H04W12/06

PERSONAL EMULATING DEVICE FOR EMULATING GLOBAL PHONE COMMUNICATION AS DOMESTIC MOBILE COMMUNICATION
20230048238 · 2023-02-16 ·

A personal emulating device for emulating global phone communication as domestic mobile communication comprises a Universal Subscriber Identity Module (USIM) authentication unit, an information confirmation unit, an authentication processing unit, and a linking unit. The USIM authentication unit includes: a USIM interface unit which interfaces with a USIM of a designated standard; an antenna unit which transmits and receives radio frequency signals of a designated mobile communication standard to and from a base station in a mobile communication network corresponding to the USIM interfaced to the USIM interface unit; and a radio unit which performs a signal processing operation for transmitting and receiving the radio frequency signals of the designated mobile communication standard to and from the base station in the mobile communication network corresponding to the USIM interfaced to the USIM interface unit.

BLUETOOTH DEVICE AND BLUETOOTH GATEWAY
20230049341 · 2023-02-16 ·

A Bluetooth device (702) is disclosed, the Bluetooth device being provisioned with a security credential (710) that is shared with an authentication server (706). The Bluetooth device comprises processing circuitry configured to use a Bluetooth pairing mechanism to establish a pairing with a Bluetooth gateway (704a-c) by establishing a shared secret key with the Bluetooth gateway and to perform an Extensible Authentication Protocol (EAP) authentication method towards the authentication server using the security credential, wherein performing the EAP authentication method comprises using the paired Bluetooth gateway to forward messages to and from the authentication server. The processing circuitry is further configured to bind the pairing established with the paired Bluetooth gateway to the performed EAP authentication method. Also disclosed are a Bluetooth gateway and methods performed by a Bluetooth device and a Bluetooth gateway.

SLICE AUTHENTICATION METHOD AND APPARATUS
20230048066 · 2023-02-16 ·

This application provides a slice authentication method and an apparatus. One example method includes: initiating, by a first network function (NF), slice authentication between a terminal device and an authentication server for a slice; sending, by the first NF, identification information of a first network, identification information of the slice, and identification information of the terminal device to the authentication server, wherein the first NF is an NF in the first network; and receiving, by the first NF, a slice authentication result for the slice, the identification information of the slice, and the identification information of the terminal device from the authentication server.

SLICE AUTHENTICATION METHOD AND APPARATUS
20230048066 · 2023-02-16 ·

This application provides a slice authentication method and an apparatus. One example method includes: initiating, by a first network function (NF), slice authentication between a terminal device and an authentication server for a slice; sending, by the first NF, identification information of a first network, identification information of the slice, and identification information of the terminal device to the authentication server, wherein the first NF is an NF in the first network; and receiving, by the first NF, a slice authentication result for the slice, the identification information of the slice, and the identification information of the terminal device from the authentication server.

AUTHENTICATION EVENT PROCESSING METHOD, APPARATUS, AND SYSTEM
20230048268 · 2023-02-16 ·

Embodiments of this application disclose example authentication event processing methods and apparatuses. One example method includes receiving, by a unified data management network element, a second authentication event processing request from an authentication server network element. The unified data management network element can then query an authentication event corresponding to the second information. The unified data management network element can then process the authentication event. The unified data management network element can then send a third authentication event processing request to a unified data repository network element. The unified data management network element can then receive a third authentication event processing response from the unified data repository network element. The unified data management network element can then send a second authentication event processing response to the authentication server network element.

AUTHENTICATION EVENT PROCESSING METHOD, APPARATUS, AND SYSTEM
20230048268 · 2023-02-16 ·

Embodiments of this application disclose example authentication event processing methods and apparatuses. One example method includes receiving, by a unified data management network element, a second authentication event processing request from an authentication server network element. The unified data management network element can then query an authentication event corresponding to the second information. The unified data management network element can then process the authentication event. The unified data management network element can then send a third authentication event processing request to a unified data repository network element. The unified data management network element can then receive a third authentication event processing response from the unified data repository network element. The unified data management network element can then send a second authentication event processing response to the authentication server network element.

INFORMATION PROCESSING METHOD AND APPARATUS BASED ON FACE RECOGNITION, STORAGE MEDIUM, AND TERMINAL
20230050957 · 2023-02-16 ·

A method includes: in response to detecting a communication connection between the electronic device and the user equipment, obtaining a user instruction transmitted to the user equipment, the user instruction including at least one preset parameter for setting an interface feature of a target logical interface on the electronic device. The target logical interface is used for verifying an identity of a user. The method includes generating the target logical interface, by setting the interface feature based on the user instruction on the electronic device; obtaining verification information of a user; collecting a face image of the current user through the target logical interface; and verifying an identity of the current user based on the face image and the verification information.

INFORMATION PROCESSING METHOD AND APPARATUS BASED ON FACE RECOGNITION, STORAGE MEDIUM, AND TERMINAL
20230050957 · 2023-02-16 ·

A method includes: in response to detecting a communication connection between the electronic device and the user equipment, obtaining a user instruction transmitted to the user equipment, the user instruction including at least one preset parameter for setting an interface feature of a target logical interface on the electronic device. The target logical interface is used for verifying an identity of a user. The method includes generating the target logical interface, by setting the interface feature based on the user instruction on the electronic device; obtaining verification information of a user; collecting a face image of the current user through the target logical interface; and verifying an identity of the current user based on the face image and the verification information.

APPARATUS, METHOD, AND COMPUTER PROGRAM
20230052658 · 2023-02-16 ·

The disclosure relates to a first apparatus comprising at least one processor and at least one memory including computer code for one or more programs, the at least one memory and the computer code configured, with the at least one processor, to cause the apparatus at least to: send (500), to a second apparatus, a request comprising information indicating a list of public land mobile network identifiers identifying a first public land mobile network supported by the first apparatus, and information to derive a second public land mobile network supported by the second apparatus; and receive (502), from the second apparatus, a response comprising information indicating a list of public land mobile network identifiers identifying the second public land mobile network supported by the second apparatus.

Method for Authentic Data Transmission Between Control Devices of a Vehicle, Arrangement with Control Devices, Computer Program, and Vehicle

A method is disclosed for authentic data transmission between control devices of a vehicle in which messages which are sent from a first control device to a receiver control device and are provided with a first cryptographic key for authentication, and messages that are sent from a second control device to the receiver control device are provided with a second cryptographic key for authentication. First status information provided with a third cryptographic key is sent from a monitoring module of the first control device to the receiver control device and second status information provided with the second cryptographic key is sent from the second control device to the receiver control device. The first status information and second status information are received by the receiver control device. The received first and second status information is evaluated to detect a manipulation of the first control device.