Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device and system for triggering network slice verification and authorization

A network slicing and triggering device technology, applied in transmission systems, security devices, wireless communications, etc., can solve problems such as waste of network resources and process failures of operators and enterprise customers

Pending Publication Date: 2022-08-05
CHINA TELECOM CORP LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Before the credential provisioning server successfully provides or updates the terminal's credential, if AMF triggers the network slice verification and authorization process, the process will fail, wasting the network resources of operators and enterprise customers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for triggering network slice verification and authorization
  • Method, device and system for triggering network slice verification and authorization
  • Method, device and system for triggering network slice verification and authorization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that the relative arrangement of the components and steps, the numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.

[0029] Meanwhile, it should be understood that, for the convenience of description, the dimensions of various parts shown in the accompanying drawings are not drawn in an actual proportional relationship.

[0030] The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the disclosure, its application or uses in any way.

[0031] Techniques, methods, and devices known to those of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, such techniques, methods, and devices should be considere...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, a device and a system for triggering network slice verification and authorization, and relates to the field of wireless communication. The triggering method comprises the steps that a voucher updating request sent by a voucher providing server is received, and the voucher updating request carries an identifier of a network slice corresponding to a to-be-updated voucher; after a registration request of the terminal is received, the verification and authorization process of the network slice corresponding to the identifier is delayed and triggered; and triggering the verification and authorization process of the network slice corresponding to the identifier after receiving a terminal certificate successful update notification. The problem that network resources of operators and enterprise customers are wasted due to failure of network slice verification and authorization processes caused by lack of vouchers of the terminal can be reduced.

Description

technical field [0001] The present disclosure relates to the field of wireless communications, and in particular, to a method, device and system for triggering network slice verification and authorization. Background technique [0002] In the 5G era, operators can provide enterprise customers with dedicated network slices, through which the terminals of enterprise customers can access the enterprise internal network. In order to improve the security of network slicing, when a terminal requests to use a dedicated network slice, the AMF (Access and Mobility Management Function) in the operator's network will trigger network slice verification and authentication after the terminal registration process is completed. Authorization process (Network Slice-SpecificAuthentication and Authorization, NSSAA). In this process, the terminal provides the corresponding certificate to the authentication server of the enterprise client for the authentication server to verify and authorize it...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/08H04L41/0893
CPCH04W12/08H04L41/0893
Inventor 田树一赵嵩
Owner CHINA TELECOM CORP LTD