Communication method and device

A communication method and user equipment technology, applied in wireless communication, network data management, security devices, etc., can solve problems such as inability to meet the data security requirements of users and businesses, and achieve the effect of reducing signaling interaction and improving efficiency

Inactive Publication Date: 2021-07-20
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing technology, security is only achieved through the signing and authentication process, but it cannot meet the data security requirements of users and businesses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication method and device
  • Communication method and device
  • Communication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0232] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention.

[0233] see figure 1 , figure 1 It is a schematic diagram of a network architecture. A communication method provided by an embodiment of the present invention is implemented based on the network architecture.

[0234] Such as figure 1 As shown, the network architecture includes: user equipment (User Equipment, UE) 101, access network (AccessNetwork, AN) 102, user plane function (User Plane Function, UPF) entity 103, data network (Datanetwork, DN) 104, Access and mobility management function (Access Mobility Management Function, AMF) entity 105, session management function (Session Management Function, SMF) entity 106, policy control function (Policy Control Function, PCF) entity 107, application function (Application Function, AF ) entity 108 , an Authentication Server Func...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed is a communication method, comprising: a management function entity receives a first request message sent by a user equipment (UE); the management function entity sends a second request message to a storage function entity according to the first request message, the second request message being used for requesting a security service identifier for the UE, and the security service identifier being used for indicating a security service process; the management function entity receives a response message sent by the storage function entity, wherein the response message comprises the security service identifier; the management function entity obtains a target security service identifier according to the security service identifier, the target security service identifier being used for indicating a security service process initiated by the management function entity; and the management function entity initiates a security service process indicated by the target security service identifier. The invention also discloses a communication device. According to the invention, the security requirements of users and businesses on data can be met.

Description

technical field [0001] The present invention relates to the field of 5G communication, in particular to a communication method and equipment. Background technique [0002] With the development of communication technology, the security requirements of data have changed. Different users may have different requirements for data security. For example, high-end users such as politicians and executives have higher requirements for data security, and need to subscribe to relevant security services to improve security performance. Different businesses also have different requirements for data security. For example, Internet of Vehicles and public security cluster communication systems have different data security requirements, and different security requirements will have a certain impact on system performance. [0003] In the prior art, security is only realized through a contract authentication process, but it cannot meet the data security requirements of users and services. Co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W8/20H04W12/40H04W12/06H04L29/06
CPCH04W8/20H04W12/06H04L63/20H04L63/08H04W8/22H04W12/40
Inventor 胡力陈璟李赫潘凯
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products