User Authentication Method and Apparatus
    11.
    发明申请

    公开(公告)号:US20200029217A1

    公开(公告)日:2020-01-23

    申请号:US16588599

    申请日:2019-09-30

    Inventor: Jing Chen Kai Pan He Li

    Abstract: This application provides a user authentication method and an apparatus. Before establishing, for a terminal device, a session used to transmit service data, an SMF entity receives a session establishment request message; determines, based on the session establishment request message, to perform user authentication on a user using the terminal device; and sends a session establishment message to a UPF entity, where the session establishment message is used to establish a first session for the terminal device, and a session attribute of the first session is: a session used to transmit only a user authentication message. Subsequently, the terminal device and an AAA server transmit the user authentication message through the first session, to complete user authentication.

    SECURITY PROTECTION METHOD AND APPARATUS
    12.
    发明申请

    公开(公告)号:US20190274051A1

    公开(公告)日:2019-09-05

    申请号:US16404163

    申请日:2019-05-06

    Inventor: He Li Jing Chen

    Abstract: A security protection method and an apparatus to implement security protection for a plurality of non-access stratum (NAS) connection links. The method includes determining, by a terminal, a first parameter, where the first parameter is used to indicate an access technology used to transmit a non-access stratum NAS message. The terminal can support at least two access technologies, and can separately maintain a corresponding NAS COUNT for each of the at least two access technologies. The method further includes performing, by the terminal, security protection on the NAS message based on the first parameter, a NAS key, and a NAS COUNT corresponding to an access technology used to transmit the NAS message. This application is applicable to a process of performing security protection on a NAS message.

    Security protection method, apparatus, and system

    公开(公告)号:US12127049B2

    公开(公告)日:2024-10-22

    申请号:US18171198

    申请日:2023-02-17

    Inventor: He Li Jing Chen

    Abstract: This application relates to the field of wireless communications technologies. Embodiments of this application provide a security protection method, an apparatus, and a system, to resolve a problem of low efficiency in handing over a terminal between serving base stations. The method in this application includes: receiving, by a target access network device, a correspondence between user plane information and a security policy from a source access network device; and determining, by the target access network device based on the correspondence between user plane information and a security policy, a first user plane protection algorithm corresponding to the user plane information, where the first user plane protection algorithm includes one or both of a user plane encryption algorithm and a user plane integrity protection algorithm. This application is applicable to a procedure in which the terminal is handed over between serving base stations.

    COMMUNICATION METHOD AND APPARATUS
    15.
    发明公开

    公开(公告)号:US20240305983A1

    公开(公告)日:2024-09-12

    申请号:US18666841

    申请日:2024-05-17

    CPC classification number: H04W12/06 H04W12/047 H04W12/72

    Abstract: This application provides a communication method and apparatus, and relates to the communication field, to ensure proximity based service relay communication security. In the method, proximity based service authentication information #1 provided by a data management network element is used, so that a remote terminal and a network may authenticate each other and generate a proximity based service key used for communication between the remote terminal and a relay terminal. Further, the remote terminal device and the relay terminal device derive a communication protection key for a PC5 connection (namely, a connection between the remote terminal and the relay terminal) based on the proximity based service key, which may include at least one of an encryption key and an integrity protection key, so that proximity based service relay communication security is ensured, and a case such as user information leakage caused by an attack is avoided.

    COMMUNICATION METHOD AND APPARATUS
    16.
    发明公开

    公开(公告)号:US20240244436A1

    公开(公告)日:2024-07-18

    申请号:US18620252

    申请日:2024-03-28

    Inventor: Li Hu He Li Rong Wu

    CPC classification number: H04W12/106 H04W12/041 H04W12/69

    Abstract: This application provides a communication method and apparatus, to implement on-demand user plane integrity protection in a 4G network. The method includes: When a first condition is met, an access network device of a first network standard obtains user plane integrity protection indication information and an integrity protection algorithm identifier of a second network standard, sends a first message including the user plane integrity protection indication information and the integrity protection algorithm identifier to a terminal device, and activates user plane integrity protection for a first DRB based on a first key and the integrity protection algorithm. The first condition includes: determining to establish the first DRB between the access network device and the terminal device, and determining to enable the user plane integrity protection for the first DRB. The user plane integrity protection indication information indicates to enable the user plane integrity protection for the first DRB.

    COMMUNICATION METHOD AND APPARATUS
    17.
    发明公开

    公开(公告)号:US20240214365A1

    公开(公告)日:2024-06-27

    申请号:US18452575

    申请日:2023-08-21

    Inventor: He Li Ao Lei Rong Wu

    CPC classification number: H04L63/08

    Abstract: This application provides a communication method and apparatus. The method includes: A first network element receives a first request message from a second network element, where the first request message is used to request to perform a first operation on a first terminal device. The first network element determines, based on the first request message, whether the second network element is authorized to request to perform the first operation on the first terminal device. Whether a network element that sends a request message is authorized to request to perform a related operation is verified, to determine whether the network element is an attacker. This reduces impact on a system service resulting from requests of an attacker and improves system security.

    Data transmission system and method, and apparatus thereof

    公开(公告)号:US11997491B2

    公开(公告)日:2024-05-28

    申请号:US17380455

    申请日:2021-07-20

    CPC classification number: H04W12/104 H04W4/029

    Abstract: A data transmission method includes calculating, by a user equipment (UE), a first message authentication code of first location privacy setting data, sending, by the UE, the first message authentication code and the first location privacy setting data to a data management network element, receiving, by the UE, a second message authentication code from the data management network element, calculating, by the UE, a third message authentication code of the first location privacy setting data, determining, by the UE, that the first location privacy setting data is not tampered with when the second message authentication code is the same as the third message authentication code.

    Subscription information configuration method and communications device

    公开(公告)号:US11930008B2

    公开(公告)日:2024-03-12

    申请号:US17148234

    申请日:2021-01-13

    CPC classification number: H04L63/0876 G06F7/588 H04L63/126

    Abstract: Example subscription information configuration methods and a communications device are described. One example method includes receiving a first device identifier by a network device from a first terminal device in a first access mode and receiving a second device identifier from a second terminal device in a second access mode. The network device determines whether the first device identifier matches the second device identifier to identify legality of the first terminal device. If the first device identifier matches the second device identifier, it indicates that the first terminal device is a legal terminal device. The network device sends subscription information of the first terminal device to the first terminal device in the first access mode, so that the first terminal device successfully accesses a network by using the subscription information.

Patent Agency Ranking