Network roaming protection method, related device, and system

    公开(公告)号:US10743368B2

    公开(公告)日:2020-08-11

    申请号:US16351772

    申请日:2019-03-13

    Inventor: Rong Wu Bo Zhang Lu Gan

    Abstract: Embodiments of the present disclosure disclose a network roaming protection method and related device. The method includes: receiving, by a visited session management device, a first session establishment request that includes a first security requirement; obtaining, by the visited session management device, a target security policy, where the target security policy is obtained by processing the first security requirement set and a second security requirement set using a preset rule; and sending the target security policy to the UE instructing the UE to generate a target shared key based on a reference shared key and according to a rule defined by the target security policy, where the target shared key is used to protect secure end-to-end data transmission between the UE and the visited gateway.

    Terminal authenticating method, apparatus, and system

    公开(公告)号:US10588015B2

    公开(公告)日:2020-03-10

    申请号:US15197381

    申请日:2016-06-29

    Abstract: Embodiments of the present invention disclose a terminal authenticating method, including: receiving, by a UE-to-network relay UE-R, a first request message sent by user equipment UE; sending, by the UE-R, a second request message to a control network element according to the first request message sent by the UE; receiving, by the UE-R, an authentication request message sent by the control network element, and determining whether the authentication request message is for authenticating on the UE; if the authentication request message is for authenticating on the UE, sending, by the UE-R, an authentication request message to the UE; and receiving, by the UE-R, an authentication response message sent by the UE according to the authentication request message, and sending the authentication response message to the control network element.

    Security implementation method, related apparatus, and system

    公开(公告)号:US10588014B2

    公开(公告)日:2020-03-10

    申请号:US16409207

    申请日:2019-05-10

    Abstract: A security implementation method includes receiving, by a first network element, a request for handing over user equipment from a source access network device to a target access network device to perform communication. The method further includes obtaining, by the first network element, a security key, where the security key is used for protecting the communication between the user equipment and the target access network device after the user equipment is handed over from the source access network device to the target access network device, and sending, by the first network element, the security key to the target access network device.

    Network Handover Protection Method, Related Device, and System

    公开(公告)号:US20190215903A1

    公开(公告)日:2019-07-11

    申请号:US16351254

    申请日:2019-03-12

    Inventor: Rong Wu Bo Zhang Lu Gan

    Abstract: A method includes: receiving, by a session management device, a path switching request used to request to hand over user equipment UE from a source network to a target network; obtaining a target security policy based on the path switching request, and obtaining a second shared key generated based on a first shared key and the target security policy, and sending the second shared key to a target gateway; and sending, by the session management device, the second shared key to the UE; or sending the target security policy to the UE, so that the UE generates the second shared key based on the first shared key and the target security policy, where the second shared key is used to perform end-to-end protection on secure data transmission between the UE and the target gateway.

    KEY CONFIGURATION METHOD, SECURITY POLICY DETERMINING METHOD, AND APPARATUS

    公开(公告)号:US20190124502A1

    公开(公告)日:2019-04-25

    申请号:US16224999

    申请日:2018-12-19

    Inventor: Bo Zhang Rong Wu Lu Gan

    Abstract: This application provides a key configuration method. A session management network element receives a request for end-to-end communication and obtains a security policy, where the security policy is determined based on at least one of: a user security requirement that is of the user equipment and that is preconfigured on a home subscriber server, a service security requirement from the user equipment, a security capability requirement supported by the user equipment, a security capability requirement from a carrier network, and a security requirement of a device on the other end of the end-to-end communication. The session management network element obtains a protection key used for protecting the end-to-end communication. The session management network element sends the security policy to the devices on two ends of the end-to-end communication.

    Negotiation Processing Method for Security Algorithm, Control Network Element, and Control System
    38.
    发明申请
    Negotiation Processing Method for Security Algorithm, Control Network Element, and Control System 有权
    安全算法协调处理方法,控制网元和控制系统

    公开(公告)号:US20160249209A1

    公开(公告)日:2016-08-25

    申请号:US15143095

    申请日:2016-04-29

    CPC classification number: H04W12/04 H04L9/0816 H04L63/205 H04W76/14

    Abstract: A negotiation processing method for a security algorithm, a control network element, and a control system where the negotiation processing method for a security algorithm includes selecting, by a control network element according to a security capability of first user equipment (UE) and a security capability of second UE, a security algorithm supported by both the first UE and the second UE, and notifying, by the control network element, the selected security algorithm to the first UE and the second UE, and hence, negotiation of a security algorithm between two UEs in proximity communication can be implemented under the control of a control network element.

    Abstract translation: 一种用于安全算法的协商处理方法,控制网元和控制系统,其中安全算法的协商处理方法包括:根据第一用户设备(UE)的安全能力和安全性 第二UE的能力,由第一UE和第二UE支持的安全算法,以及由控制网元向所述第一UE和所述第二UE通知所选择的安全算法,并且因此在所述第一UE和所述第二UE之间进行安全算法的协商 接近通信中的两个UE可以在控制网元的控制下实现。

    Key Negotiation Processing Method and Apparatus
    39.
    发明申请
    Key Negotiation Processing Method and Apparatus 审中-公开
    关键谈判处理方法与装置

    公开(公告)号:US20160248857A1

    公开(公告)日:2016-08-25

    申请号:US15146690

    申请日:2016-05-04

    Abstract: A method and apparatus of key negotiation processing, which includes acquiring, by a control network element, a first key negotiation parameter and a second key negotiation parameter, and sending, by the control network element, the first key negotiation parameter and/or the second key negotiation parameter to the first user equipment UE and a second UE such that the first UE and the second UE generate a key according to the first key negotiation parameter and the second key negotiation parameter. Key negotiation may be performed between two UEs that perform proximity communication.

    Abstract translation: 一种密钥协商处理的方法和装置,包括由控制网元获取第一密钥协商参数和第二密钥协商参数,并由控制网元发送第一密钥协商参数和/或第二密钥协商参数 密钥协商参数给第一用户设备UE和第二UE,使得第一UE和第二UE根据第一密钥协商参数和第二密钥协商参数生成密钥。 可以在执行邻近通信的两个UE之间执行密钥协商。

    PACKET PROCESSING METHOD AND APPARATUS
    40.
    发明申请
    PACKET PROCESSING METHOD AND APPARATUS 有权
    分组处理方法和装置

    公开(公告)号:US20160065460A1

    公开(公告)日:2016-03-03

    申请号:US14934943

    申请日:2015-11-06

    CPC classification number: H04L45/52 H04L51/18 H04L69/18

    Abstract: Embodiments of the present disclosure provide a packet processing method and apparatus. A first protocol identifier of a first to-be-processed packet is acquired; and first protocol rule profile information that corresponds to the first protocol identifier is acquired from a rule profile repository, where the rule profile repository stores protocol rule profile information of at least one protocol, protocol rule profile information of each protocol in the at least one protocol is associated with a protocol identifier of the protocol, the protocol rule profile information of the protocol is used to describe a method and a parameter for processing a packet, and the packet meets a standard stipulated by the protocol; and the first to-be-processed packet is processed according to the acquired first protocol rule profile information.

    Abstract translation: 本公开的实施例提供了一种分组处理方法和装置。 获取第一待处理分组的第一协议标识符; 并且从规则简档存储库获取对应于第一协议标识符的第一协议规则简档信息,其中规则简档存储库存储至少一个协议的协议规则简档信息,所述至少一个协议中的每个协议的协议规则简档信息 与协议的协议标识相关联,协议的协议规则简档信息用于描述用于处理分组的方法和参数,并且该分组满足协议规定的标准; 并且根据获取的第一协议规则简档信息处理第一待处理分组。

Patent Agency Ranking