Abstract:
A method for determining a user plane security algorithm, a system, and an apparatus. The method may include: a second device selects a non-null user plane confidentiality protection algorithm based on a security capability of a first device and a security capability of the second device in a case in which user plane confidentiality protection between the second device and the first device is enabled and control plane confidentiality protection between the second device and the first device is not enabled. The second device sends a first message to the first device. The first message includes first algorithm indication information indicating the user plane confidentiality protection algorithm. Therefore, the first device can obtain the non-null user plane confidentiality protection algorithm. Embodiments can be adopted to determine an effective user plane confidentiality protection algorithm, for confidentiality protecting user plane data.
Abstract:
This disclosure provides a method including: A session management network element receives a session establishment request message from a terminal device, where the session establishment request message is used to request to establish a session with a data network. The session management network element determines whether an authentication result of authentication and/or authorization by the data network on the terminal device exists. When determining that the authentication result exists, the session management network element does not initiate a secondary authentication procedure for the session, in other words, skips the secondary authentication procedure. In this disclosure, the session management network element may determine, based on that the data network has authenticated the terminal device, to skip the secondary authentication procedure.
Abstract:
A method for obtaining an identifier of a terminal device includes a key management network element receiving, from a first terminal device, a first key request including a first identifier, where the first identifier is an anonymous identifier or a temporary identifier of a second terminal device. The key management network element sends, to a unified data management network element, a first request including the first identifier. The unified data management network element determines a SUPI of the second terminal device based on the first identifier, and sends, to the key management network element, a first response including the SUPI. In response to an authorization check performed on the second terminal device based on the SUPI succeeds, the key management network element sends a first key response to the first terminal device, where the first key response includes a secure communication parameter.
Abstract:
Disclosed is an AMBR control method, device, and system, so that a quality of service (QoS) control mechanism can be used to control use of resources in a network slice by a terminal device. The method includes: a mobility management network element obtaining M pieces of single network slice selection assistance information (S-NSSAI) corresponding to a terminal device and a first slice-AMBR corresponding to each piece of S-NSSAI in the M pieces of S-NSSAI; and sending the M pieces of S-NSSAI and the first slice-AMBR corresponding to each piece of S-NSSAI to an access network device, where the first slice-AMBR corresponding to each piece of S-NSSAI is used to determine a second slice-AMBR corresponding to the S-NSSAI, and the second slice-AMBR corresponding to each piece of S-NSSAI is used to control an aggregate bit rate of non-guaranteed bit rate non-GBR QoS flows in a network slice indicated by the S-NSSAI.
Abstract:
This application provides a network node selection method and apparatus. An SMF network element obtains transmission capability information of an access network device, and selects, for a terminal device based on the transmission capability information of the access network device, a UPF network element that supports at least one transmission capability included in the transmission capability information. In this process, the SMF network element obtains a transmission capability of the access network device, and selects the UPF network element based on the transmission capability of the access network device. The selected UPF network element supports the transmission capability used by the access network device, so that data can be successfully transmitted between the access network device and the UPF network element. Therefore, a data transmission success rate is improved.
Abstract:
This application provides a method and an apparatus for invoking an application programming interface API, to determine a target exposing function network element used to invoke an API. The method includes: A first network element obtains routing information of an API, where the routing information is used to indicate a route for invoking the API, and the API is provided by a first exposing function network element and a second exposing function network element; the first network element obtains invocation parameter information of the API, where the invocation parameter information is used to handle the API; and the first network element determines a target exposing function network element in the first exposing function network element and the second exposing function network element based on the routing information and the invocation parameter information.
Abstract:
This application provides a method for controlling disorder of downlink data and an apparatus thereof. The method includes: A control plane network element determines to switch from a first user plane device to a second user plane device, and sends indication information to the second user plane device. The second user plane device buffers, according to the received indication information, downlink data received from a session anchor, and sends the buffered downlink data after reception of an end marker from the first user plane device.
Abstract:
The present disclosure relates to session information management methods. One example method includes sending, by a session management function (SMF) network element, identification information of a terminal device, a data network name (DNN), and slice information to a data management network element to request first subscription data that is of the terminal device and that is associated with the DNN and the slice information, where the slice information is used to identify a network slice served by the SMF network element, and receiving, by the SMF network element, the first subscription data from the data management network element.
Abstract:
Embodiments of the present application relate to the wireless communications field, and in particular, to a session management method and a session management network element. The session management method includes: receiving, by a first control plane network element, a user equipment UE context response message from a second control plane network element, where the UE context response message carries a first session message, and the first session message is a pending session message; and sending, by the first control plane network element, a second session message to user equipment according to the UE context response message. According to the session management method and the session management network element in the embodiments of the present application, a session can be managed in a scenario in which a control plane connection of user equipment changes.
Abstract:
Embodiments of the present invention provide a method for accessing a communications network by a terminal, an apparatus, and a communications system, relate to the communications field, and can effectively reduce a resource waste on a network side that is caused when WLCP is triggered by a malicious application on a terminal. A first message sent by a second device is received, where the first message includes a second message and an authentication parameter, the authentication parameter is a token or a User Datagram Protocol UDP port number, and the second message includes the encrypted authentication parameter; or the first message includes a second message, and the second message includes an encrypted authentication parameter; or the first message includes a second message and an authentication parameter; and the second message is sent to a terminal.