Patents by Inventor Shilin You

Shilin You has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220368684
    Abstract: This disclosure generally relates to encrypted communication between terminal devices and service applications via a communication network. Such encrypted communication may be based on various hierarchical levels of encryption keys that are generated and managed by the communication network. Such encrypted communication and key management may be provided by the communication network to the terminal devices as a service that can be subscribed to. The various levels of encryption keys may be managed to improve flexibility of the communication network and to reduce potential security breaches.
    Type: Application
    Filed: July 6, 2022
    Publication date: November 17, 2022
    Applicant: ZTE Corporation
    Inventors: Shilin YOU, Jiyan CAI, Jin PENG, Wantao YU, Yuze LIU, Zhaoji LIN, Yuxin MAO, Jigang WANG
  • Patent number: 11503533
    Abstract: A system and method of registration with AMF re-allocation. The system and method includes receiving, by an initial AMF from a wireless communication device via a RAN, a registration request comprising a first device identifier associated with the wireless communication device. The system and method includes determining, by the initial AMF, an identifier type associated with the first device identifier. The system and method includes generating, by the initial AMF, a reroute message comprising a second device identifier. The system and method includes originating, by the initial AMF to the wireless communication device, a security mode command message comprising a redirection criteria or an integrity negotiation algorithm, the security mode command message causes the wireless communication device to set the redirection criteria allowing the wireless communication device to accept a request message that is not integrity protected and return a security mode complete message to the initial AMF.
    Type: Grant
    Filed: February 17, 2022
    Date of Patent: November 15, 2022
    Assignee: ZTE Corporation
    Inventors: Shilin You, Jiyan Cai, Jin Peng, Jinguo Zhu, Shuang Liang, Fei Lu, Wantao Yu, Zhaoji Lin
  • Publication number: 20220345307
    Abstract: This disclosure generally relates to encrypted communication between terminal devices and service applications via a communication network. Such encrypted communication may be based on various hierarchical levels of encryption keys that are generated and managed by the communication network. Such encrypted communication and key management may be provided by the communication network to the terminal devices as a service that can be subscribed to. The various levels of encryption keys may be managed to improve flexibility of the communication network and to reduce potential security breaches.
    Type: Application
    Filed: July 6, 2022
    Publication date: October 27, 2022
    Applicant: ZTE Corporation
    Inventors: Shilin YOU, Jiyan CAI, Yuze LIU, Jin PENG, Wantao YU, Zhaoji LIN, Yuxin MAO, Jianhua LIU
  • Publication number: 20220345888
    Abstract: The present disclosure describes methods, systems and devices for establishing secure communication between a user equipment and a service application in a wireless communication. One method includes receiving, by the user equipment, an authentication and key management for service applications identifier (AKMAID) from an authentication server function (AUSF) upon successful completion of an authentication process for registering the user equipment with the communication network.
    Type: Application
    Filed: July 11, 2022
    Publication date: October 27, 2022
    Applicant: ZTE Corporation
    Inventors: Wantao YU, Shilin YOU, Yuze LIU, Jin PENG, Zhaoji LIN, Yuxin MAO
  • Publication number: 20220337408
    Abstract: This disclosure generally relates to encrypted communication between terminal devices and service applications via a communication network. Such encrypted communication may be based on various hierarchical levels of encryption keys that are generated and managed by the communication network. Such encrypted communication and key management may be provided by the communication network to the terminal devices as a service that can be subscribed to. The various levels of encryption keys may be managed to improve flexibility of the communication network and to reduce potential security breaches.
    Type: Application
    Filed: July 5, 2022
    Publication date: October 20, 2022
    Applicant: ZTE Corporation
    Inventors: Shilin YOU, Jiyan CAI, Wantao YU, Yuze LIU, Jin PENG, Zhaoji LIN, Yuxin MAO, Xiuli XU
  • Publication number: 20220330019
    Abstract: Methods, apparatus, and systems to establish a secure communication in a wireless network are described. In one example aspect, a wireless communication method includes generating, by a first function entity, a first identifier configured to be used to establish a secure communication for a first device, using at least a mobile country code, a mobile network code, and a random number, and transmitting the first identifier to the first device.
    Type: Application
    Filed: June 28, 2022
    Publication date: October 13, 2022
    Inventors: Wantao Yu, Shilin You, Yuze Liu, Jin Peng, Zhaoji Lin, Yuxin Mao
  • Publication number: 20220295272
    Abstract: The present document relates to methods, systems, and devices related to digital communication, and more specifically, to techniques related to AUSF selection in the case of dual registrations in AKMA. One example data communication method includes receiving, by a first network function, a request to retrieve an identifier of a second network function that authenticated a terminal from a third function, the request including a parameter. The method also includes transmitting, by the first network function, a response to the third network function that includes the identifier of the second network function that authenticated the terminal that is identified based on the parameter.
    Type: Application
    Filed: May 26, 2022
    Publication date: September 15, 2022
    Inventors: Jin PENG, Shilin YOU, Yuze LIU, Wantao YU, Zhaoji LIN, Yuxin MAO, Jigang WANG, Chen LU
  • Publication number: 20220295269
    Abstract: Embodiments of the prevent invention provide a network access authentication method and device. The method comprises: receiving an authentication request message sent by a first serving network, wherein the authentication request message carries a user equipment pseudonym identifier generated by a user equipment; determining whether a local user equipment pseudonym identifier is asynchronous with the user equipment pseudonym identifier generated by the user equipment; and obtaining, if the determination result is yes, an encrypted international mobile subscriber identity (IMSI) to carry out network access authentication on the user equipment. The embodiments of the present invention can solve the problem that a network access process in the related art does not provide a processing method for the case where the user equipment pseudonym identifier in the user equipment is asynchronous with the user equipment pseudonym identifier in a home network.
    Type: Application
    Filed: May 27, 2022
    Publication date: September 15, 2022
    Inventors: Shilin YOU, Hongjun LIU, Jiyan CAI, Zaifeng ZONG, Jin PENG, Zhaoji LIN, Yunyin ZHANG
  • Publication number: 20220279471
    Abstract: The present disclosure relates to a wireless communication method, systems and devices for a registration procedure. The wireless communication method for use in a wireless terminal includes determining a concealed identifier based on a permanent identifier and a check value. A message with the concealed identifier for a registration procedure is transmitted to a wireless network node.
    Type: Application
    Filed: May 9, 2022
    Publication date: September 1, 2022
    Applicant: ZTE Corporation
    Inventors: Shilin You, Jiyan Cai, Yuze Liu, Jin Peng, Wantao Yu, Zhaoji Lin
  • Publication number: 20220264289
    Abstract: Method, systems and devices for wireless communication. The method includes protecting privacy of a transmitted network slice selection assistance information (NSSAI) between a user equipment and a base station. The method includes receiving a temporary NSSAI (T-NSSAI) from an access and mobility management function (AMF) to the base station, the T-NSSAI comprising at least one temporary single NSSAI (T-S-NSSAI) and storing the T-NSSAI in the base station. The method also includes receiving a radio resource control (RRC) signaling message from the user equipment to the base station, the RRC signaling message comprising a T-S-NSSAI corresponding to an allowed single NSSAI (S-NSSAI); and selecting the AMF based on the T-S-NSSAI.
    Type: Application
    Filed: May 6, 2022
    Publication date: August 18, 2022
    Inventors: Wantao YU, Yuze LIU, Shilin YOU, Jin PENG, Zhaoji LIN
  • Patent number: 11368841
    Abstract: Embodiments of the prevent disclosure provide a network access authentication method and device. The method includes: receiving an authentication request message sent by a first serving network, the authentication request message carrying a user equipment alias identifier generated by user equipment; determining whether a local user equipment alias identifier is asynchronous with the user equipment alias identifier generated by the user equipment; and when the determination result is positive, obtaining an encrypted International Mobile Subscriber Identification Number IMSI for performing network access authentication on the user equipment.
    Type: Grant
    Filed: July 25, 2017
    Date of Patent: June 21, 2022
    Assignee: ZTE Corporation
    Inventors: Shilin You, Hongjun Liu, Jiyan Cai, Zaifeng Zong, Jin Peng, Zhaoji Lin, Yunyin Zhang
  • Publication number: 20220174580
    Abstract: A system and method of registration with AMF re-allocation. The system and method includes receiving, by an initial AMF from a wireless communication device via a RAN, a registration request comprising a first device identifier associated with the wireless communication device. The system and method includes determining, by the initial AMF, an identifier type associated with the first device identifier. The system and method includes generating, by the initial AMF, a reroute message comprising a second device identifier. The system and method includes originating, by the initial AMF to the wireless communication device, a security mode command message comprising a redirection criteria or an integrity negotiation algorithm, the security mode command message causes the wireless communication device to set the redirection criteria allowing the wireless communication device to accept a request message that is not integrity protected and return a security mode complete message to the initial AMF.
    Type: Application
    Filed: February 17, 2022
    Publication date: June 2, 2022
    Inventors: Shilin YOU, Jiyan CAI, Jin PENG, Jinguo ZHU, Shuang LIANG, Fei LU, Wantao YU, Zhaoji LIN
  • Publication number: 20220124105
    Abstract: An anti-pseudo base station method and apparatus, and a computer-readable storage medium are provided. The anti-pseudo base station method includes: sending, by a base station, first anti-pseudo base station capacity information to a mobile terminal, wherein the first anti-pseudo base station capacity information is used for identifying an anti-pseudo base station capacity of the base station.
    Type: Application
    Filed: October 21, 2019
    Publication date: April 21, 2022
    Inventors: Wantao YU, Zhenhua XIE, Jin PENG, Shilin YOU
  • Publication number: 20220124092
    Abstract: Provided are an authentication processing method and device, a storage medium, and an electronic device. The method includes that: a terminal receives an authentication request message from an authentication function; and in cases where authentication on the authentication request message fails, the terminal feeds back an authentication failure message to the authentication function. In cases where the cause of the authentication failure is a Message Authentication Code (MAC) failure and in cases where a cause of authentication failure is a Synchronization (Sync) failure, the terminal feeds back authentication failure messages of the same type to the authentication function.
    Type: Application
    Filed: January 19, 2020
    Publication date: April 21, 2022
    Inventors: Jin PENG, Shilin YOU, Zhenhua XIE, Wantao YU, Zhaoji LIN, Yongqing QIU
  • Publication number: 20220124493
    Abstract: Provided are a method and device for reporting a capacity, a method and device for key agreement, a terminal and a communication device and system. The terminal sends anti-pseudo base station capacity indication information to the communication device, and the anti-pseudo base station capacity indication information can indicate an anti-pseudo base station capacity of the terminal to the communication device. The communication device can determine the anti-pseudo base station capacity of the terminal after acquiring the anti-pseudo base station capacity indication information sent by the terminal, and perform an authentication and key agreement process matching the anti-pseudo base station capacity of the terminal and an anti-pseudo base station capacity of a target base station.
    Type: Application
    Filed: December 19, 2019
    Publication date: April 21, 2022
    Inventors: Wantao YU, ZhenHua XIE, Jin PENG, Shilin YOU
  • Publication number: 20220104012
    Abstract: Provided are an authentication processing method and device, a storage medium and an electronic device, the method includes: a terminal receives a first authentication request message from a network side; the terminal determines whether the number of times of receiving the first authentication request message is greater than a predetermined threshold; and when the number of times is greater than the predetermined threshold, the terminal stops responding to the first authentication request message.
    Type: Application
    Filed: January 19, 2020
    Publication date: March 31, 2022
    Inventors: Jin PENG, Shilin YOU, Zhenhua XIE, Wantao YU, Zhaoji LIN, Wei CAO
  • Patent number: 11290876
    Abstract: Provided are a key derivation method and device. The method includes: acquiring a slice identifier corresponding to a network slice to which a user equipment is currently attached, where the slice identifier uniquely identifies the network slice; and transmitting the slice identifier to a designated communication device. The slice identifier is configured to instruct the designated communication device to derive, according to the slice identifier, an intermediate key required by the network slice. By means of the technical solution described above, the problem in the related art that a slice function cannot be implemented normally due to the fact that different network slices probably use the same intermediate key may be solved, and different network slices may correspond to different intermediate keys, thereby avoiding a case that the slicing function cannot be implemented normally caused by allocating the same intermediate key to different network slices.
    Type: Grant
    Filed: June 13, 2017
    Date of Patent: March 29, 2022
    Assignee: XI'AN ZHONGXING NEW SOFTWARE CO., LTD.
    Inventors: Shilin You, Zhaoji Lin, Jin Peng, Hongjun Liu, Xiaowu Zhao
  • Publication number: 20210345116
    Abstract: Methods, systems, and devices related to related to digital wireless communication, and more specifically, to techniques related to securing a user authentication procedure. In one exemplary aspect, a method for wireless communication includes transmitting an authentication message from a network node. The method also includes determining a failure value indicating a reason for failure of the authentication message. The method also includes encrypting the failure value and an identifier. The method also includes transmitting an encrypted response message to the network node. In another exemplary aspect, a method for wireless communication includes transmitting an authentication message to a terminal. The method also includes receiving an encrypted response message from the terminal. The method also includes decrypting the encrypted response message to determine the failure value and the indicator.
    Type: Application
    Filed: July 14, 2021
    Publication date: November 4, 2021
    Inventors: Shilin YOU, Zhenhua XIE, Jin PENG, Wantao YU, Zhaoji LIN
  • Publication number: 20210306855
    Abstract: proviced is an authentication method based on a GBA, and the method includes: a BSF receives an initialization request message sent by a UE, wherein the initialization request message carries a first identifier of the UE, and the first identifier comprises at least one of the following: a SUCI, an identifier converted from the SUCI, and a TMPI associated with the subscriber identity; the BSF acquires an AV of the UE according to the first ID; the BSF completes GBA authentication with the UE according to the acquired AV. In this way, the privacy of the SUPI is protected for the UE, and the SUCI or the identifier converted from the SUCI is used to perform the bootstrapping process of the GBA, thereby improving the security of the GBA authentication process.
    Type: Application
    Filed: August 7, 2019
    Publication date: September 30, 2021
    Inventors: Shilin YOU, Jiyan CAI, Jianhua LIU, Zhaoji LIN, Jin PENG, Boshan ZHANG
  • Publication number: 20210289353
    Abstract: Embodiments of the prevent disclosure provide a network access authentication method and device.
    Type: Application
    Filed: July 25, 2017
    Publication date: September 16, 2021
    Applicant: ZTE Corporation
    Inventors: Shilin YOU, Hongjun LIU, Jiyan CAI, Zaifeng ZONG, Jin PENG, Zhaoji LIN, Yunyin ZHANG