-
公开(公告)号:US20210084554A1
公开(公告)日:2021-03-18
申请号:US17107545
申请日:2020-11-30
Applicant: Huawei Technologies Co., Ltd.
Inventor: Jing Chen , Ruchuan Du , Caixia Qi
Abstract: A converged network device: receives a handover requirement from a first access device in a first network, where the handover requirement carries an identifier of a second access device in a second network or an identity of a tracking area served by the second access device; determines, based on the identifier of the second access device or the identity of the tracking area served by the second access device, that the second access device is managed by the converged network device; sends a handover request to the second access device, where the handover request is used to request the second access device to prepare a related resource for the terminal; sends a handover command to the first access device, where the handover command is used to instruct to hand over the terminal to the second access device; and receives a handover notification from the second access device.
-
公开(公告)号:US20210045018A1
公开(公告)日:2021-02-11
申请号:US17038207
申请日:2020-09-30
Applicant: Huawei Technologies Co., Ltd.
Inventor: Xiaoying Xu , Xing Liu , Jing Chen , Qinghai Zeng , Yang Zhao
Abstract: A communication method and a communications apparatus, the method including receiving, by an access and mobility management function (AMF) entity, a first message from a first access network device, where the first message comprises information for indicating to hand over a voice service of a terminal from a packet switched (PS) domain to a circuit switched (CS) domain, the first message further comprises identification information of a target device, and the target device is a second access network device in a 3G network, and sending, by the AMF entity, through a mobility management entity (MME) a request message to a mobile switching center (MSC) entity, where the request message comprises information indicating a source of the first message.
-
公开(公告)号:US10812256B2
公开(公告)日:2020-10-20
申请号:US16537330
申请日:2019-08-09
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Dongmei Zhang , Jing Chen
Abstract: Embodiments of the present invention disclose a method, an apparatus, and a system for establishing a security context and relates to the communications field, so as to comprehensively protect UE data. The method includes: acquiring an encryption algorithm of an access node; acquiring a root key and deriving, according to the root key and the encryption algorithm, an encryption key of the access node; sending the encryption key and the encryption algorithm to the access node, so that the access node starts downlink encryption and uplink decryption; sending the encryption algorithm of the access node to the UE so as to negotiate the encryption algorithm with the UE; and instructing the access node to start downlink encryption and uplink decryption and instructing, during algorithm negotiation, the UE to start downlink decryption and uplink encryption.
-
公开(公告)号:US10771966B2
公开(公告)日:2020-09-08
申请号:US15965854
申请日:2018-04-28
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Lijia Zhang , Jing Chen
Abstract: In order to provide confidentiality protection, an encryption method, a decryption method, and related apparatuses are provided. An encryption device generates a first initial layer-3 message. The first initial layer-3 message includes a first part and a second part. The device generates a keystream for encrypting the first initial layer-3 message. The device performs an exclusive OR operation on the keystream and the first initial layer-3 message to generate a second initial layer-3 message. The second initial layer-3 message includes an encrypted first part of the first initial layer-3 message, an unencrypted second part of the first initial layer-3 message, and an encryption indication indicating that the first part of the first initial layer-3 message is encrypted. The device transmits the second initial layer-3 message to a network device. Small data comprised in the second initial layer-3 message is protected by the encryption.
-
公开(公告)号:US20200275276A1
公开(公告)日:2020-08-27
申请号:US16874306
申请日:2020-05-14
Applicant: Huawei Technologies Co., Ltd.
Abstract: A security protection method and an apparatus to implement security protection for a plurality of non-access stratum (NAS) connection links. The method includes determining, by a terminal, a first parameter, where the first parameter is used to indicate an access technology used to transmit a non-access stratum NAS message. The terminal can support at least two access technologies, and can separately maintain a corresponding NAS COUNT for each of the at least two access technologies. The method further includes performing, by the terminal, security protection on the NAS message based on the first parameter, a NAS key, and a NAS COUNT corresponding to an access technology used to transmit the NAS message.
-
公开(公告)号:US10735185B2
公开(公告)日:2020-08-04
申请号:US16140217
申请日:2018-09-24
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Dongmei Zhang , Jing Chen
Abstract: Embodiments disclose a method, an apparatus, and a system for establishing a security context and relates to the communications field, so as to comprehensively protect UE data. The method includes: acquiring an encryption algorithm of an access node; acquiring a root key and deriving, according to the root key and the encryption algorithm, an encryption key of the access node; sending the encryption key and the encryption algorithm to the access node, so that the access node starts downlink encryption and uplink decryption; sending the encryption algorithm of the access node to the UE so as to negotiate the encryption algorithm with the UE; and instructing the access node to start downlink encryption and uplink decryption and instructing, during algorithm negotiation, the UE to start downlink decryption and uplink encryption.
-
公开(公告)号:US10687213B2
公开(公告)日:2020-06-16
申请号:US15782584
申请日:2017-10-12
Applicant: Huawei Technologies Co., Ltd.
Inventor: Jing Chen
Abstract: The embodiments of the present invention provide a secure establishment method, system and device of a wireless local area network. The method includes: acquiring, by a UE, a first key; the first key is a shared key of the UE and a network element equipment in a mobile communication network accessed by the UE when implementing air interface security, or is derived according to the shared key; deriving, by the UE, according to the first key and a derivation parameter to acquire a derivation key; establishing, by the UE, according to the derivation key, a secure connection with a WLAN node acquiring a derivation key, wherein the derivation key acquired by the WLAN node is the same as the derivation key acquired by the UE.
-
公开(公告)号:US20190246282A1
公开(公告)日:2019-08-08
申请号:US16386462
申请日:2019-04-17
Applicant: Huawei Technologies Co., Ltd.
Abstract: A communication method and a related apparatus are provided. A base station obtains a security policy, where the security policy includes integrity protection indication information, and the integrity protection indication information is used to indicate the base station whether to enable integrity protection for a terminal device; and when the integrity protection indication information indicates the base station to enable integrity protection for the terminal device, the base station sends a target user plane integrity protection algorithm to the terminal device.
-
公开(公告)号:US20190208416A1
公开(公告)日:2019-07-04
申请号:US16298387
申请日:2019-03-11
Applicant: Huawei Technologies Co., Ltd.
Inventor: He Li , Jing Chen , Jiangsheng Wang
CPC classification number: H04W12/0401 , H04L9/08 , H04L9/0877 , H04L63/205 , H04W12/04 , H04W12/04033 , H04W12/04071 , H04W76/15
Abstract: Embodiments of the present invention provide a key negotiation method and apparatus. The method includes: obtaining, by a first base station, a selected key generation capability, and generating a first key parameter based on the selected key generation capability; sending, by the first base station, the first key parameter to a second base station, where the first key parameter is forwarded by the second base station to a terminal; and obtaining, by the first base station, a second key parameter generated by the terminal, and generating a first base key based on the first key parameter and the second key parameter. The first base station independently generates the base key, and the second base station plays only a role of parameter transfer.
-
公开(公告)号:US10218513B2
公开(公告)日:2019-02-26
申请号:US14707484
申请日:2015-05-08
Applicant: Huawei Technologies Co., Ltd.
Inventor: Xiaoyu Bi , Jing Chen , Yixian Xu , Chunshan Xiong
Abstract: Embodiments of the present invention provide a method and a terminal for message verification, which can enhance timeliness of event message verification. The method includes: receiving an event message sent by a cell broadcast entity; obtaining a public key of a CA according to pre-configured information for determining the public key of the CA and information for determining the public key of the CA and obtained from a network side, or according to information of the CA obtained from the network side; then, obtaining a public key of the cell broadcast entity according to the obtained public key of the CA and an implicit certificate of the cell broadcast entity; verifying a signature of the cell broadcast entity over the event message according to the public key of the cell broadcast entity; and finally, determining legitimacy of the event message according to the verification result.
-
-
-
-
-
-
-
-
-