A method for service-oriented architecture authorization

A service request, first-of-its-kind technology, applied in the field of communication, can solve the problem that the service provider's network function cannot verify the legitimacy of the service request.

Active Publication Date: 2022-05-06
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application proposes a service-based architecture authorization method and device to solve the problem that the service provider's network function cannot verify the validity of the service request after the introduction of SCP in the authorization process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for service-oriented architecture authorization
  • A method for service-oriented architecture authorization
  • A method for service-oriented architecture authorization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0103]The embodiment of the application provides an authorization method and device of a service-oriented architecture, which is used to verify the legitimacy of the service request by the network function of the service provider after introducing SCP in the authorization process. Among them, the method and device are based on the same inventive concept. Since the principle of solving problems of the method and device are similar, the implementation of the device and method can refer to each other, and the repetition will not be repeated.

[0104] Some terms involved in the embodiments of the application are explained below for ease of understanding.

[0105] 1) Certificate: refers to a digital certificate, a file containing public key owner information and public key digitally signed by certificate authority (CA), which is used for identity authentication of both communication parties. The certificate includes the certificate version number (version), serial number (serialnumber)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present application discloses a method and device for service-oriented architecture authorization. The method includes: a first network storage function network element generates a token after receiving a token request, and the first network storage function is included in the token Write the SCP certificate information of the service communication agent, and return the token carrying the certificate information to the sender of the token request; the service provider network function receives the service request, and the service request carries the token containing the SCP certificate information card or carry the token and the verification result of the certificate information; if the service request does not contain the verification result of the certificate information, the service provider network function verifies the certificate information of the SCP; if the verification result is successful Then continue the authorization process. Through the above technical solution, the problem that the network function of the service provider cannot verify the certificate information in the token after the introduction of the service communication proxy can be solved.

Description

technical field [0001] The present application relates to the field of communication technology, in particular to a service architecture authorization method. Background technology [0002] The fifth generation (5g) adopts service-based architecture (SBA). The 3rd Generation Partnership Project (3GPP) also proposes the enhancement of service-based architecture (esba). In SBA or esba, all network functions (NF) support transport layer security (TLS). NF allows other authorized NF to access its services. NF Repository Function (NRF) provides management, discovery and authorization services for NF. The service requester NF obtains the token corresponding to the service by requesting authorization from the NRF. The NRF also writes the certificate information of the service requester NF to the token. The service requester NF requests the service from the service provider NF that owns the service according to the token. After receiving the service request sent by the service requester,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/069H04W12/06H04L9/32H04W88/18
CPCH04L9/3213H04W88/18H04W88/182
Inventor 李飞
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products