US 12,328,577 B2
Subscription information processing method and apparatus, and device
Shikun Li, Shanghai (CN); Li Hu, Shanghai (CN); Weisheng Jin, Shanghai (CN); and Zhengyang Zeng, Shanghai (CN)
Assigned to HUAWEI TECHNOLOGIES CO., LTD., Shenzhen (CN)
Filed by HUAWEI TECHNOLOGIES CO., LTD., Shenzhen (CN)
Filed on May 24, 2022, as Appl. No. 17/752,337.
Application 17/752,337 is a continuation of application No. PCT/CN2020/103739, filed on Jul. 23, 2020.
Claims priority of application No. 201911176692.4 (CN), filed on Nov. 26, 2019.
Prior Publication US 2022/0286855 A1, Sep. 8, 2022
Int. Cl. H04W 12/08 (2021.01); H04W 8/18 (2009.01); H04W 12/71 (2021.01); H04W 12/72 (2021.01)
CPC H04W 12/08 (2013.01) [H04W 8/18 (2013.01); H04W 12/71 (2021.01); H04W 12/72 (2021.01)] 15 Claims
OG exemplary drawing
 
1. A subscription information processing method, wherein the method comprises:
obtaining, by an access control device, authorization information from a target network device, wherein the authorization information comprises an identifier of a first terminal and authorization operation indication information for subscription information of the first terminal;
obtaining, by the access control device, a subscription information processing request from a second terminal, wherein the subscription information processing request comprises an identifier of the second terminal;
processing, by the access control device, subscription information corresponding to the identifier of the second terminal based on the authorization operation indication information in response to the identifier of the first terminal matching the identifier of the second terminal, wherein the subscription information corresponding to the identifier of the second terminal is prestored in the access control device, the identifier of the first terminal matching the identifier of the second terminal indicating the first terminal and the second terminal are the same; and
performing, by the access control device, identity authentication on the second terminal, wherein the performing identity authentication on the second terminal comprises:
sending, by the access control device, a first challenge value and a second random number to the second terminal, wherein the first challenge value is calculated by the access control device based on a first key value and a first random number that is from the second terminal, and the first key value is determined by the access control device based on the identifier of the second terminal.
 
8. An access control device, comprising:
a processor; and
a memory coupled to the processor, the memory comprising instructions that, in response to being executed by the processor, cause the access control device to perform a method comprising:
obtaining, authorization information from a target network device, wherein the authorization information comprises an identifier of a first terminal and authorization operation indication information for subscription information of the first terminal;
obtaining, a subscription information processing request from a second terminal, wherein the subscription information processing request comprises an identifier of the second terminal; and
processing, subscription information corresponding to the identifier of the second terminal based on the authorization operation indication information in response to the identifier of the first terminal matching the identifier of the second terminal, wherein the subscription information corresponding to the identifier of the second terminal is prestored in the access control device, the identifier of the first terminal matching the identifier of the second terminal indicating the first terminal and the second terminal are the same; and
performing, identity authentication on the second terminal, wherein the performing, identity authentication on the second terminal comprises:
sending, a first challenge value and a second random number to the second terminal, wherein the first challenge value is calculated by the access control device based on a first key value and a first random number that is from the second terminal, and the first key value is determined by the access control device based on the identifier of the second terminal.
 
15. A non-transitory computer-readable storage medium having computer-readable instructions stored thereon, wherein in response to the computer-readable instructions being executed by a processor causes the processor to perform a method comprising:
obtaining, by an access control device, authorization information from a target network device, wherein the authorization information comprises an identifier of a first terminal and authorization operation indication information for subscription information of the first terminal;
obtaining, by the access control device, a subscription information processing request from a second terminal, wherein the subscription information processing request comprises an identifier of the second terminal;
processing, by the access control device, subscription information corresponding to the identifier of the second terminal based on the authorization operation indication information in response to the identifier of the first terminal matching the identifier of the second terminal, wherein the subscription information corresponding to the identifier of the second terminal is prestored in the access control device, the identifier of the first terminal matching the identifier of the second terminal indicating the first terminal and the second terminal are the same; and
performing, identity authentication on the second terminal, wherein the performing, identity authentication on the second terminal comprises:
sending, a first challenge value and a second random number to the second terminal, wherein the first challenge value is calculated by the access control device based on a first key value and a first random number that is from the second terminal, and the first key value is determined by the access control device based on the identifier of the second terminal.