COMMUNICATION METHOD AND APPARATUS

    公开(公告)号:US20250048073A1

    公开(公告)日:2025-02-06

    申请号:US18921352

    申请日:2024-10-21

    Abstract: A communication method and apparatus are provided. The method includes: A network repository function network element receives a discovery request message including a type of a network element that requests to be discovered. The network repository function network element determines a second network element based on the type of the network element that requests to be discovered, and sends an identifier of a first dataset, a first token, and an identifier of the second network element to the first network element, where the first token authorizes the first network element to obtain the first dataset. According to the foregoing designs, the network repository function network element can provide, to the first network element, an identifier of a network element and information needed for obtaining the dataset, so that the first network element can determine, based on the dataset, whether to access the network element.

    METHOD, SYSTEM, AND APPARATUS FOR DETERMINING USER PLANE SECURITY ALGORITHM

    公开(公告)号:US20230179997A1

    公开(公告)日:2023-06-08

    申请号:US18164697

    申请日:2023-02-06

    CPC classification number: H04W12/033 H04W12/037

    Abstract: A method for determining a user plane security algorithm, a system, and an apparatus. The method may include: a second device selects a non-null user plane confidentiality protection algorithm based on a security capability of a first device and a security capability of the second device in a case in which user plane confidentiality protection between the second device and the first device is enabled and control plane confidentiality protection between the second device and the first device is not enabled. The second device sends a first message to the first device. The first message includes first algorithm indication information indicating the user plane confidentiality protection algorithm. Therefore, the first device can obtain the non-null user plane confidentiality protection algorithm. Embodiments can be adopted to determine an effective user plane confidentiality protection algorithm, for confidentiality protecting user plane data.

    PACKET TRANSMISSION METHOD, COMMUNICATION APPARATUS, AND COMMUNICATION SYSTEM

    公开(公告)号:US20220294858A1

    公开(公告)日:2022-09-15

    申请号:US17827539

    申请日:2022-05-27

    Inventor: Fang YU Yan LI Ao LEI

    Abstract: Embodiments of this application provide a packet transmission method, a communication apparatus, and a communication system. A target transport layer proxy network element establishes a fourth transport layer connection based on a first context of a source transport layer proxy network element, where the first context is a context about packet transmission of the source transport layer proxy network element on a first path. If the target transport layer proxy network element receives first indication information, and the first indication information indicates that application context migration between a first application server and a second application server is completed, the target transport layer proxy network element performs transport layer processing on a packet on a second path based on a second context of the target transport layer proxy network element, and transmits, on the second path, a packet obtained through the transport layer processing. Hence, a packet loss can be avoided.

    SECURE COMMUNICATION METHOD AND APPARATUS

    公开(公告)号:US20250070988A1

    公开(公告)日:2025-02-27

    申请号:US18948617

    申请日:2024-11-15

    Abstract: A secure communication method includes receiving, by a first network element, first information and a first signature from a network management network element. The first signature is generated based on a private key of the network management network element and the first information, and the first information is used to describe the first network element. The method also includes sending, by the first network element, the first information and the first signature to a certificate issuing network element. The first information is used to obtain a first certificate, and the first certificate is used to prove an identity of the first network element. The method further includes receiving, by the first network element, the first certificate from the certificate issuing network element.

    TRAFFIC ROUTING METHOD, APPARATUS, AND SYSTEM

    公开(公告)号:US20240236755A1

    公开(公告)日:2024-07-11

    申请号:US18616049

    申请日:2024-03-25

    CPC classification number: H04W28/0236 H04L47/20 H04L47/2483

    Abstract: The present disclosure provides example traffic routing methods, apparatuses, and systems. One example method includes receiving a routing rule from a session management network element in a session management process, wherein the routing rule indicates at least one of the following: to send a first traffic to a first function entity, or to send a second traffic to a second function entity or an access device, where the first traffic is a traffic on which first traffic steering control is to be performed, and the second traffic is a traffic on which the first traffic steering control has been performed; and transmitting a received traffic according to the routing rule.

    METHOD AND APPARATUS FOR ESTABLISHING SECURE COMMUNICATION

    公开(公告)号:US20230232228A1

    公开(公告)日:2023-07-20

    申请号:US18191942

    申请日:2023-03-29

    CPC classification number: H04W12/069 H04W76/10

    Abstract: A method and an apparatus for establishing secure communication. The method includes: a terminal device receives a first message from a first network element, where the first message includes an identifier of a second network element and first indication information, and the first indication information indicates a candidate authentication mechanism associated with the second network element. The terminal device establishes a communication connection with the second network element based on the candidate authentication mechanism. The terminal device may obtain an authentication mechanism of the dynamically configured second network element, to meet a requirement for establishing a secure communication connection through authentication in an MEC architecture.

    KEY MANAGEMENT METHOD AND COMMUNICATION APPARATUS

    公开(公告)号:US20250063348A1

    公开(公告)日:2025-02-20

    申请号:US18937338

    申请日:2024-11-05

    Abstract: This application provides example key management methods and example communication apparatuses. In an example method, a terminal device obtains identification information of a first decryption network element in a local network. The terminal device obtains, based on the identification information and a mapping relationship, a first encryption key corresponding to the first decryption network element, where the mapping relationship indicates at least one decryption network element and an encryption key corresponding to each of the at least one decryption network element, and the at least one decryption network element includes the first decryption network element. The terminal device encrypts the user identity information by using the first encryption key, to obtain a hidden user identity. The terminal device sends a registration request to the local network through an access network device, where the registration request includes the hidden user identity.

    COMMUNICATION METHOD, APPARATUS, AND SYSTEM
    8.
    发明公开

    公开(公告)号:US20230188993A1

    公开(公告)日:2023-06-15

    申请号:US18163938

    申请日:2023-02-03

    CPC classification number: H04W12/08 H04W76/14

    Abstract: Embodiments of this application provide a communication method and an apparatus to resolve a PC5 unicast establishment failure due to inconsistency between security parameters of terminal devices in a V2X scenario with security negotiation introduced into a PC5 unicast establishment procedure. The communication method includes: A first direct communication discovery name management function network element obtains a security parameter of a first terminal device. A security parameter is required for establishing a PC5 connection between the first terminal device and a second terminal device. The first direct communication discovery name management function network element receives a security parameter of the second terminal device from a second direct communication discovery name management function network element and determines, based on whether the security parameter of the first terminal device matches the security parameter of the second terminal device, whether the first terminal device and the second terminal device support mutual communication.

    TRAFFIC ROUTING METHOD, APPARATUS, AND SYSTEM

    公开(公告)号:US20220264356A1

    公开(公告)日:2022-08-18

    申请号:US17738782

    申请日:2022-05-06

    Abstract: The present disclosure provides example traffic routing methods, apparatuses, and systems. One example method includes determining, by a session management network element, a routing rule, where the routing rule indicates a first traffic steering entity to send a first traffic to a first function entity, or send a second traffic to a second function entity or an access device, where the first traffic is a traffic on which first traffic steering control is to be performed, and the second traffic is a traffic on which the first traffic steering control has been performed. The routing rule is sent by the session management network element to the first traffic steering entity in a session management process.

    METHOD FOR OBTAINING SECURITY CLASSIFICATION RESULT AND COMMUNICATION APPARATUS

    公开(公告)号:US20240291849A1

    公开(公告)日:2024-08-29

    申请号:US18659239

    申请日:2024-05-09

    CPC classification number: H04L63/1433

    Abstract: Embodiments of this application provide a method for obtaining a security classification result and a communication apparatus. The method includes: A security function network element determines to perform security analytics on a target location area; and the security function network element determines a security classification result of the target location area based on first information, where the security classification result indicates a degree to which a potential attack exists in the target location area, the first information is related to behavior information of a terminal device in the target location area, and the behavior information includes traffic data and/or movement track information. According to this application, security analytics may be performed on a location area, to obtain a security classification result of the location area.

Patent Agency Ranking