Servitization architecture authorization method

A service request, the first technology, applied in the field of communication, can solve the problem that the network function of the service provider cannot verify the legality of the service request, etc.

Active Publication Date: 2021-05-18
HUAWEI TECH CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application proposes a service-based architecture authorization method and device to solve the problem that the service pr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Servitization architecture authorization method
  • Servitization architecture authorization method
  • Servitization architecture authorization method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0103] Embodiments of the present application provide an authorization method and apparatus for a service-based architecture, which are used to implement the service provider network function to verify the validity of a service request after an SCP is introduced in an authorization process. Among them, the method and the device are based on the same inventive concept. Since the principles of the method and the device for solving the problem are similar, the implementation of the device and the method can be referred to each other, and the repetition will not be repeated.

[0104] Some terms involved in the embodiments of the present application are explained below to facilitate understanding.

[0105] 1) Certificate: refers to a digital certificate, a file that is digitally signed by a certificate authority (Certificate Authority, CA) and contains public key owner information and public key, and is used for identity authentication of both parties. The certificate contains info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a service architecture authorization method and device. The method comprises the steps: generating a token by a first network storage function network element after receiving a token request, and writing the service communication proxy (SCP) certificate information in the token by the first network storage function; returning the token carrying the certificate information to a sender of the token request; receiving a service request by the service provider network function, wherein the service request carries a token containing the SCP certificate information or carries the token and a certificate information verification result; if the service request does not contain a certificate information verification result, verifying the certificate information of the SCP by the service provider network function; and if the verification result is successful, continuing the authorization process. According to the technical scheme, the problem that after a service communication agent is introduced, the network function of a service provider cannot verify the certificate information in the token can be solved.

Description

technical field [0001] The present application relates to the field of communication technology, and in particular to a method for service-based architecture authorization. Background technique [0002] The fifth generation mobile communication system (the Fifth Generation, 5G) adopts a service-based architecture (Service Based Architecture, SBA). The 3rd Generation Partnership Project (3rd Generation Partnership Project, 3GPP) also proposes an enhancement of Service Based Architecture (eSBA). In the SBA or eSBA, all network functions (Network Function, NF) support transport layer security (Transport Layer Security, TLS). NFs allow other authorized NFs to access their services. The network storage function (NF Repository Function, NRF) provides services such as management, discovery and authorization for NF. The service requester NF obtains the token corresponding to the service by requesting authorization from the NRF, and the NRF also writes the certificate information ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/069H04W12/06H04L9/32H04W88/18
CPCH04L9/3213H04W88/18H04W88/182
Inventor 李飞
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products