WO2022116695A1 - 发送用户标识的方法和装置 - Google Patents

发送用户标识的方法和装置 Download PDF

Info

Publication number
WO2022116695A1
WO2022116695A1 PCT/CN2021/123683 CN2021123683W WO2022116695A1 WO 2022116695 A1 WO2022116695 A1 WO 2022116695A1 CN 2021123683 W CN2021123683 W CN 2021123683W WO 2022116695 A1 WO2022116695 A1 WO 2022116695A1
Authority
WO
WIPO (PCT)
Prior art keywords
suci
usim card
card information
uicc
communication connection
Prior art date
Application number
PCT/CN2021/123683
Other languages
English (en)
French (fr)
Inventor
谢宜煌
王凯航
周好
Original Assignee
合肥途鸽科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 合肥途鸽科技有限公司 filed Critical 合肥途鸽科技有限公司
Priority to US18/039,851 priority Critical patent/US20240098487A1/en
Priority to JP2023557473A priority patent/JP2023552243A/ja
Publication of WO2022116695A1 publication Critical patent/WO2022116695A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/75Temporary identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/40Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/72Subscriber identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/50Service provisioning or reconfiguring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/60Subscription-based services using application servers or record carriers, e.g. SIM application toolkits
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier

Definitions

  • the present application relates to the field of communications, and in particular, to a method and apparatus for sending a user identity.
  • Cloud communication is a method of establishing a communication connection without using an entity subscriber identity module (SIM) card.
  • the terminal device can establish the first communication connection through the physical or virtual SIM card, obtain the cloud SIM card information from the cloud through this communication connection, and use the cloud SIM card information to establish the second communication connection, without setting two card slots in the terminal device , thereby saving the cost of terminal equipment.
  • SIM entity subscriber identity module
  • the SA network needs to identify the terminal device when establishing the second communication connection. For verification, how the terminal device completes the identity verification of the SA network to establish the second communication connection in the cloud communication scenario is a problem that needs to be solved at present.
  • the present application provides a method and apparatus for sending a user identity, which can complete the identity verification of the SA network in a cloud communication scenario, thereby establishing a second communication connection.
  • a method for sending a user identity comprising: a mobile device (mobile equipment, ME) receives a global user from a universal integrated circuit card (UICC) in a cloud card pool through a first communication connection Identity module (universal subscriber identity module, USIM) card information; the ME receives an identity request from the 5G SA network, and the identity request is used to request to obtain a subscriber concealed identifier (SUCI); the ME according to the identity Request and the USIM card information to obtain the SUCI, the USIM card information is used to indicate that the device generating the SUCI is the ME or the UICC; the ME sends the SUCI to the 5G SA network, and the The SUCI is used to establish a second communication connection.
  • a mobile device mobile equipment, ME
  • UICC universal integrated circuit card
  • USIM subscriber concealed identifier
  • the SUCI can be generated on the ME side or on the UICC side.
  • the USIM card information indicates that the SUCI is generated on the ME side, then the ME can generate the SUCI locally, which avoids the delay in acquiring the SUCI from the UICC, so that the second communication connection can be quickly established.
  • the USIM card information indicates that the SUCI is generated on the UICC side. For example, if the USIM card information lacks the 124 service and the 125 service, the ME can obtain the SUCI from the UICC, thereby ensuring the successful establishment of the second communication connection.
  • an apparatus for sending a user identity comprising a unit for performing any one of the methods in the first aspect.
  • a device for sending a user identification comprising a processor and a memory, the memory is used for storing a computer program, the processor is used for calling and running the computer program from the memory, so that the device executes the first aspect. either method.
  • a computer program product comprising: computer program code, when the computer program code is executed by a device that sends a user identification, the device causes the device to perform any one of the methods in the first aspect .
  • a computer-readable medium stores program code, the program code comprising instructions for performing any one of the methods in the first aspect.
  • the present application provides a method and device for sending a user identity, which can complete the identity verification of the SA network in a cloud communication scenario, thereby establishing a second communication connection in an independent network of a mobile communication system in 5G.
  • FIG. 1 is a schematic diagram of a communication system provided by the present application.
  • Fig. 2 is the schematic diagram of a kind of method for sending user identification provided by the present application
  • FIG. 3 is a schematic diagram of another method for sending a user identity provided by the present application.
  • FIG. 4 is a schematic diagram of yet another method for sending a user identity provided by the present application.
  • FIG. 5 is a schematic diagram of a device for sending a user identity provided by the present application.
  • FIG. 6 is a schematic diagram of a device for sending a user identity provided by the present application.
  • FIG. 1 is a schematic diagram of a communication system applicable to the present application.
  • the communication system 100 includes a network device 110 , a network device 120 and a terminal device 130 .
  • the network device 110 may be a base station defined by 3GPP, for example, a base station (gNB) in a 5G communication system.
  • the network device 110 may also be a relay station, an access point, an in-vehicle device, a wearable device, and other types of communication devices.
  • the network device 120 may be a server for providing the terminal device 130 with information required for establishing a communication connection.
  • the server may include at least one UICC.
  • the server provides authentication services required in the process of establishing a communication connection. Therefore, the network device 120 may also be referred to as a remote authentication service. Entitlement module or cloud card pool.
  • the terminal device 130 is capable of communicating with the network device 110 and the network device 120 .
  • the terminal device 130 may include various handheld devices, in-vehicle devices or wearable devices with wireless communication functions, for example, user equipment (user equipment, UE) defined by the 3rd Generation Partnership Project (3GPP) , mobile station (mobile station, MS), ME and so on.
  • UE user equipment
  • 3GPP 3rd Generation Partnership Project
  • MS mobile station
  • ME mobile station
  • the communication system 100 is only an example, and the communication system applicable to the present application is not limited thereto.
  • the communication system 100 includes more network devices.
  • the network device 110 needs to verify the identity of the terminal device 130 , that is, the network device 110 needs to obtain the SUCI of the terminal device 130 .
  • the SUCI can be generated at the terminal device 130 or at the network device 120 .
  • the terminal device 130 may send the SUCI to the network device 110, so that the network device 110 can establish a communication connection after performing security verification on the SUCI.
  • method 200 includes:
  • the ME receives the USIM card information from the UICC in the cloud card pool through the first communication connection.
  • the first communication connection may be a wireless connection, such as a cellular network connection or a Wi-Fi connection; the first communication connection may also be a wired connection.
  • the present application does not limit the specific form of the first communication connection.
  • adjectives such as “first” and “second” are used to distinguish different individuals in the same type of object, for example, the first communication connection and the second communication connection hereinafter refer to two different communication connections.
  • the USIM card information may be an EFust file (ie, a USIM service table) or other information, and the specific content of the USIM card information is not limited in this application.
  • the USIM card information is used to establish the second communication connection.
  • the ME can establish a radio resource control (RRC) link with the 5G SA network, and send the information to the 5G SA network through the RRC link.
  • RRC radio resource control
  • a registration request containing a globally unique temporary identifier (GUTI) After the 5G SA network receives the registration request and sends an identity request to the ME, the ME can perform the following steps.
  • the ME receives an identity request from the 5G SA network, where the identity request is used to request to acquire SUCI.
  • the ME acquires the SUCI according to the identity request and the USIM card information, where the USIM card information is used to indicate that the device for generating the SUCI is the ME or the UICC.
  • the SUCI can be generated on the ME side or on the UICC side.
  • the USIM card information indicates that the SUCI is generated on the ME side, then the ME can generate the SUCI locally, which avoids the delay in acquiring the SUCI from the UICC, so that the second communication connection can be quickly established.
  • the USIM card information indicates that the SUCI is generated on the UICC side. For example, if the USIM card information lacks the 124 service and the 125 service, the ME can obtain the SUCI from the UICC, thereby ensuring the successful establishment of the second communication connection.
  • Table 1 shows several situations in which the ME acquires SUCI.
  • the client refers to the operator.
  • the ME obtains the SUCI locally according to the identity request.
  • the ME obtains the SUCI from the UICC according to the identity request.
  • the USIM card information includes the configuration information that the operator requests to generate SUCI at the ME; the USIM card information includes the configuration information of the unauthorized emergency session; the USIM card information is the information of the card before R15; the USIM card information is the information of the card before R15; The information is that of an R15 card, but the R15 card is configured as a non-encrypted card.
  • the ME can determine the SUCI generation method based on whether the EFust file contains 124 services and 125 services, wherein the encryption strategy is, for example, an elliptic curve integrated encryption strategy (elliptic curve integrated encryption strategy). encryption scheme, ECIES).
  • the encryption strategy is, for example, an elliptic curve integrated encryption strategy (elliptic curve integrated encryption strategy). encryption scheme, ECIES).
  • the ME when the EFust file does not include the 124 service and the 125 service, the ME generates the SUCI locally; when the EFust file includes the 124 service and the 125 service, the ME obtains the SUCI from the UICC.
  • the ME may send the SUCI acquisition request to the UICC through the first communication connection, and receive the SUCI from the UICC through the first communication connection.
  • the ME sends the SUCI to the 5G SA network, where the SUCI is used to establish a second communication connection.
  • the first communication connection may be a roaming communication connection
  • the second communication connection may be a non-roaming communication connection.
  • the ME After the ME establishes the first communication connection, the ME establishes the RRC link between the 5G SA networks. Subsequently, the ME receives the identity request (identity request) from the 5G SA network through the RRC link, and determines to obtain the SUCI according to the identity request.
  • identity request identity request
  • the ME can determine whether to implement the non-encryption policy according to the USIM card information. If the unencrypted policy is implemented, SUCI can be obtained from UICC; if the unencrypted policy is not implemented, ECIES can be implemented, and the SUCI generation method can be determined according to whether the EFust file contains 124 services and 125 services.
  • the ME When the EFust file does not include the 124 service and the 125 service, the ME generates the SUCI locally; when the EFust file includes the 124 service and the 125 service, the ME obtains the SUCI from the UICC.
  • the ME After the ME obtains the SUCI, it can send an identity response including the SUCI to the 5G SA network through the RRC link, and then it can accept the authentication request (authentication request) from the 5G SA network through the RRC link.
  • the ME can forward the authentication request to the UICC, and after receiving the authentication response sent by the UICC, forward the authentication response to the 5G SA network through the RRC link, so as to establish a communication connection with the 5G SA network (that is, the second communication connect).
  • FIG. 4 is another schematic diagram of establishing a second communication connection.
  • the authentication request may include 5G authentication and key agreement (authentication and key agreement, AKA) information, and may also include extensible authentication protocol (extensible authentication protocol, EAP)-AKA information.
  • AKA authentication and key agreement
  • EAP extensible authentication protocol
  • the 5GC After the 5GC completes the authentication task, it can send a non-access stratum (NAS) security mode command to the ME through the radio access network (RAN).
  • the ME executes the NAS security mode after receiving the NAS security mode command, and sends a NAS security mode completion message to the 5GC through the RAN.
  • NAS non-access stratum
  • the RAN sends an access stratum (access stratum, AS) security mode command to the ME, and the ME executes the AS security mode after receiving the AS security mode command, and sends an AS security mode completion message to the RAN.
  • AS access stratum
  • the RAN may also send a 5G capability query message to the ME, and the ME receives the 5G capability query message and sends a 5G capability report message to the RAN.
  • the 5GC may send a registration accept message to the ME through the RAN, and receive a registration complete message from the ME through the RAN, thereby establishing the second communication connection.
  • the apparatus for sending the user identification includes corresponding hardware structures and/or software modules for executing each function.
  • the present application can be implemented in hardware or a combination of hardware and computer software with the units and algorithm steps of each example described in conjunction with the embodiments disclosed herein. Whether a function is performed by hardware or computer software driving hardware depends on the specific application and design constraints of the technical solution. Skilled artisans may implement the described functionality using different methods for each particular application, but such implementations should not be considered beyond the scope of this application.
  • the present application may divide the functional unit of the apparatus for sending the user identification according to the above method example, for example, each function may be divided into each functional unit, or two or more functions may be integrated into one processing unit.
  • the above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units. It should be noted that the division of units in this application is schematic, and is only a logical function division, and other division methods may be used in actual implementation.
  • FIG. 5 shows a schematic structural diagram of an apparatus for sending a user identity provided by the present application.
  • the apparatus 500 includes a processing unit 510 , a receiving unit 520 and a sending unit 530 .
  • the processing unit 510 can realize the receiving function through the receiving unit 520 , and the processing unit 510 can also realize the sending function through the sending unit 530 .
  • the receiving unit 520 is configured to: receive USIM card information from the UICC in the cloud card pool through the first communication connection; receive an identity request from the 5G SA network, where the identity request is used to request to obtain SUCI;
  • the processing unit 510 is configured to: obtain the SUCI according to the identity request and the USIM card information, where the USIM card information is used to indicate that the device for generating the SUCI is the apparatus 500 or the UICC;
  • the sending unit 530 is configured to: send the SUCI to the 5G SA network, where the SUCI is used to establish a second communication connection.
  • processing unit 510 is specifically configured to:
  • the USIM card information includes encryption indication information
  • the USIM card configuration information does not include the 124 service and the 125 service
  • the USIM card information includes encryption indication information
  • the USIM card configuration information includes 124 service and 125 service
  • the SUCI is obtained from the UICC according to the identity request.
  • the processing unit 510 is specifically configured to: send a SUCI acquisition request to the UICC through the first communication connection according to the identity request; and acquire the SUCI from the UICC through the first communication connection.
  • processing unit 510 is specifically configured to:
  • the USIM card information includes configuration information requested by the operator to generate the SUCI at the device 500; the USIM card information includes configuration information of an unauthorized emergency session; the USIM card information is: Information of the card before R15; the USIM card information is the information of the R15 card, but the R15 card is configured as a non-encrypted card.
  • the processing unit 510 is specifically configured to: send a SUCI acquisition request to the UICC through the first communication connection according to the identity request; and acquire the SUCI from the UICC through the first communication connection.
  • FIG. 6 shows a schematic structural diagram of a device for sending a user identity provided by the present application, wherein a dashed box indicates that the module or unit is optional.
  • the device 600 may be used to implement the methods described in the foregoing method embodiments, and the device 600 may be a chip or a terminal device.
  • the device 600 includes one or more processors 601, and the one or more processors 601 can support the device 600 to implement the method in the method embodiment corresponding to FIG. 2 .
  • the processor 601 may be a general purpose processor or a special purpose processor.
  • the processor 601 may be a central processing unit (CPU) or a baseband processor.
  • the baseband processor may be used to process communication data (eg, SUCI), and the CPU may be used to control the device 600, execute software programs, and process data for the software programs.
  • the device 600 may also include a transceiving unit 605 and an antenna 606 to implement signal input (reception) and output (transmission).
  • the device 600 may be a chip, and the transceiver unit 605 may be an input and/or output circuit of the chip, or the transceiver unit 605 may be a communication interface of the chip, and the chip may be used as a component part of a terminal device or other wireless communication device .
  • the device 600 may include one or more memories 602 on which a program 604 is stored, and the program 604 can be executed by the processor 601 to generate instructions 603, so that the processor 601 executes the methods described in the above method embodiments according to the instructions 603.
  • data may also be stored in the memory 602 .
  • the processor 601 may also read data stored in the memory 602 , the data may be stored at the same storage address as the program 604 , or the data may be stored at a different storage address from the program 604 .
  • the processor 601 and the memory 602 can be provided separately, or can be integrated together, for example, integrated on a system on chip (system on chip, SOC).
  • SOC system on chip
  • the steps in the above method embodiments may be implemented by logic circuits in the form of hardware or instructions in the form of software in the processor 601 .
  • the processor 601 may be a CPU, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic devices , for example, discrete gates, transistor logic devices, or discrete hardware components.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • the present application also provides a computer program product, which implements the communication method described in any method embodiment in the present application when the computer program product is executed by the processor 601 .
  • the computer program product can be stored in the memory 602 , such as a program 604 , and the program 604 is finally converted into an executable object file that can be executed by the processor 601 after processing processes such as preprocessing, compilation, assembly, and linking.
  • the present application also provides a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a computer, implements the communication method described in any method embodiment in the present application.
  • the computer program can be a high-level language program or an executable object program.
  • the computer-readable storage medium is, for example, memory 602 .
  • Memory 602 may be volatile memory or non-volatile memory, or memory 602 may include both volatile and non-volatile memory.
  • the non-volatile memory may be read-only memory (ROM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically programmable Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • Volatile memory may be random access memory (RAM), which acts as an external cache.
  • RAM random access memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • SDRAM synchronous DRAM
  • SDRAM double data rate synchronous dynamic random access memory
  • double data rate SDRAM double data rate SDRAM
  • DDR SDRAM enhanced synchronous dynamic random access memory
  • ESDRAM enhanced synchronous dynamic random access memory
  • SCRAM synchronous link dynamic random access memory
  • direct rambus RAM direct rambus RAM
  • the disclosed systems, devices and methods may be implemented in other manners.
  • some features of the method embodiments described above may be omitted, or not implemented.
  • the device embodiments described above are only illustrative, and the division of units is only a logical function division. In actual implementation, there may be other division methods, and multiple units or components may be combined or integrated into another system.
  • the coupling between the units or the coupling between the components may be direct coupling or indirect coupling, and the above-mentioned coupling includes electrical, mechanical or other forms of connection.
  • the size of the sequence numbers of each process does not mean the sequence of execution, and the execution sequence of each process should be determined by its functions and internal logic, rather than the embodiments of the present application. implementation constitutes any limitation.
  • system and “network” are often used interchangeably herein.
  • the term “and/or” in this article is only an association relationship to describe the associated objects, indicating that there can be three kinds of relationships, for example, A and/or B, it can mean that A exists alone, A and B exist at the same time, independently There are three cases of B.
  • the character "/" in this text generally indicates that the related objects are an "or” relationship.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本申请提供了一种发送用户标识的方法和装置,该方法包括:ME通过第一通信连接从云卡池中的UICC接收USIM卡信息;所述ME从5G SA网络接收身份请求,所述身份请求用于请求获取SUCI;所述ME根据所述身份请求和所述USIM卡信息获取所述SUCI,所述USIM卡信息用于指示所述SUCI的生成设备为所述ME或者所述UICC;所述ME向所述5G SA网络发送所述SUCI,所述SUCI用于建立第二通信连接。SUCI可以在ME侧生成,也可以在UICC侧生成。第一通信连接可以是漫游通信连接,第二通信连接可以是非漫游通信连接,上述方法可以在云通信场景中建立非漫游的5G通信连接,为用户节省费用。

Description

发送用户标识的方法和装置 技术领域
本申请涉及通信领域,具体涉及一种发送用户标识的方法和装置。
背景技术
云通信是一种无需使用实体用户识别模块(subscriber identity module,SIM)卡即可建立通信连接的方法。终端设备可以通过实体或虚拟SIM卡建立第一个通信连接,通过该通信连接从云端获取云SIM卡信息,使用云SIM卡信息建立第二个通信连接,无需在终端设备中设置两个卡槽,从而节省了终端设备的成本。
若上述第二个通信连接是第五代(5 th generation,5G)移动通信系统中独立(standalone,SA)网络的通信连接,则在建立第二个通信连接时SA网络需要对终端设备的身份进行校验,终端设备如何完成SA网络的身份校验以建立云通信场景中的第二个通信连接是当前需要解决的问题。
发明内容
本申请提供了一种发送用户标识的方法和装置,能够在云通信场景中完成SA网络的身份校验,从而建立第二个通信连接。
第一方面,提供了一种发送用户标识的方法,包括:移动设备(mobile equipment,ME)通过第一通信连接从云卡池中的通用集成电路卡(universal integrated circuit card,UICC)接收全球用户身份模块(universal subscriber identity module,USIM)卡信息;所述ME从5G SA网络接收身份请求,所述身份请求用于请求获取用户加密标识(subscriber concealed identifier,SUCI);所述ME根据所述身份请求和所述USIM卡信息获取所述SUCI,所述USIM卡信息用于指示所述SUCI的生成设备为所述ME或者所述UICC;所述ME向所述5G SA网络发送所述SUCI,所述SUCI用于建立第二通信连接。
SUCI可以在ME侧生成,也可以在UICC侧生成。在一些情况中,USIM卡信息指示在ME侧生成SUCI,则ME可以在本地生成SUCI,避免了从UICC获取SUCI的时延,从而可以快速建立第二通信连接。在另一些情况中,USIM卡信息指示在UICC侧生成SUCI,例如,USIM卡信息缺少124服务和125服务,则ME可以从UICC获取SUCI,从而保证了第二通信连接的成功建立。
第二方面,提供了一种发送用户标识的装置,包括用于执行第一方面中任一种方法的单元。
第三方面,提供了一种发送用户标识的设备,包括处理器和存储器,该存储器用于存储计算机程序,该处理器用于从存储器中调用并运行该计算机程序,使得该设备执行第一方面中任一种方法。
第四方面,提供了一种计算机程序产品,所述计算机程序产品包括:计算机程序代码,当所述计算机程序代码被发送用户标识的装置运行时,使得该装置执行第一方面中任一种方法。
第五方面,提供了一种计算机可读介质,所述计算机可读介质存储有程序代码,所述程序代码包括用于执行第一方面中任一种方法的指令。
本申请一种发送用户标识的方法和装置,能够在云通信场景中完成SA网络的身份校验,从而在5G中的移动通信系统独立网络建立第二个通信连接。
附图说明
图1是本申请提供的一种通信系统的示意图;
图2是本申请提供的一种发送用户标识的方法的示意图;
图3是本申请提供的另一种发送用户标识的方法的示意图;
图4是本申请提供的再一种发送用户标识的方法的示意图;
图5是本申请提供的一种发送用户标识的装置的示意图;
图6是本申请提供的一种发送用户标识的设备的示意图。
具体实施方式
下面将结合附图,对本申请中的技术方案进行描述。
首先介绍本申请的应用场景,图1是一种适用于本申请的通信系统的示意图。
通信系统100包括网络设备110、网络设备120和终端设备130。
在本申请中,网络设备110可以是3GPP所定义的基站,例如,5G通信系统中的基站(gNB)。网络设备110还可以是中继站、接入点、车载设备、可穿戴设备以及其它类型的通信设备。
网络设备120可以是服务器,用于为终端设备130提供建立通信连接所需的信息。例如,该服务器可以包括至少一个UICC,当终端设备130需要与网络设备110建立通信连接时,该服务器提供建立通信连接过程中所需鉴权服务,因此,网络设备120也可以称为远端鉴权模块或云卡池。
终端设备130能够与网络设备110和网络设备120进行通信。终端设备130可以包括各种具有无线通信功能的手持设备、车载设备或者可穿戴设备,例如,第三代合作伙伴计划(3 rd generation partnership project,3GPP)所定义的用户设备(user equipment,UE)、移动台(mobile station,MS)、ME等等。
通信系统100仅是举例说明,适用本申请的通信系统不限于此,例如,通信系统100中包含更多的网络设备。
为了保证网络的安全性,终端设备130在尝试与网络设备110建立通信连接的过程中,网络设备110需要验证终端设备130的身份,即,网络设备110需要获取终端设备130的SUCI。SUCI可以在终端设备130处生成,也可以在网络设备120处生成。终端设备130在获取SUCI后可以向网络设备110发送SUCI,以便于网络设备110对SUCI进行安全校验后建立通信连接。
下面,将详细描述本申请提供的发送用户标识的方法。如图2所示,方法200包括:
S210,ME通过第一通信连接从云卡池中的UICC接收USIM卡信息。
第一通信连接可以是无线连接,如蜂窝网络连接或Wi-Fi连接;第一通信连接也可以是有线连接。本申请对第一通信连接的具体形式不做限定。
本申请中,“第一”、“第二”等形容词用于区分同一类型的对象中的不同个体,例 如,第一通信连接与下文中的第二通信连接表示两个不同的通信连接。
USIM卡信息可以是EFust文件(即,USIM服务表),也可以是其它信息,本申请对USIM卡信息的具体内容不做限定。
USIM卡信息用于建立第二通信连接,ME获取USIM卡信息后可以建立与5G SA网络之间的无线资源控制(radio resource control,RRC)链路,并通过该RRC链路向5G SA网络发送包含全球唯一临时标识(globally unique temporary identifier,GUTI)的注册请求。5G SA网络收到该注册请求后向ME发送身份请求,则ME可以执行下列步骤。
S220,所述ME从5G SA网络接收身份请求,所述身份请求用于请求获取SUCI。
S230,所述ME根据所述身份请求和所述USIM卡信息获取所述SUCI,所述USIM卡信息用于指示所述SUCI的生成设备为所述ME或者所述UICC。
SUCI可以在ME侧生成,也可以在UICC侧生成。在一些情况中,USIM卡信息指示在ME侧生成SUCI,则ME可以在本地生成SUCI,避免了从UICC获取SUCI的时延,从而可以快速建立第二通信连接。在另一些情况中,USIM卡信息指示在UICC侧生成SUCI,例如,USIM卡信息缺少124服务和125服务,则ME可以从UICC获取SUCI,从而保证了第二通信连接的成功建立。
表1示出了ME获取SUCI的几种情况。
表1
Figure PCTCN2021123683-appb-000001
表1中,客户(client)指的是运营商。
当客户在USIM卡信息中配置了执行不加密策略的信息时,并且,当USIM卡信息满足表1中的四个条件中的任意一个时,ME根据身份请求在本地获取SUCI。当客户在USIM卡信息中配置了执行不加密策略的信息时,并且,当USIM卡信息不满足表1中的四个条件中的任意一个时(即,表1中的“N/A”所示的含义),ME根据身份请求从UICC获取SUCI。
表1中的四个条件即:USIM卡信息包括运营商请求在ME处生成SUCI的配置信息;USIM卡信息包括无授权紧急会话的配置信息;USIM卡信息为R15之前的卡的信息;USIM卡信息为R15的卡的信息,但是该R15的卡被配置为不加密卡。
当客户在USIM卡信息中配置了执行加密策略的信息时,ME可以基于EFust文件是否包含124服务和125服务确定SUCI的生成方式,其中,该加密策略例如是椭圆曲线集成加密策略(elliptic curve integrate encrypt scheme,ECIES)。
例如,当EFust文件不包括124服务和125服务时,ME在本地生成SUCI;当EFust文件包括124服务和125服务时,ME从UICC获取SUCI。
当ME根据身份请求从UICC获取SUCI时,ME可以通过第一通信连接向UICC发送SUCI获取请求,并通过第一通信连接从UICC接收SUCI。
ME获取SUCI后,可以执行下列步骤。
S240,所述ME向所述5G SA网络发送所述SUCI,所述SUCI用于建立第二通信连接。
第一通信连接可以是漫游通信连接,第二通信连接可以是非漫游通信连接,通过方法200可以在云通信场景中建立非漫游的5G通信连接,为用户节省费用。
下面结合图3和图4进一步说明第二通信连接的建立流程。
如图3所示,ME在建立第一通信连接后,建立于5G SA网络之间的RRC链路。随后,ME通过RRC链路从5G SA网络接收身份请求(identity request),并根据该身份请求确定获取SUCI。
ME可以根据USIM卡信息判断是否执行不加密策略。若执行不加密策略,则可以从UICC获取SUCI;若不执行不加密策略,则可以执行ECIES,并根据EFust文件是否包含124服务和125服务确定SUCI的生成方式。
当EFust文件不包括124服务和125服务时,ME在本地生成SUCI;当EFust文件包括124服务和125服务时,ME从UICC获取SUCI。
ME获取SUCI后,可以通过RRC链路向5G SA网络发送包含SUCI的身份响应,随后,可以通过RRC链路从5G SA网络接受鉴权请求(authentication request)。ME可以向UICC转发该鉴权请求,待收到UICC发送的鉴权响应后,通过RRC链路向5G SA网络转发鉴权响应,以便于建立与5G SA网络的通信连接(即,第二通信连接)。
图4是建立第二通信连接的另一示意图。
ME向5G核心网(5G core,5GC)发送鉴权响应之前的步骤与图3相同,在此不再赘述。其中,鉴权请求可以包括5G鉴权与密钥协商(authentication and key agreement,AKA)信息,也可以包括扩展鉴权协议(extensible authentication protocol,EAP)-AKA信息。
5GC完成鉴权任务后,可以通过无线接入网(radio access network,RAN)向ME发送非接入层(non-access stratum,NAS)安全模式命令。ME收到NAS安全模式命令后执行NAS安全模式,并通过RAN向5GC发送NAS安全模式完成消息。
随后,RAN向ME发送接入层(access stratum,AS)安全模式命令,ME收到AS安全模式命令后执行AS安全模式,并向RAN发送AS安全模式完成消息。
RAN还可以向ME发送5G能力查询消息,ME收到5G能力查询消息向RAN发送5G能力上报消息。
随后,5GC可以通过RAN向ME发送注册接受消息,并通过RAN从ME接收注册完成消息,从而建立了第二通信连接。
上文详细介绍了本申请提供的发送用户标识的方法的示例。可以理解的是,发送用户标识的装置为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
本申请可以根据上述方法示例对发送用户标识的装置进行功能单元的划分,例如,可以将各个功能划分为各个功能单元,也可以将两个或两个以上的功能集成在一个处理单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。需要说明的是,本申请中对单元的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
图5示出了本申请提供的一种发送用户标识的装置的结构示意图。装置500包括处理单元510、接收单元520和发送单元530,处理单元510能够通过接收单元520实现接收功能,处理单元510还能够通过发送单元530实现发送功能。
所述接收单元520用于:通过第一通信连接从云卡池中的UICC接收USIM卡信息;从5G SA网络接收身份请求,所述身份请求用于请求获取SUCI;
所述处理单元510用于:根据所述身份请求和所述USIM卡信息获取所述SUCI,所述USIM卡信息用于指示所述SUCI的生成设备为所述装置500或者所述UICC;
所述发送单元530用于:向所述5G SA网络发送所述SUCI,所述SUCI用于建立第二通信连接。
可选地,所述处理单元510具体用于:
当所述USIM卡信息包括加密指示信息时,并且,当所述USIM卡配置信息不包括124服务和125服务时,根据所述身份请求在本地获取所述SUCI;或者,
当所述USIM卡信息包括加密指示信息时,并且,当所述USIM卡配置信息包括124服务和125服务时,根据所述身份请求从所述UICC获取所述SUCI。
可选地,所述处理单元具体510用于:根据所述身份请求通过所述第一通信连接向所述UICC发送SUCI获取请求;通过所述第一通信连接从所述UICC获取所述SUCI。
可选地,所述处理单元510具体用于:
当所述USIM卡信息不包括加密指示信息时,并且,当所述USIM卡信息不满足下列四个条件中的任意一个时,根据所述身份请求从所述UICC获取所述SUCI;或者,
当所述USIM卡信息不包括加密指示信息时,并且,当所述USIM卡信息满足下列四个条件中的任意一个时,根据所述身份请求在本地获取所述SUCI;
所述四个条件为:所述USIM卡信息包括运营商请求在所述装置500处生成所述SUCI的配置信息;所述USIM卡信息包括无授权紧急会话的配置信息;所述USIM卡信息为R15之前的卡的信息;所述USIM卡信息为R15的卡的信息,但是所述R15的卡被配置为不加密卡。
可选地,所述处理单元510具体用于:根据所述身份请求通过所述第一通信连接向所述UICC发送SUCI获取请求;通过所述第一通信连接从所述UICC获取所述SUCI。
装置500执行方法200的具体方式以及产生的有益效果可以参见上述方法实施例中的相关描述。
图6示出了本申请提供的一种发送用户标识的设备的结构示意图,其中,虚线框表示该模块或单元为可选的。设备600可用于实现上述方法实施例中描述的方法,设备600可以是芯片或终端设备。
设备600包括一个或多个处理器601,该一个或多个处理器601可支持设备600实现图2所对应的方法实施例中的方法。处理器601可以是通用处理器或者专用处理器。例如,处理器601可以是中央处理器(central processing unit,CPU)或基带处理器。基带处理器可以用于处理通信数据(例如,SUCI),CPU可以用于对设备600进行控制,执行软件程序,处理软件程序的数据。
设备600还可以包括收发单元605和天线606,用以实现信号的输入(接收)和输出(发送)。
例如,设备600可以是芯片,收发单元605可以是该芯片的输入和/或输出电路,或者,收发单元605可以是该芯片的通信接口,该芯片可以作为终端设备或其它无线通信设备的组成部分。
设备600中可以包括一个或多个存储器602,其上存有程序604,程序604可被处理器601运行,生成指令603,使得处理器601根据指令603执行上述方法实施例中描述的方法。可选地,存储器602中还可以存储有数据。可选地,处理器601还可以读取存储器602中存储的数据,该数据可以与程序604存储在相同的存储地址,该数据也可以与程序604存储在不同的存储地址。
处理器601和存储器602可以单独设置,也可以集成在一起,例如,集成在系统级芯片(system on chip,SOC)上。
应理解,上述方法实施例的各步骤可以通过处理器601中的硬件形式的逻辑电路或者软件形式的指令完成。处理器601可以是CPU、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现场可编程门阵列(field programmable gate array,FPGA)或者其它可编程逻辑器件,例如,分立门、晶体管逻辑器件或分立硬件组件。
设备600执行方法200的具体方式以及产生的有益效果可以参见上述方法实施例中的相关描述。
本申请还提供了一种计算机程序产品,该计算机程序产品被处理器601执行时实现本申请中任一方法实施例所述的通信方法。
该计算机程序产品可以存储在存储器602中,例如是程序604,程序604经过预处理、编译、汇编和链接等处理过程最终被转换为能够被处理器601执行的可执行目标文件。
本申请还提供了一种计算机可读存储介质,其上存储有计算机程序,该计算机程序被计算机执行时实现本申请中任一方法实施例所述的通信方法。该计算机程序可以是高级语言程序,也可以是可执行目标程序。
该计算机可读存储介质例如是存储器602。存储器602可以是易失性存储器或非易失性存储器,或者,存储器602可以同时包括易失性存储器和非易失性存储器。其中,非易 失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。
本领域的技术人员可以清楚地了解到,为了描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的方法实施例的一些特征可以忽略,或不执行。以上所描述的装置实施例仅仅是示意性的,单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,多个单元或组件可以结合或者可以集成到另一个系统。另外,各单元之间的耦合或各个组件之间的耦合可以是直接耦合,也可以是间接耦合,上述耦合包括电的、机械的或其它形式的连接。
应理解,在本申请的各种实施例中,各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请的实施例的实施过程构成任何限定。
另外,本文中术语“系统”和“网络”在本文中常被可互换使用。本文中的术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
总之,以上所述仅为本申请技术方案的较佳实施例而已,并非用于限定本申请的保护范围。凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。

Claims (10)

  1. 一种发送用户标识的方法,其特征在于,包括:
    移动设备ME通过第一通信连接从云卡池中的通用集成电路卡UICC接收全球用户身份模块USIM卡信息;
    所述ME从第五代5G独立SA网络接收身份请求,所述身份请求用于请求获取用户加密标识SUCI;
    所述ME根据所述身份请求和所述USIM卡信息获取所述SUCI,所述USIM卡信息用于指示所述SUCI的生成设备为所述ME或者所述UICC;
    所述ME向所述5G SA网络发送所述SUCI,所述SUCI用于建立第二通信连接。
  2. 根据权利要求1所述的方法,其特征在于,所述ME根据所述身份请求和所述USIM卡信息获取SUCI,包括:
    当所述USIM卡信息包括加密指示信息时,并且,当所述USIM卡配置信息不包括124服务和125服务时,所述ME根据所述身份请求在本地获取所述SUCI;或者,
    当所述USIM卡信息包括加密指示信息时,并且,当所述USIM卡配置信息包括124服务和125服务时,所述ME根据所述身份请求从所述UICC获取所述SUCI。
  3. 根据权利要求2所述的方法,其特征在于,所述ME根据所述身份请求从所述UICC获取所述SUCI,包括:
    所述ME根据所述身份请求通过所述第一通信连接向所述UICC发送SUCI获取请求;
    所述ME通过所述第一通信连接从所述UICC获取所述SUCI。
  4. 根据权利要求1所述的方法,其特征在于,所述ME根据所述身份请求和所述USIM卡信息获取SUCI,包括:
    当所述USIM卡信息不包括加密指示信息时,并且,当所述USIM卡信息不满足下列四个条件中的任意一个时,所述ME根据所述身份请求从所述UICC获取所述SUCI;或者,
    当所述USIM卡信息不包括加密指示信息时,并且,当所述USIM卡信息满足下列四个条件中的任意一个时,所述ME根据所述身份请求在本地获取所述SUCI;
    所述四个条件为:所述USIM卡信息包括运营商请求在所述ME处生成所述SUCI的配置信息;所述USIM卡信息包括无授权紧急会话的配置信息;所述USIM卡信息为R15之前的卡的信息;所述USIM卡信息为R15的卡的信息,但是所述R15的卡被配置为不加密卡。
  5. 根据权利要求4所述的方法,其特征在于,所述ME根据所述身份请求从所述UICC获取所述SUCI,包括:
    所述ME根据所述身份请求通过所述第一通信连接向所述UICC发送SUCI获取请求;
    所述ME通过所述第一通信连接从所述UICC获取所述SUCI。
  6. 一种发送用户标识的装置,其特征在于,包括接收单元、处理单元和发送单元,
    所述接收单元用于:通过第一通信连接从云卡池中的通用集成电路卡UICC接收全球用户身份模块USIM卡信息;从第五代5G独立SA网络接收身份请求,所述身份请求用于请求获取用户加密标识SUCI;
    所述处理单元用于:根据所述身份请求和所述USIM卡信息获取所述SUCI,所述USIM卡信息用于指示所述SUCI的生成设备为所述装置或者所述UICC;
    所述发送单元用于:向所述5G SA网络发送所述SUCI,所述SUCI用于建立第二通信连接。
  7. 根据权利要求6所述的装置,其特征在于,所述处理单元具体用于:
    当所述USIM卡信息包括加密指示信息时,并且,当所述USIM卡配置信息不包括124服务和125服务时,根据所述身份请求在本地获取所述SUCI;或者,
    当所述USIM卡信息包括加密指示信息时,并且,当所述USIM卡配置信息包括124服务和125服务时,根据所述身份请求从所述UICC获取所述SUCI。
  8. 根据权利要求7所述的装置,其特征在于,所述处理单元具体用于:
    根据所述身份请求通过所述第一通信连接向所述UICC发送SUCI获取请求;
    通过所述第一通信连接从所述UICC获取所述SUCI。
  9. 根据权利要求6所述的装置,其特征在于,所述处理单元具体用于:
    当所述USIM卡信息不包括加密指示信息时,并且,当所述USIM卡信息不满足下列四个条件中的任意一个时,根据所述身份请求从所述UICC获取所述SUCI;或者,
    当所述USIM卡信息不包括加密指示信息时,并且,当所述USIM卡信息满足下列四个条件中的任意一个时,根据所述身份请求在本地获取所述SUCI;
    所述四个条件为:所述USIM卡信息包括运营商请求在所述装置处生成所述SUCI的配置信息;所述USIM卡信息包括无授权紧急会话的配置信息;所述USIM卡信息为R15之前的卡的信息;所述USIM卡信息为R15的卡的信息,但是所述R15的卡被配置为不加密卡。
  10. 根据权利要求9所述的装置,其特征在于,所述处理单元具体用于:
    根据所述身份请求通过所述第一通信连接向所述UICC发送SUCI获取请求;
    通过所述第一通信连接从所述UICC获取所述SUCI。
PCT/CN2021/123683 2020-12-03 2021-10-14 发送用户标识的方法和装置 WO2022116695A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US18/039,851 US20240098487A1 (en) 2020-12-18 2021-10-14 Method and apparatus for sending subscriber identifiers
JP2023557473A JP2023552243A (ja) 2020-12-18 2021-10-14 利用者識別子を送信する方法と装置

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011391949.0 2020-12-03
CN202011391949.0A CN112770314B (zh) 2020-12-03 2020-12-03 建立通信连接的方法和装置

Publications (1)

Publication Number Publication Date
WO2022116695A1 true WO2022116695A1 (zh) 2022-06-09

Family

ID=75693740

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/CN2021/123683 WO2022116695A1 (zh) 2020-12-03 2021-10-14 发送用户标识的方法和装置
PCT/CN2021/123684 WO2022116696A1 (zh) 2020-12-03 2021-10-14 建立通信连接的方法和装置

Family Applications After (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/123684 WO2022116696A1 (zh) 2020-12-03 2021-10-14 建立通信连接的方法和装置

Country Status (5)

Country Link
US (1) US20230396988A1 (zh)
EP (1) EP4221285A4 (zh)
JP (1) JP7450816B2 (zh)
CN (1) CN112770314B (zh)
WO (2) WO2022116695A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112770314B (zh) * 2020-12-03 2024-04-09 上海途鸽数据科技有限公司 建立通信连接的方法和装置
CN115002931A (zh) * 2022-05-18 2022-09-02 展讯通信(上海)有限公司 驻网方法及相关设备

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104394522A (zh) * 2014-10-30 2015-03-04 北京神州泰岳软件股份有限公司 一种通信链路的建立方法及装置
CN106412887A (zh) * 2016-06-15 2017-02-15 苏州畅途网络科技有限公司 一种虚拟sim卡的快速鉴权方法、系统、服务器及终端
US20170353939A1 (en) * 2016-06-01 2017-12-07 Intel IP Corporation Device and method for recovering services from network rejections to wireless communication devices
CN111083695A (zh) * 2019-12-30 2020-04-28 江苏全链通信息科技有限公司 5g通信无卡接入方法、设备及存储介质
CN111566994A (zh) * 2018-01-12 2020-08-21 瑞典爱立信有限公司 管理标识符隐私
CN112887965A (zh) * 2020-12-18 2021-06-01 合肥途鸽科技有限公司 发送用户标识的方法和装置

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013123233A2 (en) 2012-02-14 2013-08-22 Apple Inc. Methods and apparatus for large scale distribution of electronic access clients
CN105163305A (zh) * 2015-09-23 2015-12-16 联想(北京)有限公司 一种通讯方法及电子设备
CN105338515B (zh) * 2015-11-02 2020-08-25 联想(北京)有限公司 数据业务传输方法和移动通信设备
CN106454821A (zh) * 2016-02-01 2017-02-22 深圳市途鸽信息有限公司 虚拟用户识别模块鉴权方法和装置
CN107306387A (zh) * 2016-04-18 2017-10-31 中兴通讯股份有限公司 网络连接方法及装置、终端、系统
CN107567011B (zh) * 2016-07-01 2020-04-28 中兴通讯股份有限公司 一种网络接入业务实现方法、装置及通信终端
US10433156B1 (en) * 2018-04-24 2019-10-01 Sprint Communications Company L.P. Adapting subscriber identity module (SIM) card
CN108449801B (zh) * 2018-05-11 2020-09-18 深圳市优克联新技术有限公司 网络连接方法、装置、计算机装置及计算机可读存储介质
CN111866778B (zh) * 2019-04-29 2022-04-05 华为技术有限公司 基于漫游场景的鉴权方法、设备及系统
CN110401942B (zh) 2019-08-22 2022-05-27 天津泰岳小漫科技有限公司 云端sim卡处理方法、装置及服务器
CN112770314B (zh) * 2020-12-03 2024-04-09 上海途鸽数据科技有限公司 建立通信连接的方法和装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104394522A (zh) * 2014-10-30 2015-03-04 北京神州泰岳软件股份有限公司 一种通信链路的建立方法及装置
US20170353939A1 (en) * 2016-06-01 2017-12-07 Intel IP Corporation Device and method for recovering services from network rejections to wireless communication devices
CN106412887A (zh) * 2016-06-15 2017-02-15 苏州畅途网络科技有限公司 一种虚拟sim卡的快速鉴权方法、系统、服务器及终端
CN111566994A (zh) * 2018-01-12 2020-08-21 瑞典爱立信有限公司 管理标识符隐私
CN111083695A (zh) * 2019-12-30 2020-04-28 江苏全链通信息科技有限公司 5g通信无卡接入方法、设备及存储介质
CN112887965A (zh) * 2020-12-18 2021-06-01 合肥途鸽科技有限公司 发送用户标识的方法和装置

Also Published As

Publication number Publication date
EP4221285A1 (en) 2023-08-02
JP2023546509A (ja) 2023-11-02
US20230396988A1 (en) 2023-12-07
CN112770314A (zh) 2021-05-07
EP4221285A4 (en) 2024-03-27
CN112770314B (zh) 2024-04-09
JP7450816B2 (ja) 2024-03-15
WO2022116696A1 (zh) 2022-06-09

Similar Documents

Publication Publication Date Title
US20230016378A1 (en) Pdu session management
EP3557898B1 (en) Authorisation verification method and apparatus
US9467432B2 (en) Method and device for generating local interface key
US10743180B2 (en) Method, apparatus, and system for authenticating WIFI network
WO2022116695A1 (zh) 发送用户标识的方法和装置
US20230262459A1 (en) Service authorization method, communication apparatus, and system
WO2018176441A1 (zh) 用户鉴权方法和装置
CN109891921B (zh) 下一代系统的认证的方法、装置和计算机可读存储介质
WO2017133021A1 (zh) 一种安全处理方法及相关设备
WO2022170994A1 (zh) Pc5根密钥处理方法、装置、ausf及远程终端
US20230179997A1 (en) Method, system, and apparatus for determining user plane security algorithm
CN112514436A (zh) 发起器和响应器之间的安全的、被认证的通信
CN112449323B (zh) 一种通信方法、装置和系统
CN107104932A (zh) 密钥更新方法、装置及系统
US20240098487A1 (en) Method and apparatus for sending subscriber identifiers
US20160044487A1 (en) Network access method and apparatus, and network system
WO2018170703A1 (zh) 一种连接建立方法及装置
US10136283B2 (en) Methods for providing a response to a command requesting the execution of a proactive command
WO2021035740A1 (zh) 访问控制方法、服务器、访问设备及存储介质
CN113543131A (zh) 网络连接管理方法、装置、计算机可读介质及电子设备
CN116158100A (zh) 一种蓝牙设备接入认证方法、电子设备及存储介质
US20210120411A1 (en) Method for obtaining a profile for access to a telecommunications network
WO2023159603A1 (zh) 一种安全实现方法及装置、终端设备、网元
WO2023185513A1 (zh) 通信方法、装置以及系统
WO2024183537A1 (zh) 一种通信方法以及通信装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21899729

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 18039851

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 2023557473

Country of ref document: JP

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21899729

Country of ref document: EP

Kind code of ref document: A1