-
11.
公开(公告)号:US20220394472A1
公开(公告)日:2022-12-08
申请号:US17889758
申请日:2022-08-17
Applicant: ZTE CORPORATION
Inventor: Yuze LIU , Shilin YOU , Jin PENG , Wantao YU , Zhaoji LIN
Abstract: Systems and methods for wireless communications are disclosed herein. In one embodiment, a wireless communication method includes storing, by a first network entity, mapping information and determining, by the first network entity, based on identification information and the mapping information, that a first node is authorized to connect to a network.
-
公开(公告)号:US20220368684A1
公开(公告)日:2022-11-17
申请号:US17858271
申请日:2022-07-06
Applicant: ZTE Corporation
Inventor: Shilin YOU , Jiyan CAI , Jin PENG , Wantao YU , Yuze LIU , Zhaoji LIN , Yuxin MAO , Jigang WANG
Abstract: This disclosure generally relates to encrypted communication between terminal devices and service applications via a communication network. Such encrypted communication may be based on various hierarchical levels of encryption keys that are generated and managed by the communication network. Such encrypted communication and key management may be provided by the communication network to the terminal devices as a service that can be subscribed to. The various levels of encryption keys may be managed to improve flexibility of the communication network and to reduce potential security breaches.
-
公开(公告)号:US20220345888A1
公开(公告)日:2022-10-27
申请号:US17861496
申请日:2022-07-11
Applicant: ZTE Corporation
Inventor: Wantao YU , Shilin YOU , Yuze LIU , Jin PENG , Zhaoji LIN , Yuxin MAO
IPC: H04W12/069
Abstract: The present disclosure describes methods, systems and devices for establishing secure communication between a user equipment and a service application in a wireless communication. One method includes receiving, by the user equipment, an authentication and key management for service applications identifier (AKMAID) from an authentication server function (AUSF) upon successful completion of an authentication process for registering the user equipment with the communication network. The method also includes storing, by the user equipment, the AKMAID; deriving, by the user equipment, an application key based on a base authentication key; sending, by the user equipment, a communication request to the service application, the communication request comprising the AKMAID; and receiving, by the user equipment, an application session establishment response to the communication request from the service application to establish a security communication session between the user equipment and the service application based on the application key.
-
公开(公告)号:US20220124493A1
公开(公告)日:2022-04-21
申请号:US17423888
申请日:2019-12-19
Applicant: ZTE Corporation
Inventor: Wantao YU , ZhenHua XIE , Jin PENG , Shilin YOU
IPC: H04W12/06 , H04W24/10 , H04W60/00 , H04W12/0431
Abstract: Provided are a method and device for reporting a capacity, a method and device for key agreement, a terminal and a communication device and system. The terminal sends anti-pseudo base station capacity indication information to the communication device, and the anti-pseudo base station capacity indication information can indicate an anti-pseudo base station capacity of the terminal to the communication device. The communication device can determine the anti-pseudo base station capacity of the terminal after acquiring the anti-pseudo base station capacity indication information sent by the terminal, and perform an authentication and key agreement process matching the anti-pseudo base station capacity of the terminal and an anti-pseudo base station capacity of a target base station.
-
公开(公告)号:US20220124105A1
公开(公告)日:2022-04-21
申请号:US17423773
申请日:2019-10-21
Applicant: ZTE Corporation
Inventor: Wantao YU , Zhenhua XIE , Jin PENG , Shilin YOU
IPC: H04L9/40 , H04W12/128
Abstract: An anti-pseudo base station method and apparatus, and a computer-readable storage medium are provided. The anti-pseudo base station method includes: sending, by a base station, first anti-pseudo base station capacity information to a mobile terminal, wherein the first anti-pseudo base station capacity information is used for identifying an anti-pseudo base station capacity of the base station.
-
公开(公告)号:US20220124092A1
公开(公告)日:2022-04-21
申请号:US17423890
申请日:2020-01-19
Applicant: ZTE Corporation
Inventor: Jin PENG , Shilin YOU , Zhenhua XIE , Wantao YU , Zhaoji LIN , Yongqing QIU
Abstract: Provided are an authentication processing method and device, a storage medium, and an electronic device. The method includes that: a terminal receives an authentication request message from an authentication function; and in cases where authentication on the authentication request message fails, the terminal feeds back an authentication failure message to the authentication function. In cases where the cause of the authentication failure is a Message Authentication Code (MAC) failure and in cases where a cause of authentication failure is a Synchronization (Sync) failure, the terminal feeds back authentication failure messages of the same type to the authentication function.
-
公开(公告)号:US20210243600A1
公开(公告)日:2021-08-05
申请号:US17050474
申请日:2019-04-26
Applicant: ZTE Corporation
Inventor: Wantao YU
Abstract: The embodiments of the disclosure disclose a method, device and system for accessing a network slice. The method includes that: User Equipment (UE) sends, to a base station, request information for accessing a network slice, wherein the request information contains user identity information and temporary network slice identity information (SliceIDt); a user subscription data management entity receives the request information from the UE through the base station, determines authentication information of the UE according to the user identity information contained in the request information, searches for corresponding network slice identity information (SliceID) according to the SliceIDt and sends the authentication information to a security management entity of the network slice corresponding to the SliceID; and the security management entity performs access authentication with the UE according to the authentication information, and in case of successful authentication, the UE accesses the network slice.
-
-
-
-
-
-