-
公开(公告)号:US12158945B2
公开(公告)日:2024-12-03
申请号:US17371712
申请日:2021-07-09
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Ji Li , Leting Ren , Li Duan , Jun Xia
Abstract: This application provides an authentication credential protection method and system. The protection method includes the following steps: generating authentication secret information based on a lock screen password and hardware secret information of a first device; randomly generating, by the first device, a symmetric key, and using the symmetric key as an encryption key for the authentication secret information; splitting the encryption key into at least two first key segments by using a multi-party data splitting algorithm, where one of the at least two first key segments is stored on the first device; and sending, by the first device, another first key segment to a trusted device. In the foregoing technical solution, the authentication secret information is generated by using the lock screen password and the hardware secret information, increasing information complexity. In addition, different trusted devices are used to store the split key segments, improving security of the encryption key.
-
公开(公告)号:US10609598B2
公开(公告)日:2020-03-31
申请号:US15435440
申请日:2017-02-17
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Wangjun Wu , Jun Zhou , Peng Lan , Ziqiang Wang , Jun Xia , Yongxiang Zhao , Jingyu Wang , Nengwu Xiang , Ni Ma
Abstract: A base station includes multiple edge nodes and a central node. The edge nodes are configured to perform communication with a user equipment, and execute baseband processing and mutual conversion between baseband data and radio data, in which the multiple edge nodes belong to one or more edge node groups, and each edge node group includes at least one edge node. The central node is configured to perform communication with the multiple edge nodes, manage the multiple edge nodes, and perform resource sharing so that resources are shared by the multiple edge nodes. The base station is divided into two levels of architecture, namely, a central node and an edge node, and the central node implements resource sharing so that resources are shared by the edge nodes, so that a resource sharing degree in the base station is enhanced.
-