METHODS AND DEVICES FOR ESTABLISHING SECURE COMMUNICATION FOR APPLICATIONS

    公开(公告)号:US20220345888A1

    公开(公告)日:2022-10-27

    申请号:US17861496

    申请日:2022-07-11

    Abstract: The present disclosure describes methods, systems and devices for establishing secure communication between a user equipment and a service application in a wireless communication. One method includes receiving, by the user equipment, an authentication and key management for service applications identifier (AKMAID) from an authentication server function (AUSF) upon successful completion of an authentication process for registering the user equipment with the communication network. The method also includes storing, by the user equipment, the AKMAID; deriving, by the user equipment, an application key based on a base authentication key; sending, by the user equipment, a communication request to the service application, the communication request comprising the AKMAID; and receiving, by the user equipment, an application session establishment response to the communication request from the service application to establish a security communication session between the user equipment and the service application based on the application key.

    Method and Device for Reporting Capacity, Method and Device for Key Agreement, Terminal and Communication Device and System

    公开(公告)号:US20220124493A1

    公开(公告)日:2022-04-21

    申请号:US17423888

    申请日:2019-12-19

    Abstract: Provided are a method and device for reporting a capacity, a method and device for key agreement, a terminal and a communication device and system. The terminal sends anti-pseudo base station capacity indication information to the communication device, and the anti-pseudo base station capacity indication information can indicate an anti-pseudo base station capacity of the terminal to the communication device. The communication device can determine the anti-pseudo base station capacity of the terminal after acquiring the anti-pseudo base station capacity indication information sent by the terminal, and perform an authentication and key agreement process matching the anti-pseudo base station capacity of the terminal and an anti-pseudo base station capacity of a target base station.

    Authentication Processing Method and Device, Storage Medium, and Electronic Device

    公开(公告)号:US20220124092A1

    公开(公告)日:2022-04-21

    申请号:US17423890

    申请日:2020-01-19

    Abstract: Provided are an authentication processing method and device, a storage medium, and an electronic device. The method includes that: a terminal receives an authentication request message from an authentication function; and in cases where authentication on the authentication request message fails, the terminal feeds back an authentication failure message to the authentication function. In cases where the cause of the authentication failure is a Message Authentication Code (MAC) failure and in cases where a cause of authentication failure is a Synchronization (Sync) failure, the terminal feeds back authentication failure messages of the same type to the authentication function.

    Method, Device and System for Accessing Network Slice

    公开(公告)号:US20210243600A1

    公开(公告)日:2021-08-05

    申请号:US17050474

    申请日:2019-04-26

    Inventor: Wantao YU

    Abstract: The embodiments of the disclosure disclose a method, device and system for accessing a network slice. The method includes that: User Equipment (UE) sends, to a base station, request information for accessing a network slice, wherein the request information contains user identity information and temporary network slice identity information (SliceIDt); a user subscription data management entity receives the request information from the UE through the base station, determines authentication information of the UE according to the user identity information contained in the request information, searches for corresponding network slice identity information (SliceID) according to the SliceIDt and sends the authentication information to a security management entity of the network slice corresponding to the SliceID; and the security management entity performs access authentication with the UE according to the authentication information, and in case of successful authentication, the UE accesses the network slice.

Patent Agency Ranking