Abstract:
A communication method, apparatus, and system are provided, to resolve problems in a conventional technology that an AKMA authentication procedure is complex and signaling overheads are large. Principles of the method are as follows: In a registration procedure of a terminal device, AKMA authentication is implicitly indicated based on primary authentication. For example, if primary authentication succeeds, it may be considered that AKMA authentication also succeeds. In addition, an AKMA temporary identifier is allocated to the terminal device after AKMA authentication succeeds. According to the method, apparatus, and system in this application, no additional AKMA authentication is required. This simplifies a procedure and reduces signaling overheads.
Abstract:
This application provides a communications method and an apparatus. The communications method includes: receiving, by a first access and mobility management function network element in a first communications network, a first message from a terminal device, where the first message includes a non-access stratum (NAS) parameter used by the terminal device to access a second communications network; and sending, by the first access and mobility management function network element, a second message to a second access and mobility management function network element in the second communications network, where the second message includes the NAS parameter. Therefore, according to the embodiments of this application, the terminal device can access the second communications network through the first access and mobility management function network element in the first communications based on the NAS parameter.
Abstract:
Embodiments of this application provide a security protection method and apparatus, and an access network device, and relate to the field of communications technologies, to resolve a problem that user plane security protection cannot be enabled as required in the prior art. The method includes: receiving, by a first access network device, a first message from a second access network device, where the first message carries a user plane security policy, and the user plane security policy is used to indicate a type of user plane security protection to be enabled by the first access network device; and then determining, by the first access network device based on the user plane security policy, a user plane security algorithm and a user plane key corresponding to the user plane security algorithm.
Abstract:
Embodiments of this application provide a key update method, relate to the field of communications technologies In the method, a communications system includes a terminal and a core network device, the terminal accesses the core network device by using both a first access technology and a second access technology simultaneously, and the method includes: performing, by the core network device, re-authentication on the terminal through a first connection corresponding to the first access technology; and if a trigger condition is met, updating, by the core network device, a key for a second connection corresponding to the second access technology.
Abstract:
This application discloses a method for accessing a fixed network and an access gateway network element. The method carried out by an access gateway network element of a fixed network includes: performing a PPPoE negotiation with a terminal, to establish a PPPoE session with the terminal; negotiating a PPPoE authentication mode with the terminal; sending a PPPoE authentication parameter to an authentication service network element of a mobile network, where the PPPoE authentication parameter is used by the authentication service network element to perform PPPoE authentication on the terminal; and receiving a PPPoE authentication result from the authentication service network element, and sending a PPPoE authentication result message to the terminal, where the PPPoE authentication result message includes the PPPoE authentication result. Embodiments of this application are applied to authentication during an access from the mobile network to the fixed network.
Abstract:
Embodiments of the present invention relate to the field of communications technologies, and provide a communication method, an apparatus, and a system. The method includes: receiving, by a first network side device, a first message sent by a terminal, where the first message carries ciphertext of context information of the terminal, and the ciphertext of the context information is information obtained by encrypting the context information of the terminal; obtaining, by the first network side device, a first key, and decrypting the ciphertext of the context information based on the first key, to obtain the context information; and establishing, by the first network side device, a communication connection for the terminal based on the context information. According to this application, more terminals can access a network.
Abstract:
Embodiments of the present invention disclose a method and a system for performing network access authentication based on a non-3GPP network, and a related device. In the solutions of this application, steps in a non-3GPP-based network access authentication procedure in the prior art are reduced, and the UE can quickly access the network.
Abstract:
Embodiments of the present invention disclose a method, a related apparatus, and a system for recovering a called service of a terminal, and the method includes: when a called request of a user terminal is received, querying an initial proxy-call session control function P-CSCF entity with which the user terminal currently registers; if it is detected that the initial P-CSCF is faulty, selecting an available P-CSCF and sending, to the available P-CSCF, a notification message that carries a redundancy identifier, where the redundancy identifier is used to instruct the available P-CSCF to trigger the user terminal to re-register with the P-CSCF; and when a registration complete message sent by the P-CSCF with which the user terminal re-registers is received, delivering the called request to the re-registered P-CSCF to bear a called service of the user terminal.
Abstract:
This application provides security activation methods and communication apparatuses. In an example method, a first access network device in a first communication standard requests a second access network device in a second communication standard to allocate a resource for dual connectivity of a terminal device, and sends, to the second access network device, a user plane security policy. The first access network device further receives identification information of a bearer and a security activation status from the second access network device and sends the identification information of the bearer and the security activation status to the terminal device.
Abstract:
Embodiments of this application provide a communication method and an apparatus to resolve a PC5 unicast establishment failure due to inconsistency between security parameters of terminal devices in a V2X scenario with security negotiation introduced into a PC5 unicast establishment procedure. The communication method includes: A first direct communication discovery name management function network element obtains a security parameter of a first terminal device. A security parameter is required for establishing a PC5 connection between the first terminal device and a second terminal device. The first direct communication discovery name management function network element receives a security parameter of the second terminal device from a second direct communication discovery name management function network element and determines, based on whether the security parameter of the first terminal device matches the security parameter of the second terminal device, whether the first terminal device and the second terminal device support mutual communication.