AUTHENTICATION CREDENTIAL PROTECTION METHOD AND SYSTEM

    公开(公告)号:US20210334356A1

    公开(公告)日:2021-10-28

    申请号:US17371712

    申请日:2021-07-09

    Abstract: This application provides an authentication credential protection method and system. The protection method includes the following steps: generating authentication secret information based on a lock screen password and hardware secret information of a first device; randomly generating, by the first device, a symmetric key, and using the symmetric key as an encryption key for the authentication secret information; splitting the encryption key into at least two first key segments by using a multi-party data splitting algorithm, where one of the at least two first key segments is stored on the first device; and sending, by the first device, another first key segment to a trusted device. In the foregoing technical solution, the authentication secret information is generated by using the lock screen password and the hardware secret information, increasing information complexity. In addition, different trusted devices are used to store the split key segments, improving security of the encryption key.

    BASE STATION, NETWORK SYSTEM, AND IMPLEMENTATION METHOD

    公开(公告)号:US20170164239A1

    公开(公告)日:2017-06-08

    申请号:US15435440

    申请日:2017-02-17

    CPC classification number: H04W28/16 H04B7/024 H04L5/0037 H04W88/085 H04W88/10

    Abstract: A base station includes multiple edge nodes and a central node. The edge nodes are configured to perform communication with a user equipment, and execute baseband processing and mutual conversion between baseband data and radio data, in which the multiple edge nodes belong to one or more edge node groups, and each edge node group includes at least one edge node. The central node is configured to perform communication with the multiple edge nodes, manage the multiple edge nodes, and perform resource sharing so that resources are shared by the multiple edge nodes. The base station is divided into two levels of architecture, namely, a central node and an edge node, and the central node implements resource sharing so that resources are shared by the edge nodes, so that a resource sharing degree in the base station is enhanced.

Patent Agency Ranking