-
公开(公告)号:US20230262579A1
公开(公告)日:2023-08-17
申请号:US18192866
申请日:2023-03-30
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Bo ZHANG
IPC: H04W40/24
CPC classification number: H04W40/248
Abstract: A route information update method includes: A second terminal generates route information of a first terminal, where a relay function of the second terminal provides a communication service for the first terminal and a first device based on the route information of the first terminal, and the first device includes a third terminal and/or a network device. The second terminal updates the route information of the first terminal to generate updated route information of the first terminal. The second terminal sends a second message to the first terminal, where the second message includes the updated route information of the first terminal. When the first device includes the third terminal, the second terminal sends the updated route information of the first terminal to the third terminal.
-
公开(公告)号:US20230033598A1
公开(公告)日:2023-02-02
申请号:US17819188
申请日:2022-08-11
Applicant: Huawei Technologies Co., Ltd.
Inventor: Zhongding LEI , Lichun LI , Bo ZHANG , Fei LIU , Haiguang WANG , Xin KANG
Abstract: Embodiments of this application disclose a network key processing system, including user equipment, a security anchor network element, and an access and mobility management network element, where the security anchor network element is configured to: obtain a first key parameter from a slice selection network element, where the first key parameter includes identifier information of N network slices; generate N slice-dedicated keys based on the first key parameter; and send the N slice-dedicated keys to the corresponding N network slices respectively; the access and mobility management network element is configured to: obtain the first key parameter, and send the first key parameter to the user equipment; and the user equipment is configured to: generate the N slice-dedicated keys for the N network slices based on the first key parameter, and access the N network slices based on the generated N slice-dedicated keys.
-
公开(公告)号:US20210185527A1
公开(公告)日:2021-06-17
申请号:US17185467
申请日:2021-02-25
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Hua LI , Chengdong HE , Bo ZHANG
Abstract: Example authentication methods, devices, and systems are provided, where those example can be used to verify validity of access location information of a next generation-residential gateway (NG-RG) in a fixed-mobile convergence architecture. One example method includes a network device receiving first link information that is used to represent an access location of a residential gateway, and the network device obtaining second link information of the residential gateway. When the first link information matches partial or all information of the second link information, or when the first link information matches partial or all information of one link information of the second link information, the network device verifies validity of the access location of the residential gateway.
-
公开(公告)号:US20200162913A1
公开(公告)日:2020-05-21
申请号:US16748627
申请日:2020-01-21
Applicant: Huawei Technologies Co., Ltd.
Inventor: Bo ZHANG , Chengdong HE
IPC: H04W12/06
Abstract: Embodiments of the present invention disclose a terminal authenticating method, including: receiving, by a UE-to-network relay UE-R, a first request message sent by user equipment UE; sending, by the UE-R, a second request message to a control network element according to the first request message sent by the UE; receiving, by the UE-R, an authentication request message sent by the control network element, and determining whether the authentication request message is for authenticating on the UE; if the authentication request message is for authenticating on the UE, sending, by the UE-R, an authentication request message to the UE; and receiving, by the UE-R, an authentication response message sent by the UE according to the authentication request message, and sending the authentication response message to the control network element.
-
公开(公告)号:US20190342082A1
公开(公告)日:2019-11-07
申请号:US16517645
申请日:2019-07-21
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Zhongding LEI , Lichun LI , Bo ZHANG , Fei LIU , Haiguang WANG , Xin KANG
Abstract: Embodiments of this application disclose a network key processing system, including user equipment, a security anchor network element, and an access and mobility management network element, where the security anchor network element is configured to: obtain a first key parameter from a slice selection network element, where the first key parameter includes identifier information of N network slices; generate N slice-dedicated keys based on the first key parameter; and send the N slice-dedicated keys to the corresponding N network slices respectively; the access and mobility management network element is configured to: obtain the first key parameter, and send the first key parameter to the user equipment; and the user equipment is configured to: generate the N slice-dedicated keys for the N network slices based on the first key parameter, and access the N network slices based on the generated N slice-dedicated keys.
-
公开(公告)号:US20220276681A1
公开(公告)日:2022-09-01
申请号:US17632059
申请日:2020-07-27
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Mingchao ZHU , Yukun HE , Xiaodong JIE , Bo ZHANG
IPC: G06F1/16
Abstract: A mobile terminal includes a display module, a host module, and a hinge used to connect the display module and the host module. The hinge is disposed on a bottom border of the display module. The display module includes a top cover and a hinge cover that covers the hinge, and the top cover has an accommodating cavity. A screen body, a screen drive plate, and a screen cover plate that covers the screen body are accommodated in the accommodating cavity, and a part of the screen cover plate extends into a cavity of the hinge cover, so that the hinge cover overlaps the part of the screen cover plate. In this technical solution, a width of the bottom border of the display module can be effectively reduced, to facilitate implementation of a narrow border design of the display module.
-
公开(公告)号:US20220272533A1
公开(公告)日:2022-08-25
申请号:US17736750
申请日:2022-05-04
Applicant: Huawei Technologies Co., Ltd.
Inventor: Zhongding LEI , Xin KANG , Haiguang WANG , Bo ZHANG
IPC: H04W12/06
Abstract: Embodiments of the present invention disclose an identity authentication method, including: A first network device receives first authentication indication information from a first terminal device, wherein the first request carries first authentication indication information and a unmanned aerial system (UAS) identifier of the first terminal device, and sends the UAS identifier of the first terminal device to a second network device. The second network device performs UAS authentication on the first terminal device based on the UAS identifier, and sends a UAS authentication result of the first terminal device to the first network device. By implementing embodiments of this application, a terminal device manufactured by an unmanned aerial system device vendor that has not signed with an operator of a mobile communications network can be prevented from using the mobile communications network.
-
公开(公告)号:US20210168594A1
公开(公告)日:2021-06-03
申请号:US17171397
申请日:2021-02-09
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Rong WU , Bo ZHANG , Shuaishuai TAN
IPC: H04W12/033 , H04W12/0433 , H04W76/12 , H04W88/16 , H04W12/10
Abstract: This application provides an example secure session method and apparatus. The method includes receiving, by a user plane gateway, a service request message from user equipment UE, where the service request message is used to request to establish a connection between the UE and a service server in a data network. The user plane gateway and the UE separately generate an encryption key and an integrity protection key based on the service request message, and activate encryption protection and/or integrity protection based on the generated encryption key and integrity protection key.
-
公开(公告)号:US20210165885A1
公开(公告)日:2021-06-03
申请号:US17169737
申请日:2021-02-08
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Bo ZHANG , Philip GINZBOORG , Valtteri NIEMI , Pekka LAITINEN
Abstract: This application provides an extended authentication method and apparatus for a generic bootstrapping architecture and a storage medium. A first network element obtains a bootstrapping transaction identifier (B-TID) and a key lifetime; and the first network element sends the B-TID and the key lifetime to the terminal, so that the terminal performs extensible authentication protocol (EAP)-based generic bootstrapping architecture (GBA) authentication and key agreement (AKA) authentication with the first network element based on the B-TID and the key lifetime.
-
公开(公告)号:US20210058771A1
公开(公告)日:2021-02-25
申请号:US17031534
申请日:2020-09-24
Applicant: Huawei Technologies Co., Ltd.
Inventor: Rong WU , Bo ZHANG , Shuaishuai TAN
Abstract: Embodiments of this application provide a key generation method, applied to a scenario in which a base station is divided into a centralized unit and a distributed unit and a control plane and a user plane of the centralized unit are separated. And the control plane entity of the centralized unit obtains a root key, generates a user plane security key based on the root key, and sends the first user plane security key to the user plane entity of the first centralized unit. According to this application, key isolation between different user plane entities is implemented. Further, in an actual operation, the control plane entity or the user plane entity of the centralized unit may be flexibly selected to generate the user plane security key.
-
-
-
-
-
-
-
-
-