Patents by Inventor Xiaoyu BI
Xiaoyu BI has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240073672Abstract: The present disclosure provides an information processing method, an information processing device and a computer-readable storage medium, which relate to the field of communication technology to improve the security of edge computing services. The method includes: obtaining first authentication information for a terminal; and in the case of determining that authentication of the terminal is successful according to the first authentication information, sending information of a second network element to the terminal, so that the terminal obtains information of a target network element from the second network element, the information of the target network element is sent by the second network element to the terminal when edge computing authorization information of the terminal is verified, and the target network element is used to provide an edge computing service for the terminal.Type: ApplicationFiled: October 22, 2020Publication date: February 29, 2024Applicant: DATANG MOBILE COMMUNICATIONS EQUIPMENT CO., LTD.Inventors: Xiaoyu BI, Ling ZHANG
-
Publication number: 20220150062Abstract: Method, device, and system for deriving keys are provided in the field of mobile communications technologies. The method for deriving keys may be used, for example, in a handover process of a User Equipment (UE) from an Evolved Universal Terrestrial Radio Access Network (EUTRAN) to a Universal Terrestrial Radio Access Network (UTRAN). If a failure occurred in a first handover, the method ensures that the key derived by a source Mobility Management Entity (MME) for a second handover process of the UE is different from the key derived for the first handover process of the UE. This is done by changing input parameters used in the key derivation, so as to prevent the situation in the prior art that once the key used on one Radio Network Controller (RNC) is obtained, the keys on other RNCs can be derived accordingly, thereby enhancing the network security.Type: ApplicationFiled: January 24, 2022Publication date: May 12, 2022Applicant: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Aiqin Zhang, Jing Chen, Xiaoyu Bi
-
Patent number: 11240019Abstract: Method, device, and system for deriving keys are provided in the field of mobile communications technologies. The method for deriving keys may be used, for example, in a handover process of a User Equipment (UE) from an Evolved Universal Terrestrial Radio Access Network (EUTRAN) to a Universal Terrestrial Radio Access Network (UTRAN). If a failure occurred in a first handover, the method ensures that the key derived by a source Mobility Management Entity (MME) for a second handover process of the UE is different from the key derived for the first handover process of the UE. This is done by changing input parameters used in the key derivation, so as to prevent the situation in the prior art that once the key used on one Radio Network Controller (RNC) is obtained, the keys on other RNCs can be derived accordingly, thereby enhancing the network security.Type: GrantFiled: December 13, 2011Date of Patent: February 1, 2022Assignee: Huawei Technologies Co., Ltd.Inventors: Aiqin Zhang, Jing Chen, Xiaoyu Bi
-
Patent number: 10218513Abstract: Embodiments of the present invention provide a method and a terminal for message verification, which can enhance timeliness of event message verification. The method includes: receiving an event message sent by a cell broadcast entity; obtaining a public key of a CA according to pre-configured information for determining the public key of the CA and information for determining the public key of the CA and obtained from a network side, or according to information of the CA obtained from the network side; then, obtaining a public key of the cell broadcast entity according to the obtained public key of the CA and an implicit certificate of the cell broadcast entity; verifying a signature of the cell broadcast entity over the event message according to the public key of the cell broadcast entity; and finally, determining legitimacy of the event message according to the verification result.Type: GrantFiled: May 8, 2015Date of Patent: February 26, 2019Assignee: HUAWEI TECHNOLOGIE CO., LTD.Inventors: Xiaoyu Bi, Jing Chen, Yixian Xu, Chunshan Xiong
-
Patent number: 9232404Abstract: Embodiments of the present invention disclose a method, an apparatus, and a system for data transmission. The method for data transmission includes: determining that data to be transmitted is control plane signaling related to a user equipment that camps on a relay node; and transmitting the data through a first user data bearer established between the relay node and a donor base station, where the first user data bearer provides integrity protection for the data. According to the embodiments of the present invention, when the control plane signaling related to the user equipment that camps on the relay node is transmitted between the relay node and the donor base station, integrity protection is provided for the control plane signaling, and therefore attacks such as the denial of a service attack are prevented.Type: GrantFiled: March 28, 2012Date of Patent: January 5, 2016Assignee: Huawei Technologies Co., Ltd.Inventors: Jing Chen, Ke Wang, Hui Ma, Bo Lin, Aiqing Zhang, Dongmei Zhang, Xiaoyu Bi
-
Publication number: 20150244532Abstract: Embodiments of the present invention provide a method and a terminal for message verification, which can enhance timeliness of event message verification. The method includes: receiving an event message sent by a cell broadcast entity; obtaining a public key of a CA according to pre-configured information for determining the public key of the CA and information for determining the public key of the CA and obtained from a network side, or according to information of the CA obtained from the network side; then, obtaining a public key of the cell broadcast entity according to the obtained public key of the CA and an implicit certificate of the cell broadcast entity; verifying a signature of the cell broadcast entity over the event message according to the public key of the cell broadcast entity; and finally, determining legitimacy of the event message according to the verification result.Type: ApplicationFiled: May 8, 2015Publication date: August 27, 2015Inventors: Xiaoyu Bi, Jing Chen, Yixian Xu, Chunshan Xiong
-
Publication number: 20150236851Abstract: A method and an apparatus for updating a public key, a UE and a CA are disclosed. The method includes: receiving a first message including CA public key information, where the CA public key information includes a CA public key or CA public key acquiring information; and updating a local CA public key of a UE according to the CA public key or to the CA public key acquiring information. The present invention can realize update of the CA public key in the UE.Type: ApplicationFiled: May 7, 2015Publication date: August 20, 2015Inventors: Xiaoyu Bi, Jing Chen, Yixian Xu, Chunshan Xiong
-
Patent number: 9088616Abstract: A method and an apparatus for authentication are disclosed. The method includes: deciding to release a connection or continue a current service according to native information and network policy after an AKA authentication procedure fails. When the EPS AKA authentication procedure fails, the connection is not released immediately in the present invention, but the connection is released or the current service is continued according to the native information and network policy, thus avoiding unnecessary release of connections and saving resources.Type: GrantFiled: September 21, 2010Date of Patent: July 21, 2015Assignee: Huawei Technologies Co., Ltd.Inventors: Xiaoyu Bi, Aiqin Zhang, Dongmei Zhang
-
Patent number: 9027111Abstract: Embodiments of the present invention disclose a relay node authentication method, apparatus, and system. The method provided in an embodiment of the present invention includes: sending, by a relay node, an authentication request message to a peer node, where the authentication request message includes a certificate of the relay node, so that the peer node authenticates the relay node according to the certificate of the relay node, where the peer node is a network side node or a security gateway in a security domain where the network side node is located; and receiving, by the relay node, an authentication response message sent by the peer node, where the authentication response message includes a certificate of the peer node, and authenticating the peer node according to the certificate of the peer node.Type: GrantFiled: August 1, 2012Date of Patent: May 5, 2015Assignee: Huawei Technologies Co., Ltd.Inventors: Dongmei Zhang, Aiqin Zhang, Xiaoyu Bi, Jing Liu
-
Publication number: 20140237327Abstract: Embodiments of the present invention provide a method for testing a network under an IPsec mechanism, and relate to the field of wireless communications, so as to correct an error generated by a disorder of service data packet receiving during network testing under the IPsec mechanism. The method for testing a network under the IPsec mechanism includes: receiving a session request message, where the session request message contains information about a quantity of IPsec data packets and a sending time interval of the IPsec data packets; after a session is established with a sending end, receiving an IPsec data packet that carries testing information; and performing error detection for the received IPsec data packet according to the received testing information as well as the information about the quantity of IPsec data packets and the sending time interval of the IPsec data packets in the session request message.Type: ApplicationFiled: April 23, 2014Publication date: August 21, 2014Applicant: Huawei Technologies Co., Ltd.Inventors: Xiaoyu BI, Lei XIE
-
Patent number: 8605908Abstract: A method and a device for obtaining a security key in a relay system are disclosed in the embodiment of the present invention. A node in the relay system obtains an initial key, according to the initial key, the node obtains a root key of an air interface protection key between the node and another node that is directly adjacent to the node, and according to the root key, the node obtains the air interface protection key between the node and said another node that is directly adjacent to the node. Therefore, according to the initial key, each lower-level node obtains a root key of an air interface protection key between each lower-level node, so that data of a UE on a Un interface link may be respectively protected, that is, each active UE has a set of security parameters on the Un interface link, and effective security protection is performed on data on each segment of an air interface.Type: GrantFiled: May 3, 2012Date of Patent: December 10, 2013Assignee: Huawei Technologies Co., Ltd.Inventors: Dongmei Zhang, Xiaoyu Bi, Aiqin Zhang
-
Publication number: 20120297474Abstract: Embodiments of the present invention disclose a relay node authentication method, apparatus, and system. The method provided in an embodiment of the present invention includes: sending, by a relay node, an authentication request message to a peer node, where the authentication request message includes a certificate of the relay node, so that the peer node authenticates the relay node according to the certificate of the relay node, where the peer node is a network side node or a security gateway in a security domain where the network side node is located; and receiving, by the relay node, an authentication response message sent by the peer node, where the authentication response message includes a certificate of the peer node, and authenticating the peer node according to the certificate of the peer node.Type: ApplicationFiled: August 1, 2012Publication date: November 22, 2012Inventors: Dongmei ZHANG, Aiqin Zhang, Xiaoyu Bi, Jing Liu
-
Publication number: 20120213372Abstract: A method and a device for obtaining a security key in a relay system are disclosed in the embodiment of the present invention. A node in the relay system obtains an initial key, according to the initial key, the node obtains a root key of an air interface protection key between the node and another node that is directly adjacent to the node, and according to the root key, the node obtains the air interface protection key between the node and said another node that is directly adjacent to the node. Therefore, according to the initial key, each lower-level node obtains a root key of an air interface protection key between each lower-level node, so that data of a UE on a Un interface link may be respectively protected, that is, each active UE has a set of security parameters on the Un interface link, and effective security protection is performed on data on each segment of an air interface.Type: ApplicationFiled: May 3, 2012Publication date: August 23, 2012Applicant: Huawei Technologies Co., Ltd.Inventors: Dongmei Zhang, Xiaoyu Bi, Aiqin Zhang
-
Publication number: 20120182929Abstract: Embodiments of the present invention disclose a method, an apparatus, and a system for data transmission. The method for data transmission includes: determining that data to be transmitted is control plane signaling related to a user equipment that camps on a relay node; and transmitting the data through a first user data bearer established between the relay node and a donor base station, where the first user data bearer provides integrity protection for the data. According to the embodiments of the present invention, when the control plane signaling related to the user equipment that camps on the relay node is transmitted between the relay node and the donor base station, integrity protection is provided for the control plane signaling, and therefore attacks such as the denial of a service attack are prevented.Type: ApplicationFiled: March 28, 2012Publication date: July 19, 2012Applicant: Huawei Technologies Co., Ltd.Inventors: Jing Chen, Ke Wang, Hui Ma, Bo Lin, Aiqing Zhang, Dongmei Zhang, Xiaoyu Bi
-
Publication number: 20120077501Abstract: Method, device, and system for deriving keys are provided in the field of mobile communications technologies. The method for deriving keys may be used, for example, in a handover process of a User Equipment (UE) from an Evolved Universal Terrestrial Radio Access Network (EUTRAN) to a Universal Terrestrial Radio Access Network (UTRAN). If a failure occurred in a first handover, the method ensures that the key derived by a source Mobility Management Entity (MME) for a second handover process of the UE is different from the key derived for the first handover process of the UE. This is done by changing input parameters used in the key derivation, so as to prevent the situation in the prior art that once the key used on one Radio Network Controller (RNC) is obtained, the keys on other RNCs can be derived accordingly, thereby enhancing the network security.Type: ApplicationFiled: December 13, 2011Publication date: March 29, 2012Applicant: Huawei Technologies Co., Ltd.Inventors: Aiqin Zhang, Jing Chen, Xiaoyu Bi
-
Publication number: 20110072488Abstract: A method and an apparatus for authentication are disclosed. The method includes: deciding to release a connection or continue a current service according to native information and network policy after an AKA authentication procedure fails. When the EPS AKA authentication procedure fails, the connection is not released immediately in the present invention, but the connection is released or the current service is continued according to the native information and network policy, thus avoiding unnecessary release of connections and saving resources.Type: ApplicationFiled: September 21, 2010Publication date: March 24, 2011Inventors: Xiaoyu BI, Aiqin Zhang, Dongmei Zhang