KEY GENERATION METHOD AND APPARATUS
    21.
    发明公开

    公开(公告)号:US20230319554A1

    公开(公告)日:2023-10-05

    申请号:US18311998

    申请日:2023-05-04

    CPC classification number: H04W12/041 H04W12/069

    Abstract: A key generation method and an apparatus are provided. One example key generation method includes the following steps: determining, by a communication apparatus, that a master base station or a secondary base station serves as an integrated access and backhaul (IAB) donor, wherein the master base station and the secondary base station are connected to an IAB node; and performing at least one of the following when the master base station serves as the IAB donor, generating, by the communication apparatus, an IAB key KIAB based on a master base station key; or when the secondary base station serves as the IAB donor, generating, by the communication apparatus, the IAB key KIAB based on a secondary base station key.

    KEY DERIVATION METHOD, APPARATUS, AND SYSTEM
    22.
    发明公开

    公开(公告)号:US20230239689A1

    公开(公告)日:2023-07-27

    申请号:US18191944

    申请日:2023-03-29

    Inventor: Li HU Rong WU

    CPC classification number: H04W12/041 H04W12/06

    Abstract: A key derivation method, an apparatus, and a system. The method includes: user equipment (UE) receives an authentication success message from a mobility management function network element, generates a master session key (MSK) and an extended master session key (EMSK) based on the authentication success message; and determines whether an authentication device is located outside a 3rd generation partnership project (3GPP) network, to determine whether to obtain Kausf based on the EMSK or the MSK. Therefore, the UE can be compatible with a key derivation manner used when the authentication device is located outside the 3GPP network and a key derivation manner used when the authentication device is located inside the 3GPP network.

    METHOD AND SYSTEM FOR INVOKING APPLICATION PROGRAMMING INTERFACE, AND APPARATUS

    公开(公告)号:US20230188519A1

    公开(公告)日:2023-06-15

    申请号:US18105597

    申请日:2023-02-03

    Inventor: Li HU Rong WU

    CPC classification number: H04L63/0853 G06F9/547

    Abstract: This application provides a method and an apparatus for invoking an API. The method includes: An API-providing network element receives an API-invoking request for a target application from an application server, where the API-invoking request is for requesting to operate information of a terminal device, and includes a first identifier of the terminal device and an identifier of the target application on the application server side; obtains an authorization result based on the first identifier of the terminal device and the identifier of the target application on an application server side, where the authorization result indicates whether the application server is allowed to operate the information of the terminal device; and determines, based on the authorization result, whether to allow the application server to operate the information of the terminal device.

    FALSE BASE STATION DETERMINING METHOD, APPARATUS, AND SYSTEM

    公开(公告)号:US20220109994A1

    公开(公告)日:2022-04-07

    申请号:US17551562

    申请日:2021-12-15

    Abstract: This application relates to the field of communications technologies, and discloses a method and apparatus. The method includes: A real base station receives a first uplink NAS message and an identifier of a first device. The real base station obtains a first hash value of first system information of a cell corresponding to the identifier of the first device. The real base station sends an N2 message to a core network device, where the N2 message includes the first uplink NAS message and the first hash value of the first system information. The core network device receives the N2 message from the real base station, and sends an integrity protected first downlink NAS message to a terminal, where the first downlink NAS message is forwarded by the real base station to the terminal, and the first downlink NAS message includes the first hash value of the first system information.

    Method For Determining Class Information And Apparatus

    公开(公告)号:US20210250771A1

    公开(公告)日:2021-08-12

    申请号:US17245570

    申请日:2021-04-30

    Inventor: Li HU Jing CHEN

    Abstract: This application provides example methods and apparatuses for determining class information. One example method includes sending, by a security detection function network element, a subscription data collection event to a mobility management network element, where the subscription data collection event includes a collection range and a reporting condition. The security detection function network element can then receive a data collection service response message from the mobility management network element, where the data collection service response message includes first class information and first traffic data corresponding to the first class information, and where the first traffic data meets the reporting condition. The security detection function network element can then determine abnormal class information based on the first traffic data. The security detection function network element can then send the abnormal class information to a policy control network element.

    Method For Controlling Access Of Terminal To Network And Network Element

    公开(公告)号:US20210014686A1

    公开(公告)日:2021-01-14

    申请号:US17035223

    申请日:2020-09-28

    Abstract: Example methods for controlling access of a terminal to a network and a network element are described. One example method includes detecting whether a target terminal is exposed to a security threat and sending a message to a storage function network element based on a detection result. The message includes device information and network access indication information, the device information indicates at least one terminal including the target terminal, and the network access indication information indicates that the at least one terminal is allowed or forbidden to access a network. Thus the security function network element outputs an allowed or forbidden indication to the storage function network element, and the storage function network element controls, based on the foregoing indication, access of the terminal to the network.

    RRC CONNECTION RESUME METHOD AND APPARATUS
    27.
    发明申请

    公开(公告)号:US20200260283A1

    公开(公告)日:2020-08-13

    申请号:US16859699

    申请日:2020-04-27

    Abstract: This application provides an RRC connection resume method and apparatus. In the method, when a terminal moves to a target base station, the target base station may reselect, based on a capability and a requirement of the target base station, a first encryption algorithm and a first integrity protection algorithm that are used when the target base station communicates with the terminal, and send the first encryption algorithm and the first integrity protection algorithm to the terminal. On one hand, a security algorithm used for communication between the terminal and the target base station is flexibly selected. On the other hand, because the base station connected to the terminal changes, communication security can be improved by using a new encryption algorithm and integrity protection algorithm.

    KEY DERIVATION ALGORITHM NEGOTIATION METHOD AND APPARATUS

    公开(公告)号:US20200221297A1

    公开(公告)日:2020-07-09

    申请号:US16821103

    申请日:2020-03-17

    Inventor: Li HU Jing CHEN

    Abstract: This application provides a key derivation algorithm negotiation method and an apparatus. The method includes: checking, by a terminal, a sent first key derivation algorithm and a received second key derivation algorithm; if the checking is correct and the first key derivation algorithm is the same as the second key derivation algorithm, determining that the first key derivation algorithm sent by the terminal is not tampered with by an attacker; and then using a negotiated third key derivation algorithm as a key derivation algorithm of the terminal, to ensure confidentiality of the negotiated key derivation algorithm, thereby improving communication security.

Patent Agency Ranking