TW201727524A - Server, method, and program - Google Patents

Server, method, and program Download PDF

Info

Publication number
TW201727524A
TW201727524A TW105141068A TW105141068A TW201727524A TW 201727524 A TW201727524 A TW 201727524A TW 105141068 A TW105141068 A TW 105141068A TW 105141068 A TW105141068 A TW 105141068A TW 201727524 A TW201727524 A TW 201727524A
Authority
TW
Taiwan
Prior art keywords
server
mec
authentication information
authentication
mme
Prior art date
Application number
TW105141068A
Other languages
Chinese (zh)
Inventor
Hiroaki Takano
Shin Saito
Ryota Kimura
Original Assignee
Sony Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sony Corp filed Critical Sony Corp
Publication of TW201727524A publication Critical patent/TW201727524A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/062Pre-authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0892Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/04Registration at HLR or HSS [Home Subscriber Server]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

To provide a mechanism for ensuring security relating to an edge server. A server that provides content to other devices, the server being provided with a processing unit that performs communication with a network against which the server has been authenticated by using authentication information registered in an HSS (Home Subscriber Server) and associated with the server.

Description

伺服器、方法及程式 Server, method and program

本揭露係有關於伺服器、方法及程式。 This disclosure relates to servers, methods, and programs.

近年來,以被設置在與智慧型手機等終端實體性接近位置的伺服器(以下亦稱為邊緣伺服器)來進行資料處理,一種稱為行動邊緣計算(MEC:Mobile-Edge Computing)技術正受到矚目。例如,下記非專利文獻1中係揭露,關於MEC之技術的標準規格,係被研討。 In recent years, data processing has been carried out with a server (hereinafter also referred to as an edge server) that is placed in a physical proximity to a terminal such as a smart phone, and a technique called Mobile Edge Computing (MEC) is being implemented. Received attention. For example, it is disclosed in Non-Patent Document 1 below, and the standard specifications of the MEC technology are discussed.

在MEC中,在與終端實體性接近的位置配置有邊緣伺服器,因此相較於被集中性配置的一般的雲端伺服器,通訊延遲較為縮短,使得要求高即時性的應用程式之利用成為可能。又,在MEC中,係藉由使得目前為止在終端側上所被處理的機能,被接近終端的邊緣伺服器做分散處理,可不受限於終端的性能而實現高速的網路應用程式處理。邊緣伺服器,係可具有例如身為應用程式伺服器之機能、及身為內容伺服器之機能等等多樣的機能,而可向終端提供多樣的服務。 In the MEC, an edge server is disposed at a location close to the physical entity of the terminal, so that the communication delay is shortened compared to the general cloud server that is centrally configured, making it possible to utilize applications requiring high immediacy. . Further, in the MEC, the edge server that is close to the terminal is distributed by the function that has been processed on the terminal side so far, and high-speed network application processing can be realized without being limited to the performance of the terminal. The edge server can have various functions such as an function as an application server and a function as a content server, and can provide various services to the terminal.

[先前技術文獻] [Previous Technical Literature]

[非專利文獻] [Non-patent literature]

[非專利文獻1]ETSI, “Mobile-Edge Computing-Introductory Technical White Paper”, 2014年9月,〔2015年9月3日檢索〕,網際網路<https://portal.etsi.org/Portals/0/TBpages/MEC/Docs/Mobile-edge_Computing_-_Introductory_Technical_White_Paper_V1%2018-09-14.pdf> [Non-Patent Document 1] ETSI, "Mobile-Edge Computing-Introductory Technical White Paper", September 2014, [Searched on September 3, 2015], Internet <https://portal.etsi.org/Portals /0/TBpages/MEC/Docs/Mobile-edge_Computing_-_Introductory_Technical_White_Paper_V1%2018-09-14.pdf>

上記非專利文獻1等中的研討內容,係由於開始研討還沒有多久,因此關於MEC的技術難謂有被充份地提案。例如,用來擔保關於邊緣伺服器之安全性所需之技術,也是未被充份提案的技術之一。 The contents of the discussion in Non-Patent Document 1 and the like are not long before the start of the discussion. Therefore, the technology of the MEC is difficult to be fully proposed. For example, the technology needed to guarantee the security of edge servers is one of the technologies that have not been fully proposed.

若依據本揭露,則可提供一種伺服器,係向其他裝置提供內容的伺服器,其係具備:處理部,係與已使用HSS(Home Subscriber Server)中所被登錄之前記伺服器所對應之認證資訊而被認證之網路,進行通訊。 According to the disclosure, there is provided a server that provides a server that provides content to another device, and includes a processing unit that corresponds to a server that has been registered in the HSS (Home Subscriber Server). A network that is certified to authenticate information and communicate.

又,若依據本揭露,則可提供一種方法,係含有:藉由向其他裝置提供內容的伺服器,與已使用HSS中所被登錄之前記伺服器所對應之認證資訊而被認證之網路,進行通訊。 Further, according to the present disclosure, there is provided a method comprising: a server authenticated by using a server that provides content to other devices, and authentication information corresponding to the server that has been registered in the HSS before login; , for communication.

又,若依據本揭露,則可提供一種程式,係用來使電腦發揮機能而成為:向其他裝置提供內容的伺服器,且該伺服器係含有:處理部,係與已使用HSS中所被登錄之前記伺服器所對應之認證資訊而被認證之網路,進行通訊。 Moreover, according to the present disclosure, a program can be provided for causing a computer to function as a server that provides content to other devices, and the server includes: a processing unit that is associated with the used HSS The network authenticated by logging in to the authentication information corresponding to the server before communication.

如以上說明,若依據本揭露,則可提供一種用來擔保關於邊緣伺服器之安全性所需之機制。此外,上記效果並非一定要限定解釋,亦可和上記效果一併、或取代上記效果,而達成本說明書所欲揭露之任一效果、或可根據本說明書來掌握的其他效果。 As explained above, in accordance with the present disclosure, a mechanism for securing the security of the edge server can be provided. In addition, the effect of the above is not necessarily limited to the explanation, and may be combined with the effect of the above, or the effect of the above, to achieve any of the effects to be disclosed in the present specification, or other effects that can be grasped according to the present specification.

1‧‧‧系統 1‧‧‧ system

10‧‧‧蜂巢網 10‧‧‧Hive net

40‧‧‧核心網路 40‧‧‧core network

41‧‧‧MME 41‧‧‧MME

42‧‧‧HSS 42‧‧‧HSS

43‧‧‧S-GW 43‧‧‧S-GW

44‧‧‧P-GW 44‧‧‧P-GW

50‧‧‧PDN 50‧‧‧PDN

60‧‧‧應用程式伺服器 60‧‧‧Application Server

100‧‧‧無線通訊裝置 100‧‧‧Wireless communication device

200‧‧‧終端裝置 200‧‧‧ Terminals

210‧‧‧天線部 210‧‧‧Antenna Department

220‧‧‧無線通訊部 220‧‧‧Wireless Communications Department

230‧‧‧記憶部 230‧‧‧Memory Department

240‧‧‧處理部 240‧‧‧Processing Department

241‧‧‧認證處理部 241‧‧‧Authorization and Processing Department

243‧‧‧通訊處理部 243‧‧‧Communication Processing Department

300‧‧‧MEC伺服器 300‧‧‧MEC server

310‧‧‧通訊部 310‧‧‧Communication Department

320‧‧‧記憶部 320‧‧‧Memory Department

330‧‧‧處理部 330‧‧‧Processing Department

331‧‧‧認證處理部 331‧‧‧Authority Processing Department

333‧‧‧通訊處理部 333‧‧‧Communication Processing Department

410‧‧‧通訊部 410‧‧‧Communication Department

420‧‧‧記憶部 420‧‧‧Memory Department

430‧‧‧處理部 430‧‧‧Processing Department

500‧‧‧OTT伺服器 500‧‧‧ OTT server

510‧‧‧通訊部 510‧‧‧Communication Department

520‧‧‧記憶部 520‧‧‧Memory Department

530‧‧‧處理部 530‧‧‧Processing Department

531‧‧‧認證處理部 531‧‧‧Authority Processing Department

533‧‧‧通訊處理部 533‧‧‧Communication Processing Department

700‧‧‧伺服器 700‧‧‧Server

701‧‧‧處理器 701‧‧‧ processor

702‧‧‧記憶體 702‧‧‧ memory

703‧‧‧儲存體 703‧‧‧ storage

704‧‧‧網路介面 704‧‧‧Network interface

705‧‧‧有線通訊網路 705‧‧‧Wired communication network

706‧‧‧匯流排 706‧‧‧ Busbar

900‧‧‧智慧型手機 900‧‧‧Smart Phone

901‧‧‧處理器 901‧‧‧ processor

902‧‧‧記憶體 902‧‧‧ memory

903‧‧‧儲存體 903‧‧‧ storage

904‧‧‧外部連接介面 904‧‧‧ External connection interface

906‧‧‧相機 906‧‧‧ camera

907‧‧‧感測器 907‧‧‧ sensor

908‧‧‧麥克風 908‧‧‧ microphone

909‧‧‧輸入裝置 909‧‧‧Input device

910‧‧‧顯示裝置 910‧‧‧ display device

911‧‧‧揚聲器 911‧‧‧ Speaker

912‧‧‧無線通訊介面 912‧‧‧Wireless communication interface

913‧‧‧BB處理器 913‧‧‧BB processor

914‧‧‧RF電路 914‧‧‧RF circuit

915‧‧‧天線開關 915‧‧‧Antenna switch

916‧‧‧天線 916‧‧‧Antenna

917‧‧‧匯流排 917‧‧ ‧ busbar

918‧‧‧電池 918‧‧‧Battery

919‧‧‧輔助控制器 919‧‧‧Auxiliary controller

920‧‧‧行車導航裝置 920‧‧‧Driving navigation device

921‧‧‧處理器 921‧‧‧ processor

922‧‧‧記憶體 922‧‧‧ memory

924‧‧‧GPS模組 924‧‧‧GPS module

925‧‧‧感測器 925‧‧‧ sensor

926‧‧‧資料介面 926‧‧‧Information interface

927‧‧‧內容播放器 927‧‧‧Content Player

928‧‧‧記憶媒體介面 928‧‧‧Memory Media Interface

929‧‧‧輸入裝置 929‧‧‧ input device

930‧‧‧顯示裝置 930‧‧‧ display device

931‧‧‧揚聲器 931‧‧‧Speakers

933‧‧‧無線通訊介面 933‧‧‧Wireless communication interface

934‧‧‧BB處理器 934‧‧‧BB processor

935‧‧‧RF電路 935‧‧‧RF circuit

936‧‧‧天線開關 936‧‧‧Antenna switch

937‧‧‧天線 937‧‧‧Antenna

938‧‧‧電池 938‧‧‧Battery

940‧‧‧車載系統 940‧‧‧In-vehicle system

941‧‧‧車載網路 941‧‧‧Car network

942‧‧‧車輛側模組 942‧‧‧Vehicle side module

[圖1]本揭露之一實施形態所述之系統1之概略構成之一例的說明圖。 Fig. 1 is an explanatory diagram showing an example of a schematic configuration of a system 1 according to an embodiment of the present disclosure.

[圖2]未導入MEC的LTE網路之構成之一例的圖示。 FIG. 2 is a diagram showing an example of a configuration of an LTE network in which no MEC is introduced.

[圖3]已導入MEC的LTE網路之構成之一例的圖示。 FIG. 3 is a diagram showing an example of a configuration of an LTE network into which an MEC has been introduced.

[圖4]已導入MEC的LTE網路之構成之一例的圖示。 FIG. 4 is a diagram showing an example of a configuration of an LTE network into which an MEC has been introduced.

[圖5]DL快取資料的資料的流向之一例的圖示。 [Fig. 5] A diagram showing an example of the flow of data of the DL cache data.

[圖6]UL快取資料的資料的流向之一例的圖示。 [Fig. 6] An illustration of an example of the flow of data of UL cache data.

[圖7]用來說明承載之架構的說明圖。 [Fig. 7] An explanatory diagram for explaining the architecture of the bearer.

[圖8]用來說明EPS承載之架構的說明圖。 [Fig. 8] An explanatory diagram for explaining an architecture of an EPS bearer.

[圖9]用來說明承載中所被設定之UL用ID及DL用ID的說明圖。 FIG. 9 is an explanatory diagram for explaining a UL ID and a DL ID set in a bearer.

[圖10]用來建立預設承載所需之程序的流程之一例的程序圖。 [Fig. 10] A program diagram of an example of a flow for establishing a program required for a preset bearer.

[圖11]用來建立專用承載所需之程序的流程之一例的程序圖。 [Fig. 11] A program diagram of an example of a flow of a program required to establish a dedicated bearer.

[圖12]LTE網路中所被執行的認證程序的流程之一例的程序圖。 [Fig. 12] A program diagram of an example of a flow of an authentication program executed in an LTE network.

[圖13]用來說明實際通訊之際所被使用的金鑰之用途之例子的說明圖。 [Fig. 13] An explanatory diagram for explaining an example of the use of a key used for actual communication.

[圖14]金鑰的系統圖。 [Fig. 14] A system diagram of a key.

[圖15]本揭露的一實施形態所述之終端裝置之構成之一例的區塊圖。 Fig. 15 is a block diagram showing an example of a configuration of a terminal device according to an embodiment of the present disclosure.

[圖16]本揭露的一實施形態所述之MEC伺服器之構成之一例的區塊圖。 Fig. 16 is a block diagram showing an example of the configuration of an MEC server according to an embodiment of the present disclosure.

[圖17]本揭露的一實施形態所述之EPC機能實體之構成之一例的區塊圖。 Fig. 17 is a block diagram showing an example of the configuration of an EPC functional entity according to an embodiment of the present disclosure.

[圖18]用來說明第1實施形態所述之技術特徵的說明圖。 Fig. 18 is an explanatory diagram for explaining the technical features described in the first embodiment.

[圖19]用來說明第2實施形態所述之技術特徵的說明圖。 Fig. 19 is an explanatory diagram for explaining the technical features described in the second embodiment.

[圖20]用來說明第3實施形態所述之技術特徵的說明圖。 Fig. 20 is an explanatory diagram for explaining the technical features described in the third embodiment.

[圖21]用來說明同實施形態所述之技術特徵的說明圖。 Fig. 21 is an explanatory diagram for explaining the technical features described in the same embodiment.

[圖22]用來說明第4實施形態所述之技術特徵的說明圖。 Fig. 22 is an explanatory diagram for explaining the technical features described in the fourth embodiment.

[圖23]用來說明同實施形態所述之技術特徵的說明圖。 Fig. 23 is an explanatory diagram for explaining the technical features described in the same embodiment.

[圖24]用來說明同實施形態所述之技術特徵的說明圖。 Fig. 24 is an explanatory diagram for explaining the technical features of the embodiment.

[圖25]用來說明同實施形態所述之技術特徵的說明圖。 Fig. 25 is an explanatory diagram for explaining the technical features described in the same embodiment.

[圖26]用來說明同實施形態所述之技術特徵的說明圖。 Fig. 26 is an explanatory diagram for explaining the technical features described in the same embodiment.

[圖27]用來說明同實施形態所述之技術特徵的說明圖。 Fig. 27 is an explanatory diagram for explaining the technical features of the embodiment.

[圖28]用來說明同實施形態所述之技術特徵的說明圖。 Fig. 28 is an explanatory diagram for explaining the technical features of the embodiment.

[圖29]用來說明同實施形態所述之技術特徵的說明圖。 Fig. 29 is an explanatory diagram for explaining the technical features described in the same embodiment.

[圖30]用來說明同實施形態所述之技術特徵的說明圖。 Fig. 30 is an explanatory diagram for explaining the technical features described in the same embodiment.

[圖31]用來說明同實施形態所述之技術特徵的說明圖。 Fig. 31 is an explanatory diagram for explaining the technical features described in the same embodiment.

[圖32]伺服器之概略構成之一例的區塊圖。 Fig. 32 is a block diagram showing an example of a schematic configuration of a server.

[圖33]智慧型手機之概略構成之一例的區塊圖。 Fig. 33 is a block diagram showing an example of a schematic configuration of a smartphone.

[圖34]行車導航裝置之概略構成之一例的區塊圖。 Fig. 34 is a block diagram showing an example of a schematic configuration of a driving navigation device.

以下,一邊參照添附圖式,一邊詳細說明本揭露的理想實施形態。此外,於本說明書及圖面中,關於實質上具有同一機能構成的構成要素,係標示同一符號而省略重疊說明。 Hereinafter, a preferred embodiment of the present disclosure will be described in detail with reference to the accompanying drawings. In the present specification and the drawings, constituent elements that have substantially the same functional configuration are denoted by the same reference numerals, and overlapping description will be omitted.

又,於本說明書及圖面中,實質上具有相同機能構成的要素,有時候是在同一符號之後附上不同的英文字母來區別。例如,實質上具有同一機能構成的複數要素,因應需要而會以像是基地台100A、100B及100C這樣來區別。但是,沒有必要區別實質上具有同一機能構成的複數要素之每一者時,就僅標示同一符號。例如,若無特別需要區別基地台100A、100B及100C時,則簡稱為基地台100。 Further, in the present specification and the drawings, elements having substantially the same functional configuration are sometimes distinguished by attaching different English letters to the same symbol. For example, a plurality of elements having substantially the same function can be distinguished as needed by the base stations 100A, 100B, and 100C. However, it is not necessary to distinguish each of the plural elements having substantially the same function, and only the same symbol is indicated. For example, if there is no particular need to distinguish the base stations 100A, 100B, and 100C, it is simply referred to as the base station 100.

此外,說明是按照以下順序進行。 In addition, the explanation is performed in the following order.

1.導論 1. Introduction

1.1.系統的概略構成 1.1. The schematic structure of the system

1.2.MEC 1.2.MEC

1.3.承載 1.3. Bearer

1.4.安全性 1.4. Security

2.各裝置的構成例 2. Configuration example of each device

2.1.終端裝置之構成 2.1. Composition of terminal devices

2.2.MEC伺服器的構成例 2.2. Configuration example of MEC server

2.3.EPC機能實體的構成例 2.3. Example of the composition of the EPC functional entity

3.第1實施形態 3. First embodiment

3.1.技術課題 3.1. Technical issues

3.2.技術特徵 3.2. Technical characteristics

4.第2實施形態 4. Second embodiment

4.1.技術課題 4.1. Technical issues

4.2.技術特徵 4.2. Technical characteristics

5.第3實施形態 5. Third embodiment

5.1.技術課題 5.1. Technical issues

5.2.技術特徵 5.2. Technical characteristics

6.第4實施形態 6. Fourth Embodiment

6.1.技術課題 6.1. Technical issues

6.2.OTT伺服器的構成例 6.2. Configuration example of OTT server

6.3.技術特徵 6.3. Technical characteristics

7.應用例 7. Application examples

8.總結 8. Summary

<<1.導論>> <<1. Introduction>>

<1.1.系統的概略性構成> <1.1. Schematic configuration of the system>

首先,參照圖1,說明本揭露的一實施形態所述之系統1的概略構成。圖1係本揭露之一實施形態所述之系統1之概略構成之一例的說明圖。參照圖1,系統1係含 有:無線通訊裝置100、終端裝置200、及MEC伺服器300。 First, a schematic configuration of a system 1 according to an embodiment of the present disclosure will be described with reference to Fig. 1 . Fig. 1 is an explanatory diagram showing an example of a schematic configuration of a system 1 according to an embodiment of the present disclosure. Referring to Figure 1, system 1 contains There are: a wireless communication device 100, a terminal device 200, and an MEC server 300.

(1)無線通訊裝置100 (1) Wireless communication device 100

無線通訊裝置100,係為向旗下之裝置提供無線通訊服務的裝置。例如,無線通訊裝置100A,係為蜂巢式系統(或移動體通訊系統)的基地台。基地台100A,係與位於基地台100A的蜂巢網10A之內部的裝置(例如終端裝置200A),進行無線通訊。例如,基地台100A,係向終端裝置200A發送下鏈訊號,從終端裝置200A接收上鏈訊號。 The wireless communication device 100 is a device that provides wireless communication services to its devices. For example, the wireless communication device 100A is a base station of a cellular system (or a mobile communication system). The base station 100A performs wireless communication with a device (for example, the terminal device 200A) located inside the cellular network 10A of the base station 100A. For example, the base station 100A transmits a downlink signal to the terminal device 200A, and receives the uplink signal from the terminal device 200A.

此處,基地台100係也被稱為eNodeB(或eNB)。此處的eNodeB,係可為LTE或LTE-A中所被定義的eNodeB,也可意指一般的通訊機器。 Here, the base station 100 is also referred to as an eNodeB (or eNB). The eNodeB here may be an eNodeB defined in LTE or LTE-A, and may also mean a general communication machine.

基地台100A,係與其他基地台藉由例如X2介面而被邏輯性地連接,可進行控制資訊等之收送訊。又,基地台100A,係與核心網路40藉由例如S1介面而被邏輯性地連接,可進行控制資訊等之收送訊。此外,這些裝置間的通訊,在實體上係可藉由多樣的裝置而被中繼。 The base station 100A is logically connected to other base stations by, for example, an X2 interface, and can receive and receive control information. Further, the base station 100A is logically connected to the core network 40 by, for example, the S1 interface, and can perform reception and reception of control information and the like. In addition, communication between these devices can be physically relayed by a variety of devices.

此處,圖1所示的無線通訊裝置100A係為巨集蜂巢網基地台,蜂巢網10A係為巨集蜂巢網。另一方面,無線通訊裝置100B及100C,係為分別運用小型蜂巢網10B及10C的主裝置。作為一例,主裝置100B係為被 固定設置的小型蜂巢網基地台。小型蜂巢網基地台100B,係和巨集蜂巢網基地台100A之間建立無線回程鏈結,和小型蜂巢網10B內的1台以上之終端裝置(例如終端裝置200B)之間建立存取鏈結。主裝置100C,係為動態AP(存取點)。動態AP100C,係為將小型蜂巢網10C做動態運用的移動裝置。動態AP100C,係和巨集蜂巢網基地台100A之間建立無線回程鏈結,和小型蜂巢網10C內的1台以上之終端裝置(例如終端裝置200C)之間建立存取鏈結。動態AP100C係可為,例如,搭載有可運作成為基地台或無線存取點的硬體或軟體的終端裝置。此情況的小型蜂巢網10C,係為被動態形成的局部性網路(Localized Network/Virtual cell)。 Here, the wireless communication device 100A shown in FIG. 1 is a macro honeycomb network base station, and the cellular network 10A is a macro honeycomb network. On the other hand, the wireless communication devices 100B and 100C are master devices that use the small honeycomb networks 10B and 10C, respectively. As an example, the main device 100B is Fixed small honeycomb network base station. A small cellular network base station 100B establishes a wireless backhaul link between the macro cellular base station 100A and an access link between one or more terminal devices (for example, the terminal device 200B) in the small cellular network 10B. . The master device 100C is a dynamic AP (access point). The dynamic AP100C is a mobile device that dynamically uses the small honeycomb network 10C. The dynamic AP100C establishes a wireless backhaul link between the macrocell and the macrocell base station 100A, and establishes an access link with more than one terminal device (for example, the terminal device 200C) in the small cellular network 10C. The dynamic AP100C may be, for example, a terminal device equipped with hardware or software that can operate as a base station or a wireless access point. In this case, the small cellular network 10C is a locally formed localized network (Virtual cell).

蜂巢網10係例如,依照LTE、LTE-A(LTE-Advanced)、GSM(註冊商標)、UMTS、W-CDMA、CDMA200、WiMAX、WiMAX2或IEEE802.16等之任意之無線通訊方式而被運用即可。 The cellular network 10 is used, for example, according to any wireless communication method such as LTE, LTE-A (LTE-Advanced), GSM (registered trademark), UMTS, W-CDMA, CDMA200, WiMAX, WiMAX2, or IEEE802.16. can.

此外,小型蜂巢網係為可以包含有:與巨集蜂巢網重疊或非重疊配置的,比巨集蜂巢網還小的各種種類之蜂巢網(例如毫微微蜂巢網、毫微蜂巢網、微微蜂巢網及微蜂巢網等)之概念。在某個例子中,小型蜂巢網係被專用的基地台所運用。在別的例子中,小型蜂巢網係為,身為主裝置之終端是成為小型蜂巢網基地台而暫時動作,而被運用。所謂的中繼節點,也是可以視為小型蜂巢網基地台之一形態。作為中繼節點的母台而發揮機能的無 線通訊裝置,係也被稱為供給者基地台。供給者基地台,係亦可意味著LTE中的DeNB(Donor eNodeB),也可意味著較為一般所說的中繼節點的母台。 In addition, the small honeycomb network may include: various types of honeycomb networks (eg, a femto honeycomb network, a nano honeycomb network, a pico honeycomb) that are overlapped or non-overlapping with the macro honeycomb network and smaller than the macro honeycomb network. The concept of the network and micro-cellular network, etc.). In one example, a small hive network is used by a dedicated base station. In another example, the small honeycomb network is used as a terminal for the main device to become a small honeycomb network base station and temporarily operate. The so-called relay node is also one of the forms that can be regarded as a small honeycomb network base station. Function as a mother station of a relay node The line communication device is also referred to as a supplier base station. The provider base station may also mean a DeNB (Donor eNodeB) in LTE, and may also mean a parent station of a relay node.

(2)終端裝置200 (2) Terminal device 200

終端裝置200係可於蜂巢網系統(或移動體通訊系統)中進行通訊。終端裝置200,係與蜂巢網系統的無線通訊裝置(例如基地台100A、主裝置100B或100C)進行無線通訊。例如,終端裝置200A,係將來自基地台100A的下鏈訊號予以接收,並將往基地台100A的上鏈訊號予以發送。 The terminal device 200 can communicate in a cellular network system (or a mobile communication system). The terminal device 200 performs wireless communication with a wireless communication device (for example, the base station 100A, the main device 100B or 100C) of the cellular network system. For example, the terminal device 200A receives the downlink signal from the base station 100A and transmits the uplink signal to the base station 100A.

此處,終端裝置200係也被稱為使用者。該當使用者,係也可被稱為UE(User Equipment)。又,無線通訊裝置100C,係亦被稱為UE-Relay。此處的UE,係可為LTE或LTE-A中所被定義的UE,UE-Relay係亦可為3GPP中所正討論的Prose UE to Network Relay,也可意指一般的通訊機器。 Here, the terminal device 200 is also referred to as a user. The user, the user, may also be referred to as a UE (User Equipment). Moreover, the wireless communication device 100C is also referred to as UE-Relay. The UE here may be a UE defined in LTE or LTE-A, and the UE-Relay may also be a Prose UE to Network Relay as discussed in 3GPP, and may also mean a general communication machine.

(3)應用程式伺服器60 (3) Application Server 60

應用程式伺服器60,係為向使用者提供服務的裝置。應用程式伺服器60,係被連接至封包資料網路(PDN)50。另一方面,基地台100,係被連接至核心網路40。核心網路40,係透過閘道裝置而被連接至PDN50。因此,無線通訊裝置100,係將應用程式伺服器60所提 供的服務,透過封包資料網路50、核心網路40及無線通訊路而提供給MEC伺服器300、及使用者。 The application server 60 is a device that provides services to users. The application server 60 is connected to a packet data network (PDN) 50. On the other hand, the base station 100 is connected to the core network 40. The core network 40 is connected to the PDN 50 via a gateway device. Therefore, the wireless communication device 100 is proposed by the application server 60. The service is provided to the MEC server 300 and the user through the packet data network 50, the core network 40, and the wireless communication path.

(4)MEC伺服器300 (4) MEC server 300

MEC伺服器300,係為向使用者提供服務(例如內容等)的裝置。MEC伺服器300,係可被設在無線通訊裝置100。此情況下,無線通訊裝置100,係將MEC伺服器300所提供的服務,透過無線通訊路而提供給使用者。MEC伺服器300,係亦可以邏輯性的機能實體的方式而被實現,也可如圖1所示般地與無線通訊裝置100等一體形成。當然,MEC伺服器300,作為實體性的實體,亦可被形成為獨立的裝置。在MEC伺服器300上動作的應用程式,亦稱為MEC應用程式。 The MEC server 300 is a device that provides a service (for example, content, etc.) to a user. The MEC server 300 can be provided in the wireless communication device 100. In this case, the wireless communication device 100 provides the service provided by the MEC server 300 to the user via the wireless communication path. The MEC server 300 may be implemented in a manner of a logical functional entity, or may be integrally formed with the wireless communication device 100 or the like as shown in FIG. Of course, the MEC server 300, as a physical entity, can also be formed as an independent device. The application that operates on the MEC server 300 is also referred to as an MEC application.

例如,基地台100A,係將MEC伺服器300A所提供的服務,提供給連接至巨集蜂巢網10的終端裝置200A。又,基地台100A,係將MEC伺服器300A所提供的服務,透過主裝置100B,提供給連接至小型蜂巢網10B的終端裝置200B。 For example, the base station 100A supplies the service provided by the MEC server 300A to the terminal device 200A connected to the macro hive network 10. Further, the base station 100A supplies the service provided by the MEC server 300A to the terminal device 200B connected to the small honeycomb network 10B through the host device 100B.

又,主裝置100B,係將MEC伺服器300B所提供的服務,提供給連接至小型蜂巢網10B的終端裝置200B。同樣地,主裝置100C,係將MEC伺服器300C所提供的服務,提供給連接至小型蜂巢網10C的終端裝置200C。 Further, the master device 100B supplies the service provided by the MEC server 300B to the terminal device 200B connected to the small cellular network 10B. Similarly, the main device 100C supplies the service provided by the MEC server 300C to the terminal device 200C connected to the small cellular network 10C.

(5)補充 (5) Supplement

以上,雖然展示了系統1的概略性構成,但本技術係不限定於圖1所示的例子。例如,作為系統1的構成,亦可採用不含主裝置的構成、SCE(Small Cell Enhancement)、HetNet(Heterogeneous Network)、MTC(Machine Type Communication)網路等。 Although the schematic configuration of the system 1 has been described above, the present technology is not limited to the example shown in FIG. 1. For example, as the configuration of the system 1, a configuration including no main device, an SCE (Small Cell Enhancement), a HetNet (Heterogeneous Network), an MTC (Machine Type Communication) network, or the like may be used.

<1.2.MEC> <1.2.MEC>

接下來,參照圖2~圖6,說明MEC。 Next, the MEC will be described with reference to Figs. 2 to 6 .

(1)網路構成 (1) Network composition

圖2係未導入MEC的LTE網路之構成之一例的圖示。如圖2所示,RAN(Radio Access Network),係含有UE及eNodeB。UE與eNodeB,係藉由Uu介面而被連接,eNodeB彼此係藉由X2介面而被連接。又,EPC(Evolved Packet Core)係含有:MME(Mobility Management Entity)、HSS(Home Subscriber Server)、S-GW(Serving Gateway)及P-GW(PDN Gateway)。MME與HSS,係藉由S6a介面而被連接,MME與S-GW,係藉由S11介面而被連接,S-GW與P-GW,係藉由S5介面而被連接。eNodeB與MME,係藉由S1-MME介面而被連接,eNodeB與S-GW,係藉由S1-U介面而被連接,P-GW與PDN,係藉由SGi介面而被連接。 2 is a diagram showing an example of a configuration of an LTE network in which no MEC is introduced. As shown in FIG. 2, the RAN (Radio Access Network) includes a UE and an eNodeB. The UE and the eNodeB are connected by the Uu interface, and the eNodeBs are connected to each other by the X2 interface. Further, EPC (Evolved Packet Core) includes MME (Mobility Management Entity), HSS (Home Subscriber Server), S-GW (Serving Gateway), and P-GW (PDN Gateway). The MME and the HSS are connected by the S6a interface, and the MME and the S-GW are connected by the S11 interface, and the S-GW and the P-GW are connected by the S5 interface. The eNodeB and the MME are connected by the S1-MME interface, and the eNodeB and the S-GW are connected by the S1-U interface, and the P-GW and the PDN are connected by the SGi interface.

PDN係含有例如:原始伺服器、及快取伺服 器。原始伺服器中係記憶著,要被提供給UE的原始的應用程式。快取伺服器中係記憶著例如應用程式或快取資料。UE,係藉由不向原始伺服器而改為向快取伺服器進行存取,就可減輕原始伺服器上的處理負荷及對原始伺服器之存取所造成的通訊負荷。但是,快取伺服器係被配置在RAN及EPC之外側(亦即PDN),因此UE與快取伺服器之間所發生的通訊延遲(亦即對來自UE之請求的回應延遲),依然會是問題。 PDN contains, for example: original server, and cache servo Device. The original server remembers the original application to be provided to the UE. The cache server stores, for example, an application or cached data. The UE can reduce the processing load on the original server and the communication load caused by the access to the original server by not accessing the cache server to the original server. However, the cache server is configured on the outside of the RAN and EPC (ie, PDN), so the communication delay between the UE and the cache server (that is, the delay in response to the request from the UE) will still be It is a problem.

UE的請求中係有例如:下載Http伺服器中所被記憶之內容的靜態請求,和對特定之應用程式的操作等的動態請求。無論哪一者,快取資料及應用程式,是越被配置在靠近UE的實體中,對請求的回應就越快,這是不爭的事實。此處,典型而言,回應速度係與其說是依存於實體間的距離,不如說是依存於經由的實體之數量。這是因為,所經由的各個實體中的輸入部、處理部及輸出部中的處理延遲,會隨著實體之數量而累積下去。此外,所謂內容,係意味著應用程式、影像(動態影像或靜止影像)、聲音、或文字等任意形式的資料。 The UE's request includes, for example, a static request to download the content memorized in the Http server, and a dynamic request for operation of a specific application or the like. Either way, the faster the cached data and applications are configured in the entity close to the UE, the faster the response to the request, which is an indisputable fact. Here, in general, the response speed is not so much dependent on the distance between entities, but rather on the number of entities that depend on it. This is because the processing delay in the input unit, the processing unit, and the output unit in each of the entities that pass through is accumulated as the number of entities increases. In addition, the content means any form of data such as an application, an image (moving image or still image), sound, or text.

為了解決如此問題,而想出了MEC。在MEC中,係在EPS(Evolved Packet System)的內部,設置用來向UE提供內容或從UE取得內容的應用程式伺服器。此外,所謂EPS,係為包含EPC及eUTRAN(亦即eNodeB)的網路。被設在EPS內部的應用程式伺服器,係也有時候被稱為邊緣伺服器或MEC伺服器。此外,應用程式伺服 器,係包含有快取伺服器的概念。 In order to solve such a problem, I came up with the MEC. In the MEC, an application server for providing content to the UE or obtaining content from the UE is provided inside the EPS (Evolved Packet System). In addition, the so-called EPS is a network including EPC and eUTRAN (ie, eNodeB). Application servers that are located inside the EPS are sometimes referred to as edge servers or MEC servers. In addition, the application server It contains the concept of a cache server.

圖3及圖4,係已導入MEC的LTE網路之構成之一例的圖示。在圖3中,將內容做快取的MEC伺服器,是被設在eNodeB。若依據此構成,則相較於圖2所示的例子,由於UE與MEC伺服器之間所存在的實體之數量有被削減,因此UE係可迅速地取得內容。在圖4中,記憶內容的MEC伺服器,是被設在eNodeB及S-GW。例如,UE,係從被配置在eNodeB的MEC伺服器取得內容,同時,向被配置在eNodeB的MEC伺服器進行要求的快取資料係為不存在的情況下,則從被配置在S-GW的MEC伺服器取得內容。無論如何,由於可避免對原始伺服器之存取,因此UE係可迅速地取得內容。 3 and 4 are diagrams showing an example of a configuration of an LTE network into which an MEC has been introduced. In Figure 3, the MEC server that caches the content is placed on the eNodeB. According to this configuration, compared with the example shown in FIG. 2, since the number of entities existing between the UE and the MEC server is reduced, the UE can quickly acquire the content. In FIG. 4, the MEC server that memorizes the content is provided in the eNodeB and the S-GW. For example, the UE acquires content from the MEC server configured in the eNodeB, and at the same time, if the cache data requested by the MEC server configured in the eNodeB does not exist, the UE is configured from the S-GW. The MEC server gets the content. In any case, since the access to the original server can be avoided, the UE can quickly acquire the content.

(2)各實體 (2) entities

以下說明在圖2~圖4中所出現的實體。S-GW,係為成為接手之錨定點的實體。P-GW,係行動網路與外側(亦即PDN)之連接點,將IP位址指派給UE,對行動網路之外側提供應存取之IP位址。P-GW,係也進行從外部送來的資料之過濾等。HSS,係為記憶訂閱者資訊的資料庫。MME,係將各式各樣的控制訊號予以處理,向HSS進行存取以進行各UE之認證(authentication)、及權限賦予(authorization)等之處理。 The entities appearing in Figures 2 to 4 are explained below. S-GW is an entity that becomes the anchor point for taking over. The P-GW is a connection point between the mobile network and the outside (ie, PDN), assigns an IP address to the UE, and provides an IP address to be accessed to the outside of the mobile network. The P-GW also performs filtering of data sent from the outside. HSS is a database of memory subscriber information. The MME processes various control signals and accesses the HSS to perform authentication such as authentication and authorization for each UE.

EPC網路,係被分離成控制平面和使用者平面。S-GW及P-GW係主要是和使用者平面有關係,MME 及HSS係主要是和控制平面有關係。 The EPC network is separated into a control plane and a user plane. S-GW and P-GW are mainly related to the user plane, MME And the HSS system is mainly related to the control plane.

此處,S-GW,係即使在MEC導入前之構成中也會變成接手的錨定點,因此有記憶使用者資料的機能。另一方面,eNodeB,係在MEC導入前之構成中沒有記憶使用者資料的機能,只有對應於Uu介面上所發生之封包遺失的封包重送等之機能,並沒有記憶內容。此外,X2介面,係被使用於接手時的資料之收授、及干擾之協調控制。 Here, the S-GW is an anchor point for taking over even in the configuration before the introduction of the MEC, and therefore has a function of storing user data. On the other hand, the eNodeB does not have the function of storing user data in the configuration before the MEC is introduced, and only the function of packet retransmission corresponding to the packet loss occurring on the Uu interface does not have a memory content. In addition, the X2 interface is used for the reception of data and the coordinated control of interference when it is taken over.

(3)MEC伺服器中的應用程式 (3) The application in the MEC server

快取中係有,在IP層級上進行快取的串流快取、和在應用程式層層級上進行快取的內容快取。MEC伺服器係被想定,無論哪一種類之快取都能支援。由於目前主要是使用內容快取,因此MEC伺服器係被想定為尤其要支援內容快取。 In the cache, there are streaming caches that are cached at the IP level, and content caches that are cached at the application level. The MEC server is designed to be supported by any type of cache. Since content caching is currently mainly used, the MEC server is supposed to support content caching in particular.

此處,於MEC伺服器中,應用程式係被啟用,變成可動作之狀態,這點是很重要的。這是因為,第1,快取資料係藉由HTTP標頭而被辨識,因此在MEC伺服器中可處理HTTP的應用程式係為可動作之狀態,較為理想。第2,由MEC伺服器來提供特定之應用程式的情況下,該當應用程式係為已被配置,且為了變成可動作之狀態而已被啟用,比較理想之故。 Here, in the MEC server, it is important that the application is enabled and becomes operational. This is because, first, the cache data is recognized by the HTTP header, so that the application that can handle HTTP in the MEC server is in an operable state, which is preferable. Second, in the case where the MEC server provides a specific application, it is preferable that the application is configured and enabled to become operational.

支援MEC的應用程式之種類,係種類分歧。關於將資料予以快取的快取應用程式,係即使於MEC伺 服器中被啟用而變成可動作之狀態,在對象之資料尚未被快取的情況下,UE係會跑去原始伺服器取得資料。因此,於快取應用程式中,事前就快取好資料,較為理想。 There are different types of applications that support MEC. The cache application for caching data is even if it is served by MEC. When the server is enabled and becomes actionable, the UE will go to the original server to obtain the data if the data of the object has not been cached. Therefore, in the cache application, it is ideal to get good data beforehand.

(4)快取對象之資料 (4) Information on the cached object

於MEC伺服器300中所被快取的資料,係有:以DL(Downlink)方向而對UE所被發送的資料(以下亦稱為DL資料流)、和以UL(Uplink)方向而從UE所被上傳的資料(以下亦稱為UL資料流),這2種類。 The data to be cached in the MEC server 300 is data transmitted to the UE in the DL (Downlink) direction (hereinafter also referred to as DL data stream), and from the UE in the UL (Uplink) direction. The data to be uploaded (hereinafter also referred to as UL data stream), these two types.

作為將DL資料流予以快取的使用案例係可舉出例如:UE對Web應用程式進行存取而取得某種http資料之際,在MEC伺服器中有相同資料被快取的時候,取得該快取資料的案例。 As a use case for the DL data stream to be cached, for example, when the UE accesses the web application and obtains some http data, when the same data is cached in the MEC server, the A case of cached data.

將UL資料流予以快取的使用案例之一例,說明如下。 An example of a use case in which a UL data stream is cached is described below.

第1使用案例,係將UE本身所生成的照片等之資料予以上傳的案例。詳言之,UE係將本身所生成的照片予以上傳,MEC伺服器係將該照片予以快取。然後,MEC伺服器,係例如在核心網路內之傳輸容量上有餘裕的時序上,將已快取的照片轉送往PDN上的儲存照片的伺服器。藉由錯開轉送時序,以減輕核心網路的通訊負荷。又,MEC伺服器係例如,亦可將已快取的照片,轉送至其他UE。UL資料流的快取與其他UE之分享,係例如,觀眾在體育館中所拍攝的照片,在位於該體育館的 觀眾彼此間做分享的這類案例中,係為有用。 The first use case is a case in which information such as photographs generated by the UE itself is uploaded. In detail, the UE uploads the photos generated by itself, and the MEC server caches the photos. The MEC server then forwards the cached photo to the server that stores the photo on the PDN, for example, at a timing that has a margin of transmission capacity within the core network. By shifting the transfer timing, the communication load on the core network is alleviated. Moreover, the MEC server can also transfer the cached photos to other UEs, for example. The sharing of the UL data stream with other UEs is, for example, a photo taken by the viewer in the stadium, at the stadium. It is useful in such cases where the audience share each other.

第2使用案例,係UE將已取得之資料予以上傳的案例。例如,UE係將藉由D2D(Device to Device)通訊或Wi-Fi(註冊商標)所取得的資料予以上傳,MEC伺服器係將該資料予以快取。作為本使用案例的具體例係可考慮例如:店舖將商品之資訊藉由D2D通訊或Wi-Fi而進行廣播,由UE取得該資訊然後上傳至MEC伺服器的例子。此情況下,該店舖之地域內(例如MEC伺服器所被設置的eNodeB的蜂巢網的範圍內)的其他UE,係可取得已被快取的商品之資訊。 The second use case is a case in which the UE uploads the acquired data. For example, the UE uploads data obtained by D2D (Device to Device) communication or Wi-Fi (registered trademark), and the MEC server caches the data. As a specific example of the use case, for example, a store broadcasts information of a product by D2D communication or Wi-Fi, and the UE acquires the information and uploads it to the MEC server. In this case, other UEs in the area of the store (for example, within the range of the cellular network of the eNodeB in which the MEC server is installed) can obtain information on the products that have been cached.

第3使用案例,係將從不同eNodeB接收到的資料予以上傳的案例。例如,UE係將從接手前所連接之eNodeB所接收到的資料,往接手後所連接之eNodeB中所被設置的MEC伺服器,進行上傳。 The third use case is a case in which data received from different eNodeBs is uploaded. For example, the UE uploads the data received from the eNodeB connected before the handover to the MEC server set in the eNodeB connected to the UE.

第4使用案例,係MTC終端將資料予以上傳的案例。作為如此的資料係可考量例如:自動販賣機的營業額資料、及藉由瓦斯錶所偵測到的瓦斯的使用狀況資料等。MTC終端係有數量非常多的情況,若MTC終端一起將資料上傳至PDN上的伺服器,則在核心網路側會有發生擁塞的問題。另一方面,這些資料係不被要求即時性,因此例如即使1小時後才送達,也算夠快。亦即,來自MTC終端之資料的相關之應用程式,係可說是對延遲具有耐性。因此,MEC伺服器係亦可先將從MTC終端所上傳的資料予以快取,例如在核心網路內之傳輸容量有餘裕 的時序上,將所快取的資料轉送至PDN上的伺服器。尤其是,核心網路的傳輸容量,係與其說是使用者資料之容量,不如說是控制訊號之容量這邊,比較會造成問題。這是因為,為了要建立會談,必須要來回多個訊令。若大量的MTC終端一起上傳資料,則核心網路的訊令就會過度增加。 The fourth use case is a case in which the MTC terminal uploads the data. As such a data, for example, the turnover data of the vending machine and the usage information of the gas detected by the gas meter can be considered. There are a large number of MTC terminals. If the MTC terminal uploads data to the server on the PDN, there will be congestion on the core network side. On the other hand, these materials are not required to be immediacy, so for example, even if they are delivered after 1 hour, it is fast enough. That is, the related application of the data from the MTC terminal can be said to be resistant to delay. Therefore, the MEC server can also cache the data uploaded from the MTC terminal first, for example, the transmission capacity in the core network is sufficient. At the timing, the cached data is forwarded to the server on the PDN. In particular, the transmission capacity of the core network is not so much the capacity of the user data, but rather the capacity of the control signal, which is more problematic. This is because, in order to establish a meeting, it is necessary to go back and forth with multiple orders. If a large number of MTC terminals upload data together, the core network's command will increase excessively.

以上說明了,將UL資料流予以快取的使用案例之一例。在本說明書中,主要是針對如此的UL資料流之快取,加以說明。 The above illustrates an example of a use case in which a UL data stream is cached. In this specification, the description is mainly directed to the cache of such UL data streams.

UL資料流的快取資料,係如上述般地有往DL方向(例如UE)被轉送的情況,也有往UL方向(例如P-GW或PDN上的伺服器)被轉送的情況。前者的快取資料亦稱為DL快取資料,後者的快取資料亦稱為UL快取資料。 The cache data of the UL data stream may be transferred to the DL direction (for example, UE) as described above, or may be transferred to the UL direction (for example, a server on the P-GW or PDN). The former cache data is also called DL cache data, and the latter cache data is also called UL cache data.

圖5係DL快取資料的資料的流向之一例的圖示。如圖5所示,MEC伺服器,係將UE所上傳的資料予以快取,並向UE(典型而言,係為與上傳的UE不同的UE)發送快取資料。 Fig. 5 is a diagram showing an example of the flow of data of the DL cache data. As shown in FIG. 5, the MEC server caches the data uploaded by the UE and sends the cached data to the UE (typically, a UE different from the uploaded UE).

圖6係UL快取資料的資料的流向之一例的圖示。如圖6所示,MEC伺服器,係將UE所上傳的資料予以快取,並向PDN上的原始伺服器,發送快取資料。 Fig. 6 is a diagram showing an example of the flow of data of UL cache data. As shown in FIG. 6, the MEC server caches the data uploaded by the UE and sends the cached data to the original server on the PDN.

此外,隨著資料不同,料想會有被許可視為DL快取資料者,也有不被許可者。例如,可和其他UE共享的資料係料想會被許可視為DL快取資料,個人資料係不被許可視為DL快取資料。同樣地,隨著資料不同, 料想會有被許可視為UL快取資料者,也有不被許可者。例如,料想來自MTC終端之資料等需要統計的資料係被許可作為UL快取資料,地區限定等的局部性資料係不被許可作為UL快取資料。 In addition, as the materials are different, it is expected that there will be licenses that are considered as DL cache data, and those who are not licensed. For example, a material that can be shared with other UEs is considered to be licensed as a DL cached material, and a personal data is not permitted to be considered as a DL cached material. Similarly, with different materials, It is expected that there will be those who are licensed to be regarded as UL cache information, and those who are not licensed. For example, it is expected that data that requires statistics from the MTC terminal is permitted as UL cache data, and local data such as regional restrictions are not permitted as UL cache data.

有鑑於這些事情,於MEC伺服器中,是否可將快取資料往DL方向(亦即往UE)發送,及是否可往UL方向(亦即往PDN)發送,係被適切管理,較為理想。 In view of these matters, in the MEC server, whether the cached data can be sent to the DL direction (that is, to the UE) and whether it can be sent to the UL direction (that is, to the PDN) is appropriately managed.

<1.3.承載> <1.3. Bearer>

接下來,參照圖7~圖11,說明EPS中所被使用的承載,特別是EPS承載。所謂承載,係指會談,是進行資料傳輸所需之所謂的管道。 Next, the bearers used in the EPS, particularly the EPS bearers, will be described with reference to FIGS. 7 to 11. The so-called bearer refers to the talks and is the so-called pipeline required for data transmission.

圖7係用來說明承載之架構的說明圖。如圖7所示,從原始伺服器提供給UE的點對點服務,係藉由使用到EPS承載及外部(External)承載的資料傳輸,而被提供。EPS承載,係對應於1種類之QoS而被建立1個。UE係在例如欲同時使用2種類之QoS的情況下,則與P-GW之間建立對應於2種類之QoS的2個EPS承載。 Figure 7 is an explanatory diagram for explaining the architecture of the bearer. As shown in FIG. 7, the peer-to-peer service provided from the original server to the UE is provided by using data transmission to the EPS bearer and the external bearer. The EPS bearer is established one corresponding to one type of QoS. When the UE wants to use two types of QoS at the same time, for example, two EPS bearers corresponding to two types of QoS are established with the P-GW.

EPS承載,係為邏輯性會談(Virtual Connection),實際上是由無線電承載、S1承載、及S5承載所成。無線電承載,係UE與eNodeB之間的LTE-Uu介面上所被建立的承載。S1承載,係eNodeB與S-GW之間的S1介面上所被建立的承載。S5承載,係S-GW與P-GW之間的S5介面上所被建立的承載。 The EPS bearer is a Virtual Connection, which is actually composed of a radio bearer, an S1 bearer, and an S5 bearer. The radio bearer is the bearer established on the LTE-Uu interface between the UE and the eNodeB. The S1 bearer is a bearer established on the S1 interface between the eNodeB and the S-GW. The S5 bearer is a bearer established on the S5 interface between the S-GW and the P-GW.

圖8係用來說明EPS承載之架構的說明圖。如圖8所示,EPS承載,係由預設承載及專用(Dedicated)承載所成,UE,係與MME之間進行訊號之收授而建立承載之際,將作為預設而被決定的QoS所對應之預設承載,最初予以建立。其後,UE係將必要的QoS所對應之承載,作為專用承載而予以建立。專用承載,係在沒有預設承載的情況下就無法建立。 Fig. 8 is an explanatory diagram for explaining the architecture of the EPS bearer. As shown in FIG. 8, the EPS bearer is formed by a preset bearer and a dedicated (Dedicated) bearer, and the QoS is determined as a preset when the UE establishes a bearer between the UE and the MME. The corresponding preset bearer is initially established. Thereafter, the UE establishes the bearer corresponding to the necessary QoS as a dedicated bearer. Dedicated bearers cannot be established without a preset bearer.

各個承載係被設定有,用來識別承載所需之ID。此ID,係為了識別1個UE所使用的承載,而被使用。因此,藉由UE的ID與承載的ID之雙方,各實體(例如P-GW、S-GW及eNodeB等),就可識別各個承載。該ID中係有UL用和DL用。 Each bearer is set to identify the ID required for the bearer. This ID is used to identify the bearer used by one UE. Therefore, each bearer (for example, P-GW, S-GW, eNodeB, etc.) can identify each bearer by both the ID of the UE and the ID of the bearer. This ID is used for UL and DL.

圖9係用來說明承載中所被設定之UL用ID及DL用ID的說明圖。如圖9所示,在EPS承載之中,UL之會談與DL之會談是用各自的ID來加以區別而存在。例如,無線電承載所被設定的ID中,係有UL用的「UL RB ID」與DL用的「DL RB ID」。又,在S1承載中,係有被TEID(Tunneling End point ID)所區別的會談(GTP Tunneling Protocol中所被收授的會談),被設有有UL用的ID「UL S1 TEID」或DL用的ID「DL S1 TEID」。又,在S5承載中,係有被TEID所區別的會談,被設有有UL用的ID「UL S5 TEID」或DL用的ID「DL S5 TEID」。 FIG. 9 is an explanatory diagram for explaining a UL ID and a DL ID set in the bearer. As shown in FIG. 9, among the EPS bearers, the talks between the UL talks and the DL are distinguished by their respective IDs. For example, the ID set by the radio bearer includes "UL RB ID" for UL and "DL RB ID" for DL. In addition, in the S1 bearer, there is a talk that is distinguished by the TEID (Tunneling End Point ID) (a conversation that is received in the GTP Tunneling Protocol), and the ID "UL S1 TEID" for UL or the DL is used. ID "DL S1 TEID". Further, in the S5 bearer, there is a talk that is distinguished by the TEID, and the ID "UL S5 TEID" for UL or the ID "DL S5 TEID" for DL is provided.

在下記的表中係表示了,各ID是被哪個實體 所指派。這是意味著,由已指派了ID的實體,來負責建立相應的會談。 In the table below, it is indicated which entity is each ID. Assigned. This means that the entity that has assigned the ID is responsible for establishing the appropriate meeting.

參照上記表,TEID,係被端點側之實體所指派。另一方面,關於RB ID,係無論UL還是DL都是由eNodeB來指派。 Referring to the above table, the TEID is assigned by the entity on the endpoint side. On the other hand, regarding the RB ID, both the UL and the DL are assigned by the eNodeB.

在下記的表中,表示了使用了ID的資料的流向之一覽。如下記的表所示,UL資料流係在已被分配UL用ID的會談中被傳輸,DL資料流係在已被分配DL用ID的會談中被傳輸。此外,各會談的ID,係具有1對1對映之關係,1個ID是被對映至1個ID。亦即,1個ID係不會被對映到複數個ID。 In the table below, a list of the flow of the data using the ID is shown. As shown in the table below, the UL data stream is transmitted in the session in which the UL ID is assigned, and the DL data stream is transmitted in the session in which the DL ID has been assigned. In addition, the ID of each meeting has a one-to-one mapping relationship, and one ID is mapped to one ID. That is, one ID system is not mapped to a plurality of IDs.

接著參照圖10及圖11,說明用來建立承載所 需之程序。 Referring to FIG. 10 and FIG. 11, the description is used to establish a bearer. Required procedures.

圖10係用來建立預設承載所需之程序的流程之一例的程序圖。本程序中係有UE、eNodeB、MME、S-GW、P-GW及PCRF(Policy and Charging Rules Function)參與。如圖10所示,預設承載之建立,係以來自UE之請求為起點而進行。請求是按照eNodeB、MME、S-GW、P-GW之順序而被發送,其逆方向係有確認被返送。此外,PCRF,係為提供QoS相關資訊的實體。 Fig. 10 is a program diagram showing an example of a flow of a program required to establish a preset bearer. In this program, UE, eNodeB, MME, S-GW, P-GW, and PCRF (Policy and Charging Rules Function) participate. As shown in FIG. 10, the establishment of the preset bearer is performed starting from the request from the UE. The request is transmitted in the order of eNodeB, MME, S-GW, and P-GW, and the reverse direction is acknowledged and returned. In addition, the PCRF is an entity that provides QoS related information.

詳細說明本程序。首先,UE係將附著請求,發送至eNodeB(步驟S11),eNodeB係將該當訊息,發送至MME(步驟S12)。接下來,MME係將預設承載生成請求,發送至S-GW(步驟S13),S-GW係將該當訊息,發送至P-GW(步驟S14)。然後,P-GW係與PCRF互動而建立IP-CAN(IP Connectivity Access Network)會談(步驟S15)。接著,P-GW係將預設承載生成回應,發送至S-GW(步驟S16),S-GW係將該當訊息,發送至MME(步驟S17)。接下來,MME係將附著接受,發送至eNodeB(步驟S18),eNodeB係將RRC(Radio Resource Control)連接重新組態,發送至UE(步驟S19)。接著,UE係將RRC連接重新組態完成,發送至eNodeB(步驟S20),eNodeB係將附著完成,發送至MME(步驟S21)。接下來,MME係將承載更新請求,發送至S-GW(步驟S22),S-GW係將承載更新回應,發送至MME(步驟S23)。 Explain the procedure in detail. First, the UE transmits an attach request to the eNodeB (step S11), and the eNodeB transmits the message to the MME (step S12). Next, the MME transmits a preset bearer generation request to the S-GW (step S13), and the S-GW transmits the message to the P-GW (step S14). Then, the P-GW system interacts with the PCRF to establish an IP-CAN (IP Connectivity Access Network) talk (step S15). Next, the P-GW transmits a preset bearer generation response to the S-GW (step S16), and the S-GW transmits the message to the MME (step S17). Next, the MME transmits the attachment to the eNodeB (step S18), and the eNodeB reconfigures the RRC (Radio Resource Control) connection and transmits it to the UE (step S19). Next, the UE reconfigures the RRC connection and sends it to the eNodeB (step S20), and the eNodeB transmits the attachment to the MME (step S21). Next, the MME transmits a bearer update request to the S-GW (step S22), and the S-GW transmits a bearer update response to the MME (step S23).

圖11係用來建立專用承載所需之程序的流程 之一例的程序圖。本程序中係有UE、eNodeB、MME、S-GW、P-GW及PCRF參與。如圖11所示,專用承載之建立,係與預設承載相反,是以來自PCRF之請求為起點而進行。此外,UE欲建立專用承載的情況下,UE係將該意旨,發送至應用程式層,藉由應用程式層向PCRF傳達必要的QoS,以UE為起點的專用承載之建立就會實現。 Figure 11 shows the flow of the program required to establish a dedicated bearer. A program diagram of one example. In this procedure, UE, eNodeB, MME, S-GW, P-GW, and PCRF participate. As shown in FIG. 11, the establishment of the dedicated bearer is the reverse of the preset bearer, starting from the request from the PCRF. In addition, when the UE wants to establish a dedicated bearer, the UE sends the message to the application layer, and the application layer transmits the necessary QoS to the PCRF, and the establishment of the dedicated bearer starting from the UE is realized.

詳細說明本程序。首先,PCRF,係將IP-CAN會談變更開始,發送至P-GW(步驟S31)。接下來,P-GW係將專用承載生成請求,發送至S-GW(步驟S32),S-GW係將該當訊息,發送至MME(步驟S33)。接著,MME係將專用承載設定請求,發送至eNodeB(步驟S34),eNodeB係將RRC連接重新組態,發送至UE(步驟S35)。接下來,UE係將RRC連接重新組態完成,發送至eNodeB(步驟S36),eNodeB係將專用承載設定回應,發送至MME(步驟S37)。接著,MME係將專用承載生成回應,發送至S-GW(步驟S38),S-GW係將該當訊息,發送至P-GW(步驟S39)。接下來,P-GW係將IP-CAN會談變更結束,發送至PCRF(步驟S40)。 Explain the procedure in detail. First, the PCRF starts the IP-CAN talk change and transmits it to the P-GW (step S31). Next, the P-GW transmits a dedicated bearer generation request to the S-GW (step S32), and the S-GW transmits the message to the MME (step S33). Next, the MME transmits a dedicated bearer setup request to the eNodeB (step S34), and the eNodeB reconfigures the RRC connection and transmits it to the UE (step S35). Next, the UE reconfigures the RRC connection and sends it to the eNodeB (step S36), and the eNodeB sends a dedicated bearer setup response to the MME (step S37). Next, the MME transmits a response to the dedicated bearer and transmits it to the S-GW (step S38), and the S-GW transmits the message to the P-GW (step S39). Next, the P-GW ends the IP-CAN talk change and transmits it to the PCRF (step S40).

<1.4.安全性> <1.4. Security>

作為LTE中的安全性技術之一例,可舉出認證(Authentication)及授權(Authorization)。所謂認證,係判斷通訊對象是否為適切的對象。此處,所謂適切的對象係指例如:對運作者之LTE網路進行存取係為適切的對 象。所謂授權,係判斷通訊對象是否有利用服務所需之權利。此處,所謂權利係指例如對運作者之LTE網路進行存取的權利。以下,參照圖12,說明認證程序。此外,認證程序,係為附著程序的一部分。 As an example of the security technology in LTE, Authentication and Authorization can be cited. The so-called authentication is to determine whether the communication object is an appropriate object. Here, the term "appropriate object" means, for example, that the access to the LTE network of the carrier is appropriate. Elephant. The so-called authorization is to determine whether the communication object has the right to use the service. Here, the term "right" refers to, for example, the right to access the LTE network of the operator. Hereinafter, an authentication procedure will be described with reference to FIG. In addition, the certification process is part of the attachment process.

圖12係LTE網路中所被執行的認證程序的流程之一例的程序圖。如圖12所示,UE係記憶著IMSI(International Mobile Subscriber Identity)及金鑰K。又,HSS係將各個UE的IMSI及IMSI所對應之金鑰K,加以記憶。此外,UE係經由eNodeB而與MME通訊。UE及HSS,係如以下所說明,使用彼此所記憶的同一IMSI及金鑰K,來進行相互認證。 Fig. 12 is a flowchart showing an example of a flow of an authentication program executed in an LTE network. As shown in FIG. 12, the UE stores the IMSI (International Mobile Subscriber Identity) and the key K. Further, the HSS stores the IMSI of each UE and the key K corresponding to the IMSI. In addition, the UE communicates with the MME via the eNodeB. The UE and the HSS perform mutual authentication using the same IMSI and key K that are stored in each other as explained below.

首先,UE係將IMSI連同附著請求,發送至MME(步驟S51)。接下來,MME係將已接收的IMSI連同認證請求,發送至HSS(步驟S52)。接著,HSS,係產生亂數RAND,將亂數RAND、已接收IMSI、及與該當IMSI建立對應而記憶的金鑰K,輸入至認證機能(Authentication Function),獲得被期待之回應RESEXPECTED及金鑰KASME(步驟S53)。接下來,HSS,作為認證回應,而將金鑰KASME、被期待之回應RESEXPECTED及亂數RAND,發送至MME(步驟S54)。接著,MME係將亂數RAND,發送至UE(步驟S55)。接下來,UE,係將已接收之亂數RAND、所記憶的IMSI及金鑰K,輸入至認證機能,獲得回應RES及金鑰KASME(步驟S56)。接著,UE係將回應RES,發送至MME(步驟 S57)。然後,MME係將被期待之回應RESEXPECTED與實際之回應RES進行比較以認證UE(步驟S58)。詳言之,MME,係在被期待之回應RESEXPECTED與實際之回應RES是一致的情況下,判斷為UE有信賴性(亦即認證成功)。另一方面,MME,係在被期待之回應RESEXPECTED與實際之回應RES是不一致的情況下,判斷為UE沒有信賴性(亦即認證失敗)。 First, the UE transmits the IMSI together with the attach request to the MME (step S51). Next, the MME transmits the received IMSI together with the authentication request to the HSS (step S52). Next, the HSS generates a random number RAND, and inputs the random number RAND, the received IMSI, and the key K memorized in association with the IMSI, into the authentication function, and obtains the expected response RES EXPECTED and gold. Key K ASME (step S53). Next, the HSS, as an authentication response, transmits the key K ASME , the expected response RES EXPECTED, and the random number RAND to the MME (step S54). Next, the MME transmits the random number RAND to the UE (step S55). Next, the UE inputs the received random number RAND, the memorized IMSI, and the key K to the authentication function, and obtains the response RES and the key K ASME (step S56). Next, the UE will respond to the RES and send it to the MME (step S57). Then, the MME compares the expected response RES EXPECTED with the actual response RES to authenticate the UE (step S58). In detail, the MME determines that the UE has reliability (that is, the authentication succeeds) in the case where the expected response RES EXPECTED is consistent with the actual response RES. On the other hand, in the case where the expected response RES EXPECTED is inconsistent with the actual response RES, the MME determines that the UE has no reliability (that is, the authentication fails).

上記認證程序後,實際通訊之際所被使用之金鑰,係基於KASME而被生成。所被生成之金鑰,係有CK(Cipher Key)和IK(Integrity Key)之2種類。CK,係用來將通訊予以加密所需之金鑰,是用來防止他人獲知通訊內容而被使用。IK,係用來確認資料之完整性所需之金鑰,是用來確認資料在通訊路上是否有被變更而被使用。於EPS中,係藉由AA(Authentication/Authorization)程序、使用了CK的加密、及使用了IK的完整性(Integrity)之確認,來確保安全性。此外,這些各處理,係在每台UE中分別被進行。 After the authentication procedure is written, the key used for actual communication is generated based on K ASME . The generated key is of two types: CK (Cipher Key) and IK (Integrity Key). CK, the key used to encrypt communications, is used to prevent others from knowing the content of the communication. IK, the key required to confirm the integrity of the data, is used to confirm whether the data has been changed in the communication path. In the EPS, security is ensured by an AA (Authentication/Authorization) program, encryption using CK, and confirmation using INT integrity (Integrity). Further, these respective processes are performed separately for each UE.

如參照圖12所上記說明,藉由認證程序,共通的金鑰KASME會在UE側與網路側之雙方被生成。UE側及網路側(HSS、MME或eNodeB),係基於此共通的金鑰KASME,將實際通訊之際所被使用之金鑰,按照每種用途而加以生成。以下,參照圖13,說明實際通訊之際所被使用之金鑰的用途之例子。 As described above with reference to Fig. 12, the common key K ASME is generated on both the UE side and the network side by the authentication procedure. The UE side and the network side (HSS, MME, or eNodeB) generate a key used for actual communication based on the common key K ASME for each use. Hereinafter, an example of the use of the key used in actual communication will be described with reference to FIG.

圖13係用來說明實際通訊之際所被使用的金 鑰之用途之例子的說明圖。如圖13所示,在UE與eNodeB之間,使用者平面所需之CK會被使用。又,在UE與eNodeB之間,RRC(Radio Resource Control)訊令所需之IK及CK會被使用。又,在UE與MME之間,NAS(Non-access stratum)訊令所需之IK及CK會被使用。如此,按照每種用途而會使用不同的金鑰。然後,這些金鑰,係基於AA程序中所被生成的KASME,而所被生成之。以下,參照圖14,說明按照這些用途而被生成之金鑰彼此之關係。 Fig. 13 is an explanatory diagram for explaining an example of the use of the key used in actual communication. As shown in Figure 13, between the UE and the eNodeB, the CK required by the user plane will be used. In addition, between the UE and the eNodeB, the IK and CK required for the RRC (Radio Resource Control) command are used. In addition, between the UE and the MME, the IK and CK required for the NAS (Non-access stratum) command are used. As such, different keys are used for each use. These keys are then generated based on the K ASME generated in the AA program. Hereinafter, the relationship between the keys generated in accordance with these uses will be described with reference to FIG. 14.

圖14係為金鑰的系統圖。圖中的enc係意味著加密(encrypt),int係意味著完整性(integrity),RRC係意味著RRC訊令,NAS係意味著NAS訊令,UP係意味著使用者平面。圖14中所示的金鑰的系統圖,係在UE側與網路側為共通。關於網路側之金鑰,NAS用的金鑰,係由MME所生成。NAS用以外的,RRC訊令及使用者平面用的金鑰,係由eNodeB所生成。關於UE側之金鑰,係全部都是由UE所生成。 Figure 14 is a system diagram of the key. In the figure, enc means encryption, int means integrity, RRC means RRC, NAS means NAS, and UP means user plane. The system diagram of the key shown in FIG. 14 is common to the UE side and the network side. Regarding the key on the network side, the key used by the NAS is generated by the MME. The key used by the NAS, the RRC command and the user plane, is generated by the eNodeB. The keys on the UE side are all generated by the UE.

沿著時間系列,說明圖14中所示的金鑰之生成。首先,HSS及UE,係藉由相互認證(Mutual authentication),分別生成KASME。接下來,MME及UE,係基於KASME,生成NAS訊令用的金鑰(亦即KNASenc、及KNASint)、及eNodeB用的基礎金鑰(亦即KeNodeB)。然後,eNodeB及UE,係基於eNodeB用的基礎金鑰,生成RRC訊令用的金鑰(亦即KRRCenc、及KRRCint)、及使用者平面用 的金鑰(亦即KUPenc)。 The generation of the key shown in Fig. 14 is explained along the time series. First, the HSS and the UE generate K ASME by Mutual authentication. Next, the MME and the UE generate a NAS command key (ie, K NASenc and K NASint ) and a base key for the eNodeB (ie, K eNodeB ) based on K ASME . Then, the eNodeB and the UE generate a key for the RRC command (ie, K RRCenc and K RRCint ) and a key for the user plane (ie, K UPenc ) based on the base key for the eNodeB.

<<2.各裝置的構成例>> <<2. Configuration example of each device>>

<2.1.終端裝置之構成> <2.1. Composition of terminal device>

接下來,參照圖15,說明本揭露的實施形態所述之終端裝置200的構成之一例。圖15係本揭露之一實施形態所述之終端裝置200之構成之一例的區塊圖。參照圖15,終端裝置200係具備:天線部210、無線通訊部220、記憶部230及處理部240。 Next, an example of the configuration of the terminal device 200 according to the embodiment of the present disclosure will be described with reference to FIG. 15. Fig. 15 is a block diagram showing an example of the configuration of the terminal device 200 according to the embodiment of the present disclosure. Referring to Fig. 15, terminal device 200 includes antenna unit 210, wireless communication unit 220, memory unit 230, and processing unit 240.

(1)天線部210 (1) Antenna portion 210

天線部210,係將無線通訊部220所輸出之訊號,以電波方式在空間中輻射。又,天線部210,係將空間之電波轉換成訊號,將該當訊號輸出至無線通訊部220。 The antenna unit 210 radiates the signal output from the wireless communication unit 220 in a space by radio waves. Further, the antenna unit 210 converts the radio wave of the space into a signal, and outputs the signal to the wireless communication unit 220.

(2)無線通訊部220 (2) Wireless communication unit 220

無線通訊部220,係將訊號予以收送訊。例如,無線通訊部220,係將來自基地台的下鏈訊號予以接收,並將往基地台的上鏈訊號予以發送。 The wireless communication unit 220 transmits and receives the signal. For example, the wireless communication unit 220 receives the downlink signal from the base station and transmits the uplink signal to the base station.

(3)記憶部230 (3) Memory unit 230

記憶部230,係將終端裝置200之動作所需之程式及各種資料,予以暫時或永久性記憶。 The memory unit 230 temporarily or permanently memorizes programs and various materials required for the operation of the terminal device 200.

(4)處理部240 (4) Processing unit 240

處理部240,係提供終端裝置200的各種機能。處理部240係含有認證處理部241及通訊處理部243。此外,處理部240,係亦可還含有這些構成要素以外之其他構成要素。亦即,處理部240係還可進行這些構成要素之動作以外之動作。 The processing unit 240 provides various functions of the terminal device 200. The processing unit 240 includes an authentication processing unit 241 and a communication processing unit 243. Further, the processing unit 240 may further include other components than these components. In other words, the processing unit 240 can perform operations other than the operations of these components.

認證處理部241及通訊處理部243之動作,係在後面詳細說明。 The operations of the authentication processing unit 241 and the communication processing unit 243 will be described in detail later.

<2.2.MEC伺服器的構成例> <2.2. Configuration example of MEC server>

接下來,參照圖16,說明本揭露的一實施形態所述之MEC伺服器300的構成之一例。圖16係本揭露之一實施形態所述之MEC伺服器300之構成之一例的區塊圖。參照圖16,MEC伺服器300係具備:通訊部310、記憶部320、及處理部330。 Next, an example of the configuration of the MEC server 300 according to an embodiment of the present disclosure will be described with reference to FIG. Fig. 16 is a block diagram showing an example of the configuration of the MEC server 300 according to the embodiment of the present disclosure. Referring to Fig. 16, MEC server 300 includes a communication unit 310, a storage unit 320, and a processing unit 330.

(1)通訊部310 (1) Communication unit 310

通訊部310,係與其他裝置之間進行通訊所需之介面。例如,通訊部310,係與已被建立對應之裝置之間,進行通訊。例如,若MEC伺服器300是以邏輯實體的方式而被形成,且被包含在基地台100中,則通訊部310係例如與基地台100的控制部之間進行通訊。MEC伺服器300係亦可具有,與被一體形成的裝置以外的裝置之間,直接進行通訊所需之介面。 The communication unit 310 is an interface required for communication with other devices. For example, the communication unit 310 communicates with the device that has been established. For example, if the MEC server 300 is formed as a logical entity and is included in the base station 100, the communication unit 310 communicates with, for example, the control unit of the base station 100. The MEC server 300 may have an interface required for direct communication with devices other than the integrally formed device.

(2)記憶部320 (2) Memory unit 320

記憶部320,係將MEC伺服器300之動作所需之程式及各種資料,予以暫時或永久性記憶。例如,記憶部320,係可將被提供給使用者的多樣內容、及應用程式,加以記憶。 The memory unit 320 temporarily or permanently memorizes the programs and various materials required for the operation of the MEC server 300. For example, the storage unit 320 can memorize various contents and applications provided to the user.

(3)處理部330 (3) Processing unit 330

處理部330,係提供MEC伺服器300的各種機能。處理部330係含有認證處理部331及通訊處理部333。此外,處理部330,係亦可還含有這些構成要素以外之其他構成要素。亦即,處理部330係還可進行這些構成要素之動作以外之動作。 The processing unit 330 provides various functions of the MEC server 300. The processing unit 330 includes an authentication processing unit 331 and a communication processing unit 333. Further, the processing unit 330 may further include other components other than these components. In other words, the processing unit 330 can perform operations other than the operations of these components.

認證處理部331及通訊處理部333之動作,係在後面詳細說明。此外,在圖16中雖然省略,但處理部330係亦可含有,向UE200提供內容或從UE200取得內容的內容處理部。 The operations of the authentication processing unit 331 and the communication processing unit 333 will be described in detail later. Although not shown in FIG. 16, the processing unit 330 may include a content processing unit that provides content to the UE 200 or acquires content from the UE 200.

<2.3.EPC機能實體的構成例> <2.3. Configuration example of EPC functional entity>

接下來,參照圖17,說明本揭露的一實施形態所述之EPC機能實體的構成之一例。此處所說明的EPC機能實體,係為例如MME41或HSS42,假設這些係採取相同的構成。當然,各構成要素之動作,在MME41與HSS42間係不同。圖17係本揭露的一實施形態所述之EPC機能 實體41、42之構成之一例的區塊圖。參照圖16,EPC機能實體41、42係具備:通訊部410、記憶部420、及處理部430。 Next, an example of the configuration of an EPC functional entity according to an embodiment of the present disclosure will be described with reference to FIG. The EPC functional entities described herein are, for example, MME 41 or HSS 42, assuming that these systems take the same configuration. Of course, the operation of each component is different between the MME 41 and the HSS 42. 17 is an EPC function according to an embodiment of the present disclosure. A block diagram of an example of the composition of the entities 41, 42. Referring to Fig. 16, EPC functional entities 41 and 42 include communication unit 410, storage unit 420, and processing unit 430.

(1)通訊部410 (1) Communication unit 410

通訊部410,係與其他裝置之間進行通訊所需之介面。例如,通訊部410,係與其他EPC機能實體之間進行通訊。 The communication unit 410 is an interface required for communication with other devices. For example, the communication unit 410 communicates with other EPC functional entities.

(2)記憶部420 (2) Memory unit 420

記憶部420,係將MME41或HSS42之動作所需之程式及各種資料,予以暫時或永久性記憶。 The memory unit 420 temporarily or permanently memorizes the programs and various materials required for the operation of the MME 41 or the HSS 42.

(3)處理部430 (3) Processing unit 430

處理部430係提供MME41或HSS42的各種機能。處理部430之動作,係在之後詳細說明。 The processing unit 430 provides various functions of the MME 41 or the HSS 42. The operation of the processing unit 430 will be described in detail later.

以上,說明了各裝置的構成例。以下,為了說明的方便,將基地台100亦稱為eNodeB100,將終端裝置200亦稱為UE200。 The configuration example of each device has been described above. Hereinafter, for convenience of explanation, the base station 100 is also referred to as an eNodeB 100, and the terminal device 200 is also referred to as a UE 200.

<<3.第1實施形態>> <<3. First embodiment>>

本實施形態,係使用了MEC伺服器300中所被記憶之認證資訊的認證是被進行的形態。 In the present embodiment, the authentication using the authentication information stored in the MEC server 300 is performed.

<3.1.技術課題> <3.1. Technical issues>

EPS的各實體(P-GW、S-GW、PCRF、HSS、及eNodeB等),係分別被視為具有信賴性的實體,這些實體間的相互認證係未被規格化。另一方面,UE係為不特定多數之使用者所持有的裝置,因此與MME之間的相互認證之程序係被規格化。 Each entity of the EPS (P-GW, S-GW, PCRF, HSS, eNodeB, etc.) is regarded as a trusted entity, and the mutual authentication between these entities is not standardized. On the other hand, since the UE is a device held by a user who does not have a large number of users, the procedure for mutual authentication with the MME is standardized.

可是,關於MEC伺服器,相互認證之程序係未被規格化。MEC伺服器,係想定是被配置在靠近於eNodeB,但並非應被視為有信賴性之實體。這是因為,MEC伺服器,係有可能是由各式各樣的服務提供者所提供。因此,對MEC伺服器一一確認信賴性,較為理想。 However, regarding the MEC server, the mutual authentication program is not standardized. The MEC server is intended to be configured close to the eNodeB, but should not be considered as a trusted entity. This is because the MEC server is likely to be provided by a wide variety of service providers. Therefore, it is preferable to confirm the reliability of the MEC server one by one.

於是,在本實施形態中,係提供用來認證MEC伺服器所需之程序。 Thus, in the present embodiment, the program required to authenticate the MEC server is provided.

<3.2.技術特徵> <3.2. Technical Features>

(1)認證程序 (1) Certification procedure

MEC伺服器300,係與已使用HSS42中所被登錄之、MEC伺服器300所對應之認證資訊而被認證之網路,進行通訊。 The MEC server 300 communicates with a network that has been authenticated using the authentication information corresponding to the MEC server 300 registered in the HSS 42.

HSS42(例如記憶部420),係將MEC伺服器300所對應之認證資訊,加以記憶。在本實施形態中,MEC伺服器300所對應之認證資訊,係為MEC伺服器300的認證資訊。具體而言,MEC伺服器300的認證資訊係含有:用來特定MEC伺服器300之號碼(亦即IMSI)及 MEC伺服器300所固有之金鑰資訊(亦即金鑰K)。HSS42,係按照每一MEC伺服器300而記憶IMSI,也將MEC伺服器300的IMSI所對應之金鑰K,加以記憶。此外,對一個MEC伺服器300係登錄有一個IMSI。但是,亦可對複數個MEC伺服器300,指派一個共通的IMSI。然後,MME41(例如處理部430)及HSS42(例如處理部430),係進行MEC伺服器300的認證所需之各種處理。 The HSS 42 (for example, the storage unit 420) memorizes the authentication information corresponding to the MEC server 300. In the present embodiment, the authentication information corresponding to the MEC server 300 is the authentication information of the MEC server 300. Specifically, the authentication information of the MEC server 300 includes: a number (ie, IMSI) for specifying the MEC server 300 and The key information inherent to the MEC server 300 (ie, the key K). The HSS 42 memorizes the IMSI for each MEC server 300 and also memorizes the key K corresponding to the IMSI of the MEC server 300. In addition, an IMSI is registered for one MEC server 300. However, a plurality of MEC servers 300 can also be assigned a common IMSI. Then, the MME 41 (for example, the processing unit 430) and the HSS 42 (for example, the processing unit 430) perform various processes required for the authentication of the MEC server 300.

MEC伺服器300(例如記憶部320),係將MEC伺服器300的認證資訊,加以記憶。然後,MEC伺服器300(例如認證處理部331),係使用MEC伺服器300的認證資訊來進行對網路之認證。亦即,本實施形態所述之MEC伺服器300,係如參照圖12而上記說明,使用UE與HSS係記憶著同一認證資訊這件事情來進行UE的認證的機制、和使用相同之機制來進行認證。然後,MEC伺服器300(例如通訊處理部333),係與已被認證之網路進行通訊。具體而言,MEC伺服器300,係經由已被認證之網路(例如該當網路內的eNodeB100)而向UE200提供內容,或從UE200取得內容。如此一來,MEC伺服器300,係被認證成為具有信賴性之實體,而可連接至網路。 The MEC server 300 (for example, the storage unit 320) memorizes the authentication information of the MEC server 300. Then, the MEC server 300 (for example, the authentication processing unit 331) performs authentication of the network using the authentication information of the MEC server 300. That is, the MEC server 300 according to the present embodiment is described with reference to FIG. 12, and the mechanism for authenticating the UE using the same authentication information stored by the UE and the HSS system is used, and the same mechanism is used. Certify. Then, the MEC server 300 (for example, the communication processing unit 333) communicates with the authenticated network. Specifically, the MEC server 300 provides content to the UE 200 via the authenticated network (eg, the eNodeB 100 within the network) or retrieves content from the UE 200. In this way, the MEC server 300 is authenticated as a trusted entity and can be connected to the network.

MEC伺服器300,係亦可在例如USIM(Universal Subscriber Identification Module)等之硬體中,儲存認證資訊。此情況下,記憶部320係以USIM等之硬體的方式而被實現。除此以外,認證資訊,係亦可藉由具 有與USIM同等機能的軟體而被實現。此情況下,記憶部320係記憶該當軟體。認證資訊,係藉由例如MEC應用程式之事業者而被登錄。 The MEC server 300 may store authentication information in a hardware such as a USIM (Universal Subscriber Identification Module). In this case, the memory unit 320 is realized by a hardware such as USIM. In addition, the certification information can also be It is implemented with software equivalent to USIM. In this case, the memory unit 320 memorizes the software. The authentication information is registered by a business person such as an MEC application.

此處,MEC伺服器300,係亦可一面切換複數運作者(MNO:Mobile Network Operator)的網路而一面使用。此情況下,認證資訊係亦可被記憶在例如eSIM(Embedded Subscriber Identity Module)中而被搭載於MEC伺服器300。藉此,亦可遠端改寫認證資訊,MEC伺服器300係可一面切換複數運作者之網路而一面動作。此情況下,可將認證資訊予以改寫的實體,係與MEC伺服器300之間先建立好藉由加密處理而被隱匿化的通訊路徑,然後變更認證資訊。 Here, the MEC server 300 can be used while switching the network of the MNO (Mobile Network Operator). In this case, the authentication information can be stored in the MEC server 300, for example, in an eSIM (Embedded Subscriber Identity Module). In this way, the authentication information can be rewritten at the remote end, and the MEC server 300 can operate while switching the network of the plurality of operators. In this case, the entity that can rewrite the authentication information establishes a communication path that is concealed by the encryption process with the MEC server 300, and then changes the authentication information.

MEC伺服器300的認證程序,係認證的主體是從UE被變更成MEC伺服器300以外,其餘是和參照圖12而上記說明的相同。以下,參照圖18來說明本實施形態所述之認證程序。 The authentication procedure of the MEC server 300 is the same as that described above with reference to FIG. 12, except that the main body of the authentication is changed from the UE to the MEC server 300. Hereinafter, the authentication procedure described in the embodiment will be described with reference to Fig. 18 .

圖18係本實施形態所述之系統1中所被執行的認證程序之流程之一例的程序圖。如圖18所示,MEC伺服器300係記憶著IMSI及金鑰K。又,HSS42係記憶著,各個MEC伺服器300的IMSI及IMSI所對應之金鑰K。此外,MEC伺服器300,係經由eNodeB100而與MME41通訊。 Fig. 18 is a flowchart showing an example of a flow of an authentication program executed in the system 1 according to the embodiment. As shown in FIG. 18, the MEC server 300 memorizes the IMSI and the key K. Further, the HSS 42 stores the IM of the respective MEC server 300 and the key K corresponding to the IMSI. Further, the MEC server 300 communicates with the MME 41 via the eNodeB 100.

首先,MEC伺服器300係將IMSI連同附著請求,發送至MME41(步驟S102)。接下來,MME41係將 已接收的IMSI連同認證請求,發送至HSS42(步驟S104)。接著,HSS42,係產生亂數RAND,將亂數RAND、已接收IMSI、及與該當IMSI建立對應而記憶的金鑰K,輸入至認證機能,獲得被期待之回應RESEXPECTED及金鑰KASME(步驟S106)。接下來,HSS42,作為認證回應,而將金鑰KASME、被期待之回應RESEXPECTED及亂數RAND,發送至MME41(步驟S108)。接著,MME41係將亂數RAND,發送至MEC伺服器300(步驟S110)。接下來,MEC伺服器300,係將已接收之亂數RAND、所記憶的IMSI及金鑰K,輸入至認證機能,獲得回應RES及金鑰KASME(步驟S112)。接著,MEC伺服器300係將回應RES,發送至MME41(步驟S114)。然後,MME41係將被期待之回應RESEXPECTED與實際之回應RES進行比較以認證MEC伺服器300(步驟S116)。詳言之,MME41,係在被期待之回應RESEXPECTED與實際之回應RES是一致的情況下,判斷為MEC伺服器300有信賴性(亦即認證成功)。另一方面,MME41,係在被期待之回應RESEXPECTED與實際之回應RES是不一致的情況下,判斷為MEC伺服器300沒有信賴性(亦即認證失敗)。 First, the MEC server 300 transmits the IMSI together with the attach request to the MME 41 (step S102). Next, the MME 41 transmits the received IMSI together with the authentication request to the HSS 42 (step S104). Next, the HSS 42 generates a random number RAND, and inputs the random number RAND, the received IMSI, and the key K memorized in association with the IMSI to the authentication function, and obtains the expected response RES EXPECTED and the key K ASME ( Step S106). Next, the HSS 42 transmits the key K ASME , the expected response RES EXPECTED, and the random number RAND to the MME 41 as an authentication response (step S108). Next, the MME 41 transmits the random number RAND to the MEC server 300 (step S110). Next, the MEC server 300 inputs the received random number RAND, the memorized IMSI, and the key K to the authentication function, and obtains the response RES and the key K ASME (step S112). Next, the MEC server 300 transmits a response RES to the MME 41 (step S114). Then, the MME 41 compares the expected response RES EXPECTED with the actual response RES to authenticate the MEC server 300 (step S116). In detail, the MME 41 determines that the MEC server 300 has reliability (that is, the authentication is successful) in the case where the expected response RES EXPECTED coincides with the actual response RES. On the other hand, in the case where the expected response RES EXPECTED does not coincide with the actual response RES, the MME 41 determines that the MEC server 300 has no reliability (that is, authentication failure).

(2)網路的變異 (2) Network variation

如上述,MEC伺服器300,係亦可為被設在EPS之內部的應用程式伺服器。 As described above, the MEC server 300 may be an application server that is provided inside the EPS.

除此以外,MEC伺服器300,係亦可為被設 在LAN(Local Area Network)網路內的應用程式伺服器。此情況下,MEC伺服器300,係被設在例如無線LAN的存取點。然後,MEC伺服器300,係使用本身的認證資訊,經由ePDG(enhanced Packet Data Gateway)而進行AA程序。此外,ePDG,係為EPC的實體之一,被連接至P-GW。典型而言,ePDG係進行無線LAN終端之認證。 In addition, the MEC server 300 can also be set. An application server in a LAN (Local Area Network) network. In this case, the MEC server 300 is provided, for example, at an access point of the wireless LAN. Then, the MEC server 300 performs the AA program via the ePDG (enhanced Packet Data Gateway) using its own authentication information. In addition, ePDG, which is one of the entities of the EPC, is connected to the P-GW. Typically, ePDG is certified for wireless LAN terminals.

<<4.第2實施形態>> <<4. Second embodiment>>

本實施形態係為,MEC伺服器300之認證是由UE200來代理進行的形態。 In the present embodiment, the authentication of the MEC server 300 is performed by the UE 200.

<4.1.技術課題> <4.1. Technical issues>

在上記第1實施形態中,MEC伺服器300係記憶本身的認證資訊。典型而言,係為MEC應用程式的事業者,係對MEC伺服器300,設定該認證資訊。可是,要變更MEC伺服器300中所被記憶之認證資訊並非容易,對被新追加的MEC伺服器300即時設定認證資訊是困難的。這是因為,透過通訊來設定認證資訊這件事情,係從認證資訊(尤其是金鑰K)的隱匿性之觀點來看,並非理想。MEC伺服器300是從遠端透過通訊而被啟用(例如啟動)的情況下,仍可較安全地讓MEC伺服器300被認證,較為理想。 In the first embodiment described above, the MEC server 300 memorizes the authentication information of itself. Typically, a business operator of the MEC application sets the authentication information to the MEC server 300. However, it is not easy to change the authentication information stored in the MEC server 300, and it is difficult to immediately set the authentication information to the newly added MEC server 300. This is because setting the authentication information through communication is not ideal from the point of view of the cryptographic information of the authentication information (especially the key K). When the MEC server 300 is enabled (for example, activated) from the remote end through communication, it is preferable to securely allow the MEC server 300 to be authenticated.

於是,在本實施形態中,係提供一種用來較安全地進行MEC伺服器300之認證所需之技術。 Thus, in the present embodiment, a technique for performing authentication of the MEC server 300 more securely is provided.

<4.2.技術特徵> <4.2. Technical Features>

在本實施形態中,UE200(例如認證處理部241),作為MEC伺服器300的代理而進行認證。 In the present embodiment, the UE 200 (for example, the authentication processing unit 241) performs authentication as a proxy of the MEC server 300.

HSS42(例如記憶部420),係將MEC伺服器300所對應之認證資訊,加以記憶。在本實施形態中,MEC伺服器300所對應之認證資訊,係為MEC伺服器300所被建立對應之UE200的認證資訊。具體而言,UE200的認證資訊係含有:用來特定UE200之號碼(亦即IMSI)及UE200所固有之金鑰資訊(亦即金鑰K)。HSS42,係與UE200建立對應而記憶著MEC伺服器300的識別資訊。該識別資訊,以下亦稱為MEC伺服器ID。例如,HSS42,作為UE200的訂閱者資訊,是將與UE200建立對應的MEC伺服器300的MEC伺服器ID,加以記憶。此外,該MEC伺服器ID,係並非暫時ID,而是MEC伺服器300所固有之識別資訊。 The HSS 42 (for example, the storage unit 420) memorizes the authentication information corresponding to the MEC server 300. In the present embodiment, the authentication information corresponding to the MEC server 300 is the authentication information of the UE 200 to which the MEC server 300 is associated. Specifically, the authentication information of the UE 200 includes: a number (ie, IMSI) for specifying the UE 200 and key information (ie, the key K) inherent to the UE 200. The HSS 42 associates with the UE 200 and memorizes the identification information of the MEC server 300. This identification information, hereinafter also referred to as the MEC server ID. For example, the HSS 42, as the subscriber information of the UE 200, memorizes the MEC server ID of the MEC server 300 associated with the UE 200. Further, the MEC server ID is not a temporary ID but identification information unique to the MEC server 300.

UE200(例如認證處理部241),係在本身的認證程序完成後,將與本身建立對應的MEC伺服器300之認證程序,代替該當MEC伺服器300而進行之。詳言之,首先,UE200係使用本身的IMSI及金鑰K來進行本身的認證程序。接下來,UE200係將MEC伺服器300的附著請求,發送至MME41或eNodeB100。往MME41發送的時候是使用NAS訊令。往eNodeB100發送的時候是使用RRC訊令。MEC伺服器300的附著請求中係含有 MEC伺服器ID。MEC伺服器300的附著請求係亦可視為,請求對象之MEC伺服器300之活性化的訊息。 The UE 200 (for example, the authentication processing unit 241) performs the authentication procedure of the MEC server 300 associated with itself after the completion of the authentication procedure itself, instead of the MEC server 300. In detail, first, the UE 200 uses its own IMSI and key K to perform its own authentication procedure. Next, the UE 200 transmits an attach request of the MEC server 300 to the MME 41 or the eNodeB 100. When sending to the MME 41, the NAS command is used. When sending to eNodeB100, it uses RRC command. The attachment request of the MEC server 300 is included MEC server ID. The attachment request of the MEC server 300 can also be regarded as a message for activation of the MEC server 300 to be requested.

HSS42(例如處理部430),係在接收到含有MEC伺服器ID的附著請求的情況下,確認附著請求的送訊來源之UE200所對應之訂閱者資訊中,是否有被登錄該當MEC伺服器ID。然後,HSS42,係將含有確認結果的附著回應予以返送。在有被登錄的情況下,HSS42係將含有暫時ID的附著回應予以返送。該暫時ID,係對已認證成功的MEC伺服器300所被賦予的ID。以下亦將該暫時ID,稱為MEC伺服器暫時ID。另一方面,在未被登錄的情況下,HSS42係將不含MEC伺服器暫時ID的附著回應予以返送。此情況下,MEC伺服器300係無法連接至網路。 The HSS 42 (for example, the processing unit 430), when receiving the attachment request including the MEC server ID, confirms whether or not the subscriber information corresponding to the UE 200 of the transmission source of the attachment request is registered in the MEC server ID. . Then, the HSS 42 returns the attachment response containing the confirmation result. In the case where there is a registration, the HSS 42 returns the attachment response containing the temporary ID. The temporary ID is an ID given to the MEC server 300 that has been successfully authenticated. The temporary ID is also referred to as an MEC server temporary ID. On the other hand, if it is not registered, the HSS 42 returns the attachment response without the temporary ID of the MEC server. In this case, the MEC server 300 cannot be connected to the network.

MEC伺服器300(例如通訊處理部333),係使用基於對對網路之認證已經成功的、該當MEC伺服器300所被建立對應之UE200所做的請求(亦即附著請求)而被發行的資訊(亦即MEC伺服器暫時ID),來與網路進行通訊。系統1,係基於該已被發行之資訊來識別MEC伺服器300是否已經認證完畢,因此可確保安全性。又,在本實施形態中,係不在MEC伺服器300中設定認證資訊也能進行認證,可確保較高的安全性。 The MEC server 300 (for example, the communication processing unit 333) is issued based on a request (i.e., an attach request) made by the UE 200 to which the MEC server 300 is associated, based on the authentication of the network. Information (also known as the MEC server temporary ID) to communicate with the network. The system 1 identifies whether the MEC server 300 has been authenticated based on the information that has been issued, thereby ensuring security. Further, in the present embodiment, authentication can be performed without setting authentication information in the MEC server 300, and high security can be ensured.

eNodeB100及MME41,係在將附著回應轉送至UE200的過程中,取得MEC伺服器暫時ID並記憶,許可具有MEC伺服器暫時ID的MEC伺服器300所做的 存取。藉此,MEC伺服器300係可在MEC伺服器暫時ID為有效的期間,連接至網路。 The eNodeB 100 and the MME 41 acquire the MEC server temporary ID and memorize it during the process of forwarding the attach response to the UE 200, permitting the MEC server 300 having the MEC server temporary ID to do so. access. Thereby, the MEC server 300 can be connected to the network while the MEC server temporary ID is valid.

此外,上記雖然說明了以MEC伺服器300單位的附著請求,但同樣的認證程序,亦可用在MEC伺服器300上動作的MEC應用程式單位來進行之。例如,亦可每次有新的MEC應用程式被啟動時,就進行該當MEC應用程式的附著程序。此情況下,含有MEC伺服器暫時ID的附著回應,係亦可被視為是MEC應用程式的啟動許可。含有MEC伺服器ID的附著請求,係亦可被視為是MEC應用程式的啟動要求。又,MEC伺服器ID及MEC伺服器暫時ID,係亦可用MEC應用程式單位而被設定。 Further, although the above description has been made with an attachment request of 300 units of the MEC server, the same authentication procedure can be performed by the MEC application unit operating on the MEC server 300. For example, the attach procedure of the MEC application may be performed each time a new MEC application is launched. In this case, the attachment response containing the temporary ID of the MEC server can also be considered as the activation permission of the MEC application. The attach request containing the MEC server ID can also be considered as the startup request of the MEC application. Further, the MEC server ID and the MEC server temporary ID can also be set in the MEC application unit.

以下,參照圖19,說明由UE200來代理MEC伺服器300而進行認證時的認證程序的流程之一例。 Hereinafter, an example of the flow of the authentication procedure when the UE 200 is used to proxy the MEC server 300 and perform authentication will be described with reference to FIG.

圖19係本實施形態所述之系統1中所被執行的認證程序之流程之一例的程序圖。此外,UE200係經由eNodeB100而與MME41通訊。 Fig. 19 is a flowchart showing an example of a flow of an authentication program executed in the system 1 according to the embodiment. Further, the UE 200 communicates with the MME 41 via the eNodeB 100.

如圖19所示,首先,UE200係進行附著程序(步驟S202)。於該附著程序中,參照圖12而上記說明的認證程序會被進行,UE200會被認證。接下來,UE200係將MEC伺服器300的附著請求,發送至MME41(步驟S204)。該附著請求,係含有認證對象之MEC伺服器300的MEC伺服器ID。接著,MME41,係將已接收之MEC伺服器300的附著請求,轉送至HSS42(步驟S206)。接下來,HSS42係將MEC伺服器300的附著回應,返送至 MME41(步驟S208)。此時,HSS42係確認,附著請求的送訊來源之UE200的訂閱者資訊中,是否被登錄有該當MEC伺服器300的MEC伺服器ID。以下,針對有被登錄的情況來說明。亦即,附著回應中,含有MEC伺服器暫時ID。接著,MME41係將已接收之MEC伺服器300的附著回應,轉送至eNodeB100(步驟S210),eNodeB100係將已接收之MEC伺服器300的附著回應,轉送至MEC伺服器300(步驟S212)。然後,MEC伺服器300,係使用附著回應中所含之MEC伺服器暫時ID,而附著至網路(步驟S214)。 As shown in FIG. 19, first, the UE 200 performs an attach procedure (step S202). In the attachment procedure, the authentication procedure described above with reference to FIG. 12 is performed, and the UE 200 is authenticated. Next, the UE 200 transmits an attach request of the MEC server 300 to the MME 41 (step S204). This attachment request is the MEC server ID of the MEC server 300 including the authentication target. Next, the MME 41 transfers the attached request of the received MEC server 300 to the HSS 42 (step S206). Next, the HSS 42 sends the attachment response of the MEC server 300 back to MME 41 (step S208). At this time, the HSS 42 confirms whether or not the MEC server ID of the MEC server 300 is registered in the subscriber information of the UE 200 to which the requesting communication source is attached. Hereinafter, the case where there is a registration will be described. That is, the attachment response contains the temporary ID of the MEC server. Next, the MME 41 transfers the attached response of the received MEC server 300 to the eNodeB 100 (step S210), and the eNodeB 100 transfers the attached response of the received MEC server 300 to the MEC server 300 (step S212). Then, the MEC server 300 attaches to the network using the MEC server temporary ID included in the attach response (step S214).

<<5.第3實施形態>> <<5. Third embodiment>>

本實施形態係為,提供MEC伺服器300所致之通訊中所被使用的金鑰的形態。 In the present embodiment, the form of the key used in the communication by the MEC server 300 is provided.

<5.1.技術課題> <5.1. Technical issues>

MEC伺服器300,係一旦上記第1實施形態或第2實施形態所述之認證程序為成功,就可連接至網路而通訊。因此和UE的情況相同,認證程序後,實際通訊之際所被使用的金鑰(例如CK及IK)會被生成,較為理想。例如,MEC應用程式與MME41之通訊、及MEC應用程式與UE200之通訊中所被使用的,IK及CK會被生成,較為理想。 The MEC server 300 can be connected to the network for communication if the authentication procedure described in the first embodiment or the second embodiment is successful. Therefore, as in the case of the UE, after the authentication procedure, the keys (such as CK and IK) used at the time of actual communication are generated, which is preferable. For example, it is preferable that the MEC application communicates with the MME 41 and the IK and CK are used in the communication between the MEC application and the UE 200.

然而,將MEC伺服器300所致之通訊中所被 使用的金鑰予以生成、發布的技術,並未被提供。 However, the communication caused by the MEC server 300 is The technology used to generate and publish the key is not provided.

<5.2.技術特徵> <5.2. Technical Features>

(1)MEC應用程式與MME41的通訊所需之金鑰 (1) The key required for communication between the MEC application and the MME 41

MEC應用程式與MME41的通訊所需之金鑰(亦即CK及IK),係隨每一MEC應用程式而使用不同的金鑰。 The keys (ie, CK and IK) required for communication between the MEC application and the MME 41 are used with different keys for each MEC application.

上記第1實施形態的情況下,MEC應用程式與MME41的通訊所需之金鑰,係基於MEC伺服器300的認證資訊(亦即MEC伺服器300的IMSI及金鑰K)而被生成。詳言之,首先,在MEC伺服器300的附著程序中,使用MEC伺服器300的認證資訊而生成金鑰KASME。然後,基於該金鑰KASME,生成MEC應用程式與MME41的通訊所需之金鑰(亦即CK及IK)。該CK及IK,亦總稱為金鑰KMEC Application-MME。亦即,金鑰KMEC Application-MME,係包含有CK及IK。 In the case of the first embodiment, the key required for communication between the MEC application and the MME 41 is generated based on the authentication information of the MEC server 300 (i.e., the IMSI and the key K of the MEC server 300). In detail, first, in the attaching procedure of the MEC server 300, the key K ASME is generated using the authentication information of the MEC server 300. Then, based on the key K ASME , a key (ie, CK and IK) required for communication between the MEC application and the MME 41 is generated. The CK and IK are also collectively referred to as the key K MEC Application-MME . That is, the key K MEC Application-MME includes CK and IK.

上記第2實施形態的情況下,MEC應用程式與MME41的通訊所需之金鑰,係基於MEC伺服器300所被建立對應的UE200的認證資訊(亦即UE200的IMSI及金鑰K)而被生成。詳言之,首先,在UE200的附著程序中,使用UE200的認證資訊而生成金鑰KASME。然後,基於使用UE200的認證資訊而被生成的金鑰KASME,來生成MEC應用程式與MME41的通訊所需之金鑰KMEC Application-MME。此處,MME41,係於UE200的附著程序中,被從HSS42通知金鑰KASME(圖12中所示的步驟 S54)。可是,由於UE200的附著程序和MEC伺服器300的附著程序是個別的程序,因此在UE200的附著程序中,在金鑰KASME被生成的時序上生成金鑰KMEC Application-MME,並不理想。於是,MME41(例如記憶部420),係事前將該金鑰KASME予以記憶。然後,MME41(例如處理部430),係在MEC伺服器300的認證成功的情況下,基於所記憶的金鑰KASME來生成金鑰KMEC Application-MME,將已生成的金鑰KMEC Application-MME,通知給MEC伺服器300。 In the case of the second embodiment, the key required for communication between the MEC application and the MME 41 is based on the authentication information of the UE 200 (i.e., the IMSI and the key K of the UE 200) that the MEC server 300 is associated with. generate. In detail, first, in the attach procedure of the UE 200, the key K ASME is generated using the authentication information of the UE 200. Then, based on the key K ASME generated using the authentication information of the UE 200, a key K MEC Application-MME required for communication between the MEC application and the MME 41 is generated. Here, the MME 41 is notified of the key K ASME from the HSS 42 in the attach procedure of the UE 200 (step S54 shown in FIG. 12). However, since the attach procedure of the UE 200 and the attach procedure of the MEC server 300 are individual programs, in the attach procedure of the UE 200, the key K MEC Application-MME is generated at the timing at which the key K ASME is generated, which is not ideal. . Then, the MME 41 (for example, the storage unit 420) memorizes the key K ASME beforehand. Then, the MME 41 (for example, the processing unit 430) generates the key K MEC Application-MME based on the stored key K ASME when the authentication of the MEC server 300 is successful, and generates the generated key K MEC Application - MME , notified to the MEC server 300.

有關於金鑰KMEC Application-MME的金鑰的系統圖,示於圖20。如圖20所示,基於進行過MEC伺服器300之附著程序的UE200的KASME,而生成金鑰KMEC Application-MMEA system diagram for the key of the key K MEC Application-MME is shown in FIG. As shown in FIG. 20, the key K MEC Application-MME is generated based on the K ASME of the UE 200 that has performed the attachment procedure of the MEC server 300.

(2)MEC應用程式與UE200的通訊所需之金鑰 (2) The key required for communication between the MEC application and the UE200

MEC應用程式與UE200的通訊所需之金鑰(亦即CK及IK),係隨每一UE200而使用不同的金鑰。對一個MEC伺服器300,係可能連接有複數個00。 The keys (ie, CK and IK) required for communication between the MEC application and the UE 200 use different keys with each UE 200. For a MEC server 300, a plurality of 00s may be connected.

例如,MEC應用程式與UE200的通訊所需之金鑰,係基於UE200的認證資訊(亦即UE200的IMSI及金鑰K)而被生成。詳言之,首先,在UE200的附著程序中,使用UE200的認證資訊而生成金鑰KASME。然後,基於金鑰KASME而生成金鑰KeNodeB,基於金鑰KeNodeB而生成MEC應用程式與UE200的通訊所需之CK及IK。該 CK及IK,亦總稱為金鑰KUE-MEC Application。亦即,金鑰KUE-MEC Application,係包含有CK及IK。此外,關於在同一MEC伺服器300上動作的MEC應用程式,係可在複數MEC應用程式間使用相同的金鑰KUE-MEC Application,亦可使用不同的金鑰KUE-MEC ApplicationFor example, the key required for communication between the MEC application and the UE 200 is generated based on the authentication information of the UE 200 (ie, the IMSI and the key K of the UE 200). In detail, first, in the attach procedure of the UE 200, the key K ASME is generated using the authentication information of the UE 200. Then, a key K eNodeB is generated based on the key K ASME , and CK and IK required for communication between the MEC application and the UE 200 are generated based on the key K eNodeB . The CK and IK are also collectively referred to as the key K UE-MEC Application . That is, the key K UE-MEC Application includes CK and IK. Further, regarding the operation of the MEC application on the same server MEC 300, the system may use the same key K UE-MEC Application MEC between plural applications, may use different keys K UE-MEC Application.

有關於金鑰KUE-MEC Application的金鑰的系統圖,示於圖21。如圖21所示,基於UE200的附著程序中所被生成之金鑰KASME而生成金鑰KeNodeB,基於該金鑰KeNodeB而生成金鑰KUE-MEC ApplicationA system diagram for the key of the key K UE-MEC Application is shown in FIG. 21, based on the K ASME key to be generated in the attach procedure UE200 key K eNodeB generates, based on the generated key K eNodeB key K UE-MEC Application.

以上說明的,MEC應用程式與MME41之間的金鑰,及MEC應用程式與MME41之間的金鑰的特徵,示於下記的表3。 As described above, the key between the MEC application and the MME 41, and the key of the key between the MEC application and the MME 41 are shown in Table 3 below.

<<6.第4實施形態>> <<6. Fourth Embodiment>>

本實施形態,係認證MEC伺服器300所關連之其他實體的形態。 This embodiment is a form of authentication of other entities to which the MEC server 300 is associated.

<6.1.技術課題> <6.1. Technical issues>

想定有對MEC伺服器,提供動畫或應用程式等之內容的事業者存在。然後,想定有用來對MEC伺服器提供內容所需之內容伺服器存在。此種內容伺服器,以下亦稱為OTT(Over the top)伺服器。 I think there is a business that provides content such as animations or applications to the MEC server. Then, there is a content server that is needed to provide content to the MEC server. Such a content server, hereinafter also referred to as an OTT (Over the top) server.

OTT伺服器的配置例,示於圖22及圖23。在圖22中所示的例子中,OTT伺服器500係被配置在EPC之內部。在圖23中所示的例子中,OTT伺服器500係被配置在EPC之外部。OTT伺服器500被配置在EPC之外部的情況下,OTT伺服器500係可直接和MEC伺服器300連接,也可經由P-GW44及S-GW43等而被連接。 An example of the arrangement of the OTT server is shown in FIGS. 22 and 23. In the example shown in FIG. 22, the OTT server 500 is configured inside the EPC. In the example shown in FIG. 23, the OTT server 500 is configured outside of the EPC. When the OTT server 500 is disposed outside the EPC, the OTT server 500 may be directly connected to the MEC server 300 or may be connected via the P-GW 44, the S-GW 43, or the like.

無論採用哪種配置例,都和MEC伺服器300同樣地,確認OTT伺服器500的信賴性,較為理想。 Regardless of the configuration example, it is preferable to confirm the reliability of the OTT server 500 in the same manner as the MEC server 300.

於是,在本實施形態中,係提供用來認證OTT伺服器500所需之程序。 Thus, in the present embodiment, the program required to authenticate the OTT server 500 is provided.

<6.2.OTT伺服器的構成例> <6.2. Configuration example of OTT server>

接下來,參照圖24,說明本揭露的一實施形態所述之OTT伺服器500的構成之一例。圖24係本揭露之一實施形態所述之OTT伺服器500之構成之一例的區塊圖。參照圖24,OTT伺服器500係具備:通訊部510、記憶部520、及處理部530。 Next, an example of the configuration of the OTT server 500 according to the embodiment of the present disclosure will be described with reference to FIG. Fig. 24 is a block diagram showing an example of the configuration of the OTT server 500 according to the embodiment of the present disclosure. Referring to Fig. 24, OTT server 500 includes a communication unit 510, a storage unit 520, and a processing unit 530.

(1)通訊部510 (1) Communication Department 510

通訊部510,係與其他裝置之間進行通訊所需之介面。例如,通訊部510,係與MEC伺服器300之間直接地、或經由P-GW44及S-GW43等而間接地進行通訊。 The communication unit 510 is an interface required for communication with other devices. For example, the communication unit 510 communicates with the MEC server 300 directly or indirectly via the P-GW 44, the S-GW 43, and the like.

(2)記憶部520 (2) Memory unit 520

記憶部520,係將OTT伺服器500之動作所需之程式及各種資料,予以暫時或永久性記憶。例如,記憶部520,係可將被提供給MEC伺服器300的多樣內容、及應用程式,加以記憶。 The memory unit 520 temporarily or permanently memorizes the programs and various materials required for the operation of the OTT server 500. For example, the storage unit 520 can memorize various contents and applications provided to the MEC server 300.

(3)處理部530 (3) Processing unit 530

處理部530,係提供OTT伺服器500的各種機能。處理部530係含有認證處理部531及通訊處理部533。此外,處理部530,係亦可還含有這些構成要素以外之其他構成要素。亦即,處理部530係還可進行這些構成要素之動作以外之動作。 The processing unit 530 provides various functions of the OTT server 500. The processing unit 530 includes an authentication processing unit 531 and a communication processing unit 533. Further, the processing unit 530 may further include other components other than these components. In other words, the processing unit 530 can perform operations other than the operations of these components.

認證處理部531及通訊處理部533,係具有和上述的認證處理部331及通訊處理部333相同之機能。此外,在圖24中雖然省略,但處理部530係亦可含有,向MEC伺服器300提供內容的內容處理部。 The authentication processing unit 531 and the communication processing unit 533 have the same functions as the above-described authentication processing unit 331 and communication processing unit 333. Although not shown in FIG. 24, the processing unit 530 may include a content processing unit that provides content to the MEC server 300.

<6.3.技術特徵> <6.3. Technical Features>

以下依序說明,所被想定的各種案例中的技術特徵。 The following is a description of the technical features in the various cases that are contemplated.

(1)第1案例 (1) The first case

本案例,係OTT伺服器500是被配置在EPC之內部,且OTT伺服器500是被視為具有信賴性之實體的案例。在本案例中,不需要再次確認OTT伺服器500的信賴性所需之認證程序。當然,即使在此情況下,仍亦可進行用來確認OTT伺服器500的信賴性所需之認證程序。 In this case, the OTT server 500 is configured inside the EPC, and the OTT server 500 is an example of an entity that is considered to have reliability. In this case, there is no need to reconfirm the authentication procedure required for the reliability of the OTT server 500. Of course, even in this case, the authentication procedure required to confirm the reliability of the OTT server 500 can be performed.

(2)第2案例 (2) Case 2

本案例,係OTT伺服器500是被配置在EPC之外部、或OTT伺服器500是被配置在EPC之內部,但被視為不具信賴性之實體的案例。此情況下,OTT伺服器500,係亦可藉由與第1實施形態中的MEC伺服器300相同的認證程序而被認證。 In this case, the OTT server 500 is configured outside the EPC, or the OTT server 500 is configured as an entity that is not trusted in the EPC. In this case, the OTT server 500 can also be authenticated by the same authentication procedure as the MEC server 300 in the first embodiment.

OTT伺服器500,係具有與第1實施形態所述之MEC伺服器300相同的技術特徵。MME41及HSS42等之各實體,也是認證之對象是從MEC伺服器300被變更成OTT伺服器500,除此以外,具有和第1實施形態相同的技術特徵。亦即,本案例的技術特徵係相當於,在第1實施形態的相關說明之中,把MEC伺服器300替換成OTT伺服器500。 The OTT server 500 has the same technical features as the MEC server 300 described in the first embodiment. Each of the entities such as the MME 41 and the HSS 42 has the same technical features as those of the first embodiment, except that the authentication target is changed from the MEC server 300 to the OTT server 500. That is, the technical features of this case correspond to the replacement of the MEC server 300 with the OTT server 500 in the related description of the first embodiment.

例如,HSS42(例如記憶部420),係將OTT伺服器500所對應之認證資訊,加以記憶。在本案例中,OTT伺服器500所對應之認證資訊,係係為OTT伺服器500的認證資訊。具體而言,OTT伺服器500的認證資訊 係含有:用來特定OTT伺服器500之號碼(亦即IMSI)及OTT伺服器500所固有之金鑰資訊(亦即金鑰K)。另一方面,OTT伺服器500(例如記憶部520),也將OTT伺服器500的認證資訊,加以記憶。然後,OTT伺服器500(例如認證處理部531),係使用OTT伺服器500的認證資訊來進行對網路之認證。OTT伺服器500(例如通訊處理部533),係與已被認證之網路進行通訊。具體而言,OTT伺服器500,係經由已被認證之網路(例如該當網路內的eNodeB100),而向MEC伺服器300提供內容。如此一來,OTT伺服器500,係被認證成為具有信賴性之實體,而可連接至網路。 For example, the HSS 42 (for example, the storage unit 420) memorizes the authentication information corresponding to the OTT server 500. In this case, the authentication information corresponding to the OTT server 500 is the authentication information of the OTT server 500. Specifically, the authentication information of the OTT server 500 It contains: the number (that is, IMSI) used to specify the OTT server 500 and the key information (ie, the key K) inherent to the OTT server 500. On the other hand, the OTT server 500 (for example, the storage unit 520) also memorizes the authentication information of the OTT server 500. Then, the OTT server 500 (for example, the authentication processing unit 531) performs authentication of the network using the authentication information of the OTT server 500. The OTT server 500 (for example, the communication processing unit 533) communicates with the authenticated network. Specifically, the OTT server 500 provides content to the MEC server 300 via an authenticated network (e.g., the eNodeB 100 within the network). In this way, the OTT server 500 is authenticated as a trusted entity and can be connected to the network.

OTT伺服器500的認證程序,係認證的主體是從MEC伺服器300被變更成OTT伺服器500以外,其餘是和參照圖18而上記說明的相同。以下,參照圖25來說明本案例所述之認證程序。 The authentication procedure of the OTT server 500 is the same as that described above with reference to FIG. 18 except that the main body of the authentication is changed from the MEC server 300 to the OTT server 500. Hereinafter, the authentication procedure described in this case will be described with reference to FIG. 25.

圖25係本實施形態所述之系統1中所被執行的認證程序之流程之一例的程序圖。如圖25所示,OTT伺服器500係記憶著IMSI及金鑰K。又,HSS42係記憶著OTT伺服器500的IMSI所對應之金鑰K。此外,OTT伺服器500,係經由eNodeB100而與MME41通訊。 Fig. 25 is a flowchart showing an example of a flow of an authentication program executed in the system 1 according to the embodiment. As shown in FIG. 25, the OTT server 500 memorizes the IMSI and the key K. Further, the HSS 42 stores the key K corresponding to the IMSI of the OTT server 500. Further, the OTT server 500 communicates with the MME 41 via the eNodeB 100.

首先,OTT伺服器500係將IMSI連同附著請求,發送至MME41(步驟S302)。接下來,MME41係將已接收之IMSI連同認證請求,發送至HSS42(步驟S304)。接著,HSS42,係產生亂數RAND,將亂數RAND、已接 收IMSI、及與該當IMSI建立對應而記憶的金鑰K,輸入至認證機能,獲得被期待之回應RESEXPECTED及金鑰KASME(步驟S306)。接下來,HSS42,作為認證回應,而將金鑰KASME、被期待之回應RESEXPECTED及亂數RAND,發送至MME41(步驟S308)。接著,MME41係將亂數RAND,發送至OTT伺服器500(步驟S310)。接下來,OTT伺服器500,係將已接收之亂數RAND、所記憶之IMSI及金鑰K,輸入至認證機能,獲得回應RES及金鑰KASME(步驟S312)。接著,OTT伺服器500係將回應RES,發送至MME41(步驟S314)。然後,MME41係將被期待之回應RESEXPECTED與實際之回應RES進行比較以認證OTT伺服器500(步驟S316)。詳言之,MME41,係在被期待之回應RESEXPECTED與實際之回應RES是一致的情況下,判斷為OTT伺服器500有信賴性(亦即認證成功)。另一方面,MME41,係在被期待之回應RESEXPECTED與實際之回應RES是不一致的情況下,判斷為OTT伺服器500沒有信賴性(亦即認證失敗)。 First, the OTT server 500 transmits the IMSI together with the attach request to the MME 41 (step S302). Next, the MME 41 transmits the received IMSI together with the authentication request to the HSS 42 (step S304). Next, the HSS 42 generates a random number RAND, and inputs the random number RAND, the received IMSI, and the key K memorized in association with the IMSI to the authentication function, and obtains the expected response RES EXPECTED and the key K ASME ( Step S306). Next, the HSS 42 transmits the key K ASME , the expected response RES EXPECTED, and the random number RAND to the MME 41 as an authentication response (step S308). Next, the MME 41 transmits the random number RAND to the OTT server 500 (step S310). Next, the OTT server 500 inputs the received random number RAND, the memorized IMSI, and the key K to the authentication function, and obtains the response RES and the key K ASME (step S312). Next, the OTT server 500 transmits a response RES to the MME 41 (step S314). Then, the MME 41 compares the expected response RES EXPECTED with the actual response RES to authenticate the OTT server 500 (step S316). In detail, the MME 41 determines that the OTT server 500 is reliable (that is, the authentication is successful) in the case where the expected response RES EXPECTED is consistent with the actual response RES. On the other hand, in the case where the expected response RES EXPECTED is inconsistent with the actual response RES, the MME 41 determines that the OTT server 500 has no reliability (that is, authentication failure).

作為本案例之變形例,考慮OTT伺服器500是與MME41直接連接的案例。此情況的OTT伺服器500之配置例,示於圖26。在圖26中所示的例子中,OTT伺服器500係被配置在EPC之內部,且被直接連接至MME41。此情況的認證程序,係OTT伺服器500與MME41之通訊係不經由eNodeB100,除此以外,都和參照圖25而上記說明的相同。以下,參照圖27來說明本案 例所述之認證程序。 As a modification of this case, a case in which the OTT server 500 is directly connected to the MME 41 is considered. An example of the arrangement of the OTT server 500 in this case is shown in FIG. In the example shown in FIG. 26, the OTT server 500 is configured inside the EPC and is directly connected to the MME 41. In the authentication procedure in this case, the communication between the OTT server 500 and the MME 41 does not pass through the eNodeB 100, and the same as described above with reference to FIG. 25. Hereinafter, the present case will be described with reference to FIG. The certification procedure described in the example.

圖27係本實施形態所述之系統1中所被執行的認證程序之流程之一例的程序圖。如圖27所示,OTT伺服器500係記憶著IMSI及金鑰K。又,HSS42係記憶著OTT伺服器500的IMSI所對應之金鑰K。此外,OTT伺服器500,係不經由eNodeB100就與MME41通訊。 Fig. 27 is a flowchart showing an example of the flow of the authentication program executed in the system 1 according to the embodiment. As shown in FIG. 27, the OTT server 500 memorizes the IMSI and the key K. Further, the HSS 42 stores the key K corresponding to the IMSI of the OTT server 500. Further, the OTT server 500 communicates with the MME 41 without going through the eNodeB 100.

首先,OTT伺服器500係將IMSI連同附著請求,發送至MME41(步驟S402)。接下來,MME41係將已接收之IMSI連同認證請求,發送至HSS42(步驟S404)。接著,HSS42,係產生亂數RAND,將亂數RAND、已接收IMSI、及與該當IMSI建立對應而記憶的金鑰K,輸入至認證機能,獲得被期待之回應RESEXPECTED及金鑰KASME(步驟S406)。接下來,HSS42,作為認證回應,而將金鑰KASME、被期待之回應RESEXPECTED及亂數RAND,發送至MME41(步驟S408)。接著,MME41係將亂數RAND,發送至OTT伺服器500(步驟S410)。接下來,OTT伺服器500,係將已接收之亂數RAND、所記憶之IMSI及金鑰K,輸入至認證機能,獲得回應RES及金鑰KASME(步驟S412)。接著,OTT伺服器500係將回應RES,發送至MME41(步驟S414)。然後,MME41係將被期待之回應RESEXPECTED與實際之回應RES進行比較以認證OTT伺服器500(步驟S416)。詳言之,MME41,係在被期待之回應RESEXPECTED與實際之回應RES是一致的情況下,判斷為OTT伺服器500有信賴性(亦即認證成功)。 另一方面,MME41,係在被期待之回應RESEXPECTED與實際之回應RES是不一致的情況下,判斷為OTT伺服器500沒有信賴性(亦即認證失敗)。 First, the OTT server 500 transmits the IMSI together with the attach request to the MME 41 (step S402). Next, the MME 41 transmits the received IMSI together with the authentication request to the HSS 42 (step S404). Next, the HSS 42 generates a random number RAND, and inputs the random number RAND, the received IMSI, and the key K memorized in association with the IMSI to the authentication function, and obtains the expected response RES EXPECTED and the key K ASME ( Step S406). Next, the HSS 42 transmits the key K ASME , the expected response RES EXPECTED, and the random number RAND to the MME 41 as an authentication response (step S408). Next, the MME 41 transmits the random number RAND to the OTT server 500 (step S410). Next, the OTT server 500 inputs the received random number RAND, the memorized IMSI, and the key K to the authentication function, and obtains the response RES and the key K ASME (step S412). Next, the OTT server 500 transmits a response RES to the MME 41 (step S414). Then, the MME 41 compares the expected response RES EXPECTED with the actual response RES to authenticate the OTT server 500 (step S416). In detail, the MME 41 determines that the OTT server 500 is reliable (that is, the authentication is successful) in the case where the expected response RES EXPECTED is consistent with the actual response RES. On the other hand, in the case where the expected response RES EXPECTED is inconsistent with the actual response RES, the MME 41 determines that the OTT server 500 has no reliability (that is, authentication failure).

在本案例及上記變形例中,OTT伺服器500與MME41的通訊所需之金鑰、及OTT伺服器500與MEC應用程式的通訊所需之金鑰,係基於OTT伺服器500的認證資訊而被生成。詳言之,首先,在OTT伺服器500的附著程序中,使用OTT伺服器500的認證資訊而生成金鑰KASME。然後,基於該金鑰KASME,OTT伺服器500與MME41的通訊所需之金鑰、及OTT伺服器500與MEC應用程式的通訊所需之金鑰係被生成。前者之金鑰亦稱為金鑰KOTT Server-MME,後者之金鑰亦稱為金鑰KOTT Server-MEC Application。金鑰KOTT Server-MME,係包含有CK及IK。同樣地,金鑰KOTT Server-MEC Application,係包含有CK及IK。這些金鑰的系統圖,示於圖28。如圖28所示,基於OTT伺服器500的附著程序中所被生成的KASME,而生成金鑰KOTT Server-MME及金鑰KOTT Server-MEC ApplicationIn this case and the above variant, the key required for communication between the OTT server 500 and the MME 41, and the key required for communication between the OTT server 500 and the MEC application are based on the authentication information of the OTT server 500. Was generated. In detail, first, in the attach procedure of the OTT server 500, the key K ASME is generated using the authentication information of the OTT server 500. Then, based on the key K ASME , the key required for communication between the OTT server 500 and the MME 41, and the key required for communication between the OTT server 500 and the MEC application are generated. The former key is also known as the key K OTT Server-MME , and the latter key is also called the key K OTT Server-MEC Application . The key K OTT Server-MME contains CK and IK. Similarly, the key K OTT Server-MEC Application contains CK and IK. A systematic diagram of these keys is shown in Figure 28. As shown in FIG. 28, the key K OTT Server-MME and the key K OTT Server-MEC Application are generated based on the K ASME generated in the attach procedure of the OTT server 500.

(3)第3案例 (3) Case 3

本案例,係和上記第2實施形態同樣地,OTT伺服器500之認證是由UE200來代理進行的案例。 In the case of the second embodiment, the authentication of the OTT server 500 is performed by the UE 200.

OTT伺服器500,係具有與第2實施形態所述之MEC伺服器300相同的技術特徵。UE200、MME41及HSS42等之各實體,也是認證之對象是從MEC伺服器 300被變更成OTT伺服器500,除此以外,具有和第2實施形態相同的技術特徵。亦即,本案例的技術特徵係相當於,在第2實施形態的相關說明之中,把MEC伺服器300替換成OTT伺服器500。 The OTT server 500 has the same technical features as the MEC server 300 described in the second embodiment. The entities such as UE200, MME41, and HSS42 are also authenticated objects from the MEC server. 300 is changed to the OTT server 500, and has the same technical features as the second embodiment. That is, the technical features of this case correspond to the replacement of the MEC server 300 with the OTT server 500 in the related description of the second embodiment.

例如,HSS42(例如記憶部420),係將OTT伺服器500所對應之認證資訊,加以記憶。在本案例中,OTT伺服器500所對應之認證資訊,係為OTT伺服器500所被建立對應之UE200的認證資訊。UE200(例如認證處理部241),係代理OTT伺服器500來進行認證。然後,OTT伺服器500(例如通訊處理部533),係使用基於對對網路之認證已經成功的、該當OTT伺服器500所被建立對應之UE200所做的請求(亦即附著請求)而被發行的資訊,來與網路進行通訊。此外,第2實施形態中的MEC伺服器ID所對應之,OTT伺服器500所固有之識別資訊,以下亦稱為OTT伺服器ID。又,基於第2實施形態中的MEC伺服器暫時ID所對應之,對網路之認證已成功的UE200所做的請求而被發行的資訊,以下亦稱為OTT伺服器暫時ID。 For example, the HSS 42 (for example, the storage unit 420) memorizes the authentication information corresponding to the OTT server 500. In this case, the authentication information corresponding to the OTT server 500 is the authentication information of the UE 200 to which the OTT server 500 is established. The UE 200 (for example, the authentication processing unit 241) performs proxy authentication by the proxy OTT server 500. Then, the OTT server 500 (for example, the communication processing unit 533) is used based on a request (i.e., an attach request) made by the UE 200 to which the OTT server 500 is associated, based on the authentication of the network. Information published to communicate with the network. Further, the identification information unique to the OTT server 500 corresponding to the MEC server ID in the second embodiment is hereinafter referred to as an OTT server ID. Further, based on the MEC server temporary ID in the second embodiment, the information to be issued for the request made by the UE 200 whose network authentication has succeeded is also referred to as an OTT server temporary ID.

以下,參照圖29,說明由UE200來代理OTT伺服器500而進行認證時的認證程序的流程之一例。 Hereinafter, an example of the flow of the authentication procedure when the UE 200 is used to proxy the OTT server 500 and perform authentication will be described with reference to FIG.

圖29係本實施形態所述之系統1中所被執行的認證程序之流程之一例的程序圖。此外,UE200係經由eNodeB100而與MME41通訊。 Fig. 29 is a flowchart showing an example of the flow of the authentication program executed in the system 1 according to the embodiment. Further, the UE 200 communicates with the MME 41 via the eNodeB 100.

如圖29所示,首先,UE200係進行附著程序 (步驟S502)。於該附著程序中,參照圖12而上記說明的認證程序會被進行。接下來,UE200係將OTT伺服器500的附著請求,發送至MME41(步驟S504)。該附著請求,係含有認證對象之OTT伺服器500所固有的識別資訊也就是OTT伺服器ID。接著,MME41,係將已接收之OTT伺服器500的附著請求,轉送至HSS42(步驟S506)。接下來,HSS42係將OTT伺服器500的附著回應,返送至MME41(步驟S508)。此時,HSS42係確認,附著請求的送訊來源之UE200的訂閱者資訊中,是否被登錄有該當OTT伺服器500的OTT伺服器ID。以下,針對有被登錄的情況來說明。亦即,附著回應中,含有OTT伺服器暫時ID。接著,MME41係將已接收之OTT伺服器500的附著回應,轉送至eNodeB100(步驟S510),eNodeB100係將已接收之OTT伺服器500的附著回應,轉送至OTT伺服器500(步驟S512)。然後,OTT伺服器500,係使用附著回應中所含之OTT伺服器暫時ID,而附著至網路(步驟S514)。 As shown in FIG. 29, first, the UE 200 performs an attach procedure. (Step S502). In this attachment procedure, the authentication procedure described above with reference to Fig. 12 is performed. Next, the UE 200 transmits an attach request of the OTT server 500 to the MME 41 (step S504). The attachment request is an identification information inherent to the OTT server 500 including the authentication target, that is, an OTT server ID. Next, the MME 41 transfers the attached request of the received OTT server 500 to the HSS 42 (step S506). Next, the HSS 42 returns the attachment response of the OTT server 500 to the MME 41 (step S508). At this time, the HSS 42 confirms whether or not the OTT server ID of the OTT server 500 is registered in the subscriber information of the UE 200 to which the requesting communication source is attached. Hereinafter, the case where there is a registration will be described. That is, the attachment response contains the OTT server temporary ID. Next, the MME 41 transfers the attached response of the received OTT server 500 to the eNodeB 100 (step S510), and the eNodeB 100 forwards the attached response of the received OTT server 500 to the OTT server 500 (step S512). Then, the OTT server 500 attaches to the network using the OTT server temporary ID included in the attach response (step S514).

在本案例中,OTT伺服器500與MME41的通訊所需之金鑰、及OTT伺服器500與MEC應用程式的通訊所需之金鑰,係基於UE200的認證資訊而被生成。詳言之,首先,在UE200的附著程序中,使用UE200的認證資訊而生成金鑰KASME。然後,基於該金鑰KASME,OTT伺服器500與MME41的通訊所需之金鑰KOTT Server-MME、及OTT伺服器500與MEC應用程式的通訊所需之金鑰 KOTT Server-MEC Application,係被生成。這些金鑰的系統圖,示於圖30。如圖30所示,基於進行過OTT伺服器500之附著程序的UE200的KASME,而生成金鑰KOTT Server-MME及金鑰KOTT Server-MEC ApplicationIn this case, the key required for communication between the OTT server 500 and the MME 41, and the key required for communication between the OTT server 500 and the MEC application are generated based on the authentication information of the UE 200. In detail, first, in the attach procedure of the UE 200, the key K ASME is generated using the authentication information of the UE 200. Then, based on the key K ASME , the key K OTT Server-MME required for communication between the OTT server 500 and the MME 41, and the key required for communication between the OTT server 500 and the MEC application K OTT Server-MEC Application , is generated. A systematic diagram of these keys is shown in Figure 30. As shown in FIG. 30, the key K OTT Server-MME and the key K OTT Server-MEC Application are generated based on the K ASME of the UE 200 that has performed the attach procedure of the OTT server 500.

(4)第4案例 (4) Case 4

本案例係為,由OTT伺服器500,來代理進行MEC伺服器300之認證的案例。OTT伺服器500,係具有與第2實施形態所述之UE200相同的技術特徵。關於MEC伺服器300、MME41及HSS42等各實體也是,使用了UE200之認證資訊的認證程序係被變更成使用了OTT伺服器500之認證資訊的認證程序,除此以外,則是具有和第2實施形態相同的技術特徵。亦即,本案例的技術特徵係相當於,在第2實施形態的相關之上記說明之中,把UE200替換成OTT伺服器500。 This case is an example in which the OTT server 500 is used to perform authentication of the MEC server 300. The OTT server 500 has the same technical features as the UE 200 described in the second embodiment. For each entity such as the MEC server 300, the MME 41, and the HSS 42, the authentication program using the authentication information of the UE 200 is changed to the authentication program using the authentication information of the OTT server 500, and the other is the second and the second. The same technical features are implemented. That is, the technical features of this case correspond to the description of the second embodiment, and the UE 200 is replaced with the OTT server 500.

例如,HSS42(例如記憶部420),係將MEC伺服器300所對應之認證資訊,加以記憶。在本案例中,MEC伺服器300所對應之認證資訊,係為MEC伺服器300所被建立對應之OTT伺服器500的認證資訊。具體而言,HSS42(例如記憶部420),係與OTT伺服器500建立對應而記憶MEC伺服器300的識別資訊、亦即MEC伺服器ID。例如,HSS42,作為OTT伺服器500的訂閱者資訊,是將與OTT伺服器500建立對應之MEC伺服器300的MEC伺服器ID,加以記憶。 For example, the HSS 42 (for example, the storage unit 420) memorizes the authentication information corresponding to the MEC server 300. In this case, the authentication information corresponding to the MEC server 300 is the authentication information of the OTT server 500 to which the MEC server 300 is established. Specifically, the HSS 42 (for example, the storage unit 420) associates with the OTT server 500 to memorize the identification information of the MEC server 300, that is, the MEC server ID. For example, the HSS 42, as the subscriber information of the OTT server 500, memorizes the MEC server ID of the MEC server 300 associated with the OTT server 500.

然後,OTT伺服器500(例如認證處理部531),係代理MEC伺服器300而進行認證。MEC伺服器300(例如通訊處理部333),係使用基於對對網路之認證已經成功的、該當MEC伺服器300所被建立對應之OTT伺服器500所做的請求(亦即附著請求)而被發行的資訊(亦即MEC伺服器暫時ID),來與網路進行通訊。系統1,係基於該已被發行之資訊來識別MEC伺服器300是否已經認證完畢,因此可確保安全性。 Then, the OTT server 500 (for example, the authentication processing unit 531) performs authentication by proxying the MEC server 300. The MEC server 300 (for example, the communication processing unit 333) uses a request (that is, an attach request) based on the OTT server 500 to which the MEC server 300 is associated, based on the authentication of the network. The published information (ie, the MEC server temporary ID) is used to communicate with the network. The system 1 identifies whether the MEC server 300 has been authenticated based on the information that has been issued, thereby ensuring security.

此外,如參照圖29所上記說明,OTT伺服器500本身不具有認證資訊,由UE200來代理認證的情形,也被考慮。此情況下,MEC伺服器300對網路之認證中所被使用的認證資訊,係亦可為,與MEC伺服器300建立對應的UE200,且為代理了OTT伺服器500之認證的UE200的認證資訊。此情況下,HSS42(例如記憶部420),作為UE200的訂閱者識別資訊,係將例如OTT伺服器ID及MEC伺服器ID予以記憶。 Further, as described with reference to FIG. 29, the OTT server 500 itself does not have authentication information, and the case where the UE 200 authenticates the authentication is also considered. In this case, the authentication information used by the MEC server 300 for authentication of the network may be the UE 200 that is associated with the MEC server 300 and authenticated by the UE 200 that authenticates the OTT server 500. News. In this case, the HSS 42 (for example, the storage unit 420), as the subscriber identification information of the UE 200, memorizes, for example, the OTT server ID and the MEC server ID.

以下,參照圖31,說明由OTT伺服器500來代理MEC伺服器300而進行認證時的認證程序的流程之一例。 Hereinafter, an example of the flow of the authentication procedure when the OTT server 500 is used to proxy the MEC server 300 and perform authentication will be described with reference to FIG.

圖31係本實施形態所述之系統1中所被執行的認證程序之流程之一例的程序圖。此外,OTT伺服器500,係經由eNodeB100而與MME41通訊。 Fig. 31 is a flowchart showing an example of the flow of the authentication program executed in the system 1 according to the embodiment. Further, the OTT server 500 communicates with the MME 41 via the eNodeB 100.

如圖31所示,首先,OTT伺服器500係進行附著程序(步驟S602)。於該附著程序中,參照圖27或圖 29而上記說明的認證程序會被進行,OTT伺服器500會被認證。接下來,OTT伺服器500係將MEC伺服器300的附著請求,發送至MME41(步驟S604)。該附著請求,係含有認證對象之MEC伺服器300的MEC伺服器ID。接著,MME41,係將已接收之MEC伺服器300的附著請求,轉送至HSS42(步驟S606)。接下來,HSS42係將MEC伺服器300的附著回應,返送至MME41(步驟S608)。此時,HSS42係確認,附著請求的送訊來源之OTT伺服器500或代理該當OTT伺服器500之認證的UE200的訂閱者資訊中,是否被登錄有該當MEC伺服器300的MEC伺服器ID。以下,針對有被登錄的情況來說明。亦即,附著回應中,含有MEC伺服器暫時ID。接著,MME41係將已接收之MEC伺服器300的附著回應,轉送至eNodeB100(步驟S610),eNodeB100係將已接收之附著回應,轉送至MEC伺服器300(步驟S612)。然後,MEC伺服器300,係使用附著回應中所含之MEC伺服器暫時ID,而附著至網路(步驟S614)。 As shown in FIG. 31, first, the OTT server 500 performs an attach procedure (step S602). In the attaching procedure, refer to FIG. 27 or The authentication procedure described above will be performed and the OTT server 500 will be authenticated. Next, the OTT server 500 transmits an attach request of the MEC server 300 to the MME 41 (step S604). This attachment request is the MEC server ID of the MEC server 300 including the authentication target. Next, the MME 41 transfers the attached request of the received MEC server 300 to the HSS 42 (step S606). Next, the HSS 42 returns the attachment response of the MEC server 300 to the MME 41 (step S608). At this time, the HSS 42 confirms whether or not the OTT server 500 of the source of the request for the attachment or the subscriber information of the UE 200 that authenticates the OTT server 500 is registered with the MEC server ID of the MEC server 300. Hereinafter, the case where there is a registration will be described. That is, the attachment response contains the temporary ID of the MEC server. Next, the MME 41 transfers the attached response of the received MEC server 300 to the eNodeB 100 (step S610), and the eNodeB 100 transfers the received attach response to the MEC server 300 (step S612). Then, the MEC server 300 attaches to the network using the MEC server temporary ID included in the attach response (step S614).

<<7.應用例>> <<7. Application examples>>

本揭露所述之技術,係可應用於各種產品。例如,MEC伺服器300、MME41、HSS42、或OTT伺服器500,係可以塔式伺服器、機架伺服器、或刀鋒伺服器等之任一種類之伺服器的方式而被實現。又,MEC伺服器300、MME41、HSS42、或OTT伺服器500的至少一部分構成 要素,係亦可在被搭載於伺服器的模組(例如以1個晶片所構成的積體電路模組、或被插入至刀鋒伺服器之插槽的插卡或是刀板)中被實現。 The technology described in the present disclosure can be applied to various products. For example, the MEC server 300, the MME 41, the HSS 42, or the OTT server 500 can be implemented as any type of server such as a tower server, a rack server, or a blade server. Further, at least a part of the MEC server 300, the MME 41, the HSS 42, or the OTT server 500 constitutes The element can also be implemented in a module mounted on a server (for example, an integrated circuit module composed of one wafer or a card inserted into a slot of a blade server or a blade). .

又,例如,終端裝置200係亦可被實現成為智慧型手機、平板PC(Personal Computer)、筆記型PC、攜帶型遊戲終端、攜帶型/鑰匙型的行動路由器或是數位相機等之行動終端、或行車導航裝置等之車載終端。又,終端裝置200係亦可被實現成為進行M2M(Machine To Machine)通訊的終端(亦稱MTC(Machine Type Communication)終端)。甚至,終端裝置200的至少一部分之構成要素,係亦可於被搭載於這些終端的模組(例如以1個晶片所構成的積體電路模組)中被實現。 Further, for example, the terminal device 200 can be realized as a mobile terminal, a tablet PC (Personal Computer), a notebook PC, a portable game terminal, a portable/key type mobile router, or a mobile terminal such as a digital camera. Or an in-vehicle terminal such as a driving navigation device. Further, the terminal device 200 may be implemented as a terminal (also referred to as an MTC (Machine Type Communication) terminal) that performs M2M (Machine To Machine) communication. Further, at least a part of the components of the terminal device 200 can be realized by a module (for example, an integrated circuit module including one wafer) mounted on the terminals.

<7.1.伺服器的相關應用例> <7.1. Application examples of the server>

圖32係可適用本揭露所述之技術的伺服器700之概略構成之一例的區塊圖。伺服器700係具備:處理器701、記憶體702、儲存體703、網路介面704及匯流排706。 32 is a block diagram showing an example of a schematic configuration of a server 700 to which the technique described in the present disclosure is applicable. The server 700 includes a processor 701, a memory 702, a storage 703, a network interface 704, and a bus 706.

處理器701係可為例如CPU(Central Processing Unit)或DSP(Digital Signal Processor),控制伺服器700的各種機能。記憶體702係包含RAM(Random Access Memory)及ROM(Read Only Memory),記憶著被處理器701所執行之程式及資料。儲存體703係可含有半導體記憶體或硬碟等之記憶媒體。 The processor 701 can be, for example, a CPU (Central Processing Unit) or a DSP (Digital Signal Processor), and controls various functions of the server 700. The memory 702 includes a RAM (Random Access Memory) and a ROM (Read Only Memory), and stores programs and data executed by the processor 701. The storage medium 703 may include a memory medium such as a semiconductor memory or a hard disk.

網路介面704係為,用來將伺服器700連接至有線通訊網路705所需的有線通訊介面。有線通訊網路705係可為EPC(Evolved Packet Core)等之核心網路,或可為網際網路等之PDN(Packet Data Network)。 The network interface 704 is the wired communication interface required to connect the server 700 to the wired communication network 705. The wired communication network 705 can be a core network such as EPC (Evolved Packet Core), or can be a PDN (Packet Data Network) such as the Internet.

匯流排706係將處理器701、記憶體702、儲存體703及網路介面704彼此連接。匯流排706係亦可含有速度不同的2個以上之匯流排(例如高速匯流排及低速匯流排)。 The bus 706 connects the processor 701, the memory 702, the storage 703, and the network interface 704 to each other. The busbar 706 system may also include two or more busbars having different speeds (for example, a high speed bus bar and a low speed bus bar).

於圖32所示的伺服器700中,參照圖16所說明的MEC伺服器300中所含之1個以上之構成要素(認證處理部331及/或通訊處理部333),係亦可被實作於處理器701中。又,於伺服器700中,參照圖17所說明的MME41或HSS42中所含之1個以上之構成要素(處理部430),係亦可被實作於處理器701中。又,於伺服器700中,參照圖24所說明的OTT伺服器500中所含之1個以上之構成要素(認證處理部531及/或通訊處理部533),係亦可被實作於處理器701中。作為一例,亦可將用來使處理器運作成為上記1個以上之構成要素所需的程式(換言之,用來令處理器執行上記1個以上之構成要素之動作所需的程式)安裝至伺服器700,由處理器701執行該當程式。作為其他例子,伺服器700係亦可搭載含有處理器701及記憶體702的模組,於該當模組中實作上記1個以上之構成要素。此情況下,上記模組係亦可將用來使處理器運作成為上記1個以上之構成要素所需的程式記憶在記 憶體702,藉由處理器701來執行該當程式。如以上所述,亦可以用具備有上記1個以上之構成要素之裝置的方式來提供伺服器700或上記模組,提供用來使處理器運作成為上記1個以上之構成要素所需的上記程式。又,亦可提供記錄著上記程式的可讀取之記錄媒體。 In the server 700 shown in FIG. 32, one or more components (the authentication processing unit 331 and/or the communication processing unit 333) included in the MEC server 300 described with reference to FIG. 16 may be implemented. It is made in the processor 701. Further, in the server 700, one or more constituent elements (processing unit 430) included in the MME 41 or the HSS 42 described with reference to FIG. 17 may be implemented in the processor 701. Further, in the server 700, one or more components (the authentication processing unit 531 and/or the communication processing unit 533) included in the OTT server 500 described with reference to FIG. 24 may be implemented for processing. In 701. As an example, a program necessary for causing the processor to operate as one or more components (in other words, a program necessary for the processor to execute one or more components) may be mounted to the servo. The program 700 is executed by the processor 701. As another example, the server 700 may be equipped with a module including the processor 701 and the memory 702, and one or more components are actually implemented in the module. In this case, the above-mentioned module can also be used to remember the program required to make the processor operate as one or more components. The memory 702 is executed by the processor 701. As described above, the server 700 or the upper module may be provided by means of a device having one or more components as described above, and the above-mentioned memory for operating the processor to be one or more components may be provided. Program. Further, a readable recording medium on which the above program is recorded may be provided.

於圖32所示的伺服器700中,參照圖16所上記說明的通訊部310、參照圖17所上記說明的通訊部410、或參照圖24所上記說明的通訊部510,係亦可被實作於網路介面704中。又,於圖32所示的伺服器700中,參照圖16所上記說明的記憶部320、參照圖17所上記說明的記憶部420、或參照圖24所上記說明的記憶部520,係亦可被實作於記憶體702或儲存體703中。 In the server 700 shown in FIG. 32, the communication unit 310 described with reference to FIG. 16, the communication unit 410 described with reference to FIG. 17, or the communication unit 510 described with reference to FIG. 24 may be used. In the network interface 704. Further, in the server 700 shown in FIG. 32, the memory unit 320 described with reference to FIG. 16, the memory unit 420 described with reference to FIG. 17, or the memory unit 520 described with reference to FIG. 24 may be used. It is implemented in the memory 702 or the storage 703.

<7.2.終端裝置的相關應用例> <7.2. Related Application Examples of Terminal Devices>

(第1應用例) (First application example)

圖33係可適用本揭露所述之技術的智慧型手機900之概略構成之一例的區塊圖。智慧型手機900係具備:處理器901、記憶體902、儲存體903、外部連接介面904、相機906、感測器907、麥克風908、輸入裝置909、顯示裝置910、揚聲器911、無線通訊介面912、1個以上之天線開關915、1個以上之天線916、匯流排917、電池918及輔助控制器919。 Fig. 33 is a block diagram showing an example of a schematic configuration of a smartphone 900 to which the technology described in the present disclosure is applicable. The smart phone 900 includes a processor 901, a memory 902, a storage 903, an external connection interface 904, a camera 906, a sensor 907, a microphone 908, an input device 909, a display device 910, a speaker 911, and a wireless communication interface 912. One or more antenna switches 915, one or more antennas 916, a bus bar 917, a battery 918, and an auxiliary controller 919.

處理器901係可為例如CPU或SoC(System on Chip),控制智慧型手機900的應用層及其他層之機 能。記憶體902係包含RAM及ROM,記憶著被處理器901所執行之程式及資料。儲存體903係可含有半導體記憶體或硬碟等之記憶媒體。外部連接介面904係亦可為,用來將記憶卡或USB(Universal Serial Bus)裝置等外接裝置連接至智慧型手機900所需的介面。 The processor 901 can be, for example, a CPU or a SoC (System on Chip), and controls an application layer of the smart phone 900 and other layers. can. The memory 902 includes a RAM and a ROM, and stores programs and data executed by the processor 901. The storage 903 may contain a memory medium such as a semiconductor memory or a hard disk. The external connection interface 904 may also be an interface required to connect an external device such as a memory card or a USB (Universal Serial Bus) device to the smart phone 900.

相機906係具有例如CCD(Charge Coupled Device)或CMOS(Complementary Metal Oxide Semiconductor)等之攝像元件,生成攝像影像。感測器907係可含有,例如:測位感測器、陀螺儀感測器、地磁感測器及加速度感測器等之感測器群。麥克風908係將輸入至智慧型手機900的聲音,轉換成聲音訊號。輸入裝置909係含有例如:偵測對顯示裝置910之畫面上之觸控的觸控感測器、鍵墊、鍵盤、按鈕或開關等,受理來自使用者之操作或資訊輸入。顯示裝置910係具有液晶顯示器(LCD)或有機發光二極體(OLED)顯示器等之畫面,將智慧型手機900的輸出影像予以顯示。揚聲器911係將從智慧型手機900所輸出之聲音訊號,轉換成聲音。 The camera 906 has an imaging element such as a CCD (Charge Coupled Device) or a CMOS (Complementary Metal Oxide Semiconductor), and generates an imaging image. The sensor 907 can include, for example, a sensor group of a positioning sensor, a gyro sensor, a geomagnetic sensor, and an acceleration sensor. The microphone 908 converts the sound input to the smart phone 900 into an audio signal. The input device 909 includes, for example, a touch sensor, a key pad, a keyboard, a button or a switch for detecting a touch on the screen of the display device 910, and accepts an operation or information input from a user. The display device 910 has a screen such as a liquid crystal display (LCD) or an organic light emitting diode (OLED) display, and displays an output image of the smart phone 900. The speaker 911 converts the sound signal output from the smartphone 900 into sound.

無線通訊介面912係支援LTE或LTE-Advanced等任一蜂巢網通訊方式,執行無線通訊。無線通訊介面912,典型來說係可含有BB處理器913及RF電路914等。BB處理器913係例如可進行編碼/解碼、調變/解調及多工化/逆多工等,執行無線通訊所需的各種訊號處理。另一方面,RF電路914係亦可含有混波器、濾波器及放大器等,透過天線916而收送無線訊號。無線通訊 介面912係亦可為,BB處理器913及RF電路914所集縮而成的單晶片模組。無線通訊介面912係亦可如圖33所示,含有複數BB處理器913及複數RF電路914。此外,圖33中雖然圖示無線通訊介面912是含有複數BB處理器913及複數RF電路914的例子,但無線通訊介面912係亦可含有單一BB處理器913或單一RF電路914。 The wireless communication interface 912 supports any cellular communication method such as LTE or LTE-Advanced to perform wireless communication. The wireless communication interface 912 typically includes a BB processor 913, an RF circuit 914, and the like. The BB processor 913 is, for example, capable of performing encoding/decoding, modulation/demodulation, and multiplexing/reverse multiplexing, and performs various signal processing required for wireless communication. On the other hand, the RF circuit 914 may include a mixer, a filter, an amplifier, and the like, and transmits a wireless signal through the antenna 916. Wireless communication The interface 912 may also be a single-wafer module that is condensed by the BB processor 913 and the RF circuit 914. The wireless communication interface 912 can also include a plurality of BB processors 913 and a plurality of RF circuits 914 as shown in FIG. In addition, although FIG. 33 illustrates an example in which the wireless communication interface 912 includes a plurality of BB processors 913 and a plurality of RF circuits 914, the wireless communication interface 912 may also include a single BB processor 913 or a single RF circuit 914.

再者,無線通訊介面912,係除了蜂巢網通訊方式外,亦可還支援近距離無線通訊方式、接近無線通訊方式或無線LAN(Local Area Network)方式等其他種類之無線通訊方式,此情況下,可含有每一無線通訊方式的BB處理器913及RF電路914。 In addition, the wireless communication interface 912 can support short-range wireless communication methods, proximity wireless communication methods, or wireless LAN (Local Area Network) methods, etc., in addition to the cellular communication mode. It may include a BB processor 913 and an RF circuit 914 for each wireless communication method.

天線開關915之每一者,係在無線通訊介面912中所含之複數電路(例如不同無線通訊方式所用的電路)之間,切換天線916的連接目標。 Each of the antenna switches 915 switches the connection destination of the antenna 916 between a plurality of circuits (for example, circuits used in different wireless communication methods) included in the wireless communication interface 912.

天線916之每一者,係具有單一或複數天線元件(例如構成MIMO天線的複數個天線元件),被使用來收送無線通訊介面912之無線訊號。智慧型手機900係亦可如圖33所示般地具有複數天線916。此外,圖33中雖然圖示了智慧型手機900具有複數天線916的例子,但智慧型手機900亦可具有單一天線916。 Each of the antennas 916 has a single or complex antenna element (e.g., a plurality of antenna elements that form a MIMO antenna) that is used to receive the wireless signals of the wireless communication interface 912. The smart phone 900 can also have a plurality of antennas 916 as shown in FIG. In addition, although FIG. 33 illustrates an example in which the smart phone 900 has a plurality of antennas 916, the smart phone 900 may have a single antenna 916.

甚至,智慧型手機900係亦可具備有每一無線通訊方式的天線916。此情況下,天線開關915係可從智慧型手機900之構成中省略。 Even the smart phone 900 can be equipped with an antenna 916 having a wireless communication method. In this case, the antenna switch 915 can be omitted from the configuration of the smartphone 900.

匯流排917,係將處理器901、記憶體902、 儲存體903、外部連接介面904、相機906、感測器907、麥克風908、輸入裝置909、顯示裝置910、揚聲器911、無線通訊介面912及輔助控制器919,彼此連接。電池918,係透過圖中虛線部分圖示的供電線,而向圖33所示的智慧型手機900之各區塊,供給電力。輔助控制器919,係例如於睡眠模式下,令智慧型手機900的必要之最低限度的機能進行動作。 The bus 917 is a processor 901, a memory 902, The storage body 903, the external connection interface 904, the camera 906, the sensor 907, the microphone 908, the input device 909, the display device 910, the speaker 911, the wireless communication interface 912, and the auxiliary controller 919 are connected to each other. The battery 918 supplies power to each block of the smartphone 900 shown in FIG. 33 through a power supply line shown by a broken line in the figure. The auxiliary controller 919, for example, in the sleep mode, operates the minimum necessary function of the smartphone 900.

於圖33所示的智慧型手機900中,參照圖15所說明的終端裝置200中所含之1個以上之構成要素(認證處理部241及/或通訊處理部243),係亦可被實作於無線通訊介面912中。或者,這些構成要素的至少一部分,亦可被實作於處理器901或輔助控制器919中。作為一例,智慧型手機900係亦可搭載含有無線通訊介面912之一部分(例如BB處理器913)或全部、處理器901、及/或輔助控制器919的模組,於該當模組中實作上記1個以上之構成要素。此時,上記模組係亦可將用來使處理器運作成為上記1個以上之構成要素所需的程式(換言之,用來令處理器執行上記1個以上之構成要素之動作所需的程式)予以記憶,並執行該當程式。作為其他例子,用來使處理器運作成為上記1個以上之構成要素所需的程式亦可被安裝到智慧型手機900,由無線通訊介面912(例如BB處理器913)、處理器901、及/或輔助控制器919來執行該當程式。如以上所述,亦可以用具備有上記1個以上之構成要素之裝置的方式來提供智慧型手機900或上記模 組,提供用來使處理器運作成為上記1個以上之構成要素所需的程式。又,亦可提供記錄著上記程式的可讀取之記錄媒體。 In the smartphone 900 shown in FIG. 33, one or more components (the authentication processing unit 241 and/or the communication processing unit 243) included in the terminal device 200 described with reference to FIG. 15 may be used. In the wireless communication interface 912. Alternatively, at least a part of these constituent elements may be implemented in the processor 901 or the auxiliary controller 919. As an example, the smart phone 900 can also be equipped with a module including a part of the wireless communication interface 912 (for example, the BB processor 913) or all, the processor 901, and/or the auxiliary controller 919, and implemented in the module. One or more components are listed above. In this case, the above-mentioned module can also be used to make the processor operate as a program for one or more components (in other words, a program required for the processor to execute one or more components). ) to remember and execute the program. As another example, a program required to make the processor operate as one or more components may be installed in the smart phone 900, by a wireless communication interface 912 (for example, the BB processor 913), the processor 901, and / or auxiliary controller 919 to execute the program. As described above, it is also possible to provide the smart phone 900 or the upper model by means of a device having one or more constituent elements. The group provides a program required to make the processor operate as one or more components. Further, a readable recording medium on which the above program is recorded may be provided.

又,於圖33所示的智慧型手機900中,例如,參照圖15所說明的無線通訊部220,係亦可被實作於無線通訊介面912(例如RF電路914)中。又,天線部210係亦可被實作於天線916中。又,記憶部230係亦可被實作於記憶體902中。 Further, in the smartphone 900 shown in FIG. 33, for example, the wireless communication unit 220 described with reference to FIG. 15 may be implemented in the wireless communication interface 912 (for example, the RF circuit 914). Further, the antenna unit 210 can also be implemented in the antenna 916. Further, the memory unit 230 can also be implemented in the memory 902.

(第2應用例) (Second application example)

圖34係可適用本揭露所述之技術的行車導航裝置920之概略構成之一例的區塊圖。行車導航裝置920係具備:處理器921、記憶體922、GPS(Global Positioning System)模組924、感測器925、資料介面926、內容播放器927、記憶媒體介面928、輸入裝置929、顯示裝置930、揚聲器931、無線通訊介面933、1個以上之天線開關936、1個以上之天線937及電池938。 Fig. 34 is a block diagram showing an example of a schematic configuration of a driving navigation device 920 to which the technique described in the present disclosure is applicable. The driving navigation device 920 includes a processor 921, a memory 922, a GPS (Global Positioning System) module 924, a sensor 925, a data interface 926, a content player 927, a memory medium interface 928, an input device 929, and a display device. 930, a speaker 931, a wireless communication interface 933, one or more antenna switches 936, one or more antennas 937, and a battery 938.

處理器921係可為例如CPU或SoC,控制行車導航裝置920的導航機能及其他機能。記憶體922係包含RAM及ROM,記憶著被處理器921所執行之程式及資料。 The processor 921 can be, for example, a CPU or SoC, controlling the navigation functions and other functions of the driving navigation device 920. The memory 922 includes a RAM and a ROM, and stores programs and data executed by the processor 921.

GPS模組924係使用接收自GPS衛星的GPS訊號,來測定行車導航裝置920的位置(例如緯度、經度及高度)。感測器925係可含有,例如:陀螺儀感測器、 地磁感測器及氣壓感測器等之感測器群。資料介面926,係例如透過未圖示之端子而連接至車載網路941,取得車速資料等車輛側所生成之資料。 The GPS module 924 uses the GPS signals received from the GPS satellites to determine the position (eg, latitude, longitude, and altitude) of the driving navigation device 920. The sensor 925 can include, for example, a gyroscope sensor, A sensor group such as a geomagnetic sensor and a barometric sensor. The data interface 926 is connected to the in-vehicle network 941 via a terminal (not shown), for example, and acquires data generated by the vehicle side such as vehicle speed data.

內容播放器927,係將被插入至記憶媒體介面928的記憶媒體(例如CD或DVD)中所記憶的內容,予以再生。輸入裝置929係含有例如:偵測對顯示裝置930之畫面上之觸控的觸控感測器、按鈕或開關等,受理來自使用者之操作或資訊輸入。顯示裝置930係具有LCD或OLED顯示器等之畫面,顯示導航機能或所被再生之內容的影像。揚聲器931係將導航機能或所被再生之內容的聲音,予以輸出。 The content player 927 reproduces the content stored in a memory medium (for example, a CD or a DVD) to be inserted into the memory medium interface 928. The input device 929 includes, for example, a touch sensor, a button or a switch that detects a touch on the screen of the display device 930, and accepts an operation or information input from a user. The display device 930 has a screen such as an LCD or an OLED display, and displays an image of the navigation function or the content being reproduced. The speaker 931 outputs the sound of the navigation function or the content to be reproduced.

無線通訊介面933係支援LTE或LTE-Advanced等任一蜂巢網通訊方式,執行無線通訊。無線通訊介面933,典型來說係可含有BB處理器934及RF電路935等。BB處理器934係例如可進行編碼/解碼、調變/解調及多工化/逆多工等,執行無線通訊所需的各種訊號處理。另一方面,RF電路935係亦可含有混波器、濾波器及放大器等,透過天線937而收送無線訊號。無線通訊介面933係亦可為,BB處理器934及RF電路935所集縮而成的單晶片模組。無線通訊介面933係亦可如圖34所示,含有複數BB處理器934及複數RF電路935。此外,圖34中雖然圖示無線通訊介面933是含有複數BB處理器934及複數RF電路935的例子,但無線通訊介面933係亦可含有單一BB處理器934或單一RF電路935。 The wireless communication interface 933 supports any cellular communication method such as LTE or LTE-Advanced to perform wireless communication. The wireless communication interface 933, typically, may include a BB processor 934, an RF circuit 935, and the like. The BB processor 934 is, for example, capable of performing encoding/decoding, modulation/demodulation, and multiplexing/reverse multiplexing, and performs various signal processing required for wireless communication. On the other hand, the RF circuit 935 may also include a mixer, a filter, an amplifier, etc., and transmit the wireless signal through the antenna 937. The wireless communication interface 933 may also be a single-wafer module that is condensed by the BB processor 934 and the RF circuit 935. The wireless communication interface 933 may also include a plurality of BB processors 934 and a plurality of RF circuits 935 as shown in FIG. In addition, although the wireless communication interface 933 is illustrated in FIG. 34 as an example including a plurality of BB processors 934 and a plurality of RF circuits 935, the wireless communication interface 933 may also include a single BB processor 934 or a single RF circuit 935.

再者,無線通訊介面933,係除了蜂巢網通訊方式外,亦可還支援近距離無線通訊方式、接近無線通訊方式或無線LAN方式等其他種類之無線通訊方式,此情況下,可含有每一無線通訊方式的BB處理器934及RF電路935。 In addition, the wireless communication interface 933 can also support other types of wireless communication methods such as short-range wireless communication, proximity wireless communication, or wireless LAN, in addition to the cellular communication mode. In this case, each of the wireless communication interfaces may be included. BB processor 934 and RF circuit 935 of wireless communication mode.

天線開關936之每一者,係在無線通訊介面933中所含之複數電路(例如不同無線通訊方式所用的電路)之間,切換天線937的連接目標。 Each of the antenna switches 936 switches the connection destination of the antenna 937 between a plurality of circuits (for example, circuits used in different wireless communication methods) included in the wireless communication interface 933.

天線937之每一者,係具有單一或複數天線元件(例如構成MIMO天線的複數個天線元件),被使用來收送無線通訊介面933之無線訊號。行車導航裝置920係亦可如圖34所示般地具有複數天線937。此外,圖34中雖然圖示了行車導航裝置920具有複數天線937的例子,但行車導航裝置920亦可具有單一天線937。 Each of the antennas 937 has a single or multiple antenna elements (e.g., a plurality of antenna elements that form a MIMO antenna) that are used to receive wireless signals from the wireless communication interface 933. The driving navigation device 920 may also have a plurality of antennas 937 as shown in FIG. In addition, although FIG. 34 illustrates an example in which the driving navigation device 920 has a plurality of antennas 937, the driving navigation device 920 may have a single antenna 937.

甚至,行車導航裝置920係亦可具備有每一無線通訊方式的天線937。此種情況下,天線開關936係可從行車導航裝置920的構成中省略。 Even the driving navigation device 920 can be provided with an antenna 937 for each wireless communication method. In this case, the antenna switch 936 can be omitted from the configuration of the driving navigation device 920.

電池938,係透過圖中虛線部分圖示的供電線,而向圖34所示的行車導航裝置920之各區塊,供給電力。又,電池938係積存著從車輛側供給的電力。 The battery 938 is supplied with electric power to each block of the driving navigation device 920 shown in Fig. 34 through a power supply line shown by a broken line in the figure. Further, the battery 938 stores electric power supplied from the vehicle side.

於圖34所示的行車導航裝置920中,參照圖15所說明的終端裝置200中所含之1個以上之構成要素(認證處理部241及/或通訊處理部243),係亦可被實作於無線通訊介面933中。或者,這些構成要素的至少一部 分,亦可被實作於處理器921中。作為一例,行車導航裝置920係亦可搭載含有無線通訊介面933之一部分(例如BB處理器934)或全部及/或處理器921的模組,於該當模組中實作上記1個以上之構成要素。此時,上記模組係亦可將用來使處理器運作成為上記1個以上之構成要素所需的程式(換言之,用來令處理器執行上記1個以上之構成要素之動作所需的程式)予以記憶,並執行該當程式。作為其他例子,用來使處理器運作成為上記1個以上之構成要素所需的程式亦可被安裝到行車導航裝置920,由無線通訊介面933(例如BB處理器934)及/或處理器921來執行該當程式。如以上所述,亦可以用具備有上記1個以上之構成要素之裝置的方式來提供行車導航裝置920或上記模組,提供用來使處理器運作成為上記1個以上之構成要素所需的程式。又,亦可提供記錄著上記程式的可讀取之記錄媒體。 In the navigation device 920 shown in FIG. 34, one or more components (the authentication processing unit 241 and/or the communication processing unit 243) included in the terminal device 200 described with reference to FIG. 15 may be used. In the wireless communication interface 933. Or at least one of these components The points can also be implemented in the processor 921. As an example, the driving navigation device 920 may be equipped with a module including a part of the wireless communication interface 933 (for example, the BB processor 934) or all of the processor 921, and one or more of the modules may be implemented in the module. Elements. In this case, the above-mentioned module can also be used to make the processor operate as a program for one or more components (in other words, a program required for the processor to execute one or more components). ) to remember and execute the program. As another example, a program required to operate the processor as one or more components may be installed in the navigation device 920 by a wireless communication interface 933 (eg, BB processor 934) and/or processor 921. To execute the program. As described above, it is also possible to provide the driving navigation device 920 or the above-described module by means of a device having one or more constituent elements, and to provide a processor for operating one or more components. Program. Further, a readable recording medium on which the above program is recorded may be provided.

又,於圖34所示的行車導航裝置920中,例如,參照圖15所說明的無線通訊部220,係亦可被實作於無線通訊介面933(例如RF電路935)中。又,天線部210係亦可被實作於天線937中。又,記憶部230係亦可被實作於記憶體922中。 Further, in the driving navigation device 920 shown in FIG. 34, for example, the wireless communication unit 220 described with reference to FIG. 15 may be implemented in the wireless communication interface 933 (for example, the RF circuit 935). Further, the antenna unit 210 can also be implemented in the antenna 937. Further, the memory unit 230 can also be implemented in the memory 922.

又,本揭露所述之技術,係亦可被實現成含有上述行車導航裝置920的1個以上之區塊、和車載網路941、車輛側模組942的車載系統(或車輛)940。亦即,亦可以具備認證處理部241及/或通訊處理部243之裝置的 方式,來提供車載系統(或車輛)940。車輛側模組942,係生成車速、引擎轉數或故障資訊等之車輛側資料,將所生成之資料,輸出至車載網路941。 Further, the technology described in the present disclosure may be implemented as an in-vehicle system (or vehicle) 940 including one or more blocks of the above-described driving navigation device 920 and an in-vehicle network 941 and a vehicle-side module 942. In other words, the device of the authentication processing unit 241 and/or the communication processing unit 243 may be provided. In a way, an in-vehicle system (or vehicle) 940 is provided. The vehicle side module 942 generates vehicle side data such as vehicle speed, engine revolution number, or failure information, and outputs the generated data to the in-vehicle network 941.

<<8.總結>> <<8. Summary>>

以上,參照圖1~圖34,詳細說明了本揭露之一實施形態。如上記說明,MEC伺服器300或OTT伺服器500,係與已使用HSS42中所被登錄之該當伺服器所對應之認證資訊而被認證之網路進行通訊,提供內容。如此一來,可以防止未被確認信賴性的MEC伺服器300或OTT伺服器500,連接至網路。又,藉由提供MEC伺服器300或OTT伺服器500所致之通訊所需之金鑰,就可提供MEC伺服器300或OTT伺服器500與MME41或UE200之間的通訊路的隱匿性。 Hereinabove, an embodiment of the present disclosure has been described in detail with reference to Figs. 1 to 34. As described above, the MEC server 300 or the OTT server 500 communicates with the network that has been authenticated using the authentication information corresponding to the server registered in the HSS 42 to provide content. In this way, it is possible to prevent the untrusted MEC server 300 or the OTT server 500 from being connected to the network. Moreover, by providing the key required for communication by the MEC server 300 or the OTT server 500, the occlusion of the communication path between the MEC server 300 or the OTT server 500 and the MME 41 or the UE 200 can be provided.

以上雖然一面參照添附圖面一面詳細說明了本揭露的理想實施形態,但本揭露之技術範圍並非限定於所述例子。只要是本揭露之技術領域中具有通常知識者,自然可於申請範圍中所記載之技術思想的範疇內,想到各種變更例或修正例,而這些當然也都屬於本揭露的技術範圍。 Although the preferred embodiment of the present disclosure has been described in detail above with reference to the accompanying drawings, the technical scope of the disclosure is not limited to the examples. As long as it is a person having ordinary knowledge in the technical field of the present disclosure, various modifications and modifications can be conceived within the scope of the technical idea described in the application scope, and these are of course also within the technical scope of the present disclosure.

例如,上記說明的各實施形態係可適宜組合。 For example, each of the embodiments described above can be combined as appropriate.

又,於本說明書中使用流程圖及程序圖所說明的處理,係亦可並不一定按照圖示的順序而被執行。亦 可數個處理步驟,是被平行地執行。又,亦可採用追加的處理步驟,也可省略部分的處理步驟。 Further, the processes described in the flowcharts and the flowcharts in the present specification are not necessarily executed in the order shown. also A number of processing steps are performed in parallel. Further, an additional processing step may be employed, or some of the processing steps may be omitted.

又,本說明書中所記載的效果,係僅為說明性或例示性,並非限定解釋。亦即,本揭露所述之技術,係亦可除了上記之效果外,或亦可取代上記之效果,達成當業者可根據本說明書之記載而自明之其他效果。 Further, the effects described in the present specification are merely illustrative or exemplary, and are not intended to be construed as limiting. That is, the technology described in the present disclosure may also be used in addition to the effects described above, or may replace the effects of the above, to achieve other effects that the practitioner can self-evident according to the description of the present specification.

此外,如以下的構成也是屬於本揭露的技術範圍。 Further, the following configurations are also within the technical scope of the present disclosure.

(1) (1)

一種伺服器,係向其他裝置提供內容的伺服器,其係具備:處理部,係與已使用HSS(Home Subscriber Server)中所被登錄之前記伺服器所對應之認證資訊而被認證之網路,進行通訊。 A server is a server that provides content to another device, and includes a processing unit that is authenticated by using authentication information corresponding to a server registered in the HSS (Home Subscriber Server). , for communication.

(2) (2)

如前記(1)所記載之伺服器,其中,前記伺服器所對應之認證資訊,係為前記伺服器的認證資訊。 The server described in (1) above, wherein the authentication information corresponding to the pre-log server is the authentication information of the pre-log server.

(3) (3)

如前記(2)所記載之伺服器,其中,前記伺服器的認證資訊係含有:用來特定前記伺服器之號碼及前記伺服器所固有之金鑰資訊。 The server described in (2) above, wherein the authentication information of the pre-registration server includes: a number used to specify the pre-registration server and a key information inherent to the pre-registration server.

(4) (4)

如前記(2)或(3)所記載之伺服器,其中,前記伺服器,係還具備:記憶部,係記憶前記伺服器 的認證資訊;前記處理部係使用前記伺服器的認證資訊,來進行對前記網路之認證。 The server described in (2) or (3) above, wherein the pre-log server further includes: a memory unit, which is a memory pre-log server. The authentication information is used by the pre-recording department to authenticate the pre-recorded network using the authentication information of the pre-recorded server.

(5) (5)

如前記(2)~(4)之任一項所記載之伺服器,其中,在前記伺服器上動作的應用程式與MME的通訊所需之金鑰,係基於前記伺服器的認證資訊而被生成。 The server described in any one of the preceding paragraphs (2) to (4), wherein the key required for communication between the application operating on the server and the MME is based on the authentication information of the preceding server. generate.

(6) (6)

如前記(1)所記載之伺服器,其中,前記伺服器所對應之認證資訊係為,前記伺服器所被建立對應之終端裝置的認證資訊。 The server described in the above (1), wherein the authentication information corresponding to the pre-log server is the authentication information of the terminal device to which the pre-recording server is established.

(7) (7)

如前記(6)所記載之伺服器,其中,前記終端裝置的認證資訊係含有:用來特定前記終端裝置之號碼及前記終端裝置所固有之金鑰資訊。 The server described in the above (6), wherein the authentication information of the pre-recording terminal device includes: a number for specifying the pre-recording terminal device and key information unique to the pre-recording terminal device.

(8) (8)

如前記(6)或(7)所記載之伺服器,其中,前記處理部,係使用基於對前記網路之認證已經成功的、前記伺服器所被建立對應之前記終端裝置所做的請求而被發行的資訊,來與前記網路進行通訊。 The server described in the above (6) or (7), wherein the pre-processing unit uses a request made by the pre-recording server to establish a corresponding pre-recording terminal device based on the authentication of the pre-recorded network. The information being distributed to communicate with the pre-recorded network.

(9) (9)

如前記(8)所記載之伺服器,其中,在前記伺服器上動作的應用程式與MME的通訊所需之金鑰,係基於前記伺服器所被建立對應之前記終端裝置的認證資訊而被生 成。 The server described in the above (8), wherein the key required for communication between the application operating on the pre-reporting server and the MME is based on the authentication information of the pre-recorded server that is associated with the previously recorded terminal device. Health to make.

(10) (10)

如前記(1)~(9)之任一項所記載之伺服器,其中,終端裝置與在前記伺服器上動作的應用程式的通訊所需之金鑰,係基於前記終端裝置的認證資訊而被生成。 The server described in any one of (1) to (9), wherein the key required for communication between the terminal device and the application operating on the preamble server is based on the authentication information of the pre-recorded terminal device. Was generated.

(11) (11)

如前記(1)~(10)之任一項所記載之伺服器,其中,前記伺服器係為,被設在EPS之內部的應用程式伺服器。 The server described in any one of the above (1) to (10), wherein the pre-log server is an application server provided inside the EPS.

(12) (12)

如前記(11)所記載之伺服器,其中,前記伺服器所對應之認證資訊係為,前記伺服器所被建立對應之其他伺服器的認證資訊。 The server described in the above (11), wherein the authentication information corresponding to the pre-recording server is the authentication information of the other server to which the pre-recording server is established.

(13) (13)

如前記(12)所記載之伺服器,其中,前記處理部,係使用基於對前記網路之認證已經成功的、前記伺服器所被建立對應之前記其他伺服器所做的請求而被發行的資訊,來與前記網路進行通訊。 The server described in the above (12), wherein the pre-processing unit is issued using a request made by another server based on the authentication of the pre-recorded network that was established before the pre-registration server was established. Information to communicate with the pre-recorded network.

(14) (14)

如前記(12)或(13)所記載之伺服器,其中,前記其他伺服器係為,向前記伺服器提供內容的內容伺服器。 The server described in (12) or (13) above, wherein the other server is a content server that provides content to the server.

(15) (15)

如前記(1)~(10)之任一項所記載之伺服器,其中,前記伺服器係為,向被設在EPS之內部的應用程式伺服器提供內容的內容伺服器。 The server described in any one of (1) to (10), wherein the pre-log server is a content server that provides content to an application server provided in the EPS.

(16) (16)

如前記(15)所記載之伺服器,其中,前記伺服器,係經由基地台而與MME進行通訊。 The server described in (15) above, wherein the preamble server communicates with the MME via the base station.

(17) (17)

如前記(15)所記載之伺服器,其中,前記伺服器,係不經由基地台而與MME進行通訊。 The server described in the above (15), wherein the preamble server communicates with the MME without going through the base station.

(18) (18)

如前記(1)~(10)之任一項所記載之伺服器,其中,前記伺服器係為,被設在無線LAN網路內的應用程式伺服器。 The server described in any one of the above (1) to (10), wherein the preamble server is an application server provided in the wireless LAN network.

(19) (19)

一種方法,係含有:藉由向其他裝置提供內容的伺服器,與已使用HSS中所被登錄之前記伺服器所對應之認證資訊而被認證之網路,進行通訊。 A method includes communicating with a network that has been authenticated by using a server that provides content to another device and that has been authenticated using the authentication information corresponding to the server registered in the HSS.

(20) (20)

一種程式,係用來使電腦發揮機能成為:向其他裝置提供內容的伺服器,且該伺服器係含有:處理部,係與已使用HSS中所被登錄之前記伺服器所對應之認證資訊而被認證之網路,進行通訊。 A program for causing a computer to function as a server that provides content to other devices, and the server includes: a processing unit that is associated with the authentication information corresponding to the server that has been registered in the HSS before being registered. The authenticated network communicates.

1‧‧‧系統 1‧‧‧ system

10A~10C‧‧‧蜂巢網 10A~10C‧‧‧Hive Network

40‧‧‧核心網路 40‧‧‧core network

50‧‧‧PDN 50‧‧‧PDN

60‧‧‧應用程式伺服器 60‧‧‧Application Server

100A~100C‧‧‧無線通訊裝置 100A~100C‧‧‧Wireless communication device

200A~200C‧‧‧終端裝置 200A~200C‧‧‧ terminal device

300A~300C‧‧‧MEC伺服器 300A~300C‧‧‧MEC Server

Claims (20)

一種伺服器,係向其他裝置提供內容的伺服器,其係具備:處理部,係與已使用HSS(Home Subscriber Server)中所被登錄之前記伺服器所對應之認證資訊而被認證之網路,進行通訊。 A server is a server that provides content to another device, and includes a processing unit that is authenticated by using authentication information corresponding to a server registered in the HSS (Home Subscriber Server). , for communication. 如請求項1所記載之伺服器,其中,前記伺服器所對應之認證資訊,係為前記伺服器的認證資訊。 The server described in claim 1, wherein the authentication information corresponding to the pre-log server is the authentication information of the pre-log server. 如請求項2所記載之伺服器,其中,前記伺服器的認證資訊係含有:用來特定前記伺服器之號碼及前記伺服器所固有之金鑰資訊。 The server according to claim 2, wherein the authentication information of the pre-registration server includes: a number used to specify the pre-log server and a key information inherent to the pre-log server. 如請求項2所記載之伺服器,其中,前記伺服器,係還具備:記憶部,係記憶前記伺服器的認證資訊;前記處理部係使用前記伺服器的認證資訊,來進行對前記網路之認證。 The server described in claim 2, wherein the pre-recording server further includes: a memory unit that authenticates the authentication information of the server; and the pre-processing unit uses the authentication information of the pre-log server to perform the pre-recording network. Certification. 如請求項2所記載之伺服器,其中,在前記伺服器上動作的應用程式與MME的通訊所需之金鑰,係基於前記伺服器的認證資訊而被生成。 The server described in claim 2, wherein the key required for communication between the application operating on the preamble server and the MME is generated based on the authentication information of the preamble server. 如請求項1所記載之伺服器,其中,前記伺服器所對應之認證資訊係為,前記伺服器所被建立對應之終端裝置的認證資訊。 The server according to claim 1, wherein the authentication information corresponding to the pre-recording server is the authentication information of the terminal device to which the pre-recording server is established. 如請求項6所記載之伺服器,其中,前記終端裝置的認證資訊係含有:用來特定前記終端裝置之號碼及前 記終端裝置所固有之金鑰資訊。 The server according to claim 6, wherein the authentication information of the pre-recording terminal device includes: a number for specifying the pre-recording terminal device and the front Record the key information inherent to the terminal device. 如請求項6所記載之伺服器,其中,前記處理部,係使用基於對前記網路之認證已經成功的、前記伺服器所被建立對應之前記終端裝置所做的請求而被發行的資訊,來與前記網路進行通訊。 The server described in claim 6, wherein the pre-recording processing unit uses information that is issued based on a request made by the pre-recording server to establish a corresponding pre-recording terminal device based on the authentication of the pre-recorded network. To communicate with the pre-recorded network. 如請求項8所記載之伺服器,其中,在前記伺服器上動作的應用程式與MME的通訊所需之金鑰,係基於前記伺服器所被建立對應之前記終端裝置的認證資訊而被生成。 The server according to claim 8, wherein the key required for communication between the application operating on the pre-reporting server and the MME is generated based on the authentication information of the pre-recorded server that is associated with the previously recorded terminal device. . 如請求項1所記載之伺服器,其中,終端裝置與在前記伺服器上動作的應用程式的通訊所需之金鑰,係基於前記終端裝置的認證資訊而被生成。 The server according to claim 1, wherein the key required for communication between the terminal device and the application operating on the preamble server is generated based on the authentication information of the pre-recorded terminal device. 如請求項1所記載之伺服器,其中,前記伺服器係為,被設在EPS之內部的應用程式伺服器。 The server described in claim 1, wherein the pre-log server is an application server provided inside the EPS. 如請求項11所記載之伺服器,其中,前記伺服器所對應之認證資訊係為,前記伺服器所被建立對應之其他伺服器的認證資訊。 The server according to claim 11, wherein the authentication information corresponding to the pre-log server is the authentication information of the other server to which the pre-recording server is established. 如請求項12所記載之伺服器,其中,前記處理部,係使用基於對前記網路之認證已經成功的、前記伺服器所被建立對應之前記其他伺服器所做的請求而被發行的資訊,來與前記網路進行通訊。 The server described in claim 12, wherein the pre-processing unit uses information that is issued based on a request made by another server based on the authentication of the pre-recorded network and the pre-recording server is established to correspond to the previous server. To communicate with the pre-recorded network. 如請求項12所記載之伺服器,其中,前記其他伺服器係為,向前記伺服器提供內容的內容伺服器。 The server described in claim 12, wherein the other server is a content server that provides content to the server. 如請求項1所記載之伺服器,其中,前記伺服器 係為,向被設在EPS之內部的應用程式伺服器提供內容的內容伺服器。 The server described in claim 1, wherein the preamble server It is a content server that provides content to an application server that is set inside the EPS. 如請求項15所記載之伺服器,其中,前記伺服器,係經由基地台而與MME進行通訊。 The server according to claim 15, wherein the preamble server communicates with the MME via the base station. 如請求項15所記載之伺服器,其中,前記伺服器,係不經由基地台而與MME進行通訊。 The server described in claim 15, wherein the preamble server communicates with the MME without going through the base station. 如請求項1所記載之伺服器,其中,前記伺服器係為,被設在無線LAN網路內的應用程式伺服器。 The server described in claim 1, wherein the preamble server is an application server provided in the wireless LAN network. 一種方法,係含有:藉由向其他裝置提供內容的伺服器,與已使用HSS中所被登錄之前記伺服器所對應之認證資訊而被認證之網路,進行通訊。 A method includes communicating with a network that has been authenticated by using a server that provides content to another device and that has been authenticated using the authentication information corresponding to the server registered in the HSS. 一種程式,係用來使電腦發揮機能成為:向其他裝置提供內容的伺服器,且該伺服器係含有:處理部,係與已使用HSS中所被登錄之前記伺服器所對應之認證資訊而被認證之網路,進行通訊。 A program for causing a computer to function as a server that provides content to other devices, and the server includes: a processing unit that is associated with the authentication information corresponding to the server that has been registered in the HSS before being registered. The authenticated network communicates.
TW105141068A 2015-12-21 2016-12-12 Server, method, and program TW201727524A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2015248429 2015-12-21

Publications (1)

Publication Number Publication Date
TW201727524A true TW201727524A (en) 2017-08-01

Family

ID=59089245

Family Applications (1)

Application Number Title Priority Date Filing Date
TW105141068A TW201727524A (en) 2015-12-21 2016-12-12 Server, method, and program

Country Status (3)

Country Link
DE (1) DE112016005859T5 (en)
TW (1) TW201727524A (en)
WO (1) WO2017110193A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109327864A (en) * 2018-11-07 2019-02-12 杭州迪普科技股份有限公司 Flow processing method, device, equipment and storage medium
CN114500049B (en) * 2022-01-26 2022-11-11 北京邮电大学 Identity authentication method and system for mobile terminal equipment in Internet of things system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4613627B2 (en) * 2005-02-08 2011-01-19 株式会社日立製作所 Content distribution system
WO2006102943A1 (en) * 2005-04-01 2006-10-05 Telefonaktiebolaget Lm Ericsson (Publ) Method for initiating ims based communications
US8839373B2 (en) * 2010-06-18 2014-09-16 Qualcomm Incorporated Method and apparatus for relay node management and authorization

Also Published As

Publication number Publication date
DE112016005859T5 (en) 2018-09-06
WO2017110193A1 (en) 2017-06-29

Similar Documents

Publication Publication Date Title
JP7041212B2 (en) Connecting to a virtualized mobile core network
CN110771251B (en) Small data transfer, data buffering and data management as services in a communication network
CN109196898B (en) Service slice selection and separation method
KR102258016B1 (en) Mapping service for local content redirection
US20210282003A1 (en) Core network assisted service discovery
JP2017123667A (en) Authentication for scenario of communication handoff and setting of secure channel
JP7286785B2 (en) Establishing a protocol data unit session
US10893410B2 (en) Method and device for establishing a peer-to-peer connection in a mobile communication network
JP7178507B2 (en) Certification decisions for fixed network residential gateways
US20230269797A1 (en) Accessing a 5g network via a non-3gpp access network
CN111512654A (en) Support manual roaming for Vo L TE
KR20230074572A (en) Key management for UE-to-network relay access
EP3409002B1 (en) Method and device for data communication over a peer-to-peer connection in a mobile communication network
WO2017104281A1 (en) Device, method and program
TW201727524A (en) Server, method, and program
KR20230011294A (en) Method and apparatus for transmitting and receiving signals in a wireless communication system
US20230361989A1 (en) Apparatus, methods, and computer programs
WO2017094360A1 (en) Device, method and program
CN116709467A (en) Method and device for accessing communication network
CN117917042A (en) Establishing trust relationship between application entity and wireless communication network