-
公开(公告)号:US09894110B2
公开(公告)日:2018-02-13
申请号:US15015008
申请日:2016-02-03
Applicant: Huawei Technologies Co., Ltd.
Inventor: He Li , Jinzhou Ye , Ridong Xu , Biao Zhang , Shufeng Shi , Boqiang Luo
CPC classification number: H04L65/1069 , H04L12/1407 , H04L41/0668 , H04L41/0893 , H04L43/10 , H04L65/00 , H04L65/1016 , H04L65/1046 , H04L65/1073 , H04L69/40
Abstract: Embodiments of the present invention disclose a method, a related apparatus, and a system for recovering a called service of a terminal. The method includes: when a called request of a user terminal is received, querying an initial proxy-call session control function (P-CSCF) entity with which the user terminal currently registers; if it is detected that the initial P-CSCF is faulty, selecting an available P-CSCF and sending, to the available P-CSCF, a notification message that carries a redundancy identifier, where the redundancy identifier is used to instruct the available P-CSCF to trigger the user terminal to re-register with the P-CSCF; and when a registration complete message sent by the P-CSCF with which the user terminal re-registers is received, delivering the called request to the re-registered P-CSCF to bear a called service of the user terminal.
-
公开(公告)号:US12273706B2
公开(公告)日:2025-04-08
申请号:US18164697
申请日:2023-02-06
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Ao Lei , He Li , Yizhuang Wu , Rong Wu
IPC: H04L29/06 , H04W12/033 , H04W12/037
Abstract: A method for determining a user plane security algorithm, a system, and an apparatus. The method may include: a second device selects a non-null user plane confidentiality protection algorithm based on a security capability of a first device and a security capability of the second device in a case in which user plane confidentiality protection between the second device and the first device is enabled and control plane confidentiality protection between the second device and the first device is not enabled. The second device sends a first message to the first device. The first message includes first algorithm indication information indicating the user plane confidentiality protection algorithm. Therefore, the first device can obtain the non-null user plane confidentiality protection algorithm. Embodiments can be adopted to determine an effective user plane confidentiality protection algorithm, for confidentiality protecting user plane data.
-
公开(公告)号:US12273445B2
公开(公告)日:2025-04-08
申请号:US18050977
申请日:2022-10-28
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Longhua Guo , He Li , Rong Wu , Yizhuang Wu
IPC: H04L9/08 , H04L9/14 , H04L67/141
Abstract: This application provides a key management method, a device, and a system. The method includes: A terminal device sends a first application session establishment request message to a first application function network element, where the establishment request message carries identification information of a first key, and the first key is an authentication and key management for applications AKMA key. The terminal device receives a first authentication request message in a procedure of the re-authentication. The terminal device sends a response message for the first authentication request message in the procedure of the re-authentication. The terminal device receives a response message for the establishment request message. The terminal device derives a communication key between the terminal device and the first application function network element by using the first key.
-
公开(公告)号:US20250063357A1
公开(公告)日:2025-02-20
申请号:US18938104
申请日:2024-11-05
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Abstract: An authentication method, a communication apparatus, and a storage medium are provided. The method includes: a first function network element in a home network determines whether a terminal needs to be authenticated; the first function network element obtains an authentication material when the terminal needs to be authenticated; the first function network element obtains a first authentication vector based on the authentication material; and the first function network element sends a first authentication request message to an AMF to trigger authentication on the terminal, wherein the first authentication request message includes the first authentication vector. According to this application, the first function network element in the home network determines to trigger authentication on the terminal.
-
公开(公告)号:US12231900B2
公开(公告)日:2025-02-18
申请号:US17675784
申请日:2022-02-18
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Longhua Guo , He Li
Abstract: Embodiments of this application provide example communication methods and apparatuses. One example communication method is applied to a communications device, where a subscriber identification module (SIM) card is installed in the communications device, and where the example communication method includes determining, by the communications device, that the SIM card is removed. The communications device can then send alarm information to a network device, where the alarm information indicates that the SIM card in the communications device is removed, and where security protection is performed on the alarm information based on security context stored in the communications device. The communications device can then delete the security context.
-
公开(公告)号:US12225119B2
公开(公告)日:2025-02-11
申请号:US17011698
申请日:2020-09-03
Applicant: Huawei Technologies Co., Ltd.
Abstract: An information sending method, a key generation method, and an apparatus, where a core network element first determines whether a terminal device needs to perform a key activation procedure, and then sends a first message to an access network element, where the first message indicates whether the access network element needs to send, to the terminal device, a second message to trigger the terminal device to perform the key activation procedure. After receiving the first message, the access network element determines, based on the first message, whether the second message needs to be sent to the terminal device, and sends the second message to the terminal device when the second message needs to be sent to the terminal device.
-
公开(公告)号:US11627168B2
公开(公告)日:2023-04-11
申请号:US17214540
申请日:2021-03-26
Applicant: Huawei Technologies Co., Ltd.
Inventor: He Li , Jinzhou Ye , Ridong Xu , Biao Zhang , Shufeng Shi , Boqiang Luo
IPC: H04L65/1069 , H04L41/0668 , H04L65/1073 , H04L69/40 , H04L65/00 , H04L12/14 , H04L65/1016 , H04L43/10 , H04L41/0893 , H04L65/1046
Abstract: A method, a related apparatus, and a system for recovering a called service of a terminal are provided. The method includes: when a called request of a user terminal is received, querying an initial proxy-call session control function (P-CSCF) entity with which the user terminal currently registers; if it is detected that the initial P-CSCF is faulty, selecting an available P-CSCF and sending, to the available P-CSCF, a notification message that carries a redundancy identifier, where the redundancy identifier is used to instruct the available P-CSCF to trigger the user terminal to re-register with the P-CSCF; and when a registration complete message sent by the P-CSCF with which the user terminal re-registers is received, delivering the called request to the re-registered P-CSCF to bear a called service of the user terminal.
-
公开(公告)号:US11622268B2
公开(公告)日:2023-04-04
申请号:US16874064
申请日:2020-05-14
Applicant: Huawei Technologies Co., Ltd.
Abstract: A secure communication method and a secure communications apparatus related to the field of communications technologies and applied to a terminal. The terminal has a first security context and a second security context, the first security context is used by the terminal to communicate with a first network, the second security context is used by the terminal to communicate with a second network, and the first security context and the second security context include different first information.
-
公开(公告)号:US20230090543A1
公开(公告)日:2023-03-23
申请号:US18071314
申请日:2022-11-29
Applicant: Huawei Technologies Co., Ltd.
Inventor: Yizhuang Wu , He Li , Li Hu
IPC: H04W12/50 , H04W12/102 , H04W76/14
Abstract: A user plane security enforcement information determining method and an apparatus are provided, to ensure a security requirement of transmitted data of a remote device. In this application, a session management network element may receive a first request for creating a relay-type session of a first terminal device. Then, the session management network element determines first user plane security enforcement information of the session based on first information, and sends the first user plane security enforcement information of the session to an access network device, where the first user plane security enforcement information of the session is for determining a first user plane security activation status of the session between the first terminal device and the access network device.
-
公开(公告)号:US20230086032A1
公开(公告)日:2023-03-23
申请号:US18050977
申请日:2022-10-28
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Longhua Guo , He Li , Rong Wu , Yizhuang Wu
IPC: H04L9/08 , H04L9/14 , H04L67/141
Abstract: This application provides a key management method, a device, and a system. The method includes: A terminal device sends a first application session establishment request message to a first application function network element, where the establishment request message carries identification information of a first key, and the first key is an authentication and key management for applications AKMA key. The terminal device receives a first authentication request message in a procedure of the re-authentication. The terminal device sends a response message for the first authentication request message in the procedure of the re-authentication. The terminal device receives a response message for the establishment request message. The terminal device derives a communication key between the terminal device and the first application function network element by using the first key.
-
-
-
-
-
-
-
-
-