Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Servitization architecture authorization method

A service request, the first technology, applied in the field of communication, can solve the problem that the network function of the service provider cannot verify the legality of the service request, etc.

Active Publication Date: 2021-05-18
HUAWEI TECH CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application proposes a service-based architecture authorization method and device to solve the problem that the service provider's network function cannot verify the validity of the service request after the introduction of SCP in the authorization process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Servitization architecture authorization method
  • Servitization architecture authorization method
  • Servitization architecture authorization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0103] The embodiments of the present application provide an authorization method and device of a service-based architecture, which are used to implement the service provider network function to verify the validity of the service request after introducing the SCP in the authorization process. Wherein, the method and the device are based on the same inventive concept, and since the principles of the method and the device to solve problems are similar, the implementation of the device and the method can be referred to each other, and the repetition will not be repeated.

[0104] Some of the terms involved in the embodiments of the present application are explained below for easy understanding.

[0105] 1) Certificate (certificate): Refers to a digital certificate, a document digitally signed by a Certificate Authority (CA) that contains public key owner information and a public key, and is used for identity authentication of both communication parties. The certificate contains c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a service architecture authorization method and device. The method comprises the steps: generating a token by a first network storage function network element after receiving a token request, and writing the service communication proxy (SCP) certificate information in the token by the first network storage function; returning the token carrying the certificate information to a sender of the token request; receiving a service request by the service provider network function, wherein the service request carries a token containing the SCP certificate information or carries the token and a certificate information verification result; if the service request does not contain a certificate information verification result, verifying the certificate information of the SCP by the service provider network function; and if the verification result is successful, continuing the authorization process. According to the technical scheme, the problem that after a service communication agent is introduced, the network function of a service provider cannot verify the certificate information in the token can be solved.

Description

technical field [0001] The present application relates to the field of communication technology, and in particular to a method for service-based architecture authorization. Background technique [0002] The fifth generation mobile communication system (the Fifth Generation, 5G) adopts a service-based architecture (Service Based Architecture, SBA). The 3rd Generation Partnership Project (3rd Generation Partnership Project, 3GPP) also proposes an enhancement of Service Based Architecture (eSBA). In the SBA or eSBA, all network functions (Network Function, NF) support transport layer security (Transport Layer Security, TLS). NFs allow other authorized NFs to access their services. The network storage function (NF Repository Function, NRF) provides services such as management, discovery and authorization for NF. The service requester NF obtains the token corresponding to the service by requesting authorization from the NRF, and the NRF also writes the certificate information ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/069H04W12/06H04L9/32H04W88/18
CPCH04L9/3213H04W88/18H04W88/182
Inventor 李飞
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products