Communication authentication method and related device

    公开(公告)号:US12132823B2

    公开(公告)日:2024-10-29

    申请号:US17706877

    申请日:2022-03-29

    Inventor: Bo Zhang

    CPC classification number: H04L9/0825 H04L9/0866 H04L9/0869 H04L9/3213

    Abstract: A communication authentication method and a related device, the method including sending, by a user terminal, a generic bootstrapping architecture (GBA) authentication request carrying a user terminal identifier, receiving, by the user terminal, an authentication request carrying an authentication token (AUTN) and a random number (RAND), and deriving, by the user terminal, a first authentication vector based on the AUTN and the RAND, where the first authentication vector is different from a second authentication vector of the user terminal, the first authentication vector is a 5th generation (5G) GBA authentication vector, and the second authentication vector includes at least one of a 3rd generation/4th generation (3G/4G) GBA authentication vector or a 5G authentication vector.

    Discovery method and apparatus based on service-based architecture

    公开(公告)号:US11824981B2

    公开(公告)日:2023-11-21

    申请号:US17696093

    申请日:2022-03-16

    CPC classification number: H04L9/088 H04L9/3247 H04L63/0435 H04W12/06

    Abstract: A discovery method and apparatus based on a service-based architecture, where the method includes a control network element sending a discovery response to a first functional network element, where the discovery response includes a determined security parameter and an access address or an identifier of a second functional network element. The first functional network element receives the discovery response from the control network element, and sends an access request to the second functional network element based on the address or the identifier of the second functional network element, where the access request includes the received security parameter. The second functional network element receives the access request from the first functional network element, verifies correctness of the security parameter, and determines, based on the correctness of the security parameter, whether the access request is authorized by the first functional network element.

    Authentication method, device, and system

    公开(公告)号:US11503467B2

    公开(公告)日:2022-11-15

    申请号:US17185467

    申请日:2021-02-25

    Abstract: Example authentication methods, devices, and systems are provided, where those example can be used to verify validity of access location information of a next generation-residential gateway (NG-RG) in a fixed-mobile convergence architecture. One example method includes a network device receiving first link information that is used to represent an access location of a residential gateway, and the network device obtaining second link information of the residential gateway. When the first link information matches partial or all information of the second link information, or when the first link information matches partial or all information of one link information of the second link information, the network device verifies validity of the access location of the residential gateway.

    Discovery Method and Apparatus Based on Service-Based Architecture

    公开(公告)号:US20220278831A1

    公开(公告)日:2022-09-01

    申请号:US17696093

    申请日:2022-03-16

    Abstract: A discovery method and apparatus based on a service-based architecture, where the method includes a control network element sending a discovery response to a first functional network element, where the discovery response includes a determined security parameter and an access address or an identifier of a second functional network element. The first functional network element receives the discovery response from the control network element, and sends an access request to the second functional network element based on the address or the identifier of the second functional network element, where the access request includes the received security parameter. The second functional network element receives the access request from the first functional network element, verifies correctness of the security parameter, and determines, based on the correctness of the security parameter, whether the access request is authorized by the first functional network element.

    Switching method and apparatus
    96.
    发明授权

    公开(公告)号:US11252649B2

    公开(公告)日:2022-02-15

    申请号:US16967253

    申请日:2018-02-05

    Abstract: A switching method and a terminal device, which relate to the communications field. The switching method comprises: establishing, by a terminal device, a first packet data network PDN connection in a long term evolution LTE access network; switching, by the terminal device, the first PDN connection from the LTE access network to a wireless local area network WLAN access network; establishing, by the terminal device, a second PDN connection in the LTE access network, so that the terminal device is in a registered state in the LTE network; and switching, by the terminal device, the first PDN connection or a third PDN connection established in the WLAN access network, to the LTE access network.

    Network authentication method, and related device and system

    公开(公告)号:US11075752B2

    公开(公告)日:2021-07-27

    申请号:US16248778

    申请日:2019-01-16

    Inventor: Rong Wu Bo Zhang Lu Gan

    Abstract: Embodiments of the present invention disclose a network system. The system includes user equipment, a network authentication device, and a service authentication device. The service authentication device is configured to obtain reference information and generate a second shared key with reference to the reference information and a first shared key, where the first shared key is a shared key pre-configured between the user equipment and the service authentication device; the user equipment is configured to obtain the reference information and generate the second shared key with reference to the reference information and the first shared key; the service authentication device is configured to send the second shared key to the network authentication device; and the network authentication device is configured to receive the second shared key, where the second shared key is used by the user equipment and the network authentication device to generate a target shared key.

    Security implementation method, device, and system

    公开(公告)号:US11025597B2

    公开(公告)日:2021-06-01

    申请号:US16521171

    申请日:2019-07-24

    Inventor: Bo Zhang Rong Wu Lu Gan

    Abstract: A security implementation method includes obtaining, by a first device, a security policy of a session and at least one key, and sending, by the first device, protected data to a second device, where the protected data is obtained by protecting security of session data of the session using the at least one key based on the security policy of the session, and the second device is configured to restore the protected data using the at least one key based on the security policy to obtain the session data, where when the first device is a terminal device, the second device is an access network node or a user plane node, or when the first device is an access network node or a user plane node, the second device is a terminal device.

    Network handover protection method, related device, and system

    公开(公告)号:US10959091B2

    公开(公告)日:2021-03-23

    申请号:US16351254

    申请日:2019-03-12

    Inventor: Rong Wu Bo Zhang Lu Gan

    Abstract: A method includes: receiving, by a session management device, a path switching request used to request to hand over user equipment UE from a source network to a target network; obtaining a target security policy based on the path switching request, and obtaining a second shared key generated based on a first shared key and the target security policy, and sending the second shared key to a target gateway; and sending, by the session management device, the second shared key to the UE; or sending the target security policy to the UE, so that the UE generates the second shared key based on the first shared key and the target security policy, where the second shared key is used to perform end-to-end protection on secure data transmission between the UE and the target gateway.

Patent Agency Ranking