Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Registration method and device based on service architecture

A registration request and algorithm technology, applied in the field of registration methods and devices based on service-oriented architecture, can solve problems such as low security

Active Publication Date: 2020-10-09
HUAWEI TECH CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Since the communication interface between the functional network element to be registered and the NRF is not protected by a secure channel, there may be a risk of an attacker modifying parameters, or an attacker playing the role of the functional network element to be registered and attempting to access the NRF, so the above service-based In the secure registration method of the standardized architecture, the NRF does not perform security authentication on the registration request sent by the functional network element to be registered, and the security is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Registration method and device based on service architecture
  • Registration method and device based on service architecture
  • Registration method and device based on service architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0090] Embodiment 1: The security parameter includes a token, and the token is generated based on an asymmetric key.

[0091] image 3 Shown is the flow chart of the security registration implementation based on the service-oriented architecture provided by Embodiment 1 of this application, refer to image 3 shown, including:

[0092] S201a: OAM generates an asymmetric token.

[0093] In this embodiment of the application, the OAM can generate an asymmetric token based on the public key (PKnrf) of the NRF.

[0094] Among them, the OAM generates an asymmetric token, and the OAM needs to store the OAM public key (PKoam), the OAM private key (SKoam) and the NRF public key (PKnrf) in advance. Wherein, the PKnrf may be initially pre-set in the OAM, or may be obtained from the NRF during the interaction between the OAM and the NRF. NRF also needs to save Pkoam, PKnrf and NRF's private key (SKnrf) in advance. Wherein, the Pkoam may be initially pre-set in the NRF, or may be sent...

Embodiment 2

[0116] Embodiment 2: The security parameters include token, and the token is generated based on a symmetric key.

[0117] Figure 4 Shown is a flow chart of implementing the secure registration method provided in Embodiment 2 of the present application. Figure 4 The implementation flow chart of the security registration method shown is the same as image 3 The implementation process of the security registration method shown is similar, and the only difference lies in the calculation method of the token. The difference will be described below. For the same or similar points, please refer to the description of the first embodiment above.

[0118] S301a: The OAM generates a symmetric token.

[0119] In the embodiment of the present application, the OAM may generate a symmetric token based on the symmetric key (k) shared between the OAM and the NRF.

[0120] Wherein, when the OAM generates the symmetric token based on the symmetric key (k) shared between the OAM and the NRF, b...

Embodiment 3

[0136] Embodiment 3: The security parameter includes MAC.

[0137] Figure 5 Shown is a flow chart of implementing the secure registration method provided in Embodiment 3 of the present application. Figure 5 The implementation flow chart of the security registration method shown is the same as Figure 4 The implementation process of the security registration method shown is similar, and the only difference is that the security parameter generated by OAM is MAC without generating token, and NRF only verifies MAC without token. Only the differences will be described below, and for the same or similar points, reference can be made to the relevant description of the second embodiment above.

[0138] S401: The OAM generates a MAC.

[0139] In the embodiment of the present application, the OAM may generate a MAC based on the symmetric key (k) shared between the OAM and the NRF.

[0140] In the case where the OAM generates the MAC based on the symmetric key (k) shared between th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present application provides a registration method and device based on a service-oriented architecture. In this method, the management network element determines the configuration information of the functional network element, and the configuration information includes security parameters; the management network element sends the functional network element send the configuration information. The functional network element receives the configuration information sent by the management network element; the functional network element sends a registration request to the control network element based on the configuration information, and the registration request includes security parameters. The control network element receives the registration request sent by the functional network element, and the registration request includes security parameters; the control network element verifies the correctness of the security parameters, and determines the validity of the registration request through the correctness of the security parameters. Legitimacy, so as to realize the security authentication of the registration request of the functional network element by the control network element, and improve security.

Description

technical field [0001] The present application relates to the field of communication technology, and in particular to a registration method and device based on a service-oriented architecture. Background technique [0002] In the discussion of the core network network architecture of the 5G network, a service-oriented architecture solution centered on the network function (network function, NF) is proposed. In the service-oriented architecture solution, decoupling and integration between NFs are realized through modularization. Each decoupled NF can be expanded independently, evolved independently, and deployed on demand, and all NFs on the control plane use service-oriented interfaces to interact. The same service can be invoked by multiple NFs, reducing the coupling degree of interface definitions between NFs, and finally realizing the on-demand customization of the entire network function to flexibly support different business scenarios and requirements. [0003] In the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L67/14H04L67/51H04L67/60H04W12/10H04W12/03H04W12/108H04L9/30H04L9/3213H04L9/3242H04L9/3247
Inventor 张博甘露吴荣谭帅帅
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products