Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Discovery method and device based on servitization architecture

A discovery method and architecture technology, applied in the field of discovery methods and devices based on service-oriented architecture, can solve the problem of high communication complexity, and achieve the effects of reducing communication complexity and the number of times of communication

Pending Publication Date: 2019-03-05
HUAWEI TECH CO LTD
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with this method, communication between the NRF and the second NF is required to complete the sharing of security keys between the first NF and the second NF, and the communication complexity is relatively high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Discovery method and device based on servitization architecture
  • Discovery method and device based on servitization architecture
  • Discovery method and device based on servitization architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0110] image 3 Shown is the implementation flow chart of a service-based architecture-based discovery method provided in Embodiment 1 of the present application, see image 3 shown, including:

[0111] S201: The first NF determines that a service needs to be requested, and the service can be determined through a service parameter, for example, the service parameter can be a service identifier (service ID). In the following embodiments, the service parameter is taken as an example for illustration, and the implementation process of other service parameters is similar, and will not be repeated here.

[0112] S202: The first NF sends a discovery request to the NRF, and the discovery request may include the identifier of the first NF (ID_NF1), and information such as the service ID of the service requested by the first NF, and may also include the type information of the second NF (NF2type )Wait.

[0113] In the embodiment of the present application, the discovery request may ...

Embodiment 2

[0145] Figure 4 Shown is a flowchart for implementing a service-based architecture-based discovery method provided in Embodiment 2 of the present application. Figure 4 In the above, the execution steps of S301 and S302 are the same as the execution steps of S201 and S202 in the first implementation and will not be repeated here, and only the differences will be described below.

[0146] S303: The NRF receives the discovery request sent by the first NF, and determines the access address or identifier (ID_NF2) of the second NF, and determines the security parameters.

[0147] Wherein, the implementation process of determining ID_NF2 by the NRF is similar to the above embodiment, and will not be repeated here.

[0148] In the embodiment of this application, when the NRF determines the K_session shared between the first NF and the second NF, it can distinguish the services requested by the first NF and generate K_sessions respectively. It can be understood that there is a one-t...

Embodiment 3

[0174] Figure 5 Shown is a flowchart for implementing a service-based architecture-based discovery method provided in Embodiment 3 of the present application. Figure 5 , the execution steps of S401 and S402 are the same as the execution steps of S301 and S302 in the second implementation, and the implementation process of determining ID_NF2 and generating the second K_session in S303 is also the same as the implementation process of determining ID_NF2 and generating the second K_session in the second embodiment They are the same, so they will not be repeated here, and only the differences will be described below.

[0175] S403: The NRF generates a third token based on each generated second K_session.

[0176] In this embodiment of the present application, the third token may be a symmetrical third token or an asymmetrical third token.

[0177] In a possible implementation manner, in the embodiment of the present application, the NRF can encrypt the digital signature, ID_NF...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application provides a discovery method and device based on a servitization architecture. In the method, a control network element sends a discovery response to a first functional network element,and the discovery response comprises a determined safety parameter and an access address or an identifier of a second functional network element; the first functional network element receives the discovery response sent by the control network element and sends an access request to the second functional network element according to the address or the identifier of the second functional network element, which is included in the discovery response, and the access request comprises the received safety parameter; and the second functional network element receives the access request sent by the first functional network element, verifies correctness of the safety parameter and determines whether the access request is authorized by the first functional network element on the basis of correctnessof the safety parameter. By the discovery method and device provided by the application, communication times can be reduced to a certain degree, and communication complexity is reduced.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular to a discovery method and device based on a service-based architecture. Background technique [0002] In the discussion of the core network network architecture of the 5G network, a service-oriented architecture solution centered on the network function (network function, NF) is proposed. In the service-oriented architecture solution, decoupling and integration between NFs are realized through modularization. Each decoupled NF can be expanded independently, evolved independently, and deployed on demand, and all NFs on the control plane use service-oriented interfaces to interact. The same service can be invoked by multiple NFs, reducing the coupling degree of interface definitions between NFs, and finally realizing the on-demand customization of the entire network function to flexibly support different business scenarios and requirements. [0003] In the serv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04W8/00
CPCH04L9/3247H04L63/08H04L63/083H04L63/0807H04L67/51H04W8/00H04L9/0866H04L9/3242H04W88/14H04L9/088H04L63/0435H04W12/06
Inventor 张博甘露吴荣谭帅帅
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products