-
公开(公告)号:US10904750B2
公开(公告)日:2021-01-26
申请号:US16383087
申请日:2019-04-12
Applicant: Huawei Technologies Co., Ltd.
Abstract: In a method for security handling in a mobility of a terminal device, a target access and mobility management function (AMF) entity receives a first message for registering a terminal device, sends a second message to a source AMF entity after receiving the first message. The source AMF entity derives a first key based on a key between the source AMF entity and the terminal device, sends the first key to the target AMF entity. The target AMF entity determines to use the first key based on security related information after receiving the first key and determines a communication key between the target AMF entity and the terminal device based on the first key after determining to use the first key.
-
公开(公告)号:US10805793B2
公开(公告)日:2020-10-13
申请号:US16585978
申请日:2019-09-27
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Abstract: The present disclosure discloses a communication method performed by a management function entity, including: receiving a first request message sent by user equipment UE; sending a second request message to a storage function entity based on the first request message, where the second request message is used to request a security service identifier for the UE, and the security service identifier is used to indicate a security service procedure; receiving a response message including the security service identifier from the storage function entity; obtaining a target security service identifier based on the security service identifier, where the target security service identifier is used to indicate a security service procedure to be initiated by the management function entity; and initiating the security service procedure indicated by the target security service identifier. The present disclosure further discloses a communications device.
-
公开(公告)号:US10798579B2
公开(公告)日:2020-10-06
申请号:US16728764
申请日:2019-12-27
Applicant: Huawei Technologies Co., Ltd.
IPC: H04W8/08 , H04W12/10 , H04W76/27 , H04W80/10 , H04W12/04 , H04L29/06 , H04W92/10 , H04W12/08 , H04W12/00 , H04W12/02
Abstract: A communication method and a related apparatus, where a base station obtains a security policy, where the security policy includes integrity protection indication information, and where the integrity protection indication information is used to instruct the base station whether to enable integrity protection for a terminal device. When the integrity protection indication information instructs the base station to enable integrity protection for the terminal device, the base station sends a target user plane integrity protection indication information to the terminal device.
-
公开(公告)号:US10735480B2
公开(公告)日:2020-08-04
申请号:US16146813
申请日:2018-09-28
Applicant: Huawei Technologies Co., Ltd.
Inventor: He Li , Jinzhou Ye , Ridong Xu , Biao Zhang , Shufeng Shi , Boqiang Luo
Abstract: A method, a related apparatus, and a system for recovering a called service of a terminal are provided. The method includes: when a called request of a user terminal is received, querying an initial proxy-call session control function (P-CSCF) entity with which the user terminal currently registers; if it is detected that the initial P-CSCF is faulty, selecting an available P-CSCF and sending, to the available P-CSCF, a notification message that carries a redundancy identifier, where the redundancy identifier is used to instruct the available P-CSCF to trigger the user terminal to re-register with the P-CSCF; and when a registration complete message sent by the P-CSCF with which the user terminal re-registers is received, delivering the called request to the re-registered P-CSCF to bear a called service of the user terminal.
-
公开(公告)号:US20190268753A1
公开(公告)日:2019-08-29
申请号:US16383087
申请日:2019-04-12
Applicant: Huawei Technologies Co., Ltd.
Abstract: In a method for security handling in a mobility of a terminal device; a target access and mobility management function (AMF) entity receives a first message for registering a terminal device, sends a second message to a source AMF entity after receiving the first message. The source AMF entity derives a first key based on a key between the source AMF entity and the terminal device, sends the first key to the target AMF entity. The target AMF entity determines to use the first key based on security related information after receiving the first key and determines a communication key between the target AMF entity and the terminal device based on the first key after determining to use the first key.
-
公开(公告)号:US20190253403A1
公开(公告)日:2019-08-15
申请号:US16388326
申请日:2019-04-18
Applicant: Huawei Technologies Co., Ltd.
Inventor: He Li , Jing Chen , Huan Li , Yizhuang Wu
Abstract: This application relates to the field of communications technologies, and discloses a network authentication triggering system, method and a related device. The method includes: receiving a first message from a terminal, where the first message carries first identity information and identifier information, the first identity information is encrypted identity information, and the identifier information is used to identify an encryption manner of the first identity information; and sending a second message to a first security function entity, where the second message is used to trigger authentication for the terminal, and the second message carries the identifier information. This application provides a solution of triggering an authentication process when identity information is encrypted.
-
公开(公告)号:US10278073B2
公开(公告)日:2019-04-30
申请号:US15890936
申请日:2018-02-07
Applicant: Huawei Technologies Co., Ltd.
Inventor: He Li , Youyang Yu , Jing Chen
Abstract: A processing method for terminal access to a 3GPP network is provided. A UE sends an access request message to a core network device on the 3GPP network, and the core network device sends an unauthorized access message to the UE after determining that the UE has no permission to access the 3GPP network. The unauthorized access message includes authentication information of the core network device. The UE performs authentication on the core network device according to the authentication information of the core network device, and executes a corresponding network access policy after authentication on the core network device by the UE succeeds, that is, after the UE determines that a source of the unauthorized access message is authorized.
-
-
-
-
-
-