-
公开(公告)号:US20240220339A1
公开(公告)日:2024-07-04
申请号:US18288701
申请日:2022-03-30
Applicant: Huawei Technologies Co., Ltd.
Inventor: Bo Zhang , Zezhi Wang , Zhibin Chen , Zhiqun Zhang
IPC: G06F9/54 , H04L51/224
CPC classification number: G06F9/542 , G06F9/546 , H04L51/224
Abstract: A message reminding method and a terminal device are provided. The method includes: A first application receives a first message sent by a second application. The first message includes an identifier of the second application. The second application is an application that receives a new message. The first application and the second application are applications in a system carried by a simulator. The first application sends a second message to a simulator application. The second message includes the identifier of the second application. The second message indicates the simulator to determine whether to perform reminding on the new message received by the second application. According to the method, reminding may be implemented when an application in the simulator receives a new message, so that a user can view and process the message.
-
公开(公告)号:US11924629B2
公开(公告)日:2024-03-05
申请号:US17245991
申请日:2021-04-30
Applicant: Huawei Technologies Co., Ltd.
IPC: H04L9/00 , H04L9/08 , H04L9/40 , H04W8/08 , H04W12/04 , H04W12/041 , H04W12/043 , H04W12/0431 , H04W12/0433 , H04W76/11 , H04W76/25 , H04W80/10 , H04W88/02
CPC classification number: H04W12/041 , H04L9/08 , H04L63/0869 , H04W8/08 , H04W12/04 , H04W12/043 , H04W12/0431 , H04W12/0433 , H04W76/11 , H04W76/25 , H04W80/10 , H04W88/023
Abstract: An anchor key generation method, device, and system, where the method includes generating, by a unified data management network element (UDM), an intermediate key based on a cipher key (CK), an integrity key (IK), and indication information regarding an operator; sending, by the UDM, the intermediate key to an authentication server function (AUSF); receiving, by the AUSF, the intermediate key; generating, by the AUSF, an anchor key based on the intermediate key; sending, by the AUSF, the anchor key to a security anchor function (SEAF); and generating, by the SEAF, a key (Kamf) based on the anchor key, where the Kamf is used to derive a 3rd Generation Partnership Project (3GPP) key.
-
公开(公告)号:US20240040376A1
公开(公告)日:2024-02-01
申请号:US18448235
申请日:2023-08-11
Applicant: Huawei Technologies Co., Ltd.
Inventor: Rong Wu , Bo Zhang , Shuaishuai Tan
IPC: H04W12/033 , H04L9/40 , H04W12/10 , H04W12/041
CPC classification number: H04W12/033 , H04L63/205 , H04W12/10 , H04W12/041
Abstract: A security negotiation method includes receiving, by a terminal, security negotiation information from a centralized unit control plane (CU-CP)/a centralized unit user plane (CU-UP), where the security negotiation information includes an integrity protection indication identifier of the CU-UP, and determining, by the terminal based on the integrity protection indication identifier, whether to enable user-plane integrity protection of the terminal.
-
公开(公告)号:US11082739B2
公开(公告)日:2021-08-03
申请号:US16585889
申请日:2019-09-27
Applicant: Huawei Technologies Co., Ltd.
Inventor: Bo Zhang
IPC: H04N21/4363 , H04N21/44 , H04N21/4385 , G06F5/06 , G06F5/14
Abstract: This application discloses a data flow control method and apparatus. The method includes: calculating, by a device when a clock signal arrives, a quantity of transition-minimized differential signaling (TMDS) characters currently stored in a buffer of the device; and outputting, by the device, the TMDS character in the buffer when the quantity of TMDS characters currently stored in the buffer reaches a preset value, or outputting a gap data packet when the quantity of TMDS characters currently stored in the buffer does not reach a preset value, where the preset value is less than or equal to a TMDS character storage capacity of the buffer.
-
公开(公告)号:US20210195409A1
公开(公告)日:2021-06-24
申请号:US17115179
申请日:2020-12-08
Applicant: Huawei Technologies Co., Ltd.
Inventor: Bo Zhang
Abstract: An identity information processing method, a device, and a system, the method including obtaining, by a first network element, a first parameter, where the first parameter is associated with a domain to which a network slice belongs, and determining, by the first network element, according to the first parameter, whether the network slice is managed by an operator.
-
公开(公告)号:US20210092608A1
公开(公告)日:2021-03-25
申请号:US17114812
申请日:2020-12-08
Applicant: Huawei Technologies Co., Ltd.
Abstract: A security context obtaining method includes: a first access and mobility management function (AMF) receiving a first registration request message sent by a user equipment (UE) and validating integrity protection for the first registration request message; if the first AMF successfully validates integrity protection for the first registration request message, sending, by the first AMF, a second request message to a second AMF; the second AMF receiving the second request message; and if the second request message carries indication information and the indication information is used to indicate that the UE is validated, sending, by the second AMF, a security context of the UE to the first AMF.
-
公开(公告)号:US10798752B2
公开(公告)日:2020-10-06
申请号:US15528303
申请日:2014-11-21
Applicant: Huawei Technologies Co., Ltd.
Inventor: Hui Jin , Bo Zhang , Xianglei Xin , Lei Fu , Xiaoyan Duan
IPC: H04W4/90 , H04W4/44 , H04W76/50 , H04W76/10 , H04M3/46 , H04W36/28 , G08B25/00 , G08B25/01 , H04M3/51 , H04W36/00 , H04W76/30
Abstract: A method includes: receiving an emergency call request; initiating, according to the emergency call request, n emergency calls by simultaneously using n call modes, where n is an integer not less than 2; and when a connection is established for one of the n emergency calls, releasing other emergency calls for which no connection has been established. By means of the embodiments of the present invention, multiple emergency calls may be simultaneously made, and when any one of the multiple emergency calls is connected, other emergency calls are released, reducing an emergency call time.
-
公开(公告)号:US10743368B2
公开(公告)日:2020-08-11
申请号:US16351772
申请日:2019-03-13
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Abstract: Embodiments of the present disclosure disclose a network roaming protection method and related device. The method includes: receiving, by a visited session management device, a first session establishment request that includes a first security requirement; obtaining, by the visited session management device, a target security policy, where the target security policy is obtained by processing the first security requirement set and a second security requirement set using a preset rule; and sending the target security policy to the UE instructing the UE to generate a target shared key based on a reference shared key and according to a rule defined by the target security policy, where the target shared key is used to protect secure end-to-end data transmission between the UE and the visited gateway.
-
公开(公告)号:US10588015B2
公开(公告)日:2020-03-10
申请号:US15197381
申请日:2016-06-29
Applicant: Huawei Technologies Co., Ltd.
Inventor: Bo Zhang , Chengdong He
Abstract: Embodiments of the present invention disclose a terminal authenticating method, including: receiving, by a UE-to-network relay UE-R, a first request message sent by user equipment UE; sending, by the UE-R, a second request message to a control network element according to the first request message sent by the UE; receiving, by the UE-R, an authentication request message sent by the control network element, and determining whether the authentication request message is for authenticating on the UE; if the authentication request message is for authenticating on the UE, sending, by the UE-R, an authentication request message to the UE; and receiving, by the UE-R, an authentication response message sent by the UE according to the authentication request message, and sending the authentication response message to the control network element.
-
公开(公告)号:US10588014B2
公开(公告)日:2020-03-10
申请号:US16409207
申请日:2019-05-10
Applicant: Huawei Technologies Co., Ltd.
Inventor: Rong Wu , Lu Gan , Bo Zhang , Shuaishuai Tan
Abstract: A security implementation method includes receiving, by a first network element, a request for handing over user equipment from a source access network device to a target access network device to perform communication. The method further includes obtaining, by the first network element, a security key, where the security key is used for protecting the communication between the user equipment and the target access network device after the user equipment is handed over from the source access network device to the target access network device, and sending, by the first network element, the security key to the target access network device.
-
-
-
-
-
-
-
-
-