Communication Method and Apparatus
    41.
    发明公开

    公开(公告)号:US20230327857A1

    公开(公告)日:2023-10-12

    申请号:US18324474

    申请日:2023-05-26

    CPC classification number: H04L9/0825 H04L9/0894 H04L9/3247

    Abstract: A communication method includes: sending a first public key and a signature of the first public key; receiving first information from a second node, where the first information includes an identification (ID) ciphertext; decrypting the ID ciphertext based on a first private key corresponding to the first public key, to obtain an ID of the second node; and sending second information to the second node, where the second information includes a temporary ID corresponding to the second node, and the temporary ID is used to temporarily indicate an identity of the second node.

    Key update method and apparatus
    43.
    发明授权

    公开(公告)号:US11595206B2

    公开(公告)日:2023-02-28

    申请号:US16922485

    申请日:2020-07-07

    Inventor: He Li Jing Chen

    Abstract: Embodiments of this application provide key update methods and apparatuses in the field of communications technologies. A communications system includes a terminal and a core network device. The terminal can access the core network device using both a first access technology and a second access technology. The first connection and the second connection have a shared key. Key update for the first connection is performed in obtaining a first key identifier that identifies a first key obtained by performing the key update for the first connection. In response to determining that the second connection is in a connected state, the shared key for the second connection and a second key identifier that identifies the shared key are retained. The shared key is kept using for the second connection before performing key update for the second connection.

    Communication method, communications apparatus, and system

    公开(公告)号:US11546771B2

    公开(公告)日:2023-01-03

    申请号:US16834858

    申请日:2020-03-30

    Abstract: A communication method includes receiving, by an access network (AN) node, indication information from a mobility management device. The indication information is indicative of a security policy of a quality of service (QoS) flow. The method also includes obtaining, by the access network node based on the indication information, security information of a radio bearer corresponding to the QoS flow. The security information is indicative of a security policy of the radio bearer. The method further includes sending, by the access network node, an identifier of the radio bearer and the security information of the radio bearer to a terminal.

    Methods, apparatuses, and systems for voice service handover

    公开(公告)号:US11523308B2

    公开(公告)日:2022-12-06

    申请号:US17038207

    申请日:2020-09-30

    Abstract: A communication method and a communications apparatus, the method including receiving, by an access and mobility management function (AMF) entity, a first message from a first access network device, where the first message comprises information for indicating to hand over a voice service of a terminal from a packet switched (PS) domain to a circuit switched (CS) domain, the first message further comprises identification information of a target device, and the target device is a second access network device in a 3G network, and sending, by the AMF entity, through a mobility management entity (MME) a request message to a mobile switching center (MSC) entity, where the request message comprises information indicating a source of the first message.

    Method and device for verifying key requester

    公开(公告)号:US11445370B2

    公开(公告)日:2022-09-13

    申请号:US16453833

    申请日:2019-06-26

    Inventor: He Li Jing Chen

    Abstract: A method and device for verifying a key requester are described. The method may include a security function entity receiving a request message sent by a user management function (UMF) entity. The method may also include decrypting information in the request message by using a private key of the security function entity, and obtaining the information carried in the request message after signature verification on decrypted information using a public key in a certificate of the UMF entity succeeds. Furthermore, the method may include determining to provide a key of a user equipment (UE) for the UMF entity, when determining that a first verification parameter carried in the request message is valid and determining that an identifier which is of the UMF entity and which is carried in the request message is the same as an identifier of a UMF entity to which the UE attaches.

    Communication Method and Apparatus
    47.
    发明申请

    公开(公告)号:US20220256344A1

    公开(公告)日:2022-08-11

    申请号:US17731931

    申请日:2022-04-28

    Inventor: Kai Pan Jing Chen

    Abstract: A communication method performed by a second apparatus includes sending a first message to a first apparatus, where the first message is used for requesting M pieces of verification information from the first apparatus; the second apparatus receives a second message from the first apparatus, where the second message includes N pieces of verification information included in the M pieces of verification information, and N is an integer less than or equal to M.

    METHOD, DEVICE, AND SYSTEM FOR DERIVING KEYS

    公开(公告)号:US20220150062A1

    公开(公告)日:2022-05-12

    申请号:US17583013

    申请日:2022-01-24

    Abstract: Method, device, and system for deriving keys are provided in the field of mobile communications technologies. The method for deriving keys may be used, for example, in a handover process of a User Equipment (UE) from an Evolved Universal Terrestrial Radio Access Network (EUTRAN) to a Universal Terrestrial Radio Access Network (UTRAN). If a failure occurred in a first handover, the method ensures that the key derived by a source Mobility Management Entity (MME) for a second handover process of the UE is different from the key derived for the first handover process of the UE. This is done by changing input parameters used in the key derivation, so as to prevent the situation in the prior art that once the key used on one Radio Network Controller (RNC) is obtained, the keys on other RNCs can be derived accordingly, thereby enhancing the network security.

Patent Agency Ranking