Anchor Key Generation Method, Device, and System

    公开(公告)号:US20220295271A9

    公开(公告)日:2022-09-15

    申请号:US17245991

    申请日:2021-04-30

    Inventor: Rong Wu Bo Zhang Lu Gan

    Abstract: An anchor key generation method, device, and system, where the method includes generating, by a unified data management network element (UDM), an intermediate key based on a cipher key (CK), an integrity key (IK), and indication information regarding an operator; sending, by the UDM, the intermediate key to an authentication server function (AUSF); receiving, by the AUSF, the intermediate key; generating, by the AUSF, an anchor key based on the intermediate key; sending, by the AUSF, the anchor key to a security anchor function (SEAF); and generating, by the SEAF, a key (Kamf) based on the anchor key, where the Kamf is used to derive a 3rd Generation Partnership Project (3GPP) key.

    Key Distribution Method, Key Receiving Method, First Key Management System, and First Network Element

    公开(公告)号:US20220286442A1

    公开(公告)日:2022-09-08

    申请号:US17700064

    申请日:2022-03-21

    Inventor: Lu Gan Bo Zhang

    Abstract: The present invention disclose a key distribution method. The method includes obtaining, by a first key management system, a shared key of a first network element, where the shared key of the first network element is generated according to a key parameter obtained after the first network element performs authentication or a root key of the first network element; obtaining a service key, where the service key is used to perform encryption and/or integrity protection on communication data in a first service between the first network element and a second network element; performing encryption and/or integrity protection on the service key by using the shared key of the first network element, to generate a first security protection parameter; and sending the first security protection parameter to the first network element. According to present invention, data can be protected against an eavesdropping attack in a sending process.

    Key distribution and authentication method and system, and apparatus

    公开(公告)号:US11240218B2

    公开(公告)日:2022-02-01

    申请号:US16169416

    申请日:2018-10-24

    Abstract: This application provides a key distribution and authentication method, system, and an apparatus. The method includes: a service center server distributes different keys to terminal devices, and then the terminal devices perform mutual authentication with the network authentication server based on respective keys and finally obtain communication keys for communication between the terminal devices and a functional network element. This provides a method for establishing a secure communication channel for the terminal device, having a broad application range.

    Network roaming protection method, related device, and system

    公开(公告)号:US11109230B2

    公开(公告)日:2021-08-31

    申请号:US16909601

    申请日:2020-06-23

    Inventor: Rong Wu Bo Zhang Lu Gan

    Abstract: Embodiments of the present disclosure disclose a network roaming protection method and related device. The method includes: receiving, by a visited session management device, a first session establishment request that includes a first security requirement; obtaining, by the visited session management device, a target security policy, where the target security policy is obtained by processing the first security requirement set and a second security requirement set using a preset rule; and sending the target security policy to the UE instructing the UE to generate a target shared key based on a reference shared key and according to a rule defined by the target security policy, where the target shared key is used to protect secure end-to-end data transmission between the UE and the visited gateway.

    Anchor Key Generation Method, Device, and System

    公开(公告)号:US20210258780A1

    公开(公告)日:2021-08-19

    申请号:US17245991

    申请日:2021-04-30

    Inventor: Rong Wu Bo Zhang Lu Gan

    Abstract: An anchor key generation method, device, and system, where the method includes generating, by a unified data management network element (UDM), an intermediate key based on a cipher key (CK), an integrity key (IK), and indication information regarding an operator; sending, by the UDM, the intermediate key to an authentication server function (AUSF); receiving, by the AUSF, the intermediate key; generating, by the AUSF, an anchor key based on the intermediate key; sending, by the AUSF, the anchor key to a security anchor function (SEAF); and generating, by the SEAF, a key (Kamf) based on the anchor key, where the Kamf is used to derive a 3rd Generation Partnership Project (3GPP) key.

    Key Configuration Method, Apparatus, and System

    公开(公告)号:US20200084631A1

    公开(公告)日:2020-03-12

    申请号:US16674697

    申请日:2019-11-05

    Abstract: A key configuration method includes receiving, by a policy function network element, a request for communication between a user equipment (UE) and a network device, determining a user plane protection mechanism based on the request, UE registration information, subscription service data, and a service security requirement, and sending the user plane protection mechanism to an algorithm network element when the network device is a core network (CN) device, where the algorithm network element determines a security protection algorithm based on the user plane protection mechanism, generates a first user plane protection key based on the security protection algorithm, sends the first user plane protection key to the CN device, and sends the security protection algorithm to the UE, and the UE generates a second user plane protection key based on the security protection algorithm.

    Method and apparatus for detecting man-in-the-middle attack

    公开(公告)号:US10362043B2

    公开(公告)日:2019-07-23

    申请号:US15270722

    申请日:2016-09-20

    Abstract: A method and an apparatus for detecting a man-in-the-middle attack, where the method includes receiving, by a macro evolved Node B (MeNB), a first check request message sent by a secondary evolved Node B (SeNB), where the first check request message includes first identifier information and a first data packet count value, generating a second check request message according to the first identifier information, sending the second check request message to a user terminal, receiving a first check response message generated by the user terminal according to the second check request message, where the first check response message includes second identifier information and a second data packet count value, determining, by the MeNB, that the man-in-the-middle attack exists between the SeNB and the user terminal when the first data packet count value is different from the second data packet count value.

Patent Agency Ranking