Abstract:
Solution for security negotiation during handover of a user equipment (UE) between different radio access technologies are provided. In the solution, the UE receives NAS security information and AS security information which are selected by the target system and then performs security negotiation with the target system according to the received NAS security information and AS security information. As such, the UE may obtain the key parameter information of the NAS and AS selected by a LTE system and perform security negotiation with the LTE system when the UE hands over from a different system, such as a UTRAN, to the LTE system.
Abstract:
A time message processing method, apparatus and system are provided by the embodiments of the present. The method includes: receiving a time message transmitted from a transmitter; determining whether the time message is an event message according to the identifier information in the time message, wherein the identifier information is the information carried in the field which is not encrypted with the Internet protocol security by the transmitter. With the method, apparatus and system provided by the embodiments of the present, after receiving the time message, the time message receiver can directly determine whether the time message is the event message according to the identifier information carried in the field which is not encrypted by the Internet protocol security in the time message, without any decryption, thereby solving the problem in the prior art that it cannot be determined whether the time message is an event message.
Abstract:
A key generation method includes determining, by an access and mobility management function node, key-related information. The method also includes sending, by the access and mobility management function node, a redirection request message to a mobility management entity. The redirection request message includes the key-related information, and the redirection request message is used to request to hand over a voice service from a packet switched (PS) domain to a circuit switched (CS) domain. The method further includes receiving, by the mobility management entity, the redirection request message. The method additionally includes generating, by the mobility management entity, an encryption key and an integrity protection key for the voice service based on the key-related information.
Abstract:
The present disclosure relates to mobile communications technologies, and in particular, to a mobile communication method, apparatus, and device. The method includes: receiving, by user equipment UE, a non-access stratum NAS security mode command message from a mobility management entity MME, where the NAS security mode command message carries first verification matching information used to verify UE capability information received by the MME; determining, by the UE based on the first verification matching information, whether the UE capability information received by the MME is consistent with UE capability information sent by the UE to the MME; and if the UE capability information received by the MME is consistent with the UE capability information sent by the UE to the MME, sending, by the UE, a NAS security mode complete message to the MME.
Abstract:
This application provides a method for controlling a connection between a terminal and a network, and an apparatus. The method includes: receiving, by a terminal, a packet filter; and discarding, by the terminal, an uplink data packet matching the packet filter. Based on this solution, a connection can be blocked near a source (that is, the connection is blocked from the terminal), to reduce traffic exchanged between the terminal and a user plane network element. Compared with an existing technical solution, the terminal implements traffic control to reduce a quantity of uplink data packets sent to the user plane network element, thereby reducing load of the user plane network element.
Abstract:
Embodiments of this application provide a security protection method and apparatus, and an access network device, and relate to the field of communications technologies, to resolve a problem that user plane security protection cannot be enabled as required in the prior art. The method includes: receiving, by a first access network device, a first message from a second access network device, where the first message carries a user plane security policy, and the user plane security policy is used to indicate a type of user plane security protection to be enabled by the first access network device; and then determining, by the first access network device based on the user plane security policy, a user plane security algorithm and a user plane key corresponding to the user plane security algorithm.
Abstract:
Embodiments of this application provide a key update method, relate to the field of communications technologies In the method, a communications system includes a terminal and a core network device, the terminal accesses the core network device by using both a first access technology and a second access technology simultaneously, and the method includes: performing, by the core network device, re-authentication on the terminal through a first connection corresponding to the first access technology; and if a trigger condition is met, updating, by the core network device, a key for a second connection corresponding to the second access technology.
Abstract:
A communication method and a communications apparatus in which the method includes: a terminal device receiving a first authentication request from a security function network element, and obtaining authentication reference information based on the first authentication request, where the authentication reference information is a response value, a resynchronization token, or a cause indication value. The terminal device sends an authentication response message to the security function network element, where the authentication response message includes a first information element used to carry the response value, a second information element used to carry the resynchronization token, and a third information element used to carry the cause indication value, and the authentication reference information is carried in an information element corresponding to the authentication reference information.
Abstract:
Embodiments of the present invention relate to the field of communications technologies, and provide a communication method, an apparatus, and a system. The method includes: receiving, by a first network side device, a first message sent by a terminal, where the first message carries ciphertext of context information of the terminal, and the ciphertext of the context information is information obtained by encrypting the context information of the terminal; obtaining, by the first network side device, a first key, and decrypting the ciphertext of the context information based on the first key, to obtain the context information; and establishing, by the first network side device, a communication connection for the terminal based on the context information. According to this application, more terminals can access a network.
Abstract:
Embodiments of the present invention disclose a method and a system for performing network access authentication based on a non-3GPP network, and a related device. In the solutions of this application, steps in a non-3GPP-based network access authentication procedure in the prior art are reduced, and the UE can quickly access the network.