H04W12/10

Registration method and apparatus based on service-based architecture

Embodiments of this application provide a registration method and apparatus based on a service-based architecture. In this method, a management network element determines configuration information of a function network element, where the configuration information includes a security parameter; and the management network element sends the configuration information to the function network element. The function network element receives the configuration information sent by the management network element; and the function network element sends a registration request to a control network element based on the configuration information, where the registration request includes the security parameter. The control network element receives the registration request sent by the function network element, where the registration request includes the security parameter; and the control network element verifies correctness of the security parameter, and determines validity of the registration request based on the correctness of the security parameter.

Computer system and device for controlling use of secure media recordings

A network system is provided that enables a user to record media in connection with a user operating a service application to participate in a transport service. In examples, the network system includes a user computing device on which media is recorded and stored in an unrenderable state. The user can elect to make a media recording submission for a particular service activity (e.g., trip provided or received by user). In response to the media recording submission, the user computing device identifies one or more media files that contain media data which depict the service activity. The identified media files are transmitted to a service computing system where the media files can be rendered.

METHOD, ELECTRONIC IDENTITY OBJECT, AND TERMINAL FOR RECOGNIZING AND/OR IDENTIFYING A USER
20230094432 · 2023-03-30 ·

A method for recognizing and/or identifying a user (9) with a chip (C) in an electronic identity object storing a digital identity (24), the method comprising steps of: —establishing a wireless or electrical connection between the electronic identity object (C) and a verification terminal (T); —verifying, in the electronic identity object, if the verification terminal is authorized to communicate with the electronic identity object (C), and in response of a positive verification sharing a secret (K): using the shared secret (K) for establishing an encrypted symmetric data link (5) between the electronic identity object and the verification terminal (T); transmitting, through the encrypted data link (5), said digital identity (24) stored in the electronic identity object to the verification terminal (T); and verifying in the verification terminal (T) the authenticity of said digital identity (24).

Handover handling method and apparatus
11576092 · 2023-02-07 · ·

A handover handling method and apparatus applied to a scenario in which user equipment (UE) is handed over from a first access and management function (AMF) to a second AMF, and where the method includes receiving, by the UE, a handover command message from a first access network device, wherein the handover command message carries a Non-Access Stratum container (NASC), performing, by the UE, integrity verification on the NASC, and continuing, by the UE, to use a first NAS security context when the integrity verification performed on the NASC fails, wherein the first NAS security context is a security context used between the UE and the first AMF.

Handover handling method and apparatus
11576092 · 2023-02-07 · ·

A handover handling method and apparatus applied to a scenario in which user equipment (UE) is handed over from a first access and management function (AMF) to a second AMF, and where the method includes receiving, by the UE, a handover command message from a first access network device, wherein the handover command message carries a Non-Access Stratum container (NASC), performing, by the UE, integrity verification on the NASC, and continuing, by the UE, to use a first NAS security context when the integrity verification performed on the NASC fails, wherein the first NAS security context is a security context used between the UE and the first AMF.

Distributed Content Uploading and Validation
20230035103 · 2023-02-02 ·

In accordance with one or more embodiments, aspects of the disclosure provide efficient, effective, and convenient ways of uploading and authenticating content. In particular, a user device may receive validating information from a wireless networking device. The user or client device may record a content item, and may insert a validation tag based on the validating information. The user or client device may then send the content item to the wireless networking device. The wireless networking device may receive the content item at a first location and may determine the validity of the content item based on the validating information. The user device may continually interact with wireless networking devices as it travels to continually upload content items while establishing the validity of the time and location of the content items.

Distributed Content Uploading and Validation
20230035103 · 2023-02-02 ·

In accordance with one or more embodiments, aspects of the disclosure provide efficient, effective, and convenient ways of uploading and authenticating content. In particular, a user device may receive validating information from a wireless networking device. The user or client device may record a content item, and may insert a validation tag based on the validating information. The user or client device may then send the content item to the wireless networking device. The wireless networking device may receive the content item at a first location and may determine the validity of the content item based on the validating information. The user device may continually interact with wireless networking devices as it travels to continually upload content items while establishing the validity of the time and location of the content items.

TERMINAL APPARATUS, BASE STATION APPARATUS, AND METHOD
20230030653 · 2023-02-02 ·

A terminal apparatus for communicating with a base station apparatus includes a receiver configured to receive, from the base station apparatus, an RRC reconfiguration message including a first configuration related to a radio bearer to which a Dual Active Protocol Stack (DAPS) is applied, and a processing unit configured to perform configuration in accordance with the RRC reconfiguration message. In a case that a first timer expires, that no radio link failure is detected in a source primary cell, and that the first configuration is performed on any radio bearer, the processing units releases a configuration for a target primary cell, resets MAC for the target primary cell, discards all data of a PDCP entity for a SRB of the source primary cell, discards all data of an RLC entity for the SRB of the source primary cell, resumes the SRB suspended in the source primary cell, and transmits, to the base station apparatus, an RRC message for notifying that a DAPS handover is unsuccessful.

Methods providing NAS connection identifications and related wireless terminals and network nodes

A method at a UE may include providing a first NAS connection with a network node through a first access node, wherein a first NAS CID is associated with the first NAS connection. While providing the first NAS connection, a second NAS CID may be allocated for a second NAS connection with the network node through a second access node. A registration request message may be transmitted to the network node to request the second NAS connection, wherein transmitting the registration request message includes performing integrity protection for the registration request message using the second NAS CID. A security mode command message may be received from the network node, wherein the security mode command message corresponds to the registration request message. Responsive to receiving the security mode command message, a security mode complete message may be transmitted to the network node through the second access node.

NODE HANDOVER METHOD AND APPARATUS
20230034534 · 2023-02-02 ·

Embodiments of this application provide a node handover method and an apparatus. A source secondary node receives first handover information and determines to perform an uninterrupted node handover. The source secondary node performs, in a process of the uninterrupted node handover, first processing on first data received by the source secondary node, to obtain second data, and sends the second data to a terminal device. The source secondary node performs second processing on the first data to obtain third data in the process of the uninterrupted node handover, and sends fourth data to the terminal device via a target secondary node. According to some embodiments provided in this application, a communication delay of the terminal device can be reduced, and user experience of the terminal device can be improved.