白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Data transmission system and method, and apparatus thereof

專利號
US11997491B2
公開日期
2024-05-28
申請人
Huawei Technologies Co., Ltd.(CN Shenzhen)
發(fā)明人
Longhua Guo; He Li; Jing Chen
IPC分類
H04W12/104; H04W4/029
技術(shù)領(lǐng)域
privacy,gmlc,location,ue,udm,setting,amf,data,message,network
地域: Shenzhen

摘要

A data transmission method includes calculating, by a user equipment (UE), a first message authentication code of first location privacy setting data, sending, by the UE, the first message authentication code and the first location privacy setting data to a data management network element, receiving, by the UE, a second message authentication code from the data management network element, calculating, by the UE, a third message authentication code of the first location privacy setting data, determining, by the UE, that the first location privacy setting data is not tampered with when the second message authentication code is the same as the third message authentication code.

說明書

The location service request includes action indication information, the digital signature data, and the second counter value.

In non-roaming scenarios, a GMLC directly sends the location service request to the AMF. Correspondingly, the AMF receives the location service request from the GMLC. The location service request includes action indication information, the digital signature data, and the second counter value.

Step S407: The AMF determines whether the digital signature data matches the action indication information.

The AMF determines, based on a public key of the UDM and the second counter value, whether the digital signature data matches the action indication information, that is, de-signs the digital signature data by using the public key of the UDM and the second counter value. If first location privacy setting data obtained through de-signing matches a location service operation indicated by the action indication information, the digital signature data matches the action indication information, and the action indication information delivered by the GMLC is not maliciously modified. If the digital signature data does not match the action indication information, it indicates that the action indication information delivered by the GMLC is maliciously modified.

The AMF may obtain the public key of the UDM. For example, when obtaining the first location privacy setting data from the UDM, the AMF may obtain the public key of the UDM. A specific manner in which the AMF obtains the public key of the UDM is not limited in this embodiment of this application.

Step S408: If the UE is in an idle mode, the AMF triggers a network side service request to the UE.

權(quán)利要求

1
微信群二維碼
意見反饋