Authorization method under multiple NRF scenes

A technology of scenarios and tokens, applied in the field of authorization in multiple NRF scenarios, can solve the problem of inability to solve authorization problems in multiple NRF scenarios

Inactive Publication Date: 2021-03-12
HUAWEI TECH CO LTD
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above-mentioned authorization under the deployment of multiple NRF scenarios in the same PLMN is not considered in the 3GPP standard, and the existing authorization mechanism cannot solve the authorization problem under multiple NRF scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization method under multiple NRF scenes
  • Authorization method under multiple NRF scenes
  • Authorization method under multiple NRF scenes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0106] The embodiments of the present application provide an authorization method and device in a multi-NRF scenario, so as to implement authorization when an NF requests a service in a multi-NRF scenario in a PLMN. Wherein, the method and the device are based on the same inventive concept, and since the principles of the method and the device to solve problems are similar, the implementation of the device and the method can be referred to each other, and the repetition will not be repeated.

[0107]In the description of the embodiments of the present application, "and / or" describes the association relationship of associated objects, indicating that there may be three types of relationships, for example, A and / or B, which may mean: A exists alone, A and B exist simultaneously, and There are three cases of B. The character " / " generally indicates that the contextual objects are an "or" relationship. The at least one involved in this application refers to one or more; a plurali...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a network function service authorization method and device, and the method comprises the steps that a first network storage function network element NRF receives a first token request, and the first token request comprises the identification of a service provider network function NF_P; the first NRF determines a target network storage function network element NRF registered by each service provider NF_P according to the identifier; if a second network storage function NRF exists in the target NRF, a second token request is sent to the second NRF; the second NRF generates a token according to the second token request and returns the token to the first NRF; and after the first NRF receives the token sent by the second NRF, the generated and/or received token are sent to a token requester. According to the technical scheme, the authorization problem under the condition that multiple NRF scenes exist in the same public land network PLMN can be solved.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to an authorization method in multiple NRF scenarios. Background technique [0002] The fifth generation mobile communication system (the Fifth Generation, 5G) adopts a service-based architecture (Service Based Architecture, SBA). The 3rd Generation Partnership Project (3rd Generation Partnership Project, 3GPP) also proposes an enhancement of Service Based Architecture (eSBA). In SBA or eSBA, a network function (Network Function, NF) allows other authorized NFs to access its services. The network storage function (NF Repository Function, NRF) provides services such as management, discovery and authorization for NF. The NF obtains the token corresponding to the service by requesting authorization from the NRF, and requests the service from another NF that owns the service according to the token, and the other NF returns a service response after verifying that t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W60/00H04L9/32
CPCH04L9/3213H04W12/06H04W60/00H04L9/32
Inventor 赵绪文
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products