ROUTE INFORMATION UPDATE METHOD, COMMUNICATION APPARATUS, AND STORAGE MEDIUM

    公开(公告)号:US20230262579A1

    公开(公告)日:2023-08-17

    申请号:US18192866

    申请日:2023-03-30

    Inventor: Bo ZHANG

    CPC classification number: H04W40/248

    Abstract: A route information update method includes: A second terminal generates route information of a first terminal, where a relay function of the second terminal provides a communication service for the first terminal and a first device based on the route information of the first terminal, and the first device includes a third terminal and/or a network device. The second terminal updates the route information of the first terminal to generate updated route information of the first terminal. The second terminal sends a second message to the first terminal, where the second message includes the updated route information of the first terminal. When the first device includes the third terminal, the second terminal sends the updated route information of the first terminal to the third terminal.

    NETWORK KEY PROCESSING METHOD AND SYSTEM AND RELATED DEVICE

    公开(公告)号:US20230033598A1

    公开(公告)日:2023-02-02

    申请号:US17819188

    申请日:2022-08-11

    Abstract: Embodiments of this application disclose a network key processing system, including user equipment, a security anchor network element, and an access and mobility management network element, where the security anchor network element is configured to: obtain a first key parameter from a slice selection network element, where the first key parameter includes identifier information of N network slices; generate N slice-dedicated keys based on the first key parameter; and send the N slice-dedicated keys to the corresponding N network slices respectively; the access and mobility management network element is configured to: obtain the first key parameter, and send the first key parameter to the user equipment; and the user equipment is configured to: generate the N slice-dedicated keys for the N network slices based on the first key parameter, and access the N network slices based on the generated N slice-dedicated keys.

    Authentication Method, Device, And System

    公开(公告)号:US20210185527A1

    公开(公告)日:2021-06-17

    申请号:US17185467

    申请日:2021-02-25

    Abstract: Example authentication methods, devices, and systems are provided, where those example can be used to verify validity of access location information of a next generation-residential gateway (NG-RG) in a fixed-mobile convergence architecture. One example method includes a network device receiving first link information that is used to represent an access location of a residential gateway, and the network device obtaining second link information of the residential gateway. When the first link information matches partial or all information of the second link information, or when the first link information matches partial or all information of one link information of the second link information, the network device verifies validity of the access location of the residential gateway.

    TERMINAL AUTHENTICATING METHOD, APPARATUS, AND SYSTEM

    公开(公告)号:US20200162913A1

    公开(公告)日:2020-05-21

    申请号:US16748627

    申请日:2020-01-21

    Abstract: Embodiments of the present invention disclose a terminal authenticating method, including: receiving, by a UE-to-network relay UE-R, a first request message sent by user equipment UE; sending, by the UE-R, a second request message to a control network element according to the first request message sent by the UE; receiving, by the UE-R, an authentication request message sent by the control network element, and determining whether the authentication request message is for authenticating on the UE; if the authentication request message is for authenticating on the UE, sending, by the UE-R, an authentication request message to the UE; and receiving, by the UE-R, an authentication response message sent by the UE according to the authentication request message, and sending the authentication response message to the control network element.

    NETWORK KEY PROCESSING METHOD AND SYSTEM AND RELATED DEVICE

    公开(公告)号:US20190342082A1

    公开(公告)日:2019-11-07

    申请号:US16517645

    申请日:2019-07-21

    Abstract: Embodiments of this application disclose a network key processing system, including user equipment, a security anchor network element, and an access and mobility management network element, where the security anchor network element is configured to: obtain a first key parameter from a slice selection network element, where the first key parameter includes identifier information of N network slices; generate N slice-dedicated keys based on the first key parameter; and send the N slice-dedicated keys to the corresponding N network slices respectively; the access and mobility management network element is configured to: obtain the first key parameter, and send the first key parameter to the user equipment; and the user equipment is configured to: generate the N slice-dedicated keys for the N network slices based on the first key parameter, and access the N network slices based on the generated N slice-dedicated keys.

    MOBILE TERMINAL
    6.
    发明申请

    公开(公告)号:US20220276681A1

    公开(公告)日:2022-09-01

    申请号:US17632059

    申请日:2020-07-27

    Abstract: A mobile terminal includes a display module, a host module, and a hinge used to connect the display module and the host module. The hinge is disposed on a bottom border of the display module. The display module includes a top cover and a hinge cover that covers the hinge, and the top cover has an accommodating cavity. A screen body, a screen drive plate, and a screen cover plate that covers the screen body are accommodated in the accommodating cavity, and a part of the screen cover plate extends into a cavity of the hinge cover, so that the hinge cover overlaps the part of the screen cover plate. In this technical solution, a width of the bottom border of the display module can be effectively reduced, to facilitate implementation of a narrow border design of the display module.

    IDENTITY AUTHENTICATION METHOD AND COMMUNICATIONS APPARATUS

    公开(公告)号:US20220272533A1

    公开(公告)日:2022-08-25

    申请号:US17736750

    申请日:2022-05-04

    Abstract: Embodiments of the present invention disclose an identity authentication method, including: A first network device receives first authentication indication information from a first terminal device, wherein the first request carries first authentication indication information and a unmanned aerial system (UAS) identifier of the first terminal device, and sends the UAS identifier of the first terminal device to a second network device. The second network device performs UAS authentication on the first terminal device based on the UAS identifier, and sends a UAS authentication result of the first terminal device to the first network device. By implementing embodiments of this application, a terminal device manufactured by an unmanned aerial system device vendor that has not signed with an operator of a mobile communications network can be prevented from using the mobile communications network.

    Secure Session Method And Apparatus

    公开(公告)号:US20210168594A1

    公开(公告)日:2021-06-03

    申请号:US17171397

    申请日:2021-02-09

    Abstract: This application provides an example secure session method and apparatus. The method includes receiving, by a user plane gateway, a service request message from user equipment UE, where the service request message is used to request to establish a connection between the UE and a service server in a data network. The user plane gateway and the UE separately generate an encryption key and an integrity protection key based on the service request message, and activate encryption protection and/or integrity protection based on the generated encryption key and integrity protection key.

    KEY GENERATION METHOD AND RELATED APPARATUS

    公开(公告)号:US20210058771A1

    公开(公告)日:2021-02-25

    申请号:US17031534

    申请日:2020-09-24

    Abstract: Embodiments of this application provide a key generation method, applied to a scenario in which a base station is divided into a centralized unit and a distributed unit and a control plane and a user plane of the centralized unit are separated. And the control plane entity of the centralized unit obtains a root key, generates a user plane security key based on the root key, and sends the first user plane security key to the user plane entity of the first centralized unit. According to this application, key isolation between different user plane entities is implemented. Further, in an actual operation, the control plane entity or the user plane entity of the centralized unit may be flexibly selected to generate the user plane security key.

Patent Agency Ranking