Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device and system for pNF to authenticate cNF through NRF in 5G core network

A core network and 5G technology, applied in the 5G core network where pNF has passed NRF certification in the cNF field, can solve the problems of cNF verification, low security, and few parameters, and achieve the effect of enhancing security

Active Publication Date: 2021-02-12
IPLOOK NETWORKS CO LTD
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But in this way, it is difficult to avoid the potential safety hazard that the cNF disguised by an illegal program obtains the services provided by the pNF by illegal means
[0003] In the prior art, static configuration parameters such as the IP address that restricts cNF access are also configured on the pNF, but there are too few parameters that can be verified, and the cNF is not verified at the application layer, so the security is still not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for pNF to authenticate cNF through NRF in 5G core network
  • Method, device and system for pNF to authenticate cNF through NRF in 5G core network
  • Method, device and system for pNF to authenticate cNF through NRF in 5G core network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0042] It should be noted that if there is a directional indication (such as up, down, left, right, front, back...) in the embodiment of the present invention, the directional indication is only used to explain the position in a certain posture (as shown in the accompanying drawing). If the specific posture changes, the directional indication will also change accordingly.

[0043] In addition, if there are descriptions involving "first", "second" and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, device and system for a pNF to authenticate a cNF through an NRF in a 5G core network, the device and system are used for implementing the method, the method is thatthe cNF is registered in a cNRF network, the pNF is registered in a pNRF network, and the method comprises the following steps: when the cNF sends a request for obtaining the pNF service to the pNF, the pNF requests the pNRF to inquire the cNF data; if the pNRF cannot inquire the cNF data, intermediate forwarding and / or intermediate redirection forwarding is carried out on the pNRF discovery request to find the cNRF registered by the cNF; and the pNF judges whether to allow the cNF to access the service of the pNF according to the feedback condition of the pNRF discovery request. According tothe invention, the identity of the cNF is verified through the information among the cNF, the pNF, the cNRF and the pNRF, and the security of mutual service access between network functions NFs in a 5G core network is enhanced.

Description

technical field [0001] The present invention relates to the field of mobile communication technologies, and in particular to a method, device and system for pNF in a 5G core network to authenticate cNF through NRF. Background technique [0002] According to the 5G security architecture and process protocol TS 3GPP 33501-g30, there are a large number of network function NFs (NF, Network Function) in the 5G core network. ), a large number of NFs use the http2 protocol for communication, and use TLS as the data transport layer encryption protocol (the TLS protocol only performs TLS negotiation verification on the cNF at the transport layer, and does not verify the cNF identity and configuration data at the application layer). Therefore, the service consumer cNF (cNF, consumer Network Function, NF for accessing and invoking services is the NF service user) connects to the service provider pNF (pNF, provider Network Function, the NF for providing services is the NF service provid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/128H04W60/00
CPCH04W12/06H04W60/00
Inventor 邱权冠苏国章
Owner IPLOOK NETWORKS CO LTD