H04W12/106

System and method of cryptographically signing web applications
11496321 · 2022-11-08 · ·

Embodiments disclosed herein provide a method that includes receiving, at a client-side web browser, a minimal bootstrap payload from an application server; storing, by a client-side processor, the minimal bootstrap payload in a client-side local cache, where the locally cached minimal bootstrap payload is executed by the client-side processor before executing an application from the application server; the minimal bootstrap payload includes at least one public key and at least one Uniform Resource Location (URL) address of an application code payload.

System and method of cryptographically signing web applications
11496321 · 2022-11-08 · ·

Embodiments disclosed herein provide a method that includes receiving, at a client-side web browser, a minimal bootstrap payload from an application server; storing, by a client-side processor, the minimal bootstrap payload in a client-side local cache, where the locally cached minimal bootstrap payload is executed by the client-side processor before executing an application from the application server; the minimal bootstrap payload includes at least one public key and at least one Uniform Resource Location (URL) address of an application code payload.

Non-Transitory Computer-Readable Medium Storing Computer-Readable Instructions for Terminal Device and Terminal Device
20230101277 · 2023-03-30 ·

A terminal device may obtain a public key and target identification information from a communication device, search for the communication device via a wireless interface of the terminal device, based on the target identification information and a result of the search for the communication device, determine whether the communication device is to establish a wireless connection with an external device or with the terminal device, in a case where it is determined that the communication device is to establish the wireless connection with the external device, send first connection information to the communication device, in a case where it is determined that the communication device is to establish the wireless connection with the terminal device, send second connection information different from the first connection information to the communication device, establish the wireless connection with the communication device via the wireless interface by using the second connection information.

Handover handling method and apparatus
11576092 · 2023-02-07 · ·

A handover handling method and apparatus applied to a scenario in which user equipment (UE) is handed over from a first access and management function (AMF) to a second AMF, and where the method includes receiving, by the UE, a handover command message from a first access network device, wherein the handover command message carries a Non-Access Stratum container (NASC), performing, by the UE, integrity verification on the NASC, and continuing, by the UE, to use a first NAS security context when the integrity verification performed on the NASC fails, wherein the first NAS security context is a security context used between the UE and the first AMF.

METHOD AND APPARATUS FOR TRANSMITTING DATA UNIT BASED ON SELECTIVELY APPLIED INTEGRITY PROTECTION IN WIRELESS COMMUNICATION SYSTEM
20230096809 · 2023-03-30 ·

The present invention relates to a method of transmitting a protocol data unit (PDU) by a user equipment (UE) in a wireless communication system. Especially, the method includes the steps of receiving a service data unit (SDU) from an upper layer; generating the PDU including the SDU and an integrity protection indicator, based on whether to perform integrity protection for the SDU or not; and transmitting the PDU to a network, wherein, when the integrity protection for the SDU is performed, a Message Authentication Code-Integrity (MAC-I) is included at an end of the PDU and the integrity protection indicator represents that the SDU is integrity protected, wherein, when the integrity protection for the SDU is not performed, the MAC-I is not included in the PDU and the integrity protection indicator represents that the SDU is not integrity protected.

METHOD AND APPARATUS FOR TRANSMITTING DATA UNIT BASED ON SELECTIVELY APPLIED INTEGRITY PROTECTION IN WIRELESS COMMUNICATION SYSTEM
20230096809 · 2023-03-30 ·

The present invention relates to a method of transmitting a protocol data unit (PDU) by a user equipment (UE) in a wireless communication system. Especially, the method includes the steps of receiving a service data unit (SDU) from an upper layer; generating the PDU including the SDU and an integrity protection indicator, based on whether to perform integrity protection for the SDU or not; and transmitting the PDU to a network, wherein, when the integrity protection for the SDU is performed, a Message Authentication Code-Integrity (MAC-I) is included at an end of the PDU and the integrity protection indicator represents that the SDU is integrity protected, wherein, when the integrity protection for the SDU is not performed, the MAC-I is not included in the PDU and the integrity protection indicator represents that the SDU is not integrity protected.

METHOD AND APPARATUS FOR PROCESSING DOWNLINK DATA, AND TERMINAL
20230095930 · 2023-03-30 · ·

A downlink data processing method includes: receiving predetermined downlink data; verifying the downlink data and processing the downlink data based on a verification result.

ELECTRONIC DEVICE FOR PERFORMING EDGE COMPUTING SERVICE, AND OPERATING METHOD OF ELECTRONIC DEVICE

An electronic device and an operating method of an electronic device are provided. The electronic device receives, from a first server, access information about a second server for accessing the second server, receives access information about a third server from the second server accessed based on the access information about the second server, in response to a service connection request using the third server of an application, checks the validity of the application based on data for verifying the validity of the application included in the access information about the third server, and performs the service by accessing the third server based on the result of identifying the validity of the application.

SLICE SERVICE VERIFICATION METHOD AND APPARATUS
20230102604 · 2023-03-30 ·

Embodiments of this application disclose a slice service verification method and apparatus, to improve network security. The method in embodiments of this application includes: A slice service verification function entity receives a first message sent by a terminal device, where the first message carries an identifier of a first network slice and a first message authentication code, and the first message authentication code is calculated based on a first network identifier. The slice service verification function entity verifies the first message authentication code based on a second network identifier. The slice service verification function entity sends the second network identifier to an authentication server when the verification succeeds.

SLICE SERVICE VERIFICATION METHOD AND APPARATUS
20230102604 · 2023-03-30 ·

Embodiments of this application disclose a slice service verification method and apparatus, to improve network security. The method in embodiments of this application includes: A slice service verification function entity receives a first message sent by a terminal device, where the first message carries an identifier of a first network slice and a first message authentication code, and the first message authentication code is calculated based on a first network identifier. The slice service verification function entity verifies the first message authentication code based on a second network identifier. The slice service verification function entity sends the second network identifier to an authentication server when the verification succeeds.