Discovery method and device based on servitization architecture

A technology for discovering requests and services, applied in the field of discovery methods and devices based on service-oriented architecture, can solve the problem of high communication complexity, and achieve the effect of reducing communication complexity and communication times

Active Publication Date: 2019-11-19
HUAWEI TECH CO LTD
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with this method, communication between the NRF and the second NF is required to complete the sharing of security keys between the first NF and the second NF, and the communication complexity is relatively high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Discovery method and device based on servitization architecture
  • Discovery method and device based on servitization architecture
  • Discovery method and device based on servitization architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0110] image 3 Shown is the implementation flow chart of a service-based architecture-based discovery method provided in Embodiment 1 of the present application, see image 3 shown, including:

[0111] S201: The first NF determines that a service needs to be requested, and the service can be determined through a service parameter, for example, the service parameter can be a service identifier (service ID). In the following embodiments, the service parameter is taken as an example for illustration, and the implementation process of other service parameters is similar, and will not be repeated here.

[0112] S202: The first NF sends a discovery request to the NRF, and the discovery request may include the identifier of the first NF (ID_NF1), and information such as the service ID of the service requested by the first NF, and may also include the type information of the second NF (NF2type )Wait.

[0113] In the embodiment of the present application, the discovery request may ...

Embodiment 2

[0145] Figure 4 Shown is a flowchart for implementing a service-based architecture-based discovery method provided in Embodiment 2 of the present application. Figure 4 In the above, the execution steps of S301 and S302 are the same as the execution steps of S201 and S202 in the first implementation and will not be repeated here, and only the differences will be described below.

[0146] S303: The NRF receives the discovery request sent by the first NF, and determines the access address or identifier (ID_NF2) of the second NF, and determines the security parameters.

[0147] Wherein, the implementation process of determining ID_NF2 by the NRF is similar to the above embodiment, and will not be repeated here.

[0148] In the embodiment of this application, when the NRF determines the K_session shared between the first NF and the second NF, it can distinguish the services requested by the first NF and generate K_sessions respectively. It can be understood that there is a one-t...

Embodiment 3

[0174] Figure 5 Shown is a flowchart for implementing a service-based architecture-based discovery method provided in Embodiment 3 of the present application. Figure 5 , the execution steps of S401 and S402 are the same as the execution steps of S301 and S302 in the second implementation, and the implementation process of determining ID_NF2 and generating the second K_session in S303 is also the same as the implementation process of determining ID_NF2 and generating the second K_session in the second embodiment They are the same, so they will not be repeated here, and only the differences will be described below.

[0175] S403: The NRF generates a third token based on each generated second K_session.

[0176] In this embodiment of the present application, the third token may be a symmetrical third token or an asymmetrical third token.

[0177] In a possible implementation manner, in the embodiment of the present application, the NRF can encrypt the digital signature, ID_NF...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a discovery method and a device based on a servitization architecture, and the method comprises the steps: enabling a control network element to transmit a discovery response toa first function network element, and enabling the discovery response to comprise a determined safety parameter and an access address or identification of a second function network element. And the first functional network element receives a discovery response sent by the control network element, sends an access request to the second functional network element according to the address or identifier of the second functional network element included in the discovery response, and includes the received security parameter in the access request. And the second functional network element receives the access request sent by the first functional network element, verifies the correctness of the security parameter, and determines whether the access request is authorized by the first functional network element based on the correctness of the security parameter. According to the method, the communication frequency can be reduced to a certain extent, and the communication complexity is reduced.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular to a discovery method and device based on a service-based architecture. Background technique [0002] In the discussion of the core network network architecture of the 5G network, a service-oriented architecture solution centered on the network function (network function, NF) is proposed. In the service-oriented architecture solution, decoupling and integration between NFs are realized through modularization. Each decoupled NF can be expanded independently, evolved independently, and deployed on demand, and all NFs on the control plane use service-oriented interfaces to interact. The same service can be invoked by multiple NFs, reducing the coupling degree of interface definitions between NFs, and finally realizing the on-demand customization of the entire network function to flexibly support different business scenarios and requirements. [0003] In the serv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L9/3247H04L63/08H04L63/083H04L63/0807H04L67/51H04W8/00H04L9/0866H04L9/3242H04W88/14H04L9/088H04L63/0435H04W12/06
Inventor 张博甘露吴荣谭帅帅
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products