Abstract:
An anti-pseudo base station method and apparatus, and a computer-readable storage medium are provided. The anti-pseudo base station method includes: sending, by a base station, first anti-pseudo base station capacity information to a mobile terminal, wherein the first anti-pseudo base station capacity information is used for identifying an anti-pseudo base station capacity of the base station.
Abstract:
The present disclosure relates to a wireless communication method, systems and devices for a registration procedure. The wireless communication method for use in a wireless terminal includes determining a concealed identifier based on a permanent identifier and a check value. A message with the concealed identifier for a registration procedure is transmitted to a wireless network node.
Abstract:
Disclosed is a method for secure transmission of small data of a machine type communication (MTC) device group, comprising a process wherein an MTC device and an MTC-Interworking Function (MTC-IWF) generate a shared key KIWF on the basis of a GBA procedure, the MTC device and a bootstrapping server (BSF) performing AKA authentication: a home subscriber server (HSS) determines whether the MTC device belongs to the MTC device group and whether said device has small data transmission and reception capabilities; if said device belongs to said group and has said capabilities, an AKA authentication vector generated on the basis of the MTC device group key is sent to said BSF; the BSF carries out AKA authentication with the MTC device on the basis of the received AKA authentication vector. Also disclosed is a system for secure transmission of small data of an MTC device group.
Abstract:
Methods, systems, and devices related to related to digital wireless communication, and more specifically, to techniques related to securing a user authentication procedure. In one exemplary aspect, a method for wireless communication includes transmitting an authentication message from a network node. The method also includes determining a failure value indicating a reason for failure of the authentication message. The method also includes encrypting the failure value and an identifier. The method also includes transmitting an encrypted response message to the network node. In another exemplary aspect, a method for wireless communication includes transmitting an authentication message to a terminal. The method also includes receiving an encrypted response message from the terminal. The method also includes decrypting the encrypted response message to determine the failure value and the indicator.
Abstract:
Provided are a method and device for reporting a capacity, a method and device for key agreement, a terminal and a communication device and system. The terminal sends anti-pseudo base station capacity indication information to the communication device, and the anti-pseudo base station capacity indication information can indicate an anti-pseudo base station capacity of the terminal to the communication device. The communication device can determine the anti-pseudo base station capacity of the terminal after acquiring the anti-pseudo base station capacity indication information sent by the terminal, and perform an authentication and key agreement process matching the anti-pseudo base station capacity of the terminal and an anti-pseudo base station capacity of a target base station.
Abstract:
Disclosed is a method for managing a device-to-device (D2D) communication group. The method comprises: a network side device establishes a D2D communication group, and delivers a shared key generated for the D2D communication group to all the devices in the D2D communication group, the shared key being used for D2D communication of all the devices; and the network side device determines that the D2D communication group terminates the D2D communication, and deletes the D2D communication group and the shared key. Also disclosed are a device and a computer storage medium.
Abstract:
The present disclosure describes methods, systems and devices for establishing secure communication between a user equipment and a service application in a wireless communication. One method includes receiving, by the user equipment, an authentication and key management for service applications identifier (AKMAID) from an authentication server function (AUSF) upon successful completion of an authentication process for registering the user equipment with the communication network. The method also includes storing, by the user equipment, the AKMAID; deriving, by the user equipment, an application key based on a base authentication key; sending, by the user equipment, a communication request to the service application, the communication request comprising the AKMAID; and receiving, by the user equipment, an application session establishment response to the communication request from the service application to establish a security communication session between the user equipment and the service application based on the application key.
Abstract:
Methods, apparatus, and systems to establish a secure communication in a wireless network are described. In one example aspect, a wireless communication method includes generating, by a first function entity, a first identifier configured to be used to establish a secure communication for a first device, using at least a mobile country code, a mobile network code, and a random number, and transmitting the first identifier to the first device.
Abstract:
Disclosed are a method for protecting a machine type communication device, a network entity, and a machine type communication (MTC) device service capability opening functional entity. The method comprises: after a network entity authenticates an external application, establish a security association between the external application and an MTC device according to a preset rule; and the network entity sends the security association between the external application and the MTC device to the corresponding MTC device, so as to determine, by means of the security association between the external application and the MTC device, the MTC device that can be accessed by the external application under authorization.
Abstract:
Provided is a SIP-based method for secure communication between MTC devices, including that an SIP server establishes a secure connection with a source MTC device and a secure connection with a target MTC device respectively through a GBA manner or a GBA-push manner, the SIP server generates an application layer session key, sends the application layer session key to the source MTC device through the secure connection between the SIP server and the source MTC device, and sends the application layer session key to the target MTC through the secure connection between the SIP server and the target MTC device. A SIP-based system and apparatus for secure communication between MTC devices are also provided. The establishment of a secure connection between MTC devices based on an SIP protocol can be implemented.