Abstract:
Embodiments of the present disclosure provide a method for selecting an authentication algorithm, including: receiving, by a serving device, an authentication data request massage sent by a control device; selecting, by the serving device, an authentication algorithm according to the authentication data request message and information about an authentication algorithm supported by the serving device; determining, by the serving device, identification information of the authentication algorithm according to the selected authentication algorithm; and sending, by the serving device, the identification information of the authentication algorithm to the control device. The embodiments of the present disclosure further provide an apparatus and system for selecting an authentication algorithm. The embodiments of the present disclosure have advantages of improving diversity of methods for selecting an authentication algorithm, improving terminal utilization, and enhancing user experience of terminal authentication.
Abstract:
Embodiments of the present invention disclose a terminal authenticating method, including: receiving, by a UE-to-network relay UE-R, a first request message sent by user equipment UE; sending, by the UE-R, a second request message to a control network element according to the first request message sent by the UE; receiving, by the UE-R, an authentication request message sent by the control network element, and determining whether the authentication request message is for authenticating on the UE; if the authentication request message is for authenticating on the UE, sending, by the UE-R, an authentication request message to the UE; and receiving, by the UE-R, an authentication response message sent by the UE according to the authentication request message, and sending the authentication response message to the control network element.
Abstract:
The technology of this application relates to the communication field, and provides an authentication method, an information sending method, a processing method, and a communication apparatus, to resolve a problem that authentication reliability is low because an authentication procedure can be triggered by only a mobility management function, and improve the authentication reliability. The method includes a first network function determining first information, where the first network function belongs to a home network of user equipment. The first network function selects a first mobility management function based on the first information, where the first mobility management function belongs to a first serving network with which the user equipment is registered, and, the first network function sends a first request to the first mobility management function, where the first request requests the first mobility management function to perform a first authentication procedure on the user equipment.
Abstract:
A signaling protection method, apparatus, and system prevents an NF from spoofing an NF of another PLMN under a shared SEPP to access a peer PLMN service, so that system security is improved. A first SEPP serving a first PLMN receives a third service request that is from an NF of the first PLMN and that is sent to an NF of a second PLMN. A second SEPP serves the second PLMN, and a connection that is between the first SEPP and the second SEPP and is for the first PLMN and the second PLMN includes first N32-f. The first SEPP determines a first PLMN identifier based on configuration information. The first SEPP determines a first N32-f context context identifier corresponding to the first PLMN identifier, where the first N32-f context identifier corresponds to the first N32-f.
Abstract:
Embodiments of this application disclose a trusted communication method. A core network device may detect, based on trusted policy information, whether a non-access stratum NAS message or user data that passes through the core network device is abnormal. When it is detected that the NAS message or the user data is abnormal, the NAS message or a service corresponding to the user data may be notified or blocked, and exception information notification signaling may be reported to a trusted control node (an independent network function entity, an existing control network element, or an existing management network element). In this way, the trusted control node can update the trusted policy information in a timely manner, or notify each network element to take a trusted protection operation. This effectively improves security of a communication system.
Abstract:
A method and an apparatus for performing verification using a shared key are disclosed. The method includes: receiving, by a first network element, a registration request message from a second network element, where the registration request message includes a user identifier, first network identifier information, and second network identifier information, the second network identifier information is obtained by processing the first network identifier information by using a shared key, and the shared key is a key used between the first network element and the second network element; verifying, by the first network element, the registration request message by using the shared key; and sending, by the first network element, a registration response message to the second network element. When receiving a registration request from a visited network, a home network verifies the registration request message by using a shared key, to avoid a spoofing attack from the visited network.
Abstract:
Embodiments of this application provide an authentication method, device, and system, to resolve problems of wastage of performance and memory resources that may be caused by remaining n−1 unused authentication vectors (AVs). The method includes: receiving, by an authentication entity, n first authentication vectors from a unified data management entity, where n is a positive integer; generating, by the authentication entity, n second authentication vectors based on the n first authentication vectors; sending, by the authentication entity, one of the n second authentication vectors to a security anchor function entity; receiving, by the authentication entity, an authentication confirmation request from the security anchor function entity, and performing authentication confirmation on the terminal according to the authentication confirmation request; and sending, by the authentication entity, the other n−1 unused second authentication vectors in the n second authentication vectors to the security anchor function entity when the authentication confirmation succeeds.
Abstract:
An MME negotiates security in case of idle state mobility for a UE from a first network to a LTE network. The UE sends its security capabilities including non-access stratum (NAS) security capabilities supported by the UE to the LTE network. The MME selects a NAS security algorithm, in accordance with the NAS security capabilities of the UE, and sends the selected NAS security algorithm to the UE, sharing the NAS security algorithm between the UE and the LTE network when the UE moves from the first network to the LTE network. The MME also derives, in accordance with the selected NAS security algorithm, a NAS protection key from an authentication vector-related key so as to security communication between the UE and the LTE network.
Abstract:
A communication method and a related product are provided. The communication method includes: When UE switches from a source slice to a target slice mutually exclusive with the source slice, both the UE and a target AMF serving the target slice can obtain a first AMF key Kamf_new. The first AMF key Kamf_new is different from a second AMF key Kamf, and the second AMF key Kamf is a key of a source AMF serving the source slice. According to the application communication security and effectiveness are significantly improved_in a mutually exclusive slice switching scenario.
Abstract:
Example authentication methods, devices, and systems are provided, where those example can be used to verify validity of access location information of a next generation-residential gateway (NG-RG) in a fixed-mobile convergence architecture. One example method includes a network device receiving first link information that is used to represent an access location of a residential gateway, and the network device obtaining second link information of the residential gateway. When the first link information matches partial or all information of the second link information, or when the first link information matches partial or all information of one link information of the second link information, the network device verifies validity of the access location of the residential gateway.