Security protection negotiation method and network element

    公开(公告)号:US10856141B2

    公开(公告)日:2020-12-01

    申请号:US16520369

    申请日:2019-07-24

    Inventor: Rong Wu Bo Zhang Lu Gan

    Abstract: A security protection negotiation method and a network element are disclosed, to implement, based on a 5G network architecture, negotiation between UE and a UPF to start user plane security protection for a current session. The method includes: determining, by an SMF, security protection information used on a user plane in a current session process; sending, by the SMF to UE, a first message including the security protection information used on the user plane; performing, by the UE, integrity protection authentication on the first message based on the security protection information used on the user plane; when the authentication performed by the UE on the first message succeeds, starting, by the UE, user plane security protection, and sending, to the SMF, a second message used to indicate that the authentication performed by the UE on the first message succeeds.

    Security Implementation Method, Related Apparatus, and System

    公开(公告)号:US20190274038A1

    公开(公告)日:2019-09-05

    申请号:US16409207

    申请日:2019-05-10

    Abstract: A security implementation method includes receiving, by a first network element, a request for handing over user equipment from a source access network device to a target access network device to perform communication. The method further includes obtaining, by the first network element, a security key, where the security key is used for protecting the communication between the user equipment and the target access network device after the user equipment is handed over from the source access network device to the target access network device, and sending, by the first network element, the security key to the target access network device.

    Key negotiation processing method and apparatus

    公开(公告)号:US10320917B2

    公开(公告)日:2019-06-11

    申请号:US15146690

    申请日:2016-05-04

    Abstract: A method and apparatus of key negotiation processing, which includes acquiring, by a control network element, a first key negotiation parameter and a second key negotiation parameter, and sending, by the control network element, the first key negotiation parameter and/or the second key negotiation parameter to the first user equipment UE and a second UE such that the first UE and the second UE generate a key according to the first key negotiation parameter and the second key negotiation parameter. Key negotiation may be performed between two UEs that perform proximity communication.

    IDENTITY AUTHENTICATION METHOD, ELECTRONIC DEVICE, AND COMPUTER-READABLE STORAGE MEDIUM

    公开(公告)号:US20230344635A1

    公开(公告)日:2023-10-26

    申请号:US18341985

    申请日:2023-06-27

    Inventor: Rui Shi Lu Gan Chao He

    CPC classification number: H04L9/3226 H04L9/0869 H04W12/06

    Abstract: An identity authentication method and a mobile device. The mobile device performs receiving a first message of an electronic device within a second distance from the electronic device, where the first message includes a randomly generated session key, randomly generating first action information in response to the first message, and obtaining a second message by encrypting the first action information using the session key, sending the second message to the electronic device. displaying first confirmation information to determine whether the electronic device performs a first action indicated by the first action information, receiving first input used for confirmation, and prompting that identity authentication on the electronic device succeeds, where the second distance is less than or equal to a preset secure distance.

    Key Negotiation Method and Electronic Device

    公开(公告)号:US20230017263A1

    公开(公告)日:2023-01-19

    申请号:US17780902

    申请日:2020-11-26

    Abstract: A key negotiation method and an electronic device are provided, and relate to the field of communications technologies. Specifically, the method includes: An IoT control device multicasts, in a first local area network, a discovery message that carries a first public key, and sends a second ciphertext to a first IoT device after receiving a first ciphertext and a second public key. After receiving a third ciphertext from the first IoT device, the IoT control device decrypts the third ciphertext based on a first session key, to obtain a second signature and second session information; verifies the second signature based on a long-term public key of the first IoT device; and performs encrypted communication with the first IoT device based on the first session key after the second signature is successfully verified.

    Registration method and apparatus based on service-based architecture

    公开(公告)号:US11496320B2

    公开(公告)日:2022-11-08

    申请号:US16803624

    申请日:2020-02-27

    Abstract: Embodiments of this application provide a registration method and apparatus based on a service-based architecture. In this method, a management network element determines configuration information of a function network element, where the configuration information includes a security parameter; and the management network element sends the configuration information to the function network element. The function network element receives the configuration information sent by the management network element; and the function network element sends a registration request to a control network element based on the configuration information, where the registration request includes the security parameter. The control network element receives the registration request sent by the function network element, where the registration request includes the security parameter; and the control network element verifies correctness of the security parameter, and determines validity of the registration request based on the correctness of the security parameter.

    Authorization method and network element

    公开(公告)号:US11431695B2

    公开(公告)日:2022-08-30

    申请号:US16814018

    申请日:2020-03-10

    Abstract: An authorization method and a network element are disclosed, to implement a third-party authorization function based on a 5G service-based network architecture. The method is: receiving, by a resource control network element, a resource usage request message sent by a terminal device; replacing a first user identifier in the resource usage request message with a second user identifier; sending an authorization request message carrying the second user identifier to an authorization server by using an NEF; receiving, by using the NEF, an authorization response message sent by the authorization server, where the authorization response message includes an authorization result that is obtained by performing authorization based on the second user identifier and the resource usage request message; and allocating a network resource to the terminal device based on the authorization result, and sending a resource allocation response message to the terminal device.

Patent Agency Ranking