Network slice authentication method, system and related equipment
A network slicing and authentication method technology, applied in the field of systems and related equipment, network slicing authentication and authentication methods, can solve the problems of network slicing resource misappropriation, inability to meet authentication and authentication requirements, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0076] The technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present disclosure.
[0077] Unless otherwise specified, descriptions such as "first" and "second" in the present disclosure are used to distinguish different objects, and are not used to express meanings such as size or timing.
[0078] figure 1 Shown is a schematic flowchart of a network slice authentication and authentication method according to some embodiments of the present disclosure.
[0079] like figure 1 As shown, the method of this embodiment includes steps 110-180.
[0080] In step 110, for any one of the multiple applications whose routing policy corresponds to the same network slice, the user equipment sends a registration request to an Authentication Management Function (AMF) network element, which carries the identifier of the network slice and the identifier of the app...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


