IDENTITY AUTHENTICATION METHOD AND COMMUNICATIONS APPARATUS

    公开(公告)号:US20220272533A1

    公开(公告)日:2022-08-25

    申请号:US17736750

    申请日:2022-05-04

    Abstract: Embodiments of the present invention disclose an identity authentication method, including: A first network device receives first authentication indication information from a first terminal device, wherein the first request carries first authentication indication information and a unmanned aerial system (UAS) identifier of the first terminal device, and sends the UAS identifier of the first terminal device to a second network device. The second network device performs UAS authentication on the first terminal device based on the UAS identifier, and sends a UAS authentication result of the first terminal device to the first network device. By implementing embodiments of this application, a terminal device manufactured by an unmanned aerial system device vendor that has not signed with an operator of a mobile communications network can be prevented from using the mobile communications network.

    KEY GENERATION METHOD, DEVICE, AND SYSTEM

    公开(公告)号:US20210250762A1

    公开(公告)日:2021-08-12

    申请号:US17243011

    申请日:2021-04-28

    Abstract: A key generation method includes a user plane network function and a terminal device obtain key update information sent by each other. The user plane network function updates, by using the obtained key update information, a sub-key derived from a permanent key, to obtain a new protection key. The terminal device updates, by using the obtained key update information, a sub-key derived from the permanent key, to obtain a new protection key. The terminal device and the user plane network function perform, by using the new protection key, security protection on user plane data transmitted between the terminal device and the user plane network function.

    PRIVATE KEY GENERATION METHOD AND SYSTEM, AND DEVICE

    公开(公告)号:US20200007324A1

    公开(公告)日:2020-01-02

    申请号:US16564140

    申请日:2019-09-09

    Abstract: Embodiments of this application provide a private key generation method and system, and a device. The method includes: receiving, by a terminal device, a first response message sent by a first network device, where the first response message includes at least a first sub-private key, and the first sub-private key is generated based on a first parameter set sent by a second network device; receiving, by the terminal device, a second response message sent by the second network device, where the second response message includes at least a second sub-private key, and the second sub-private key is generated based on a second parameter set sent by the first network device; and synthesizing, by the terminal device, a joint private key based on at least the first sub-private key and the second sub-private key.

    VERTICAL INDUSTRY USER SYSTEM, DEVICE, AND IDENTIFICATION NUMBER DISTRIBUTION METHOD

    公开(公告)号:US20190141531A1

    公开(公告)日:2019-05-09

    申请号:US16221566

    申请日:2018-12-16

    Abstract: Embodiments of the present invention disclose a vertical industry user system, including a service provider device, a terminal, a core network element, and a base station. The core network element is configured to: obtain a distribution instruction; and according to the distribution instruction, configure a core network identification number for the core network element, distribute a provider identification number to the service provider device, and distribute a base station identification number to the base station. The service provider device is configured to receive the provider identification number. The base station is configured to receive the base station identification number. The embodiments of the present invention further provide an identification number distribution method.

    VEHICLE CONTROL METHOD, COMMUNICATIONS APPARATUS, AND COMPUTER-READABLE STORAGE MEDIUM

    公开(公告)号:US20230017001A1

    公开(公告)日:2023-01-19

    申请号:US17946490

    申请日:2022-09-16

    Abstract: This disclosure provide a vehicle control method. A first terminal device obtains first biometric information of a first user, generates a first key based on the first biometric information and identifier information of the first terminal device, and generates first verification information based on the first key. Further, the first terminal device sends the first verification information to an in-vehicle device. When successfully verifying the first verification information, the in-vehicle device controls a vehicle to start. If the first user loses the first terminal device, an unauthorized user that obtains the first terminal device cannot control the vehicle based on only the identifier information of the first terminal device. Because different users have different biometric information, a key generated by the first terminal device is different from the first key, and the in-vehicle device cannot control the vehicle to start. This improves vehicle security.

    Secondary Authentication Method And Apparatus

    公开(公告)号:US20220086145A1

    公开(公告)日:2022-03-17

    申请号:US17532757

    申请日:2021-11-22

    Abstract: The present disclosure relates to secondary authentication methods and apparatus. In one example method, a core network function entity obtains an identity of a first terminal device, where the identity of the first terminal device is an identity in a first network. The core network function entity sends the identity of the first terminal device to an authentication device in a second network, where the identity of the first terminal device is used to determine an identity used by the second network to perform secondary authentication on a first user, and the identity of the first user is different from the identity of the first terminal device.

    KEY DISTRIBUTION AND AUTHENTICATION METHOD AND SYSTEM, AND APPARATUS

    公开(公告)号:US20190058701A1

    公开(公告)日:2019-02-21

    申请号:US16169416

    申请日:2018-10-24

    Abstract: This application provides a key distribution and authentication method, system, and an apparatus. The method includes: a service center server distributes different keys to terminal devices, and then the terminal devices perform mutual authentication with the network authentication server based on respective keys and finally obtain communication keys for communication between the terminal devices and a functional network element. This provides a method for establishing a secure communication channel for the terminal device, having a broad application range.

    COMMUNICATION METHOD AND NETWORK ELEMENT DEVICE

    公开(公告)号:US20250063364A1

    公开(公告)日:2025-02-20

    申请号:US18939046

    申请日:2024-11-06

    Abstract: Embodiments of this application provide a communication method and a network element device. The method includes: A first network function network element obtains integrity-protected attestation information, where the attestation information includes an attestation result and range indication information associated with the attestation result; generates a service request message when determining that a service provided by a second network function network element is to be requested; and sends the service request message to the second network function network element, where the service request message includes the attestation information and an identifier of the first network function network element. The method disclosed in this application can prevent and mitigate a potential security risk faced by a network function in a mobile communication network, especially faced by a network function implemented in a software or virtualization manner.

    DEVICE MANAGEMENT METHOD, SYSTEM, AND APPARATUS

    公开(公告)号:US20240163119A1

    公开(公告)日:2024-05-16

    申请号:US18416938

    申请日:2024-01-19

    CPC classification number: H04L9/50 H04L9/30 H04L9/32

    Abstract: This disclosure discloses a device management method, system, and apparatus. The method includes: A second device sends an identity file to a first access control node, to indicate the first access control node to store the identity file in a file system, where the identity file includes identity information of a first device and a public key of the second device. The second device receives a first identifier sent by the first access control node. The first identifier is used to read the identity file from the file system. After verification is performed on the second device and information about a device associated with the first device in association information and succeeds, the first access control node sends the identity file to the file system. The association information is stored in a database node and a blockchain.

Patent Agency Ranking