白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Data transmission system and method, and apparatus thereof

專利號(hào)
US11997491B2
公開(kāi)日期
2024-05-28
申請(qǐng)人
Huawei Technologies Co., Ltd.(CN Shenzhen)
發(fā)明人
Longhua Guo; He Li; Jing Chen
IPC分類(lèi)
H04W12/104; H04W4/029
技術(shù)領(lǐng)域
privacy,gmlc,location,ue,udm,setting,amf,data,message,network
地域: Shenzhen

摘要

A data transmission method includes calculating, by a user equipment (UE), a first message authentication code of first location privacy setting data, sending, by the UE, the first message authentication code and the first location privacy setting data to a data management network element, receiving, by the UE, a second message authentication code from the data management network element, calculating, by the UE, a third message authentication code of the first location privacy setting data, determining, by the UE, that the first location privacy setting data is not tampered with when the second message authentication code is the same as the third message authentication code.

說(shuō)明書(shū)

A freshness parameter is used to protect a network from a low-altitude replay attack. In the embodiments of this application, the freshness parameter is used to calculate a message authentication code and perform digital signing.

A message authentication code is applied to the embodiments of this application, and is used to check whether location privacy setting data is tampered with.

A counter value is a type of freshness parameter, and is used to indicate a quantity of times of sending a specific message.

A function counter (FC) value is a type of freshness parameter, and different counter values are allocated to messages based on functions.

The following describes in detail the data communication method provided in the embodiments of this application. It should be noted that FIG. 5A and FIG. 5B, FIG. 5C and FIG. 5D, and FIG. 6A and FIG. 6B to FIG. 8A and FIG. 8B are described by using a roaming scenario as an example. When the embodiments shown in FIG. 5A and FIG. 5B, FIG. 5C and FIG. 5D, and FIG. 6A and FIG. 6B to FIG. 8A and FIG. 8B are described, an access network between UE and an AMF is omitted. In actual application, there is an access network between the UE and the AMF.

權(quán)利要求

1
微信群二維碼
意見(jiàn)反饋