Unlock instant, AI-driven research and patent intelligence for your innovation.

Authorization method and device for proxy subscription

An authorization device, a technology for subscription requests, applied in the field of communication

Active Publication Date: 2020-10-30
HUAWEI TECH CO LTD
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of this application provides an authorization method and device for proxy subscription to solve the problem of how to ensure the security of proxy subscription in the scenario of proxy subscription

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization method and device for proxy subscription
  • Authorization method and device for proxy subscription
  • Authorization method and device for proxy subscription

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0095] The embodiments of the present application provide an authorization method, device, and system for proxy subscription, which are used to realize the security of proxy subscription. Wherein, the method and the device are based on the same inventive concept, and since the principles of the method and the device to solve problems are similar, the implementation of the device and the method can be referred to each other, and the repetition will not be repeated. In the description of the embodiments of the present application, "and / or" describes the association relationship of associated objects, indicating that there may be three types of relationships, for example, A and / or B, which may mean: A exists alone, A and B exist simultaneously, and There are three cases of B. The character " / " generally indicates that the contextual objects are an "or" relationship. The at least one involved in this application refers to one or more; a plurality refers to two or more than two. In...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authorization method and device for proxy subscription. The authorization method and device are used for improving the safety in the proxy subscription process. The method comprises the steps that a network function storage function NRF receives a token request from a first network function NF, wherein the token request comprises an identifier of the first NF and an identifier of the second NF; the NRF generates a first token based on the token request, wherein the first token is used for indicating that the first NF has an authority of subscribing a network functionservice from the third NF by the second NF, and is used for indicating that the second NF has an authority of receiving the network function service provided by the third NF; and the NRF sends the first token to the first NF.

Description

technical field [0001] The embodiments of the present application relate to the field of communication technologies, and in particular, to a method and device for authorizing proxy subscription. Background technique [0002] The fifth generation mobile communication system (the fifth generation, 5G) adopts a service based architecture (SBA). The third generation partnership project (3rd generation partnership project, 3GPP) also proposes an enhancement of service based architecture (eSBA). In the SBA or eSBA, the communication between network functions (network functions, NFs) in the core network adopts a service invocation manner. For example, the "subscribe-notify" interaction mode is adopted between two NFs. NF_A subscribes services to NF_B, and NF_B notifies NF_A of related services after corresponding conditions are met. [0003] In addition, the SBA or eSBA architecture also supports proxy subscriptions. In the proxy subscription scenario, NF_A can also subscribe s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/06H04W12/10
CPCH04L63/0807H04L63/0884H04W12/06H04L63/123H04W12/10H04L9/40
Inventor 赵绪文张博
Owner HUAWEI TECH CO LTD