NETWORK SECURITY MANAGEMENT METHOD, AND APPARATUS

    公开(公告)号:US20240223613A1

    公开(公告)日:2024-07-04

    申请号:US18415304

    申请日:2024-01-17

    IPC分类号: H04L9/40 H04W76/10

    CPC分类号: H04L63/20 H04L63/08 H04W76/10

    摘要: Embodiments of this application provide a network security management method and an apparatus. The method includes: receiving, by a first network device, a session request sent by a terminal device, where the session request is used to request establishment of a first session with a first data network, the session request includes first authentication information for the first session, and the first authentication information includes identifier information of the first data network; obtaining, by the first network device, second authentication information for a second session of the terminal device, where the second authentication information includes identifier information of a second data network to which the second session is connected; and if the identifier information of the first data network is the same as the identifier information of the second data network, authorizing the terminal device to establish the first session with the first data network.

    Network security management method, and apparatus

    公开(公告)号:US11477242B2

    公开(公告)日:2022-10-18

    申请号:US16746479

    申请日:2020-01-17

    IPC分类号: H04L9/40 H04W76/10

    摘要: Embodiments of this application provide a network security management method and an apparatus. The method includes: receiving, by a first network device, a session request sent by a terminal device, where the session request is used to request establishment of a first session with a first data network, the session request includes first authentication information for the first session, and the first authentication information includes identifier information of the first data network; obtaining, by the first network device, second authentication information for a second session of the terminal device, where the second authentication information includes identifier information of a second data network to which the second session is connected; and if the identifier information of the first data network is the same as the identifier information of the second data network, authorizing the terminal device to establish the first session with the first data network.

    Network security management method, and apparatus

    公开(公告)号:US11895157B2

    公开(公告)日:2024-02-06

    申请号:US17939637

    申请日:2022-09-07

    IPC分类号: H04L9/40 H04W76/10

    CPC分类号: H04L63/20 H04L63/08 H04W76/10

    摘要: Embodiments of this application provide a network security management method and an apparatus. The method includes: receiving, by a first network device, a session request sent by a terminal device, where the session request is used to request establishment of a first session with a first data network, the session request includes first authentication information for the first session, and the first authentication information includes identifier information of the first data network; obtaining, by the first network device, second authentication information for a second session of the terminal device, where the second authentication information includes identifier information of a second data network to which the second session is connected; and if the identifier information of the first data network is the same as the identifier information of the second data network, authorizing the terminal device to establish the first session with the first data network.

    Blacklist management method for IBC-based distributed authentication framework

    公开(公告)号:US10581860B2

    公开(公告)日:2020-03-03

    申请号:US16372668

    申请日:2019-04-02

    摘要: A system for managing and distributing a blacklist of User Equipment IDs (UE IDs) in a network. The system comprises a number of groups of networks, each of the groups of networks comprise a blacklist server and a number of authentication servers. The system further comprises a Package Key Generator (PKG). The blacklist server is configured to: store a blacklist containing UE IDs that are not allowed to gain access to the network; transmit the blacklist to the plurality of authentication servers in the same group; receive a message; determine a content in the message is an order to add a new revoked UE ID to the blacklist; update the blacklist to include the new revoked UE ID; and send an update blacklist message to the plurality of authentication servers in the same group.

    Pseudonym credential configuration method and apparatus

    公开(公告)号:US11570008B2

    公开(公告)日:2023-01-31

    申请号:US17129428

    申请日:2020-12-21

    IPC分类号: H04L9/40 H04L9/32 H04L9/08

    摘要: A pseudonym credential configuration method and apparatus are provided. The method includes: receiving an identifier of a terminal device and information about N to-be-requested pseudonym credentials from the terminal device, sending N second request messages to a pseudonym credential generation server, and storing a tag of each second request message in association with the identifier of the terminal device in the registration server, so that the registration server can obtain, based on the tag, the identifier that is of the terminal device and that is associated with the tag; and generating N pseudonym credentials. The pseudonym credential generated in this application may enable a behavior investigation server to learn of a real identity of the terminal device.

    Key generation and distribution method based on identity-based cryptography

    公开(公告)号:US10979903B2

    公开(公告)日:2021-04-13

    申请号:US16258180

    申请日:2019-01-25

    摘要: A key generation and distribution method is disclosed. The method includes receiving a first request from a first requestor, the first requestor comprising an identity of the first requestor; generating a new identity (ID) based on the identity of the first requestor; generating a secret key for the new ID with a predetermined pair of global keys, namely a Global Secret Key (GSK) and a Global Public Key (GPK); transmitting the new ID, secret key and the GPK to the first requestor; receiving a request from a second requestor, the request comprising a plurality of identities; generating an new ID for each of the plurality of identities; generating a secret key based on the IBC key generation algorithm for each of the plurality of new IDs; and transmitting the plurality of new IDs, secret keys corresponding to each of the plurality of IDs and the GPK to the second requestor.