WO2021196913A1 - 一种终端参数更新的保护方法和通信装置 - Google Patents
一种终端参数更新的保护方法和通信装置 Download PDFInfo
- Publication number
- WO2021196913A1 WO2021196913A1 PCT/CN2021/077280 CN2021077280W WO2021196913A1 WO 2021196913 A1 WO2021196913 A1 WO 2021196913A1 CN 2021077280 W CN2021077280 W CN 2021077280W WO 2021196913 A1 WO2021196913 A1 WO 2021196913A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- ausf
- terminal
- service network
- udm
- service
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 174
- 230000006854 communication Effects 0.000 title claims abstract description 149
- 238000004891 communication Methods 0.000 title claims abstract description 148
- 230000004044 response Effects 0.000 claims abstract description 78
- 230000006870 function Effects 0.000 claims description 62
- 238000012545 processing Methods 0.000 claims description 56
- 238000004590 computer program Methods 0.000 claims description 22
- 230000009977 dual effect Effects 0.000 claims description 18
- 238000007726 management method Methods 0.000 claims description 13
- 238000013523 data management Methods 0.000 claims description 8
- 230000008569 process Effects 0.000 description 77
- 238000005516 engineering process Methods 0.000 description 12
- 238000012790 confirmation Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 10
- 238000012795 verification Methods 0.000 description 7
- 230000006399 behavior Effects 0.000 description 6
- 238000013461 design Methods 0.000 description 6
- 101100055418 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) AMF1 gene Proteins 0.000 description 5
- 238000013475 authorization Methods 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 5
- 230000000694 effects Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 230000003068 static effect Effects 0.000 description 4
- 235000014510 cooky Nutrition 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 238000010168 coupling process Methods 0.000 description 2
- 238000005859 coupling reaction Methods 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000003190 augmentative effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000011144 upstream manufacturing Methods 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/18—Selecting a network or a communication service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W60/00—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
- H04W60/005—Multiple registrations, e.g. multihoming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
- H04W8/08—Mobility data transfer
- H04W8/12—Mobility data transfer between location registers or mobility servers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/186—Processing of subscriber group data
Definitions
- the first AUSF has the authentication result of the terminal in multiple service networks, and the multiple service networks include the first service network; or, the terminal is in multiple service networks, and the multiple service networks include the first service network.
- the parameter update information of the terminal includes roaming processing (steering of roaming, SoR) information.
- roaming processing steering of roaming, SoR
- the communication device includes, for example, a processing module and a transceiver module that are coupled to each other, where the transceiver module is used to send a protection request message to the first AUSF, and receive a response to the protection request message sent by the first AUSF Message, the protection request message is used to request the parameter update information of the protection terminal, the protection request message carries the parameter update information and the first service network information; the processing module is used to control the transceiver module to send through the AMF corresponding to the first service network The parameter update information.
- the first service network information includes the name of the first service network; or,
- a communication device for example, the communication device is the aforementioned AUSF.
- the communication device has the function of realizing the behavior in the method embodiment of the second aspect described above.
- the function can be realized by hardware, or by hardware executing corresponding software.
- the hardware or software includes one or more modules corresponding to the above-mentioned functions.
- the communication device includes, for example, a processing module and a transceiver module that are coupled to each other, wherein the transceiver module is used to receive a protection request message sent by UDM, and the protection request message is used to request parameter update information of the protection terminal.
- the first key used when registering in the first service network where the first AMF is located is the first AUSF is the AUSF that the terminal authenticates when registering in the first service network; the processing module is used to determine that the terminal is in a single registration state In the case, it is determined to send the parameter update information of the terminal through the second AMF.
- the transceiver module is specifically configured to send the first AMF to the first AMF when the second message is sent to the first AMF or the third message sent by the first AMF is received. Message, where the second message is used to delete the registration information of the terminal, and the third message is a response message to the second message.
- a communication device for example, the communication device is the AUSF as described above.
- the communication device has the function of realizing the behavior in the method embodiment of the fourth aspect described above.
- the function can be realized by hardware, or by hardware executing corresponding software.
- the hardware or software includes one or more modules corresponding to the above-mentioned functions.
- FIG. 6 is a schematic flowchart of another method for protecting terminal parameter updates according to an embodiment of the application.
- Entities in HPLMN can communicate with each other through interfaces, and can also communicate with entities between VPLMN through interfaces.
- the HPLMN needs to send parameters to the terminal, such as the preferred PLMN and other home network parameters or subscription data that needs to be updated.
- the entity in HPLMN such as UDM, needs to send these parameters to the terminal through the entity of VPLMN, such as AMF.
- the PCF entity of HPLMN needs to send policy information to the terminal through the PCF entity of the VPLMN and the AMF entity of the VPLMN in turn. Due to the security level of these parameters, HPLMN needs to prevent VPLMN and others from tampering with these parameters.
- the embodiments of the present application are suitable for protecting the parameter update information sent by the HPLMN to the terminal through the AMF.
- it can be adapted to the SoR process or the UPU process.
- the parameter update information of the terminal is SoR information as an example.
- the UDM sends a first message to the first AUSF, and the first AUSF receives the first message.
- the first message is used to instruct the first AUSF to delete the first secret generated when the terminal is registered in the first SN where the first AMF is located.
- the first AUSF is the AUSF that the terminal performs authentication when it registers with the first SN.
- the UDM sends a second message to the first AMF, for example, the message for deleting the registration information of the terminal (Nudm_UECM_DeregistrationNotify message), the first message is sent to the first AUSF; or the UDM receives the second message sent by the first AMF.
- the response message of the message that is, the third message (Nudm_SDM_Unsubscribe message)
- the first message is sent to the first AUSF.
- UDM specifies AUSF to protect SoR or UPU information.
- AUSF at only unique key K AUSF or for the same service network has only one K AUSF, thus guaranteeing key key agreement AUSF selected terminal selection.
- UDM returns a UE authentication acquisition response to AUSF, carrying the first K AUSF .
- the AUSF receives the UE authentication acquisition response returned by the UDM, it returns the UE authentication response to the security anchor function SEAF (may be co-deployed with the AMF), carrying the authentication token AUTN.
- SEAF may be co-deployed with the AMF
- the SEAF initiates an authentication request to the UE, carrying the AUTN.
- AUSF will send the authentication result confirmation request of the terminal to UDM, and after receiving the authentication result confirmation response of the terminal returned by UDM, delete the stored old K AUSF (if any) .
- This allows the UE and the AUSF side to delete the stored old K AUSF in the main authentication process, the security mode command SMC process and the authentication result confirmation process, thereby ensuring that only the first and second K AUSF exist on the UE and the AUSF side.
- the first service network information includes the name of the first service network; or,
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Communication Control (AREA)
Abstract
Description
Claims (30)
- 一种终端参数更新的保护方法,其特征在于,包括:统一数据管理UDM向第一认证服务功能AUSF发送保护请求消息,所述保护请求消息用于请求保护终端的参数更新信息;所述保护请求消息携带所述参数更新信息和第一服务网络信息;所述UDM接收所述第一AUSF发送的所述保护请求消息的响应消息;所述UDM通过所述第一服务网络对应的接入和移动性管理功能AMF发送所述参数更新信息。
- 如权利要求1所述的方法,其特征在于,所述方法还包括:所述UDM在向所述第一AUSF发送所述保护请求消息之前,所述UDM根据本地策略确定所述第一服务网络信息。
- 如权利要求2所述的方法,其特征在于,所述UDM在确定存在多个服务网络的情况下,确定进行终端的参数更新的所述第一服务网络。
- 如权利要求2或3所述的方法,其特征在于,所述方法还包括:所述UDM根据所述第一服务网络信息确定所述第一AUSF。
- 如权利要求1-4任一所述的方法,其特征在于,所述方法还包括:所述UDM在向所述第一AUSF发送保护请求消息之前,所述UDM确定:所述第一AUSF有所述终端在多个服务网络的认证结果,所述多个服务网络包括所述第一服务网络;或者,所述终端在多个服务网络,所述多个服务网络包括所述第一服务网络;或者,所述终端处于双注册状态。
- 如权利要求1-5任一所述的方法,其特征在于,所述第一服务网络信息包括所述第一服务网络的名称;或者,所述第一服务网络信息包括所述第一服务网络的公共陆地移动网络PLMN的标识ID或所述第一服务网络的ID;或者,所述第一服务网络信息包括所述终端的认证事件的标识。
- 如权利要求1-6任一所述的方法,其特征在于,所述参数更新信息包括漫游处理SoR信息。
- 一种终端参数更新的保护方法,其特征在于,包括:第一认证服务功能AUSF接收统一数据管理UDM发送的保护请求消息,所述保护请求消息用于请求保护终端的参数更新信息,所述保护请求消息携带所述参数更新信息和第一服务网络信息;所述第一AUSF根据所述第一服务网络信息确定第一密钥,所述第一密钥用于保护所述参数更新信息;所述第一AUSF根据所述第一密钥对所述参数更新信息进行安全保护。
- 如权利要求8所述的方法,其特征在于,所述第一服务网络信息为所述UDM存储 的多个第一服务网络信息中的一个服务网络信息。
- 如权利要求8或9所述的方法,其特征在于,存在多个AUSF,所述第一AUSF为与所述第一服务网络信息对应的AUSF。
- 如权利要求8或9所述的方法,其特征在于,所述第一AUSF有所述终端在多个服务网络的认证结果,所述多个服务网络包括所述第一服务网络;或者,所述终端在多个服务网络,所述多个服务网络包括所述第一服务网络;或者,所述终端处于双注册状态。
- 如权利要求8-11任一所述的方法,其特征在于,所述第一服务网络信息包括所述第一服务网络的名称;或者,所述第一服务网络信息包括所述第一服务网络的公共陆地移动网络PLMN标识;或者,所述第一服务网络信息包括所述终端的认证事件的标识。
- 如权利要求8-12任一所述的方法,其特征在于,所述参数更新信息包括漫游处理SoR信息。
- 一种通信装置,其特征在于,包括处理模块和收发模块,其中:所述收发模块,用于向第一认证服务功能AUSF发送保护请求消息,所述保护请求消息用于请求保护终端的参数更新信息;所述保护请求消息携带所述参数更新信息和第一服务网络信息;所述收发模块,用于接收所述第一AUSF发送的所述保护请求消息的响应消息;所述处理模块,用于控制所述收发模块通过所述第一服务网络对应的接入和移动性管理功能AMF发送所述参数更新信息。
- 如权利要求14所述的通信装置,其特征在于,所述收发模块还用于:在向所述第一AUSF发送所述保护请求消息之前,根据本地策略确定所述第一服务网络信息。
- 如权利要求15所述的通信装置,其特征在于,所述处理模块具体用于:在确定存在多个服务网络的情况下,确定进行终端的参数更新的所述第一服务网络。
- 如权利要求15或16所述的通信装置,其特征在于,所述处理模块具体用于:根据所述第一服务网络信息确定所述第一AUSF。
- 如权利要求14-17任一所述的通信装置,其特征在于,所述处理模块具体用于在向所述第一AUSF发送保护请求消息之前,确定:所述第一AUSF有所述终端在多个服务网络的认证结果,所述多个服务网络包括所述第一服务网络;或者,所述终端在多个服务网络,所述多个服务网络包括所述第一服务网络;或者,所述终端处于双注册状态。
- 如权利要求14-18任一所述的通信装置,其特征在于,所述第一服务网络信息包括所述第一服务网络的名称;或者,所述第一服务网络信息包括所述第一服务网络的公共陆地移动网络PLMN的标识ID或所述第一服务网络的ID;或者,所述第一服务网络信息包括所述终端的认证事件的标识。
- 如权利要求14-19任一所述的通信装置,其特征在于,所述参数更新信息包括漫游处理SoR信息。
- 一种通信装置,其特征在于,包括处理模块和收发模块,其中:所述收发模块,用于接收统一数据管理UDM发送的保护请求消息,所述保护请求消息用于请求保护终端的参数更新信息,所述保护请求消息携带所述参数更新信息和第一服务网络信息;所述处理模块,用于根据所述第一服务网络信息确定第一密钥,所述第一密钥用于保护所述参数更新信息;所述处理模块,用于根据所述第一密钥对所述参数更新信息进行安全保护。
- 如权利要求21所述的通信装置,其特征在于,所述第一服务网络信息为所述UDM存储的多个第一服务网络信息中的一个服务网络信息。
- 如权利要求21或22所述的通信装置,其特征在于,存在多个AUSF,所述第一AUSF为与所述第一服务网络信息对应的AUSF。
- 如权利要求21或22所述的通信装置,其特征在于,所述第一AUSF有所述终端在多个服务网络的认证结果,所述多个服务网络包括所述第一服务网络;或者,所述终端在多个服务网络,所述多个服务网络包括所述第一服务网络;或者,所述终端处于双注册状态。
- 如权利要求21-24任一所述的通信装置,其特征在于,所述第一服务网络信息包括所述第一服务网络的名称;或者,所述第一服务网络信息包括所述第一服务网络的公共陆地移动网络PLMN标识;或者,所述第一服务网络信息包括所述终端的认证事件的标识。
- 如权利要求21-25任一所述的通信装置,其特征在于,所述参数更新信息包括漫游处理SoR信息。
- 一种通信装置,其特征在于,所述通信装置包括处理器和存储器,所述存储器用于存储计算机程序,所述处理器用于执行存储在所述存储器上的计算机程序,使得所述装置执行如权利要求1~7或8~13中任一项所述的通信方法。
- 一种通信系统,其特征在于,包括如权利要求14~20之一的通信装置,和如权利要求21~26之一的通信装置。
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机程序,所述计算机程序当被计算机执行时,使所述计算机执行如权利要求1~7或8~13中任意一项所述的方法。
- 一种计算机程序产品,其特征在于,所述计算机程序产品存储有计算机程序,所述计算机程序当被计算机执行时,使所述计算机执行如权利要求1~7或8~13中任意一项所述的方法。
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP21779741.4A EP4132113A4 (en) | 2020-03-31 | 2021-02-22 | TERMINAL PARAMETER UPDATE PROTECTION METHOD AND COMMUNICATION DEVICE |
KR1020227037668A KR20220159455A (ko) | 2020-03-31 | 2021-02-22 | 단말 파라미터 업데이트를 보호하는 방법 및 통신 장치 |
JP2022559719A JP2023519997A (ja) | 2020-03-31 | 2021-02-22 | 端末パラメータ更新を保護するための方法および通信装置 |
BR112022019885A BR112022019885A2 (pt) | 2020-03-31 | 2021-02-22 | Método para proteger atualização de parâmetro de terminal e aparelho de comunicação e sistema de comunicação e meio de armazenamento legível por computador |
AU2021247219A AU2021247219B2 (en) | 2020-03-31 | 2021-02-22 | Terminal parameter updating protection method and communication device |
CA3178449A CA3178449A1 (en) | 2020-03-31 | 2021-02-22 | Method for protecting terminal parameter update and communication apparatus |
US17/936,634 US20230035970A1 (en) | 2020-03-31 | 2022-09-29 | Method for Protecting Terminal Parameter Update and Communication Apparatus |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010247619.8 | 2020-03-31 | ||
CN202010247619 | 2020-03-31 | ||
CN202010292085.0 | 2020-04-14 | ||
CN202010292085.0A CN113543121A (zh) | 2020-03-31 | 2020-04-14 | 一种终端参数更新的保护方法和通信装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/936,634 Continuation US20230035970A1 (en) | 2020-03-31 | 2022-09-29 | Method for Protecting Terminal Parameter Update and Communication Apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021196913A1 true WO2021196913A1 (zh) | 2021-10-07 |
Family
ID=77927694
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/077280 WO2021196913A1 (zh) | 2020-03-31 | 2021-02-22 | 一种终端参数更新的保护方法和通信装置 |
Country Status (8)
Country | Link |
---|---|
US (1) | US20230035970A1 (zh) |
EP (1) | EP4132113A4 (zh) |
JP (1) | JP2023519997A (zh) |
KR (1) | KR20220159455A (zh) |
AU (1) | AU2021247219B2 (zh) |
BR (1) | BR112022019885A2 (zh) |
CA (1) | CA3178449A1 (zh) |
WO (1) | WO2021196913A1 (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230239280A1 (en) * | 2022-01-21 | 2023-07-27 | Dell Products L.P. | Method and system for a conditional key storage using network information of a key management service |
WO2023165407A1 (zh) * | 2022-03-02 | 2023-09-07 | 华为技术有限公司 | 认证方法、发送信息的方法、处理方法及通信装置 |
US12026291B2 (en) | 2022-01-21 | 2024-07-02 | Dell Products L.P. | Method and system for a conditional key storage in a hardware resource manager |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108848495A (zh) * | 2018-05-18 | 2018-11-20 | 兴唐通信科技有限公司 | 一种使用预置密钥的用户身份更新方法 |
CN109041057A (zh) * | 2018-08-08 | 2018-12-18 | 兴唐通信科技有限公司 | 一种基于5g aka的核心网网元间鉴权流程安全性增强方法 |
CN109041054A (zh) * | 2018-07-27 | 2018-12-18 | 中国电子科技集团公司第三十研究所 | 一种网络侧发起号码变更的隐私保护方法 |
WO2019017689A1 (en) * | 2017-07-18 | 2019-01-24 | Samsung Electronics Co., Ltd. | METHOD AND SYSTEM FOR DETECTING ANTI-DIRECTION OF ROAMING ACTIVITY IN A WIRELESS COMMUNICATION NETWORK |
-
2021
- 2021-02-22 CA CA3178449A patent/CA3178449A1/en active Pending
- 2021-02-22 AU AU2021247219A patent/AU2021247219B2/en not_active Expired - Fee Related
- 2021-02-22 BR BR112022019885A patent/BR112022019885A2/pt not_active Application Discontinuation
- 2021-02-22 KR KR1020227037668A patent/KR20220159455A/ko not_active Application Discontinuation
- 2021-02-22 JP JP2022559719A patent/JP2023519997A/ja active Pending
- 2021-02-22 WO PCT/CN2021/077280 patent/WO2021196913A1/zh unknown
- 2021-02-22 EP EP21779741.4A patent/EP4132113A4/en active Pending
-
2022
- 2022-09-29 US US17/936,634 patent/US20230035970A1/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019017689A1 (en) * | 2017-07-18 | 2019-01-24 | Samsung Electronics Co., Ltd. | METHOD AND SYSTEM FOR DETECTING ANTI-DIRECTION OF ROAMING ACTIVITY IN A WIRELESS COMMUNICATION NETWORK |
CN108848495A (zh) * | 2018-05-18 | 2018-11-20 | 兴唐通信科技有限公司 | 一种使用预置密钥的用户身份更新方法 |
CN109041054A (zh) * | 2018-07-27 | 2018-12-18 | 中国电子科技集团公司第三十研究所 | 一种网络侧发起号码变更的隐私保护方法 |
CN109041057A (zh) * | 2018-08-08 | 2018-12-18 | 兴唐通信科技有限公司 | 一种基于5g aka的核心网网元间鉴权流程安全性增强方法 |
Non-Patent Citations (1)
Title |
---|
See also references of EP4132113A4 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230239280A1 (en) * | 2022-01-21 | 2023-07-27 | Dell Products L.P. | Method and system for a conditional key storage using network information of a key management service |
US12026291B2 (en) | 2022-01-21 | 2024-07-02 | Dell Products L.P. | Method and system for a conditional key storage in a hardware resource manager |
WO2023165407A1 (zh) * | 2022-03-02 | 2023-09-07 | 华为技术有限公司 | 认证方法、发送信息的方法、处理方法及通信装置 |
Also Published As
Publication number | Publication date |
---|---|
CA3178449A1 (en) | 2021-10-07 |
AU2021247219A1 (en) | 2022-11-17 |
BR112022019885A2 (pt) | 2022-12-13 |
EP4132113A4 (en) | 2023-08-16 |
US20230035970A1 (en) | 2023-02-02 |
KR20220159455A (ko) | 2022-12-02 |
EP4132113A1 (en) | 2023-02-08 |
AU2021247219B2 (en) | 2024-02-15 |
JP2023519997A (ja) | 2023-05-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111865598B (zh) | 网络功能服务的身份校验方法及相关装置 | |
US10162959B2 (en) | Method and apparatus for providing subscriber identity module-based data encryption and remote management of portable storage devices | |
WO2021196913A1 (zh) | 一种终端参数更新的保护方法和通信装置 | |
WO2020024764A1 (zh) | 一种鉴权过程中验证用户设备标识的方法及装置 | |
KR101122999B1 (ko) | 무선 통신 네트워크에서의 사용자 프로파일, 정책, 및 pmip 키 분배 | |
WO2021037175A1 (zh) | 一种网络切片的管理方法及相关装置 | |
US20080026724A1 (en) | Method for wireless local area network user set-up session connection and authentication, authorization and accounting server | |
JP2020510377A (ja) | ネットワークスライシングをサポートするモバイルシステムにおける強化された登録手続き | |
CN112105021B (zh) | 一种认证方法、装置及系统 | |
WO2019041809A1 (zh) | 基于服务化架构的注册方法及装置 | |
KR20070025366A (ko) | 무선 랜 시스템의 보안 시스템 및 그 방법 | |
US20040010713A1 (en) | EAP telecommunication protocol extension | |
KR20130031829A (ko) | 가입자 디바이스들의 네트워크 개인화를 위한 방법 및 장치 | |
WO2019056971A1 (zh) | 一种鉴权方法及设备 | |
CN113543121A (zh) | 一种终端参数更新的保护方法和通信装置 | |
US20230396602A1 (en) | Service authorization method and system, and communication apparatus | |
WO2019144719A1 (zh) | 一种远端设备的动态接入方法及装置 | |
WO2022237693A1 (zh) | Nswo业务的认证方法、设备和存储介质 | |
US20220174490A1 (en) | System, method, storage medium and equipment for mobile network access | |
WO2019141135A1 (zh) | 支持无线网络切换的可信服务管理方法以及装置 | |
CN110351726B (zh) | 终端认证的方法及装置 | |
US20220286855A1 (en) | Subscription information processing method and apparatus, and device | |
WO2020254205A1 (en) | Amf reallocation handling using security context | |
CN117135634A (zh) | 无线网络接入方法、装置、系统、存储介质及电子设备 | |
CN117098100A (zh) | 一种机卡绑定认证方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21779741 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2022559719 Country of ref document: JP Kind code of ref document: A Ref document number: 3178449 Country of ref document: CA |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112022019885 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 20227037668 Country of ref document: KR Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2021779741 Country of ref document: EP Effective date: 20221031 |
|
ENP | Entry into the national phase |
Ref document number: 2021247219 Country of ref document: AU Date of ref document: 20210222 Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 112022019885 Country of ref document: BR Kind code of ref document: A2 Effective date: 20220930 |