-
公开(公告)号:US20250063032A1
公开(公告)日:2025-02-20
申请号:US18819443
申请日:2024-08-29
Applicant: ZTE CORPORATION
Inventor: Zhen XING , Shilin YOU , Yuze LIU , Zhaoji LIN
IPC: H04L9/40 , H04L65/1066
Abstract: A wireless communication method is provided. The wireless communication method includes: receiving an authentication indicator; utilizing the authentication indicator to access authentication information; and providing the authentication information for selecting an authentication method.
-
公开(公告)号:US20240137757A1
公开(公告)日:2024-04-25
申请号:US18240998
申请日:2023-08-30
Applicant: ZTE CORPORATION
Inventor: Yuze LIU , Shilin YOU , Jin PENG , Zhen XING , Zhaoji LIN
IPC: H04W12/041 , H04W12/0433 , H04W12/06
CPC classification number: H04W12/041 , H04W12/0433 , H04W12/06
Abstract: Presented are systems and methods for authorization of proximity based services. A first wireless communication device may send, to a second wireless communication device, a message to access a network via the second wireless communication device as a relay node, using at least one authentication and key management for applications (AKMA) service. The message may include an AKMA key identifier (A-KID) and a freshness parameter. The first wireless communication device may generate a validation token to validate against another validation token of the second wireless communication device. The first wireless communication device may generate the validation token using the freshness parameter and a proximity based service function (PBSF) key (KPBSF).
-
公开(公告)号:US20240031800A1
公开(公告)日:2024-01-25
申请号:US18375885
申请日:2023-10-02
Applicant: ZTE Corporation
Inventor: Shilin YOU , Hongjun LIU , Jiyan CAI , Zaifeng ZONG , Jin PENG , Zhaoji LIN , Yunyin ZHANG
CPC classification number: H04W12/03 , H04W12/02 , H04W12/069 , H04W12/75 , H04W12/72 , H04W12/06 , H04W12/08 , H04L2101/654
Abstract: Embodiments of the prevent invention provide a network access authentication method and device. The method comprises: receiving an authentication request message sent by a first serving network, wherein the authentication request message carries a user equipment pseudonym identifier generated by a user equipment; determining whether a local user equipment pseudonym identifier is asynchronous with the user equipment pseudonym identifier generated by the user equipment; and obtaining, if the determination result is yes, an encrypted international mobile subscriber identity (IMSI) to carry out network access authentication on the user equipment. The embodiments of the present invention can solve the problem that a network access process in the related art does not provide a processing method for the case where the user equipment pseudonym identifier in the user equipment is asynchronous with the user equipment pseudonym identifier in a home network.
-
公开(公告)号:US20230413047A1
公开(公告)日:2023-12-21
申请号:US18458729
申请日:2023-08-30
Applicant: ZTE Corporation
Inventor: Yuze LIU , Shilin YOU , Zhen XING , Zhaoji LIN , Jigang WANG
IPC: H04W12/06 , H04W12/0431
CPC classification number: H04W12/06 , H04W12/0431 , H04W84/047
Abstract: Techniques are described to perform network relay security. An example wireless communication method includes receiving, by a network device, a request message that includes an identifier associated with a first communication device; determining, by the network device in response to the receiving, that the first communication device is authenticated based on a local policy of the network device; and sending, by the network device in response to the determining, a message to a second communication device to relay to the first communication device, where the message indicates that the identifier is rejected by the network device for communication with the first communication device, or where the message indicates that the first communication device is triggered to send another identifier.
-
公开(公告)号:US20230300702A1
公开(公告)日:2023-09-21
申请号:US18322892
申请日:2023-05-24
Applicant: ZTE Corporation
Inventor: Shilin YOU , Jiyan CAI , Jinguo ZHU , Yuze LIU , Jin PENG , Zhen XING , Zhaoji LIN
Abstract: This disclosure generally relates performing UE authentication and registration with the core network, and in particular, to supporting secure interactions between the UE and the target AMF when the UE is re-allocated to the target AMF from an initial AMF. The Access Network element stores a candidate AMF list, and optionally, the original Registration Request message from the UE. The initial AMF, once determines an AMF re-allocation is needed, instruct the UE to re-start the registration procedure with the core network according to the stored candidate AMF list. With the solutions provided in this disclosure, the message interactions between the UE and the target AMF are integrity protected, without the need to upgrade the UE and without using an indirect connection of the core network.
-
公开(公告)号:US20230232240A1
公开(公告)日:2023-07-20
申请号:US17988431
申请日:2022-11-16
Applicant: ZTE Corporation
Inventor: Shilin YOU , Jiyan CAI , Zhaoji LIN , Jin PENG , Yuze LIU , Zhen XING , Jigang WANG , Min LIU
IPC: H04W12/72 , H04W12/06 , H04W12/0433
CPC classification number: H04W12/72 , H04W12/06 , H04W12/0433
Abstract: Provided are a subscription data update method and apparatus, a node, and a storage medium, where the method includes: in a case where a first network function node determines that authentication and key management for applications (AKMA) subscription data of a user is updated, determining, by the first network function node, a second network function node storing an AKMA context of the user; sending, by the first network function node, a subscription data management notification message to the second network function node; and receiving, by the first network function node, a subscription data management notification response message sent by the second network function node; where the subscription data management notification response message is sent after the second network function node deletes the AKMA context of the user according to the subscription data management notification message.
-
公开(公告)号:US20220337408A1
公开(公告)日:2022-10-20
申请号:US17857389
申请日:2022-07-05
Applicant: ZTE Corporation
Inventor: Shilin YOU , Jiyan CAI , Wantao YU , Yuze LIU , Jin PENG , Zhaoji LIN , Yuxin MAO , Xiuli XU
IPC: H04L9/08 , H04L9/40 , H04W12/041 , H04W12/03
Abstract: This disclosure generally relates to encrypted communication between terminal devices and service applications via a communication network. Such encrypted communication may be based on various hierarchical levels of encryption keys that are generated and managed by the communication network. Such encrypted communication and key management may be provided by the communication network to the terminal devices as a service that can be subscribed to. The various levels of encryption keys may be managed to improve flexibility of the communication network and to reduce potential security breaches.
-
公开(公告)号:US20190166493A1
公开(公告)日:2019-05-30
申请号:US16320704
申请日:2017-06-13
Applicant: ZTE CORPORATION
Inventor: Shilin YOU , Zhaoji LIN , Jin PENG , Hongjun LIU , Xiaowu ZHAO
Abstract: Provided are a key derivation method and device. The method includes: acquiring a slice identifier corresponding to a network slice to which a user equipment is currently attached, where the slice identifier uniquely identifies the network slice; and transmitting the slice identifier to a designated communication device. The slice identifier is configured to instruct the designated communication device to derive, according to the slice identifier, an intermediate key required by the network slice. By means of the technical solution described above, the problem in the related art that a slice function cannot be implemented normally due to the fact that different network slices probably use the same intermediate key may be solved, and different network slices may correspond to different intermediate keys, thereby avoiding a case that the slicing function cannot be implemented normally caused by allocating the same intermediate key to different network slices.
-
公开(公告)号:US20180279394A1
公开(公告)日:2018-09-27
申请号:US15542081
申请日:2015-08-06
Applicant: ZTE CORPORATION
Inventor: Jin PENG , Shilin YOU , Shuang LIANG , Zhaoji LIN
Abstract: A security method for D2D mode B discovery is disclosed in the embodiments of the present disclosure, in four processes of the D2D mode B discovery service, integrity protection is performed, by adding corresponding parameters, on a discovery response message of a passive terminal, a discovery response message of an active terminal, a query request message sent by the active terminal to the passive terminal, a query response message sent by the passive terminal to the active terminal, and the matching report message of the active terminal. A security system, terminal for D2D mode B discovery and a storage medium are further disclosed in the embodiments of the present disclosure.
-
30.
公开(公告)号:US20170118637A1
公开(公告)日:2017-04-27
申请号:US15306852
申请日:2014-07-14
Applicant: ZTE Corporation
Inventor: Jin PENG , Shilin YOU , Zhaoji LIN , Zaifeng ZONG , Li ZHU
IPC: H04W12/04
CPC classification number: H04W12/04 , H04L63/205 , H04W76/14
Abstract: The disclosure discloses a security configuration method for Device to Device (D2D) communication, a Proximity-based Service (ProSe) key management function, User Equipment (UE) and a system. The method includes that: first information indicating security capability of a UE is acquired; and whether to feed back a security configuration response message or a content of the security configuration response message to the UE is determined according to the first information. The disclosure further discloses a computer storage medium.
-
-
-
-
-
-
-
-
-