Patent application number | Description | Published |
20110044455 | Method, Apparatus and System for Key Derivation - A method, an apparatus and a system for key derivation are disclosed. The method includes the following steps: a target base station) receives multiple keys derived by a source base station, where the keys correspond to cells under control of the target base station; the target base station selects a key corresponding to the target cell after knowing a target cell that a user equipment (UE) wants to access. An apparatus for key derivation and a communications system are also provided. | 02-24-2011 |
20110165870 | Method, Apparatus and System for Key Derivation - A method, an apparatus and a system for key derivation are disclosed. The method includes the following steps: a target base station) receives multiple keys derived by a source base station, where the keys correspond to cells under control of the target base station; the target base station selects a key corresponding to the target cell after knowing a target cell that a user equipment (UE) wants to access. An apparatus for key derivation and a communications system are also provided. | 07-07-2011 |
20110287773 | Method, Apparatus and System for Key Derivation - A method, an apparatus and a system for key derivation are disclosed. The method includes the following steps: a target base station) receives multiple keys derived by a source base station, where the keys correspond to cells under control of the target base station; the target base station selects a key corresponding to the target cell after knowing a target cell that a user equipment (UE) wants to access. An apparatus for key derivation and a communications system are also provided. | 11-24-2011 |
20120093036 | METHOD, SYSTEM AND NETWORK DEVICE FOR IMPLEMENTING LOCAL IP ACCESS - A method for implementing local Internet Protocol (IP) access includes: obtaining User Equipment (UE)'s first information that is used for implementing local IP access; and implementing local IP access of the UE according to the first information. A system for implementing local IP access is disclosed by the present invention. The system can communicate with UE and includes: a NodeB, configured to obtain UE's first information that is used for implementing local IP access, and implement local IP access of the UE according to the first information; and a core network node, configured to assist the NodeB in obtaining the UE's first information that is used for implementing local IP access. Besides, relevant network devices are also disclosed. | 04-19-2012 |
20120297193 | MTC DEVICE AUTHENTICATION METHOD, MTC GATEWAY, AND RELATED DEVICE - Embodiments of the present invention provide an MTC device authentication method, an MTC gateway, and a related device, which are used to solve a problem that direct interaction between a large quantity of MTC devices and a network side brings a heavy load to a network when the MTC devices are authenticated in the prior art. The method includes: performing, by an MTC gateway, mutual authentication with a core network node; performing, by the MTC gateway, mutual authentication with an MTC device; reporting, by the MTC gateway, a result of the mutual authentication with the MTC device to the core network node; and providing, by the MTC gateway, a non access stratum link protection key K between the MTC device and the core network node according to a key K | 11-22-2012 |
20120331298 | SECURITY AUTHENTICATION METHOD, APPARATUS, AND SYSTEM - Embodiments of the present invention provide a security authentication method, apparatus, and system, where the method includes: verifying a feature identifier for identifying terminal equipment, where the terminal equipment is machine-to-machine equipment; and obtaining a key corresponding to the feature identifier, so as to perform secure communication with the terminal equipment according to the key. In the embodiments of the present invention, after terminal equipment, a mobility management entity, and a home subscriber system successfully perform authentication and key agreement, it is verified whether a feature identifier of the terminal is legal, and when the feature identifier of the terminal is a legal identifier, a key is obtained according to the feature identifier, so that the mobility management entity and the terminal equipment perform secure communication according to the key, thereby implementing secure communication between M2M equipment and a network side. | 12-27-2012 |
20130035067 | METHOD AND APPARATUS FOR AUTHENTICATING COMMUNICATION DEVICE - Embodiments of the present invention disclose a method and an apparatus for authenticating a communication device, where the method includes: receiving an attach request including a group identifier and sent by an MTC device to be authenticated, where the group identifier is a group identifier of an MTC group where the MTC device to be authenticated is located; determining whether a first group authentication vector bound to the group identifier exists locally, where the first group authentication vector is an authentication vector used for authenticating MTC devices in the MTC group; and if existing, according to the first group authentication vector, authenticating the MTC device to be authenticated, and generating a system key of the MTC device to be authenticated. The technical solutions provided in the present invention can be applied to the technical field of authenticating the MTC device. | 02-07-2013 |
20130079014 | Method, Apparatus and System for Key Derivation - A method, an apparatus and a system for key derivation are disclosed. The method includes the following steps: a target base station) receives multiple keys derived by a source base station, where the keys correspond to cells under control of the target base station; the target base station selects a key corresponding to the target cell after knowing a target cell that a user equipment (UE) wants to access. An apparatus for key derivation and a communications system are also provided. | 03-28-2013 |
20130128866 | METHOD, APPARATUS, AND SYSTEM FOR SECURITY PROCESSING IN HANDOVER PROCESS - A method, an apparatus, and a system for security processing in a handover process in the field of communication technologies are provided, including: in a handover preparation and handover execution processes performed by a user equipment UE and a source node and a target node on a network side, obtaining, by the target node, security capability information of the UE provided by the source node or a security verification entity, where the security verification entity includes a gateway in case of UE handover under a NodeB or a donor NodeB in case of UE handover under a relay node; and if the source node provides the security capability information of the UE. | 05-23-2013 |
20130143532 | KEY SEPARATION METHOD AND DEVICE - A key separation method and device are provided in the embodiments of the present invention. The key separation method includes: when a User Equipment hands over from a source node to a target node, or when the User Equipment moves from the source node to the target node in idle state, determining whether or not the source node is a Home NodeB; and if the source node is a Home NodeB, triggering an Authentication and Key Agreement procedure according to the operator's policy, to update Ciphering Key and Integrity Key. By performing Authentication and Key Agreement procedure, the method and device of the embodiments seperate key of the source node from the key of the target node. | 06-06-2013 |
20130310006 | METHOD AND DEVICE FOR KEY GENERATION - A method and a device for key generation are disclosed in embodiments of the present invention. The method for key generation is applied to a UMTS-LTE resource convergence scenario that has a base station as an anchor point, and includes: deriving, according to a root key and a count value of an LTE system, or according to a random number and an LTE system root key, a UMTS integrity key and cipher key, and sending the UMTS integrity key and cipher key to a UMTS control node. The embodiments of the present invention enable the derivation of the UMTS integrity key and cipher key in a UMTS-LTE resource convergence scenario that has a base station as an anchor point, enable a user equipment to communicate securely through a UMTS, and further improve security of data transmitted in the UMTS. | 11-21-2013 |