SECURITY VERIFICATION METHOD AND APPARATUS

    公开(公告)号:US20250047674A1

    公开(公告)日:2025-02-06

    申请号:US18926758

    申请日:2024-10-25

    Abstract: Embodiments of this application disclose a security verification method and apparatus. The method includes: receiving a first command from a network device, where the first command includes a first value, and the first command is one of a select command, a query command, a query repeat command, a query adjust command, or an acknowledgment command; determining a first response value based on the first value and a security key; and sending a first request, where the first request includes the first response value, and the first response value is used by a verification function to verify a terminal device. According to embodiments of this application, communication security can be ensured.

    COMMUNICATION METHOD, APPARATUS, AND SYSTEM

    公开(公告)号:US20250016213A1

    公开(公告)日:2025-01-09

    申请号:US18897638

    申请日:2024-09-26

    Abstract: Embodiments of this application provide a communication method, apparatus, and system. The method may include: A user equipment sends a first uncharged traffic message to a core network device, where the first uncharged traffic message is for triggering the core network device to send a second uncharged traffic message to the user equipment. The user equipment receives the second uncharged traffic message from the core network device, where the second uncharged traffic message includes login information, and the login information is information needed by the user equipment to log in to an application server. The user equipment sends the login information to the application server, to log in to the application server. Both the first uncharged traffic message and the second uncharged traffic message are messages that are transmitted via a base station without generating to-be-charged traffic.

    AUTHENTICATION METHOD AND COMMUNICATION APPARATUS

    公开(公告)号:US20230370277A1

    公开(公告)日:2023-11-16

    申请号:US18356420

    申请日:2023-07-21

    Inventor: Fei LI

    CPC classification number: H04L9/3239 H04L9/3271 H04W60/04 H04L2209/80

    Abstract: An authentication method includes: A terminal device sends a first registration request message carrying information about security algorithms that can be supported by the terminal device to a serving call session control function network element. The terminal device receives an authentication challenge message which includes information about a third security algorithm, and the third security algorithm is one of the security algorithms that can be supported by the terminal device. The terminal device calculates a hash value of a security parameter based on the third security algorithm, and calculates an authentication response based on the third security algorithm and the hash value. The terminal device sends a second registration request message to the serving call session control function network element. The second registration request message carries the authentication response, and the authentication response is used to authenticate the terminal device.

    AIR INTERFACE INFORMATION SECURITY PROTECTION METHOD AND APPARATUS

    公开(公告)号:US20220210648A1

    公开(公告)日:2022-06-30

    申请号:US17695145

    申请日:2022-03-15

    Inventor: Fei LI Juan DENG

    Abstract: Embodiments of this application disclose an air interface information security protection method and apparatus, to protect security performance of air interface information sent by a terminal to a base station. in an embodiment, a terminal determines a first message authentication code (MAC) value based on a security key and air interface information, where the security key is a non-access stratum (NAS) security key between the terminal and a core network device; and the terminal sends the air interface information and the first MAC value to a base station.

    METHOD AND APPARATUS FOR CREATING VIRTUALIZED NETWORK FUNCTION INSTANCE

    公开(公告)号:US20200302051A1

    公开(公告)日:2020-09-24

    申请号:US16894198

    申请日:2020-06-05

    Inventor: Fei LI

    Abstract: This application provides a method and an apparatus for creating a virtualized network function instance VNFI. The method includes: generating, by a hardware-mediated execution enclave HMEE in a network functions virtualization NFV system, a private-public key pair, where a to-be-instantiated VNFI is deployed in the NFV system, and the HMEE and a to-be-instantiated first virtualized network function component VNFC are deployed in the VNFI; sending a public key in the private-public key pair to a security control device; receiving an encrypted security credential from the security control device, where the encrypted security credential is obtained by encrypting a security credential of a package of the first VNFC based on the public key, and the security credential is used to decrypt the package of the first VNFC; and decrypting the encrypted security credential based on a private key in the private-public key pair, to obtain the security credential.

    METHOD FOR AUTHENTICATION FOR NSWO SERVICE, DEVICE, AND STORAGE MEDIUM

    公开(公告)号:US20240073685A1

    公开(公告)日:2024-02-29

    申请号:US18502799

    申请日:2023-11-06

    Inventor: Bo ZHANG Fei LI

    CPC classification number: H04W12/06 H04W12/0433

    Abstract: Embodiments of this application are applicable to the field of communication technologies, and provide a method for authentication for an NSWO service, a device, and a storage medium, applicable to a 5G network. The method for authentication for an NSWO service includes: After determining to perform the NSWO service, the UE sends a SUCI to an AN device. The AN device sends a second request message to an NSWO network element. After determining to perform authentication for the NSWO service, the NSWO network element sends a first authentication request message to an AUSF. After determining to perform authentication for the NSWO service, the AUSF sends a second authentication request message to a UDM. The UDM determines to use an EAP-AKA′ authentication method. Then, the UDM, the AUSF, the NSWO network element, the AN device, and the UE sequentially complete an authentication procedure based on EAP-AKA′ authentication.

    SERVICE AUTHORIZATION METHOD, APPARATUS, AND SYSTEM

    公开(公告)号:US20230019000A1

    公开(公告)日:2023-01-19

    申请号:US17950187

    申请日:2022-09-22

    Inventor: Fei LI Chengdong HE

    Abstract: Embodiments of this application relate to a service authorization method and system, and an apparatus. The method includes: A first NRF receives a first request requesting an access token for accessing service of a second NF in a second network from a first NF, where the first NF and the first NRF are located in a first network, and the first request includes SNPN information of the first network and/or the second network. The first NRF forwards the first request to a second NRF located in the second network. The second NRF generates an access token in response to the first request, where the access token includes the SNPN information of the first network and/or the second network. The second NRF sends the access token to the first NRF. The first NRF receives the access token and sends the access token to the first NF.

    METHOD FOR STARTING VEHICLE AND RELATED DEVICE

    公开(公告)号:US20220014906A1

    公开(公告)日:2022-01-13

    申请号:US17486576

    申请日:2021-09-27

    Inventor: Fei LI

    Abstract: A method for starting a vehicle and a related device. The method includes: A server sends first security information and second security information to a mobile terminal and a telematics box respectively through an encrypted secure transmission channel or an encrypted secure transmission protocol, so that the telematics box can verify, by using the first security information and the second security information, a vehicle start instruction sent by the mobile terminal. When the verification succeeds, the telematics box controls the vehicle to start. The method help to avoid plaintext transmission of the security information between the mobile terminal and the telematics box, thereby avoiding leakage of the security information, and reducing a risk that the vehicle is maliciously started. In addition, a transmission process of the security information may not be restricted by a distance between the vehicle and the mobile terminal.

Patent Agency Ranking