-
公开(公告)号:US20250048073A1
公开(公告)日:2025-02-06
申请号:US18921352
申请日:2024-10-21
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Lun LI , Yizhuang WU , Yang CUI , Ao LEI , Taoran SUN
Abstract: A communication method and apparatus are provided. The method includes: A network repository function network element receives a discovery request message including a type of a network element that requests to be discovered. The network repository function network element determines a second network element based on the type of the network element that requests to be discovered, and sends an identifier of a first dataset, a first token, and an identifier of the second network element to the first network element, where the first token authorizes the first network element to obtain the first dataset. According to the foregoing designs, the network repository function network element can provide, to the first network element, an identifier of a network element and information needed for obtaining the dataset, so that the first network element can determine, based on the dataset, whether to access the network element.
-
公开(公告)号:US20230179997A1
公开(公告)日:2023-06-08
申请号:US18164697
申请日:2023-02-06
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Ao LEI , He LI , Yizhuang WU , Rong WU
IPC: H04W12/033 , H04W12/037
CPC classification number: H04W12/033 , H04W12/037
Abstract: A method for determining a user plane security algorithm, a system, and an apparatus. The method may include: a second device selects a non-null user plane confidentiality protection algorithm based on a security capability of a first device and a security capability of the second device in a case in which user plane confidentiality protection between the second device and the first device is enabled and control plane confidentiality protection between the second device and the first device is not enabled. The second device sends a first message to the first device. The first message includes first algorithm indication information indicating the user plane confidentiality protection algorithm. Therefore, the first device can obtain the non-null user plane confidentiality protection algorithm. Embodiments can be adopted to determine an effective user plane confidentiality protection algorithm, for confidentiality protecting user plane data.
-
公开(公告)号:US20220294858A1
公开(公告)日:2022-09-15
申请号:US17827539
申请日:2022-05-27
Applicant: Huawei Technologies Co., Ltd.
IPC: H04L67/148 , H04L9/40 , H04L69/14
Abstract: Embodiments of this application provide a packet transmission method, a communication apparatus, and a communication system. A target transport layer proxy network element establishes a fourth transport layer connection based on a first context of a source transport layer proxy network element, where the first context is a context about packet transmission of the source transport layer proxy network element on a first path. If the target transport layer proxy network element receives first indication information, and the first indication information indicates that application context migration between a first application server and a second application server is completed, the target transport layer proxy network element performs transport layer processing on a packet on a second path based on a second context of the target transport layer proxy network element, and transmits, on the second path, a packet obtained through the transport layer processing. Hence, a packet loss can be avoided.
-
公开(公告)号:US20250070988A1
公开(公告)日:2025-02-27
申请号:US18948617
申请日:2024-11-15
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Taoran SUN , Yizhuang WU , Lun LI , Yang CUI , Ao LEI
Abstract: A secure communication method includes receiving, by a first network element, first information and a first signature from a network management network element. The first signature is generated based on a private key of the network management network element and the first information, and the first information is used to describe the first network element. The method also includes sending, by the first network element, the first information and the first signature to a certificate issuing network element. The first information is used to obtain a first certificate, and the first certificate is used to prove an identity of the first network element. The method further includes receiving, by the first network element, the first certificate from the certificate issuing network element.
-
公开(公告)号:US20240236755A1
公开(公告)日:2024-07-11
申请号:US18616049
申请日:2024-03-25
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Yongcui LI , Ao LEI , Hui NI
IPC: H04W28/02 , H04L47/20 , H04L47/2483
CPC classification number: H04W28/0236 , H04L47/20 , H04L47/2483
Abstract: The present disclosure provides example traffic routing methods, apparatuses, and systems. One example method includes receiving a routing rule from a session management network element in a session management process, wherein the routing rule indicates at least one of the following: to send a first traffic to a first function entity, or to send a second traffic to a second function entity or an access device, where the first traffic is a traffic on which first traffic steering control is to be performed, and the second traffic is a traffic on which the first traffic steering control has been performed; and transmitting a received traffic according to the routing rule.
-
公开(公告)号:US20230232228A1
公开(公告)日:2023-07-20
申请号:US18191942
申请日:2023-03-29
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Yizhuang WU , He LI , Ao LEI
IPC: H04W12/069 , H04W76/10
CPC classification number: H04W12/069 , H04W76/10
Abstract: A method and an apparatus for establishing secure communication. The method includes: a terminal device receives a first message from a first network element, where the first message includes an identifier of a second network element and first indication information, and the first indication information indicates a candidate authentication mechanism associated with the second network element. The terminal device establishes a communication connection with the second network element based on the candidate authentication mechanism. The terminal device may obtain an authentication mechanism of the dynamically configured second network element, to meet a requirement for establishing a secure communication connection through authentication in an MEC architecture.
-
公开(公告)号:US20250063348A1
公开(公告)日:2025-02-20
申请号:US18937338
申请日:2024-11-05
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Ao LEI , Yizhuang WU , Yang CUI , Li HU
Abstract: This application provides example key management methods and example communication apparatuses. In an example method, a terminal device obtains identification information of a first decryption network element in a local network. The terminal device obtains, based on the identification information and a mapping relationship, a first encryption key corresponding to the first decryption network element, where the mapping relationship indicates at least one decryption network element and an encryption key corresponding to each of the at least one decryption network element, and the at least one decryption network element includes the first decryption network element. The terminal device encrypts the user identity information by using the first encryption key, to obtain a hidden user identity. The terminal device sends a registration request to the local network through an access network device, where the registration request includes the hidden user identity.
-
公开(公告)号:US20230188993A1
公开(公告)日:2023-06-15
申请号:US18163938
申请日:2023-02-03
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Ao LEI , He LI , Yizhuang WU , Rong WU
Abstract: Embodiments of this application provide a communication method and an apparatus to resolve a PC5 unicast establishment failure due to inconsistency between security parameters of terminal devices in a V2X scenario with security negotiation introduced into a PC5 unicast establishment procedure. The communication method includes: A first direct communication discovery name management function network element obtains a security parameter of a first terminal device. A security parameter is required for establishing a PC5 connection between the first terminal device and a second terminal device. The first direct communication discovery name management function network element receives a security parameter of the second terminal device from a second direct communication discovery name management function network element and determines, based on whether the security parameter of the first terminal device matches the security parameter of the second terminal device, whether the first terminal device and the second terminal device support mutual communication.
-
公开(公告)号:US20220264356A1
公开(公告)日:2022-08-18
申请号:US17738782
申请日:2022-05-06
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Yongcui LI , Ao LEI , Hui NI
IPC: H04W28/02 , H04L47/20 , H04L47/2483
Abstract: The present disclosure provides example traffic routing methods, apparatuses, and systems. One example method includes determining, by a session management network element, a routing rule, where the routing rule indicates a first traffic steering entity to send a first traffic to a first function entity, or send a second traffic to a second function entity or an access device, where the first traffic is a traffic on which first traffic steering control is to be performed, and the second traffic is a traffic on which the first traffic steering control has been performed. The routing rule is sent by the session management network element to the first traffic steering entity in a session management process.
-
公开(公告)号:US20240291849A1
公开(公告)日:2024-08-29
申请号:US18659239
申请日:2024-05-09
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Ao LEI , Yizhuang WU , Yang CUI , Taoran SUN
IPC: H04L9/40
CPC classification number: H04L63/1433
Abstract: Embodiments of this application provide a method for obtaining a security classification result and a communication apparatus. The method includes: A security function network element determines to perform security analytics on a target location area; and the security function network element determines a security classification result of the target location area based on first information, where the security classification result indicates a degree to which a potential attack exists in the target location area, the first information is related to behavior information of a terminal device in the target location area, and the behavior information includes traffic data and/or movement track information. According to this application, security analytics may be performed on a location area, to obtain a security classification result of the location area.
-
-
-
-
-
-
-
-
-