Signaling attack prevention method and apparatus

    公开(公告)号:US10972917B2

    公开(公告)日:2021-04-06

    申请号:US16289106

    申请日:2019-02-28

    Inventor: Chengdong He

    Abstract: A signaling attack prevention method and apparatus, where the method includes receiving a general packet radio service (GPRS) Tunneling Protocol (GTP-C) message from a serving gateway (SGW), determining whether the GTP-C message is received from an eighth data interface (S8), determining whether a first characteristic parameter of the GTP-C message is valid when the GTP-C message is received from the S8 interface, where the first characteristic parameter includes at least one of an international mobile subscriber identity (IMSI) of a user, or an identifier of a message source end of the GTP-C message, and discarding the GTP-C message or returning, to the SGW, a GTP-C response message carrying an error code cause value when the first characteristic parameter of the GTP-C message is invalid.

    Method and Apparatus for Detecting Man-In-The-Middle Attack

    公开(公告)号:US20190281070A1

    公开(公告)日:2019-09-12

    申请号:US16422051

    申请日:2019-05-24

    Abstract: A system and method for detecting a man-in-the-middle attack, where the includes sending, by a secondary base station, a first check request message to a master base station, wherein the first check request message comprises first identifier information of an evolved random access bearer (ERAB) and a first data packet count value corresponding to the first identifier information; receiving, by the master base station, the first check request message; obtaining second identifier information that matches the first identifier information, wherein the second identifier information is an identifier of a data radio bearer (DRB) corresponding to the ERAB; sending a second check request message to a user terminal, wherein the second check request message comprises the first data packet count value and the second identifier information; and receiving, by the master base station, a check response message from the user terminal.

    Method, Apparatus, and System for Preventing Diameter Signaling Attack in Wireless Network

    公开(公告)号:US20180109953A1

    公开(公告)日:2018-04-19

    申请号:US15847094

    申请日:2017-12-19

    Inventor: Chengdong He

    Abstract: A method includes receiving a diameter request message sent by a home subscriber server HSS, where the diameter request message carries a source domain name and a user identity, and determining whether a binding relationship between the source domain name and the user identity is correct. If the binding relationship is incorrect, the method includes discarding the diameter request message or sending a diameter response message to the HSS, where the diameter response message carries a failure code. In the embodiments of the present application, when the binding relationship between the source domain name and the user identity that are carried in the diameter request message is incorrect, the diameter request message is discarded or the diameter response message carrying the failure code is sent.

    Method, apparatus, and system for protecting cloud data security
    28.
    发明授权
    Method, apparatus, and system for protecting cloud data security 有权
    保护云数据安全的方法,设备和系统

    公开(公告)号:US09203614B2

    公开(公告)日:2015-12-01

    申请号:US14141849

    申请日:2013-12-27

    CPC classification number: H04L9/083 H04L9/0822 H04L9/0825 H04L9/14 H04L63/0471

    Abstract: The present invention relates to a method, an apparatus, and a system for protecting cloud data security. A key management center encrypts original data M sent by a first terminal using a key K, and uploads encrypted data C1 to a cloud server. When the key management center receives a request from a second terminal for the data M, it generates encrypted data C2, which is generated by first encrypting C1 with a key Kb of the second terminal and then decrypted by the key K that was used to encrypt the original data M to generate C1. The key management center then sends the encrypted data C2 to the second terminal. The second terminal decrypts the encrypted data C2 using its own key Kb to obtain the original data M.

    Abstract translation: 本发明涉及一种保护云数据安全性的方法,装置和系统。 密钥管理中心使用密钥K对由第一终端发送的原始数据M进行加密,并将加密数据C1上传到云服务器。 当密钥管理中心从数据M的第二终端接收到请求时,生成加密数据C2,该加密数据C2通过用第二终端的密钥Kb首先加密C1,然后由用于加密的密钥K进行解密 原始数据M生成C1。 密钥管理中心然后将加密数据C2发送到第二终端。 第二终端使用其自己的密钥Kb解密加密数据C2以获得原始数据M.

    Method, System and Device for Negotiating Security Capability when Terminal Moves
    29.
    发明申请
    Method, System and Device for Negotiating Security Capability when Terminal Moves 有权
    终端移动时谈判安全能力的方法,系统和设备

    公开(公告)号:US20140120879A1

    公开(公告)日:2014-05-01

    申请号:US14147179

    申请日:2014-01-03

    Inventor: Chengdong He

    Abstract: A method, user equipment (UE) and system are provided for negotiating a security capability during idle state mobility of the UE from a non-long term evolution (non-LTE) network to a long term evolution (LTE) network. The UE sends UE security capabilities supported by the UE to the LTE network for a non-access stratum (NAS) security algorithm selection use. The UE then receives from the LTE network selected NAS security algorithm. The UE further generates a root key from an authentication vector-related key stored at the UE and then derives, from the generated root key, a NAS protection key for security communication with the LTE network.

    Abstract translation: 提供了一种方法,用户设备(UE)和系统,用于在UE从非长期演进(non-LTE)网络到长期演进(LTE)网络的空闲状态移动性期间协商安全能力。 UE向UE提供UE所支持的UE安全功能,用于非接入层(NAS)安全算法选择的使用。 然后,UE从LTE网络接收所选择的NAS安全算法。 UE还从存储在UE处的认证向量相关密钥生成根密钥,然后从生成的根密钥中导出用于与LTE网络进行安全通信的NAS保护密钥。

    Terminal device location determining method and device

    公开(公告)号:US11096142B2

    公开(公告)日:2021-08-17

    申请号:US17004171

    申请日:2020-08-27

    Abstract: A terminal device location determining method and a device. A core network device obtains location information of a terminal device reported by the terminal device and location information reported by a first base station. The core network device determines whether the location information of the terminal device matches the location information reported by the first base station, and if the location information of the terminal device does not match the location information reported by the first base station, the core network device sends a reject message to the terminal device. By determining, through comparison, whether the location information of the terminal device reported by the terminal device matches the location information reported by the base station, it can be determined whether a location of the terminal device is incorrectly determined.

Patent Agency Ranking