Unlock instant, AI-driven research and patent intelligence for your innovation.

Network slice authentication method, system and related equipment

A network slicing and authentication method technology, applied in the field of systems and related equipment, network slicing authentication and authentication methods, can solve the problems of network slicing resource misappropriation, inability to meet authentication and authentication requirements, etc.

Pending Publication Date: 2022-06-17
CHINA TELECOM CORP LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that when the network slice authentication process is used in combination with URSP, the authentication requirements of the authenticated network slice for the application cannot be met, and there will be security problems such as network slice resources being stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network slice authentication method, system and related equipment
  • Network slice authentication method, system and related equipment
  • Network slice authentication method, system and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] The technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present disclosure.

[0077] Unless otherwise specified, descriptions such as "first" and "second" in the present disclosure are used to distinguish different objects, and are not used to express meanings such as size or timing.

[0078] figure 1 Shown is a schematic flowchart of a network slice authentication and authentication method according to some embodiments of the present disclosure.

[0079] like figure 1 As shown, the method of this embodiment includes steps 110-180.

[0080] In step 110, for any one of the multiple applications whose routing policy corresponds to the same network slice, the user equipment sends a registration request to an Authentication Management Function (AMF) network element, which carries the identifier of the network slice and the identifier of the app...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network slice authentication method, a network slice authentication system and related equipment, and relates to the field of communication. For any application in a plurality of applications of the same network slice corresponding to the routing policy, the user equipment sends a registration request to the AMF network element, and the registration request carries an identifier of the network slice and an identifier of the application; the user equipment responds to the AMF network element authentication request, carries the identifier of the application, returns an authentication response and carries user information corresponding to the application, so that the AMF network element forwards the authentication response to the authentication server; the user equipment responds to a voucher request sent by the authentication server based on the authentication response and returns a voucher response carrying a voucher corresponding to the user information corresponding to the application, so that the authentication server verifies the voucher; the user equipment receives a verification result of the credential, and if the credential verification is passed, the application can use the network slice. Therefore, network slice authentication which covers all applications is realized.

Description

technical field [0001] The present disclosure relates to the field of communications, and in particular, to a network slice authentication and authentication method, system and related equipment. Background technique [0002] In order to meet the requirements for user authentication and authentication when using network slices, related technologies introduce the network slice authentication and authentication process. [0003] An application-based user equipment routing selection policy (URSP) provides routing options such as network slicing for each application. [0004] When URSP routes different applications to the same network slice, if the first application of these applications passes the authentication of the network slice, other applications in the subsequent applications will directly use the network slice and will not initiate the network slice. Slice authentication and authentication process. It can be seen that when the network slice authentication and authenti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04W12/37
Inventor 陈淑珍黄海陈平辉
Owner CHINA TELECOM CORP LTD