Network function service invocation method, apparatus, and system

    公开(公告)号:US11218314B2

    公开(公告)日:2022-01-04

    申请号:US16566018

    申请日:2019-09-10

    Abstract: A network function service invocation method includes sending, by a first network function network element, a first request message to an authorization network element, wherein the first request message is used to request permission to invoke a first network function service provided by a second network function network element, performing, by the authorization network element, identity authentication on the first network function network element; generating, by the authorization network element, a token when determining that the identity authentication succeeds, wherein the token is used to indicate that the first network function network element has the permission to invoke the first network function service of the second network function network element, and sending, by the authorization network element, a token to the first network function network element.

    Method and Apparatus for Determining Security Protection Mode

    公开(公告)号:US20210306381A1

    公开(公告)日:2021-09-30

    申请号:US17346961

    申请日:2021-06-14

    Inventor: Bo Zhang

    Abstract: A method and an apparatus for determining a security protection mode. In the method, a terminal device may determine a security protection mode of a second communications mode based on security protection information in a first communications mode. In this way, when switching from the first communications mode to the second communications mode, the terminal device may directly use the security protection mode corresponding to the second communications mode to protect transmitted data, so as to ensure data security of the terminal device after communications mode switching is performed.

    Data Transmission Method and Device

    公开(公告)号:US20210168614A1

    公开(公告)日:2021-06-03

    申请号:US17171658

    申请日:2021-02-09

    Abstract: A data transmission method and a device. The data transmission method includes performing integrity protection on to-be-sent data, to generate a packet data convergence protocol (PDCP) data packet, where the PDCP data packet includes identification information and integrity protection information, the identification information is at least used to indicate that integrity protection is performed on data carried in the PDCP data packet, and the integrity protection information is used to perform integrity check on the data carried in the PDCP data packet, and sending the PDCP data packet.

    Virtual network function audit method and apparatus

    公开(公告)号:US10990670B2

    公开(公告)日:2021-04-27

    申请号:US16185971

    申请日:2018-11-09

    Abstract: A virtual network function (VNF) audit method and apparatus, used to audit a VNF generated by a platform that includes an authentication and authorization component, a service component, and a virtualized infrastructure. The method includes receiving an event reported by the authentication and authorization component, receiving an event reported by the service component, and receiving an event reported by the virtualized infrastructure, obtaining an event occurrence sequence of each VNF according to all received events, and auditing the event occurrence sequence of each VNF to obtain an audit result of the VNF. According to the method, the events that are distributed in different components are integrated into one event occurrence sequence in order to visually and quickly detect a malicious VNF generated by bypassing a component, and more comprehensively detect the malicious VNF, thereby reducing a missed detection rate of a VNF operation audit.

    Key configuration method, key management center, and network element

    公开(公告)号:US10903987B2

    公开(公告)日:2021-01-26

    申请号:US15978794

    申请日:2018-05-14

    Inventor: Bo Zhang Lu Gan

    Abstract: This application provides a key configuration method and an apparatus. A key management center obtains a service key, and performs encryption and/or integrity protection on the service key to obtain a token. The key management center sends the token to a first network element, the first network element forwards the token to a second network element, and the second network element obtains the service key based on the token. The service key is used to perform encryption and/or integrity protection on data transmitted between the first network element and the second network element. Therefore, security key configuration can be implemented through interaction between the key management center and the network elements, thereby laying a foundation for end-to-end security communication between the first network element and the second network element.

    Data Flow Control Method and Apparatus
    19.
    发明申请

    公开(公告)号:US20200029121A1

    公开(公告)日:2020-01-23

    申请号:US16585889

    申请日:2019-09-27

    Inventor: Bo Zhang

    Abstract: This application discloses a data flow control method and apparatus. The method includes: calculating, by a device when a clock signal arrives, a quantity of transition-minimized differential signaling (TMDS) characters currently stored in a buffer of the device; and outputting, by the device, the TMDS character in the buffer when the quantity of TMDS characters currently stored in the buffer reaches a preset value, or outputting a gap data packet when the quantity of TMDS characters currently stored in the buffer does not reach a preset value, where the preset value is less than or equal to a TMDS character storage capacity of the buffer.

Patent Agency Ranking