu , Xin Kang
Abstract: A system for transmission data protection includes user equipment (UE) and an access point. The access point sends a broadcast message that carries a public key for encryption. The UE receives and stores the public key for encryption. The UE obtains a global public key or a private key corresponding to the UE, and protects transmission data using the public key for encryption and the global public key or the private key corresponding to the UE.
-
公开(公告)号:US20240223391A1
公开(公告)日:2024-07-04
申请号:US18608829
申请日:2024-03-18
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Donghui Wang , Fei Liu
Abstract: According to a communication method, a first communication device obtains a network identifier of a second communication device, generates a query request, sends the query request to a blockchain service device, and receives first blockchain information from the blockchain service device. The query request is used to request the first blockchain information corresponding to the network identifier of the second communication device. The first blockchain information includes a first blockchain identifier, or the first blockchain information includes a first transaction identifier set. The first transaction identifier set includes one or more first transaction identifiers. The first blockchain information is used by the first communication device to query transaction data of the second communication device in a blockchain.
-
公开(公告)号:US20240048986A1
公开(公告)日:2024-02-08
申请号:US18491520
申请日:2023-10-20
Applicant: Huawei Technologies Co., Ltd.
Inventor: Fei Liu , Donghui Wang , Gurbakshish Singh Toor
IPC: H04W12/069 , H04W60/00
CPC classification number: H04W12/069 , H04W60/00
Abstract: A terminal device initiates a request to a first network element device in a public network core network to access a second network element device in a private network core network. If the private network core network and the public network core network are in a same trusted domain, the first network element device sends first indication information to the second network element device, where the first indication information indicates the second network element device to skip performing an authentication operation on the terminal device.
-
公开(公告)号:US11715356B2
公开(公告)日:2023-08-01
申请号:US17511270
申请日:2021-10-26
Applicant: Huawei Technologies Co., Ltd.
CPC classification number: G08B6/00
Abstract: The disclosure relates to technology for haptic stimulation. A haptic interface device comprises an array comprising haptic stimulation elements configured to generate a stimulation pattern. The haptic interface device comprises a controller configured to continually propagate the stimulation pattern on a user's skin, including repeatedly eliminate a portion of a first end of the stimulation pattern and replace the eliminated portion with a new portion at a second end of the stimulation pattern.
-
公开(公告)号:US11431479B2
公开(公告)日:2022-08-30
申请号:US16517645
申请日:2019-07-21
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Zhongding Lei , Lichun Li , Bo Zhang , Fei Liu , Haiguang Wang , Xin Kang
Abstract: Embodiments of this application disclose a network key processing system, including user equipment, a security anchor network element, and an access and mobility management network element, where the security anchor network element is configured to: obtain a first key parameter from a slice selection network element, where the first key parameter includes identifier information of N network slices; generate N slice-dedicated keys based on the first key parameter; and send the N slice-dedicated keys to the corresponding N network slices respectively; the access and mobility management network element is configured to: obtain the first key parameter, and send the first key parameter to the user equipment; and the user equipment is configured to: generate the N slice-dedicated keys for the N network slices based on the first key parameter, and access the N network slices based on the generated N slice-dedicated keys.
-
公开(公告)号:US20180219732A1
公开(公告)日:2018-08-02
申请号:US15940416
申请日:2018-03-29
Applicant: Huawei Technologies Co., Ltd.
Inventor: Fei Liu , Dapeng Chen , Jinli Du , Zhiqi Wang
CPC classification number: H04L41/0813 , H04L41/0873 , H04L41/0886 , H04L47/76 , H04L69/323
Abstract: A negotiation mode processing method and an intelligent network device relate to the field of communications technologies, and used to improve application flexibility of the intelligent network device. The method includes determining, by an intelligent network device, that a physical layer (PHY) receives an auto-negotiation configuration stream from a network device connected to the PHY, and changing a negotiation mode of another PHY in the intelligent network device from a non-auto-negotiation mode to an auto-negotiation mode. The auto-negotiation configuration stream indicates that the device sending the auto-negotiation configuration stream is in the auto-negotiation mode. In this way, the application flexibility of the intelligent network device can be improved, and further improves communication quality of the network device.
-
公开(公告)号:US20240275621A1
公开(公告)日:2024-08-15
申请号:US18444769
申请日:2024-02-19
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Donghui Wang , Jing Chen , Fei Liu , kai li
IPC: H04L9/00
CPC classification number: H04L9/50
Abstract: A first blockchain node determines a block type of a first block and determines the first block based on the block type of the first block. The first blockchain node sends the first block to a second blockchain node and the second blockchain node determines the block type of the first block. The second blockchain node performs block verification on the first block based on the block type of the first block. After verification succeeds, the second blockchain node updates a first blockchain, where the block type is a first type or a second type. The first blockchain node and the second blockchain node are configured to maintain the first blockchain, and the first blockchain includes at least one first-type block and at least one second-type block.
-
-
-
-
-
-
-
-
-