SERVICE AUTHORIZATION METHOD AND SYSTEM, AND COMMUNICATION APPARATUS

    公开(公告)号:US20230396602A1

    公开(公告)日:2023-12-07

    申请号:US18452003

    申请日:2023-08-18

    CPC classification number: H04L63/0807 H04L63/102 H04L67/56

    Abstract: Embodiments of this application disclose a service authorization method and system, and a communication apparatus. The method includes: A first network element obtains a first access token from a token generation network element, and sends a first service request for a specified service to a second network element. The first service request includes the first access token. The first access token indicates that an NF service consumer network element has permission to access a specified service provided by an NF service producer network element belonging to a specified service domain. The first access token includes an identifier of the NF service consumer network element, an identifier of the specified service, and first service domain information associated with the specified service domain. The first service domain information is carried in the first access token, so that service domain-based access control can be implemented, thereby helping improve security of service authorization.

    COMMUNICATION METHOD, APPARATUS, AND SYSTEM
    12.
    发明公开

    公开(公告)号:US20230185910A1

    公开(公告)日:2023-06-15

    申请号:US18168228

    申请日:2023-02-13

    CPC classification number: G06F21/554 G06F2221/034

    Abstract: Embodiments of this application provide a communication method, apparatus, and system, to improve security of a V2X PC5 establishment procedure. The method includes: A first terminal device obtains a first security protection method, where the first security protection method is a security protection method determined in a discovery procedure between the first terminal device and a second terminal device; and the first terminal device determines a second security protection method according to the first security protection method, where the second security protection method is a security protection method for a PC5 connection between the first terminal device and the second terminal device. For example, a security level of the second security protection method is not lower than a security level of the first security protection method. The communication method is applicable to the V2X communication field.

    KEY MANAGEMENT METHOD AND COMMUNICATION APPARATUS

    公开(公告)号:US20230179400A1

    公开(公告)日:2023-06-08

    申请号:US18163980

    申请日:2023-02-03

    CPC classification number: H04L9/0819 H04W12/033 H04L9/0861 H04W4/06

    Abstract: Embodiments of this application provide a key management method and a communication apparatus, and relate to the field of communication technologies, to securely transmit multicast service data, and prevent an unauthorized terminal device from obtaining the multicast service data. The method includes: A terminal device obtains a target key, where the target key includes at least one of a target multimedia broadcast/multicast service service key MSK, a first sub-key corresponding to the target MSK, or a second sub-key corresponding to the target MSK, the first sub-key is for confidentiality protection calculation, and the second sub-key is for integrity protection calculation. The terminal device receives target data from a multicast user-plane processing network element, where the target data is data on which security protection is performed. Then, the terminal device processes the target data by using the target key.

    Subscription Information Configuration Method And Communications Device

    公开(公告)号:US20210136070A1

    公开(公告)日:2021-05-06

    申请号:US17148234

    申请日:2021-01-13

    Abstract: Example subscription information configuration methods and a communications device are described. One example method includes receiving a first device identifier by a network device from a first terminal device in a first access mode and receiving a second device identifier from a second terminal device in a second access mode. The network device determines whether the first device identifier matches the second device identifier to identify legality of the first terminal device. If the first device identifier matches the second device identifier, it indicates that the first terminal device is a legal terminal device. The network device sends subscription information of the first terminal device to the first terminal device in the first access mode, so that the first terminal device successfully accesses a network by using the subscription information.

    COMMUNICATION METHOD, COMMUNICATIONS APPARATUS, AND SYSTEM

    公开(公告)号:US20200228975A1

    公开(公告)日:2020-07-16

    申请号:US16834858

    申请日:2020-03-30

    Abstract: A communication method includes receiving, by an access network (AN) node, indication information from a mobility management device. The indication information is indicative of a security policy of a quality of service (QoS) flow. The method also includes obtaining, by the access network node based on the indication information, security information of a radio bearer corresponding to the QoS flow. The security information is indicative of a security policy of the radio bearer. The method further includes sending, by the access network node, an identifier of the radio bearer and the security information of the radio bearer to a terminal.

    METHOD AND DEVICE FOR VERIFYING KEY REQUESTER

    公开(公告)号:US20190320320A1

    公开(公告)日:2019-10-17

    申请号:US16453833

    申请日:2019-06-26

    Inventor: He LI Jing CHEN

    Abstract: A method and device for verifying a key requester are described. The method may include a security function entity receiving a request message sent by a user management function (UMF) entity. The method may also include decrypting information in the request message by using a private key of the security function entity, and obtaining the information carried in the request message after signature verification on decrypted information using a public key in a certificate of the UMF entity succeeds. Furthermore, the method may include determining to provide a key of a user equipment (UE) for the UMF entity, when determining that a first verification parameter carried in the request message is valid and determining that an identifier which is of the UMF entity and which is carried in the request message is the same as an identifier of a UMF entity to which the UE attaches.

    SECURITY PROTECTION METHOD, APPARATUS, AND SYSTEM

    公开(公告)号:US20230284103A1

    公开(公告)日:2023-09-07

    申请号:US18171198

    申请日:2023-02-17

    Inventor: He LI Jing CHEN

    Abstract: This application relates to the field of wireless communications technologies. Embodiments of this application provide a security protection method, an apparatus, and a system, to resolve a problem of low efficiency in handing over a terminal between serving base stations. The method in this application includes: receiving, by a target access network device, a correspondence between user plane information and a security policy from a source access network device; and determining, by the target access network device based on the correspondence between user plane information and a security policy, a first user plane protection algorithm corresponding to the user plane information, where the first user plane protection algorithm includes one or both of a user plane encryption algorithm and a user plane integrity protection algorithm. This application is applicable to a procedure in which the terminal is handed over between serving base stations.

    SECURE COMMUNICATION METHOD AND APPARATUS
    18.
    发明公开

    公开(公告)号:US20230188997A1

    公开(公告)日:2023-06-15

    申请号:US18164131

    申请日:2023-02-03

    Abstract: A secure communication method and apparatus are disclosed, to ensure security of a direct communication between terminal devices. In this application, a first terminal device may receive a key generation parameter from a first network element, where the key generation parameter includes a ProSe temporary identity of the first terminal device. Then, the first terminal device may generate a first discovery key based on the key generation parameter. The first terminal device sends a ProSe request message, where the ProSe request message includes the ProSe temporary identity and a message integrity code, and the message integrity code is generated based on the discovery key. The second terminal device receives the ProSe request message, and verifies the first terminal device based on the message integrity code, to ensure the security of a direct communication between the first terminal device and the second terminal device.

    COMMUNICATION METHOD AND APPARATUS
    19.
    发明公开

    公开(公告)号:US20230188976A1

    公开(公告)日:2023-06-15

    申请号:US18166140

    申请日:2023-02-08

    CPC classification number: H04W12/033 H04W12/106 H04W80/02

    Abstract: Embodiments of this application provide a communication method and an apparatus, to ensure a multicast service data packet transmission security requirement. An access device may determine a user plane security active state of a multicast DRB in a PDU session, and indicate the user plane security active state of the multicast DRB to a terminal, where the user plane security active state includes whether integrity protection is activated and/or whether confidentiality protection is activated. In addition, the access device configures a multicast PDCP layer entity based on the user plane security active state of the DRB for transmitting multicast service data. The access device may further determine a user plane security active state of a unicast DRB, indicate the user plane security active state to the terminal, and modify a unicast PDCP layer entity.

    METHOD, SYSTEM, AND APPARATUS FOR DETERMINING USER PLANE SECURITY ALGORITHM

    公开(公告)号:US20230179997A1

    公开(公告)日:2023-06-08

    申请号:US18164697

    申请日:2023-02-06

    CPC classification number: H04W12/033 H04W12/037

    Abstract: A method for determining a user plane security algorithm, a system, and an apparatus. The method may include: a second device selects a non-null user plane confidentiality protection algorithm based on a security capability of a first device and a security capability of the second device in a case in which user plane confidentiality protection between the second device and the first device is enabled and control plane confidentiality protection between the second device and the first device is not enabled. The second device sends a first message to the first device. The first message includes first algorithm indication information indicating the user plane confidentiality protection algorithm. Therefore, the first device can obtain the non-null user plane confidentiality protection algorithm. Embodiments can be adopted to determine an effective user plane confidentiality protection algorithm, for confidentiality protecting user plane data.

Patent Agency Ranking