Method, device and computer-readable storage medium for network function authentication

A network function and computer program technology, applied in the field of communication, can solve problems such as NF communication security, achieve the effect of improving security and avoiding illegal attacks

Active Publication Date: 2021-12-07
ZTE CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the above technical problems, the embodiment of the present invention provides a network function authentication method, device and computer-readable storage medium, which solves the problem of NF communication security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and computer-readable storage medium for network function authentication
  • Method, device and computer-readable storage medium for network function authentication
  • Method, device and computer-readable storage medium for network function authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the technical problems, technical solutions and advantages to be solved by the present invention clearer, the following will describe in detail with reference to the drawings and specific embodiments.

[0051] The terms "first", "second" and the like in the description and claims of the present invention are used to distinguish similar objects, and are not necessarily used to describe a specific order or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of practice in sequences other than those illustrated or described herein.

[0052] In order to solve the problem of NF communication security, especially the security problem of NF communication under the current 5G bus architecture, an embodiment of the present invention provides a network function authentication system. see figure 2 , the network function aut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present invention provide a network function authentication method, device, and computer-readable storage medium. The network function authentication method includes: receiving a network function NF request from a sender, performing access token authentication on the NF request, and obtaining Authentication result; respond to the NF request according to the authentication result, and return the response result to the sending end, the method of network function authentication uses NRF to authenticate the request NF during registration, discovery and other processes to improve the system At the same time, when the NF automatically registers, it provides its own token for the NF to discover, and the NRF provides it to the service requesting NF, so that the service provider NF can authenticate the NF service call, which improves the security of the system and avoids system illegally attacked.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method, device and computer-readable storage medium for network function authentication. Background technique [0002] The traditional telecommunication network is relatively closed. The hardware usually adopts special equipment, and the business software is superimposed on the special application. These equipment are usually located in the dedicated telecommunications room. There is generally no authentication for the interaction between services, and only need to follow the mutual The interface protocol is sufficient, such as the interaction between MME (Mobility Management Entity, mobile management entity) and SGW (Serving Gate Way, service gateway) as long as it follows the 3GPP (3rd Generation Partnership Project, third generation partnership project) TS (Technical specification , technical specification) The interface defined in 29.274 is enough. [0003] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/084
CPCH04W12/06H04W12/08
Inventor 蒋栋栋刘俊羿郑芳庭涂小勇刘合伦翟义强
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products