Security Context Obtaining Method and Apparatus, and Communications System

    公开(公告)号:US20210092608A1

    公开(公告)日:2021-03-25

    申请号:US17114812

    申请日:2020-12-08

    Inventor: Fei Li Bo Zhang

    Abstract: A security context obtaining method includes: a first access and mobility management function (AMF) receiving a first registration request message sent by a user equipment (UE) and validating integrity protection for the first registration request message; if the first AMF successfully validates integrity protection for the first registration request message, sending, by the first AMF, a second request message to a second AMF; the second AMF receiving the second request message; and if the second request message carries indication information and the indication information is used to indicate that the UE is validated, sending, by the second AMF, a security context of the UE to the first AMF.

    Information Transmission Method, Gateway, and Controller

    公开(公告)号:US20180367635A1

    公开(公告)日:2018-12-20

    申请号:US16110604

    申请日:2018-08-23

    Inventor: Fei Li

    Abstract: An information transmission method, a gateway, and a controller relate to the communications field, and to determine a compression parameter according to an operating status and a transmission port of the gateway, thereby implementing an optimal combination of processor performance and bandwidth. The method includes that a gateway determines a current operating status and a current transmission port of the gateway, where the current transmission port is a current communications port between the gateway and a controller, the gateway determines a first compression parameter table according to the current operating status and the current transmission port, where the first compression parameter table includes at least one compression parameter determined by the gateway, and the first compression parameter table further indicates a priority of each compression parameter, the gateway transmits information to the controller according to the first compression parameter table using the current transmission port.

    Service instance mapping method, apparatus and system

    公开(公告)号:US09900254B2

    公开(公告)日:2018-02-20

    申请号:US14061535

    申请日:2013-10-23

    Inventor: Fei Li Yizhou Li

    CPC classification number: H04L47/17 H04L12/4662 H04L45/50

    Abstract: The present invention discloses a service instance mapping method, apparatus and system. The service instance mapping method includes: correlating a layer-2 service instance with a service access port of the service instance, and determining correspondence between the service access port and a service instance identifier; and mapping the service instance identifier to a service label of a packet. In embodiments of the present invention, because the service label is adopted to carry the service instance identifier, a higher service label supporting capability may be included, more service instances may be supported, and a multi-tenant requirement in a large-scale public cloud environment can be met; control protocol support is extended, and extension of a TRILL protocol can fulfill a higher service development capability.

    Communication method and communications device

    公开(公告)号:US12200484B2

    公开(公告)日:2025-01-14

    申请号:US17490276

    申请日:2021-09-30

    Inventor: Fei Li Ruchuan Du

    Abstract: A communication method and a communications device, where the communication method includes: When a user equipment roams from a first network to a second network, a first core network device receives a first request, where the first request is a user authentication request or an authentication data request, where the first request carries an authentication vector request indication, where the second network is a 5G standalone network, where the first network is a 5G non-standalone network, and where the first core network device is in the first network. The first core network device generates an authentication vector quintet based on the authentication vector request indication, where a 0th bit of an authentication management field in the authentication vector quintet is set to 1. The first core network device sends a response to the first request, where the response to the first request carries the authentication vector quintet.

    Method and apparatus for creating virtualized network function instance

    公开(公告)号:US11487867B2

    公开(公告)日:2022-11-01

    申请号:US16894198

    申请日:2020-06-05

    Inventor: Fei Li

    Abstract: This application provides a method and an apparatus for creating a virtualized network function instance VNFI. The method includes: generating, by a hardware-mediated execution enclave HMEE in a network functions virtualization NFV system, a private-public key pair, where a to-be-instantiated VNFI is deployed in the NFV system, and the HMEE and a to-be-instantiated first virtualized network function component VNFC are deployed in the VNFI; sending a public key in the private-public key pair to a security control device; receiving an encrypted security credential from the security control device, where the encrypted security credential is obtained by encrypting a security credential of a package of the first VNFC based on the public key, and the security credential is used to decrypt the package of the first VNFC; and decrypting the encrypted security credential based on a private key in the private-public key pair, to obtain the security credential.

    IDENTITY VERIFICATION METHOD FOR NETWORK FUNCTION SERVICE AND RELATED APPARATUS

    公开(公告)号:US20250023863A1

    公开(公告)日:2025-01-16

    申请号:US18786610

    申请日:2024-07-29

    Inventor: Bo Zhang Fei Li

    Abstract: In an identity verification method for a network function service, a network element receives from a requesting network element a network function (NF) service request that includes a token, The token includes first certificate information. The network element verifies the first certificate information to determine whether an identity represented by the first certificate information is consistent with an identity of the requesting network element. When the network element determines that the identity represented by the first certificate information is inconsistent with the identity of the requesting network element, the network element rejects the NF service request.

    WIRELESS COMMUNICATION METHOD AND APPARATUS
    8.
    发明公开

    公开(公告)号:US20240163670A1

    公开(公告)日:2024-05-16

    申请号:US18424458

    申请日:2024-01-26

    CPC classification number: H04W12/069 H04L9/30

    Abstract: This application provides a wireless communication method and apparatus. The wireless communication method includes: A first device obtains first information, where the first information includes a correspondence between first customer premise equipment and at least one first terminal device, and a correspondence between the first terminal device and at least one second terminal device. The first device configures the first information on a second device, where the first information is used by the second device to verify that a received service packet is a service packet sent by the first terminal device to the second terminal device by using the first customer premise equipment. Therefore, accuracy of service packet transmission of an industrial terminal device can be ensured, an industrial terminal or customer premise equipment can be prevented from being attacked to some extent, a loss caused by the attack on the device is reduced, and information security of the industrial terminal device in an industrial field network and an entire industrial field network is improved.

    Handover handling method and apparatus

    公开(公告)号:US11576092B2

    公开(公告)日:2023-02-07

    申请号:US16939926

    申请日:2020-07-27

    Inventor: Fei Li Linping Yang

    Abstract: A handover handling method and apparatus applied to a scenario in which user equipment (UE) is handed over from a first access and management function (AMF) to a second AMF, and where the method includes receiving, by the UE, a handover command message from a first access network device, wherein the handover command message carries a Non-Access Stratum container (NASC), performing, by the UE, integrity verification on the NASC, and continuing, by the UE, to use a first NAS security context when the integrity verification performed on the NASC fails, wherein the first NAS security context is a security context used between the UE and the first AMF.

Patent Agency Ranking