The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Dec. 02, 2025

Filed:

Apr. 29, 2021
Applicant:

China Telecom Corporation Limited, Beijing, CN;

Inventors:

Xiaoyin Zhao, Beijing, CN;

Weiliang Xie, Beijing, CN;

Assignee:
Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
H04M 1/66 (2006.01); H04W 12/041 (2021.01); H04W 12/108 (2021.01);
U.S. Cl.
CPC ...
H04W 12/108 (2021.01); H04W 12/041 (2021.01);
Abstract

This disclosure discloses a configuration method, a configuration device, and a configuration system of security mode and a computer readable storage medium, relating to mobile communications technologies. The configuration method of security mode includes: acquiring an integrity protection algorithm, an encryption algorithm, an original key and an operator identification of a core network from the core network, wherein the original key is also sent to a user to start a security mode, the core network is a core network of a first operator or a second operator, and the first operator and the second operator use a same shared carrier in a co-construction and sharing base station; determining a key generation algorithm preset by an operator to which the user belongs according to the operator identification; generating an integrity protection key and an encryption key of the user according to the key generation algorithm and the original key; and sending a security mode command to a terminal of the user, wherein the security mode command comprises verification information encrypted by the integrity protection key of the user, the integrity protection algorithm and the encryption algorithm, and the terminal has the key generation algorithm preset by the operator to which the user belongs.


Find Patent Forward Citations

Loading…