WO2022141132A1 - Resource checking method for service-based interface and related device - Google Patents
Resource checking method for service-based interface and related device Download PDFInfo
- Publication number
- WO2022141132A1 WO2022141132A1 PCT/CN2020/141127 CN2020141127W WO2022141132A1 WO 2022141132 A1 WO2022141132 A1 WO 2022141132A1 CN 2020141127 W CN2020141127 W CN 2020141127W WO 2022141132 A1 WO2022141132 A1 WO 2022141132A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network element
- client
- identifier
- client network
- request message
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 213
- 238000012795 verification Methods 0.000 claims abstract description 295
- 238000013507 mapping Methods 0.000 claims description 61
- 238000012545 processing Methods 0.000 claims description 34
- 238000012546 transfer Methods 0.000 claims description 22
- 238000004590 computer program Methods 0.000 claims description 10
- 230000001568 sexual effect Effects 0.000 claims 1
- 230000005540 biological transmission Effects 0.000 abstract description 44
- 238000012217 deletion Methods 0.000 abstract description 6
- 230000037430 deletion Effects 0.000 abstract description 6
- 230000008569 process Effects 0.000 description 107
- 230000004044 response Effects 0.000 description 86
- 230000006870 function Effects 0.000 description 36
- 238000004891 communication Methods 0.000 description 29
- 238000010586 diagram Methods 0.000 description 22
- 238000007726 management method Methods 0.000 description 18
- 239000003795 chemical substances by application Substances 0.000 description 15
- 101150102131 smf-1 gene Proteins 0.000 description 10
- 230000002159 abnormal effect Effects 0.000 description 8
- 238000012986 modification Methods 0.000 description 6
- 230000004048 modification Effects 0.000 description 6
- 101100477784 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) SMF2 gene Proteins 0.000 description 4
- 238000013475 authorization Methods 0.000 description 4
- 230000001413 cellular effect Effects 0.000 description 4
- 230000008859 change Effects 0.000 description 4
- 230000008878 coupling Effects 0.000 description 4
- 238000010168 coupling process Methods 0.000 description 4
- 238000005859 coupling reaction Methods 0.000 description 4
- 230000011664 signaling Effects 0.000 description 4
- 238000013461 design Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000013439 planning Methods 0.000 description 2
- 230000005856 abnormality Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000003190 augmentative effect Effects 0.000 description 1
- 238000013144 data compression Methods 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 239000003607 modifier Substances 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 238000001356 surgical procedure Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/142—Managing session states for stateless protocols; Signalling session states; State transitions; Keeping-state mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/146—Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
- H04W12/48—Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications
Definitions
- the present application relates to the field of communications, and in particular, to a service-oriented interface-oriented resource verification method and related equipment.
- the 5G system architecture control plane adopts service-oriented interface technology.
- the communication between the client and the server needs to be legalized, and the user resource identifier is one of the methods of legalization.
- the 3GPP Release 16 protocol does not provide a reliable verification method for the user resource identifier of the application layer. Therefore, a new service-oriented interface resource verification method is required to solve the verification problem of the user resource identifier of the application layer.
- the present application provides a service-oriented interface-oriented resource verification method and related equipment, which can verify the validity of client requests, avoid the server from operating resources according to unexpected client requests, and improve the operation efficiency of the server. Accuracy and Safety.
- the present application provides a resource verification method for a service-oriented interface, the method may include: a server network element receiving a first request message sent by a first client network element, the first request message carrying Information to be verified, the information to be verified is used to verify the validity of the first client network element; the server network element performs verification on the first client network element according to the information to be verified Legality verification; the server network element executes the first request message after verifying that the first client network element is legal.
- the server network element after receiving the message from the client network element, the server network element will verify the validity of the client network element, which prevents the server network element from operating resources according to unexpected client requests. , that is, to avoid misoperation, reduce the risk of wrong deletion of resources, accidental tampering and improper transmission, etc., and improve the accuracy and security of network element operations on the server side.
- the server network element receiving the first request message sent by the first client network element includes: receiving, by the server network element, the first request message sent by the first client network element.
- An HTTP request message sent by a client network element according to the hypertext transfer protocol the HTTP request message includes an HTTP protocol header and a message body, and the HTTP protocol header includes the type of the first client network element and the identifier of the first client network element .
- the message sent by the client network element to the server network element may be an HTTP request message
- the HTTP request includes information to be verified
- the server network element can
- legality verification which prevents the server-side network element from operating resources according to unexpected client requests, and improves the accuracy and security of the server-side network element operation.
- the message body includes the identifier of the first client network element
- the server network element interprets the first client network element according to the information to be verified.
- a client-side network element performing legality verification comprising: comparing, by the server-side network element, whether the first client-side network element identifier in the HTTP protocol header is consistent with the first client-side network element identifier in the message body; If they are consistent, it is confirmed that the first client network element is legal.
- the server network element can judge whether the client network element is legal by comparing the client network element identifier in the HTTP protocol header with the client network element identifier in the message body, avoiding the need for When the client network element is illegal, the server network element is still operating, and the resources are deleted by mistake, accidentally tampered with, and improperly transmitted, which improves the accuracy and security of the server network element operation.
- the server network element performs legality verification on the first client network element according to the information to be verified, including: when the When the type of the first client network element in the HTTP protocol header is consistent with the network element type of the server network element itself, the server network element compares the identifier of the first client network element in the HTTP protocol header with that of the server network element. Whether the identity of the network element instance of the server network element itself is consistent, if not, confirming that the first client network element is legal.
- the server network element can verify the network element type and network element identification respectively when verifying the legitimacy of the client network element, so as to avoid wrong execution of the old client network element.
- the resource deletion, tampering, and improper transmission may occur due to the request of the network element, which improves the accuracy and security of the operation of the network element on the server side.
- the method further includes: the server network element saves the first client After the server network element performs legality verification on the first client network element according to the information to be verified, the method further includes: the server network element receives the first A second request message sent by the client network element, where the second request message carries the identifier of the first client network element; the server network element compares the identifier of the first client network element in the second request message Whether it is consistent with the identifier of the first client network element saved by the server network element, if they are consistent, confirm that the first client network element is legal; the server network element is verifying the first client network element.
- the second request message is executed after being valid.
- the server network element after the server network element receives the message sent by the client network element for the first time, it will verify the legitimacy of the client network element.
- the client network element identifier is saved locally, and when the message sent by the client network element is received again, the server network element compares the client network element identifier carried in the request with the saved client network element.
- the element identifier is used to verify the legitimacy of the client network element, which prevents the server from operating resources according to unexpected client requests, and improves the accuracy and security of the server operation.
- the method before the server network element receives the first request message sent by the first client network element, the method further includes: the server network element element receives the third request message sent by the second client network element, the third request message carries the identifier of the second client network element; the server network element performs legality verification according to the identifier of the second client network element ; the server network element saves the identifier of the second client network element after verifying that the first client network element is legal; after the server network element receives the first request message sent by the first client network element , the method further includes: comparing, by the server network element, whether the identifier of the first client network element in the HTTP protocol header is consistent with the stored identifier of the second client network element.
- the new client network element sends a message to the server network element, and the server network element can perform two verifications, and compare the client network element carried in the message. Whether the element identifier is consistent with the client network element stored locally by the server network element, if not, then compare the HTTP protocol header in the request with the client network element identifier in the message body, which improves the accuracy of legality verification. This means that the accuracy and security of server-side operations are improved.
- the information to be verified includes a first resource verification identifier
- the method further includes: receiving, by the server network element, a fourth request message sent by the first client network element, where the fourth request message carries the first resource verification identifier, and the first resource verification
- the identifier is used to uniquely identify the first client network element; the server network element saves the first resource verification identifier; the server network element checks the first client network element according to the information to be verified.
- the validity verification of the element includes: comparing, by the server network element, whether the first resource verification identifier carried in the first request message is consistent with the stored first resource verification identifier, and if they are consistent, confirming the first client The network element is legal.
- the server network element can also verify the client network element according to the resource verification identifier, and the server network element to verify the legitimacy of the client through the resource verification identifier needs to first save the resource verification identifier, which can be It is understood that when the client network element sends a message to the server network element for the first time, the server network element will save the resource verification identifier in the message. If the client network element sends a message to the server network element again, the server network element will The element verifies the legitimacy of the client network element by comparing the saved resource verification identifier with the resource verification identifier in the message received later, which prevents the server from operating resources according to unexpected client requests, and improves the operation efficiency of the server. Accuracy and Safety.
- the method further includes: receiving, by the server network element, a third client network element
- the fifth request message sent by the client, the fifth request message carries the first resource verification identifier and the second resource verification identifier, and the second resource verification identifier is used to uniquely identify the third client network element; the The server network element compares whether the first resource verification identifier carried in the fifth request message is consistent with the saved first resource verification identifier, and if they are consistent, the server network element deletes the first resource verification identifier, The second resource verification identifier is saved.
- the server network element will update the resource verification identifier of the old client network element stored locally to the changed resource verification identifier of the client network element , so as to facilitate the subsequent legality verification of the changed client network element, so that the accuracy and security of the server operation are greatly improved.
- the server network element includes an address mapping table, and the address mapping table includes a first client network element identifier and the first client network element.
- the client address information corresponding to the element identifier, the information to be verified includes the client address information, and the server network element performs legality verification on the first client network element according to the information to be verified, Including: the server network element traverses the address mapping table, and determines whether the address mapping table contains the client address information carried in the first request message, if the address mapping table contains the client address information, it is confirmed that the first client network element is legal.
- the server network element can also verify the legitimacy of the client network element through the client address information, thereby avoiding the server operating resources according to unexpected client requests, and improving the accuracy of the server operation. sex and safety.
- a network device may include: a receiving unit configured to receive a first request message sent by a first client network element, where the first request message carries information to be verified, and the The information to be verified is used to verify the validity of the first client network element; the processing unit is used to verify the legality of the first client network element according to the information to be verified; The first request message is executed after the first client network element is legal.
- the receiving unit when the receiving unit is configured to receive the first request message sent by the first client network element, the receiving unit is specifically configured to: receive the first request message sent by the first client network element.
- the HTTP request message sent by the client network element according to the hypertext transfer protocol the HTTP request message includes an HTTP protocol header and a message body, and the HTTP protocol header includes the first client network element type and the first client network element identifier.
- the message body includes the identifier of the network element of the first client
- the processing unit is configured to perform an analysis on the information to be verified according to the information to be verified.
- the first client network element performs legality verification, it is specifically used to: compare whether the first client network element identifier in the HTTP protocol header is consistent with the first client network element identifier in the message body, and if If they are consistent, it is confirmed that the first client network element is legal.
- the processing unit when used to verify the validity of the first client network element according to the information to be verified, specifically use In: when the first client network element type in the HTTP protocol header is consistent with the network element type of the server network element itself, compare the first client network element identifier in the HTTP protocol header with the Whether the network element instance identifiers of the server network element itself are consistent, if not, it is confirmed that the first client network element is legal.
- the processing unit is further configured to save the first request message Client network element identifier; after the processing unit verifies the validity of the first client network element according to the information to be verified, the receiving unit is further configured to receive the information sent by the first client network element a second request message, where the second request message carries the identifier of the network element of the first client; the processing unit is further configured to: compare the identifier of the network element of the first client in the second request message with the identifier of the network element of the first client Whether the identifiers of the first client NEs saved by the server NE are consistent, if they are consistent, confirm that the first client NE is legal; execute the second request message after verifying that the first client NE is legal .
- the receiving unit before the receiving unit receives the first request message sent by the first client network element, the receiving unit is further configured to: receive the second client a third request message sent by the end network element, where the third request message carries the identifier of the second client network element; the processing unit is further configured to: perform legality verification according to the identifier of the second client network element; After verifying that the first client network element is legal, save the identifier of the second client network element; after the receiving unit receives the first request message sent by the first client network element, the processing unit is further configured to: Compare whether the identifier of the first client network element in the HTTP protocol header is consistent with the stored identifier of the second client network element.
- the information to be verified includes a first resource verification identifier
- the receiving unit is further configured to: receive a fourth request message sent by the first client network element, where the fourth request message carries the first resource verification identifier, and the first resource verification identifier is used to uniquely Identifies the first client network element;
- the processing unit is further configured to: save the first resource verification identifier; perform legality verification on the first client network element according to the information to be verified, including : Compare whether the first resource verification identifier carried in the first request message is consistent with the stored first resource verification identifier, and if they are consistent, confirm that the first client network element is legal.
- the receiving unit is further configured to: receive the data sent by the third client network element. a fifth request message, where the fifth request message carries the first resource verification identifier and the second resource verification identifier, and the second resource verification identifier is used to uniquely identify the third client network element; the processing unit , and is also used to: compare whether the first resource verification identifier carried in the fifth request message is consistent with the saved first resource verification identifier, and if they are consistent, delete the first resource verification identifier and save the second resource Check mark.
- the device includes an address mapping table, and the address mapping table includes a first client network element identifier corresponding to the first client network element identifier
- the client address information, the information to be verified includes the client address information
- the processing unit when used to verify the validity of the first client network element according to the information to be verified, It is specifically used for: traversing the address mapping table, judging whether the address mapping table contains the client address information carried in the first request message, and confirming if the address mapping table contains the client address information The first client network element is legal.
- a computing device in a third aspect, includes a processor, and the processor is configured to support the electronic device to implement the first aspect and the service-oriented provided in combination with any one of the above-mentioned first aspects.
- the corresponding function in the resource verification method of the interface may also include a memory for coupling with the processor that holds program instructions and data necessary for the electronic device.
- the computing device may also include a communication interface for the computing device to communicate with other devices or a communication network.
- a computer-readable storage medium stores a computer program.
- the computer program is executed by the processor, the first aspect and any one of the first aspect can be implemented.
- the function of the resource verification method for the service-oriented interface provided by this implementation.
- the present application provides a computer program product, the computer program includes instructions that, when the computer program is executed by a computer, enables the computer to execute the above-mentioned first aspect and any implementation manner in combination with the above-mentioned first aspect The process of the provided service-oriented interface resource verification method.
- the present application provides a chip system
- the chip system includes a processor for supporting a network device to implement the functions involved in the first aspect, for example, generating or processing the service-oriented interface of the first aspect. Information involved in the resource verification method.
- the chip system further includes a memory for storing necessary program instructions and data of the data sending device.
- the chip system may be composed of chips, or may include chips and other discrete devices.
- the network device provided by the second aspect, the computing device provided by the third aspect, the computer-readable storage medium provided by the fourth aspect, and the computer program product provided by the fifth aspect , and the chip system provided by the sixth aspect is used to execute the service-oriented interface-oriented resource verification method provided by the first aspect. Therefore, for the beneficial effects that can be achieved, reference may be made to the beneficial effects of the service-oriented interface-oriented resource verification method provided in the first aspect, which will not be repeated here.
- FIG. 1 is a schematic diagram of a session creation process provided by an embodiment of the present application.
- FIG. 2 is a schematic diagram of a PDU session reconstruction process provided by an embodiment of the present application
- FIG. 3 is a schematic diagram of a 5G service-oriented architecture provided by an embodiment of the present application.
- FIG. 4 is a schematic flowchart of a resource verification method for a service-oriented interface provided by an embodiment of the present application
- FIG. 5 is a schematic flowchart of a user mobile update provided by an embodiment of the present application.
- FIG. 6 is a schematic diagram of a correspondence between a first client network element identifier and client address information according to an embodiment of the present application
- FIG. 7 is a schematic diagram of an address mapping table provided by an embodiment of the present application.
- FIG. 8 is a schematic flowchart of yet another service-oriented interface-oriented resource verification method provided by an embodiment of the present application.
- FIG. 9 is a schematic flowchart of yet another service-oriented interface-oriented resource verification method provided by an embodiment of the present application.
- FIG. 10 is a schematic flowchart of yet another service-oriented interface-oriented resource verification method provided by an embodiment of the present application.
- FIG. 11 is a schematic flowchart of yet another service-oriented interface-oriented resource verification method provided by an embodiment of the present application.
- FIG. 12 is a schematic diagram of AMF and SMF registering NRF provided by an embodiment of the present application.
- FIG. 13 is a schematic diagram of an AMF client address information configuration provided by an embodiment of the present application.
- FIG. 14 is a schematic diagram of the SMF verifying the validity of the AMF provided by the embodiment of the present application.
- FIG. 15 is a schematic diagram of an AMF verifying the validity of an SMF provided by an embodiment of the present application.
- FIG. 16 is a schematic diagram of a network device according to an embodiment of the present application.
- FIG. 17 is a schematic structural diagram of a computing device according to an embodiment of the present application.
- Uniform Resource Identifier means that every resource available on the web, such as HTML documents, images, video clips, programs, etc., is identified by a URI.
- the International Mobile Subscriber Identity is an identification code used to distinguish different users in a cellular network and will not be repeated in all cellular networks.
- the phone stores the IMSI in a 64-bit field and sends it to the network.
- the IMSI can be used to query the user's information in the Home Location Register (HLR) or the Visitor Location Register (VLR).
- HLR Home Location Register
- VLR Visitor Location Register
- the 5G Globally Unique Temporary UE Identity (G-GUTI) consists of two parts: the first part identifies the 5G-GUTI allocated by which AMF; the second part represents the UE's unique id within the AMF.
- the purpose of using 5G-GUTI under the 5G system is to reduce the display of the permanent identity of the UE in communication, which can improve security.
- GPSI Generic Public Subscription Identifier
- SUPI Subscription Permanent Identifier
- the PDU Session ID (PDU Session ID) is an ID used to identify the PDU session. This ID is unique to each terminal, and the number range is limited to the UE that initiated the PDU session.
- the session context identifier (SM context reference assigned by the SMF during the Create SM Context service operation, smContextRef) assigned by the SMF is used to respond to the AMF request, indicating that the SMF can process subsequent processes.
- User Equipment also known as terminal equipment, mobile station (Mobile Station, MS), mobile terminal (Mobile Terminal, MT), etc.
- the terminal device can be a handheld terminal, a notebook computer, a subscriber unit (Subscriber Unit), a cellular phone (Cellular Phone), a smart phone (Smart Phone), a wireless data card, a personal digital assistant (Personal Digital Assistant, PDA) computer, tablet computer , Wireless Modem (Modem), Handheld Device (Handheld), Laptop Computer (Laptop Computer), Cordless Phone (Cordless Phone) or Wireless Local Loop (WLL) station, Machine Type Communication, MTC) terminals, wearable devices (such as smart watches, smart bracelets, pedometers, etc.), in-vehicle devices (such as cars, bicycles, electric vehicles, airplanes, ships, trains, high-speed rail, etc.), virtual reality (Virtual Reality, VR) equipment, Augmented Reality (AR) equipment, wireless
- VR Virtual Reality
- AR Augmented Reality
- the terminal device in FIG. 3 is shown as a UE, which is only an example and does not limit the terminal device.
- the UE can access the DN by establishing a session between the UE-(R)AN device-UPF-DN, that is, a protocol data unit (Protocol Data Unit, PDU) session.
- a protocol data unit Protocol Data Unit, PDU
- the (Radio) Access Network ((R)AN) device is a device that provides wireless access to the UE, and is mainly responsible for radio resource management, Quality of Service (QoS) flow management on the air interface side, Features such as data compression and encryption.
- (R)AN devices may include various forms of base stations, such as: macro base stations, micro base stations (also called small stations), relay stations, access points, and the like.
- the (R)AN device may also include a Wireless Fidelity (Wi-Fi) access node (Access Point, AP).
- Wi-Fi Wireless Fidelity
- the (R)AN device may also include a Worldwide Interoperability for Microwave Access (WiMAX) base station (Base Station, BS).
- WiMAX Worldwide Interoperability for Microwave Access
- the user plane function (UPF) network element is mainly responsible for processing user packets, such as forwarding and charging.
- the user packet can be received from the DN and transmitted to the UE through the RAN device; the user packet can also be received from the UE through the RAN device and forwarded to the DN.
- the transmission resources and scheduling functions provided by the UPF network element to serve the UE are managed and controlled by the SMF network element.
- the data network can be the Internet (Internet), IP Multimedia Service (IP Multimedia Service, IMS) network, regional network, that is, local network, such as Multi-Access Edge Computing (Multi-Access Edge Computing, MEC) network ,Wait.
- IP Multimedia Service IP Multimedia Service
- IMS IP Multimedia Service
- MEC Multi-Access Edge Computing
- the DN is the destination of the UE's PDU session access.
- An application server is included or deployed in the DN, and the application server can perform data transmission with the UE and provide business services for the UE.
- the authentication server function (Authentication Server Function, AUSF) network element can be responsible for the authentication and authentication of the access of the UE, and also responsible for the charging.
- AUSF Authentication Server Function
- the Access and Mobility Management Function (AMF) network element can access the UE's non-access stratum (Non Access Stratum, NAS) signaling (including session management (Session Management, SM) signaling through the N1 interface. Command) and the N2 interface to access the RAN signaling to complete the UE registration process and SM signaling forwarding and mobility management.
- NAS non-access stratum
- Session Management, SM Session Management
- the session management function Session Management Function, SMF
- SMF Session Management Function
- SMF Session Management Function
- Specific functions include assigning IP addresses to users and selecting UPF network elements that provide packet forwarding functions.
- the Network Slice Selection Function (NSSF) network element is a new network element of 5G. It is mainly used in 5G slice services and is responsible for managing network slice-related confidence.
- the Network Exposure Function (NEF) network element is responsible for opening network data to the outside world.
- the network element data warehouse function (NF Repository Function, NRF) network element is responsible for the registration, management and status detection of the NF, which can realize the automatic management of all NFs.
- NRF Network element Repository Function
- the Policy Control Function (PCF) network element can be responsible for terminal device policy management, including both mobility-related policies and PDU session-related policies, such as QoS policies and charging policies.
- PCF Policy Control Function
- the Unified Data Management (UDM) network element is responsible for user key management, user identification processing, access authorization for subscription data, UE network function entity management, session and business continuity management, short message push, legal interception, Contract management, short message management, used to manage and control user data, such as contract information management.
- UDM Unified Data Management
- the Application Function (AF) network element mainly supports interaction with the 3rd Generation Partnership Project (3GPP) core network to provide services to affect service flow routing, access network capability opening, policy control, etc. .
- 3GPP 3rd Generation Partnership Project
- the service-oriented interface is a modeled interaction method between different network entities introduced by the 5G architecture.
- the 5G network can be used for various specific tasks.
- a service interface is only for one network function block, the network function block interacts with other function blocks through this interface, and other function blocks interact with this function block through another corresponding interface.
- Policy and Charging Control is an architecture that maps the QoS requirements of application-level session service data streams to IP-CAN, and accesses the QoS requirements of transport network bearer-level services to ensure data transmission.
- the operator's charging policy implements the charging function at the service data flow level.
- Hyper Text Transfer Protocol is a simple request-response protocol that usually runs on top of TCP. It specifies what kind of messages the client might send to the server and what kind of response it gets.
- the headers of the request and response messages are given in ASCII; the message content has a format similar to Multipurpose Internet Mail Extensions (MIME).
- MIME Multipurpose Internet Mail Extensions
- HTTP messages consist of client-to-server requests and server-to-client responses. Both the request message and the response message consist of a start line (for a request message, the start line is the request line, for a response message, the start line is the status line), message header (optional), blank line (only CRLF lines), message body (Optional) Composition.
- HTTP message headers include normal headers, request headers, response headers, and entity headers.
- Request headers allow the client to pass additional information about the request to the server as well as information about the client itself.
- Accept image/gif, indicating that the client wants to accept resources in GIF image format
- Accept text/html, indicating that the client wants to accept html text.
- Accept-Charset which is used to specify the character set accepted by the client.
- Accept-Charset iso-8859-1, gb2312, indicating that if this field is not set in the request message, the default is that any character set is acceptable.
- Accept-Encoding similar to Accept, but it is used to specify acceptable content encodings.
- Accept-Encoding gzip.deflate. If this is not set in the request message, the domain server assumes that the client accepts various content encodings.
- Accept-Language similar to Accept, but it is used to specify a natural language.
- Authorization is mainly used to prove that the client has the right to view a resource.
- a browser accesses a page, if it receives a response code of 401 (unauthorized) from the server, it can send a request containing the Authorization request header field, asking the server to authenticate it.
- Host (this header field is required when sending a request) is mainly used to specify the Internet host and port number of the requested resource, which is usually extracted from the HTTP URL.
- User-Agent used to obtain the client's operating system, browser and other properties.
- the User-Agent request header field allows the client to tell the server its operating system, browser, and other attributes.
- Response headers allow the server to pass additional response information that cannot be placed in the status line, as well as information about the server and further access to the resource identified by the Request-URI.
- the Location response header field is often used when changing the domain name.
- Server contains software information that the server uses to process requests. Corresponds to the User-Agent request header field.
- Both request and response messages can convey an entity.
- An entity consists of the entity header field and the entity body, but it does not mean that the entity header field and the entity body should be sent together, and only the entity header field can be sent.
- the entity header defines meta-information about the entity body (eg, the presence or absence of an entity body) and the resource identified by the request.
- Content-Encoding used as a modifier for the media type, its value indicates the encoding of the additional content that has been applied to the entity body, so to obtain the media type referenced in the Content-Type header field, the corresponding decoding must be used mechanism.
- Content-Length used to indicate the length of the entity body, expressed as a decimal number stored in bytes.
- Content-Type used to indicate the media type of the entity body sent to the recipient.
- Last-Modified which indicates the date and time when the resource was last modified.
- UUID Universally Unique Identifier
- GUID Globals Unique Identifier
- Bits 1 to 8 adopt the system time, and the system time is accurate to the millisecond level to ensure the uniqueness of time;
- Bits 17 to 24 adopt the Hash Code value of the current object to ensure uniqueness on an internal object
- the request message sent by the client will carry URI, user identifier (such as IMSI, 5G-GUTI, GPSI, etc.) and special resource identifiers (such as PDU Session ID, smContextRef, subscription identifier, etc.), and the server uses these identifiers Locate the local user context, and then complete the client request operation.
- user identifier such as IMSI, 5G-GUTI, GPSI, etc.
- special resource identifiers such as PDU Session ID, smContextRef, subscription identifier, etc.
- FIG. 1 is a schematic diagram of a session creation process provided by an embodiment of the present application.
- the user requests to create a PDU session
- the session ID of the PDU session is 5
- the SMF associated before PDU5 is SMF1
- the currently associated SMF is SMF2
- session PDU5 There is a context for session PDU5. If the SMF1 requests the AMF to release the user's session, the AMF performs the service request incorrectly.
- FIG. 2 is a schematic diagram of a PDU session reestablishment process provided by an embodiment of the present application.
- the SMF associated with PDU5 before is SMF1
- AMF selects a new SMF-SMF2 for session PDU5
- the SMF associated with PDU5 is SMF2 at this time.
- the AMF notifies the SMF1 that the request to delete the context of the PDU5 is not sent successfully, resulting in the context of the PDU5 still existing in the SMF1, and the AMF continues to process the session re-establishment process.
- the SMF1 releases the context of the PDU5 and notifies the AMF to delete the context of the PDU5 due to reasons such as the maintenance command triggering or the resource release timer timeout triggering the resource release. If the SMF2 then requests to process the context of PDU5 at this time, the AMF will reply abnormally because there is no context, resulting in an abnormal session re-establishment process.
- SMF1 is the client network element, and its identifier is PDU5, which is a general identifier and has a limited range (1-15).
- PDU5 is a general identifier and has a limited range (1-15).
- AMF cannot verify the legitimacy of the client network element, which will lead to wrong operation.
- SMF1 when SMF1 notifies AMF to delete the context of PDU5, SMF1 is a client network element, and the identifier it carries is PDU5, which is a general identifier and has a limited range (1-15).
- AMF as a server network element, cannot verify the client The validity of the network element causes the AMF to delete the PDU5 context by mistake, resulting in an abnormality in the subsequent session re-establishment process.
- the present application provides a service-oriented interface-oriented resource verification method and related equipment, which can allow the client network element to carry more information, so as to support the server network element to perform legal verification and avoid occurrence of Misoperations such as wrong deletion, wrong tampering, and improper transmission of resources improve the accuracy and security of server-side network element operations.
- FIG. 3 is a schematic diagram of a 5G service-oriented architecture disclosed in an embodiment of the present application.
- the 5G service-oriented architecture may include UE, (R)AN equipment, UPF network element, DN, AUSF network element, AMF network element, SMF network element, NSSF network element, NEF network element, NRF network element element, PCF network element, UDM network element, AF network element, etc., also includes Service Based Interface (SBI), such as Nnssf, Nnef, Nnrf, Npcf, etc., and also includes reference points, such as N1, N2, N3, N4, N6, where N1 is the reference point between UE and AMF, N2 is the reference point between (R)AN and AMF, N3 is the reference point between (R)AN and UPF, and N4 is SMF and UPF N6 is the reference point between UPF and DN.
- SBI Service Based Interface
- N1 is the reference point between UE and AMF
- N2 is the reference point between (R)AN and AMF
- N3 is the reference point between (R)AN and UPF
- N4 is
- Each of the above network elements in the core network can also be referred to as functional entities, which can be either network elements implemented on dedicated hardware, software instances running on dedicated hardware, or instances of virtualized functions on an appropriate platform
- the above-mentioned virtualization platform may be a cloud platform.
- the network element in FIG. 3 may be a server network element or a client network element. After the information is sent, it is necessary to verify the validity of the client network element, and then determine whether to perform subsequent operations according to the verification result.
- system architecture shown in FIG. 3 is not limited to the network elements shown in the figure, and may also include other devices not shown in the figure, which will not be listed one by one here.
- the 5G network architecture shown in FIG. 3 does not constitute a limitation on the 5G network.
- the methods in the embodiments of the present application are also applicable to various future communication systems, such as 6G or other communication networks.
- FIG. 4 is a schematic flowchart of a service-oriented interface-oriented resource verification method provided by an embodiment of the present application. The method can be applied to the 5G service-oriented architecture shown in FIG. 3. The The method includes but is not limited to the following steps:
- S401 The server network element receives the first request message sent by the first client network element.
- the first client network element sends a first request message to the server network element, and the server network element receives the first request message sent by the first client network element, where the first request message carries the information to be verified,
- the to-be-verified information is used to verify the validity of the first client network element.
- the server network element receives an HTTP request message sent by the first client network element according to the hypertext transfer protocol, that is, the first request message may be an HTTP request message, and the The HTTP request message includes an HTTP protocol header and a message body, the HTTP protocol header includes the first client network element type and the first client network element identifier, and the message body includes the first client network element identifier, that is, the The information to be verified includes the first client network element type and the first client network element identifier.
- the first client network element identifier can be a network element instance identifier.
- the HTTP protocol header includes Accept, Accept-Encoding, Context-Length, Context-Type, User -Agent and other information, where the protocol defines User-Agent in the form of "NF Type-", NF Type refers to the network element type, and the content after "-" is optional information, which can be customized by equipment manufacturers.
- the optional information can be customized as a network element instance ID (NF Instance ID), and the NF Instance ID can be changed to mandatory content in the User-Agent, that is, the customization operation is completed
- NF Type-NF Instance ID which means that the HTTP protocol header can include the NE type and NE instance ID.
- the User-Agent in the HTTP protocol header is the AMF-AMF Instance ID, and the AMF Instance ID refers to the instance identifier of the AMF.
- the User-Agent may be AMF-00000000-0000 -0000-000000000011, at this time, the instance identifier of AMF is 00000000-0000-0000-000000000011.
- the first client network element identifier may also be a serving network element identifier (Serving NF ID), and the Serving NF ID may be carried by the HTTP protocol header like the above-mentioned NF Instance ID.
- the first request message carries information to be verified
- the information to be verified includes a first resource verification identifier
- the first resource verification identifier is used to uniquely identify the first client
- the end network element that is, the first request information carries the first resource verification identifier.
- the first request message may be an HTTP request message or other types of messages. Therefore, the first resource verification identifier may be carried by the HTTP request message or by the HTTP protocol layer. This is not limited.
- the resource verification identifier includes but is not limited to a network element instance identifier (NF Instance ID), and the network element instance identifier can be carried through the HTTP protocol layer.
- NF Instance ID network element instance identifier
- the server network element includes an address mapping table
- the information to be verified includes a first client network element identifier and client address information corresponding to the first client network element identifier
- there is a mapping relationship between the first client network element identifier and the client address information which means that the client address information can be found through the first client network element identifier
- the first client network element identifier may be a network element instance identifier or a service network element identifier.
- S402 The server network element performs legality verification on the first client network element.
- the server network element After receiving the first request message sent by the first client network element, the server network element performs legality verification on the first client network element according to the information to be verified carried in the first request message.
- the first request message is an HTTP request message
- the HTTP request message includes an HTTP protocol header and a message body
- the HTTP protocol header includes the first client network element type and the first client network element identifier
- the message body includes the network element identifier of the first client.
- the legality verification may have the following forms:
- the server network element compares whether the first client network element identifier in the HTTP protocol header is consistent with the first client network element identifier in the message body, and if they are consistent, confirms The first client network element is legal.
- the above-mentioned validity process may occur when the server network element receives the message from the first client network element for the first time, that is, the first request message may be the message sent by the first client network element to the server network element for the first time.
- the server network element after the server network element confirms that the first client network element that sent the first request message is legal, the server network element saves the identifier of the first client network element.
- the network element sends a second request message to the server network element, where the second request message includes the first client network element identifier, and the server network element checks the validity of the first client network element according to the first client network element identifier Verification, specifically, the server network element compares whether the first client network element identifier in the second request message is consistent with the first client network element identifier saved by the server network element, and if they are consistent, confirms sending the second request The first client network element of the message is legal.
- the server network element and the first client The end network elements are different network elements of the same type.
- the server network element needs to be changed to the first client network element
- the first client network element sends a first request message to the server network element to obtain the information in the server network element.
- the server network element will compare whether the first client network element type in the HTTP protocol header is consistent with the server network element's own network element type.
- the server network element continues to compare whether the identifier of the first client network element in the HTTP protocol header is consistent with the identifier of the network element instance of the server network element itself, and if not, confirm the first client network element legitimate.
- the UE sends a registration request to the NEW AMF, and the NEW AMF determines that the UE initiates a registration request after receiving the registration request sent by the UE.
- the NEW AMF sends a context transfer request to the OLD AMF to obtain the user context.
- the NEW AMF and the OLD AMF are different network elements of the same type.
- the NEW AMF is the first client network element
- the OLD AMF is the server network element
- the context transmission request is the first request message.
- the context transfer request is an HTTP request message
- the User-Agent in the HTTP protocol header is the AMF-AMF Instance ID
- the first client network element type in the HTTP protocol header is AMF
- the HTTP protocol header is AMF.
- the first client network element identifier in the header is AMF Instance ID, for example, the first client network element identifier may be AMF-00000000-0000-0000-000000000011.
- the OLD AMF receives the context transmission request, and compares whether the first client network element type in the HTTP protocol header is consistent with the network element type of the OLD AMF itself. It can be seen that both the NEW AMF and the OLD AMF are AMF network elements.
- the NEW AMF may continue to process the context transfer request and send a context transfer response to the OLD AMF.
- the context transfer request may be a Namf_Communication_UEContextTransfer Request.
- the first client network element is a changed network element of the second client network element, which means that the first client network element sends the first request message to the server network element.
- a process occurs after the above modification process. It can be understood that before the server network element receives the first request message sent by the first client, the server network element receives the third request message sent by the second client network element.
- the third request message carries the identifier of the second client network element, the server network element will verify the validity of the second client network element according to the second client network element identifier, and the server network element is verifying the second client network element. After the end network element is legal, the second client instance identifier will be saved.
- the server-side network element After the server-side network element receives the first request message sent by the first client-side network element, the server-side network element compares the identifier of the first client-side network element in the HTTP protocol header with the second client-side network element stored therein If they are inconsistent, the server network element will continue to compare whether the first client network element identifier in the HTTP protocol header is consistent with the first client network element identifier in the message body. The element confirms that the first client network element is legal.
- the NEW AMF may initiate a session update process. Specifically, the NEW AMF sends a context update request to the SMF.
- the NEW AMF is the first client network. element, SMF is a server network element, and the update context request is a first request message.
- the update context request is an HTTP request message
- the User-Agent in the HTTP protocol header is the AMF-AMF Instance ID, that is, the first client network element type in the HTTP protocol header is AMF
- the HTTP protocol The first client network element identifier in the header is AMF Instance ID
- the User-Agent may be AMF-00000000-0000-0000-0000-000000000012.
- the update context request may be an Nsmf_PDUSession_UpdateSMContext Request.
- the OLD AMF will send a session creation request to the SMF, that is, before the SMF receives the update context request sent by the NEW AMF, the SMF will receive the session creation request sent by the OLD AMF.
- the OLD AMF is the second client network element
- the SMF is the server network element
- the session creation request is a third request message
- the third request message carries the identifier of the second client network element.
- the session creation request is an HTTP request message
- the User-Agent in the HTTP protocol header is the AMF-AMF Instance ID, that is, the first client network element type in the HTTP protocol header is AMF, and the HTTP protocol header is AMF.
- the second client network element identifier in the header is AMF Instance ID, for example, the User-Agent may be AMF-00000000-0000-0000-0000-000000000011.
- the SMF After the SMF receives the update context request sent by the NEW AMF, the SMF will compare whether the first client network element identifier in the HTTP protocol header of the update context request is consistent with the second client network element identifier stored in it. SMF will continue to compare whether the first client network element identifier in the HTTP protocol header is consistent with the first client network element identifier in the message body of the update context request. If they are consistent, SMF confirms the first client network element identifier. The end network element is legal. At this time, the SMF can continue to process the update context request and send the update context response to the NEW AMF.
- the NEW AMF can also send a context release request to the SMF, and the process of SMF's verification of the validity of the NEW AMF can be referred to above, and will not be repeated here.
- the above-mentioned relevant process of the NEW AMF sending the update context request and the release context request to the SMF is an optional process of the user mobile update process shown in FIG. 5.
- some content is omitted in the user mobile update process shown in FIG. 5. , for details, please refer to 3GPP related protocols, which will not be repeated here.
- the first request message includes the information to be verified
- the information to be verified includes a first resource verification identifier
- the first resource verification identifier is used to uniquely identify the first client A network element, that is, the first request information carries the first resource verification identifier.
- the legality verification may have the following forms:
- the first client network element before sending the first request message to the server network element, the first client network element will also send a fourth request message to the server network element, where the fourth request message carries the first request message.
- a resource verification identifier the first resource verification identifier is used to uniquely identify the first client network element
- the server network element after receiving the fourth request message, the server network element will save the first resource verification identifier, and then The client network element performs legality verification. Specifically, the server network element compares the first resource verification identifier carried in the first request message with the stored first resource verification identifier. If they are consistent, the server network element confirms the first resource verification identifier. A client NE is legal.
- the fourth request message may be an HTTP request message or other types of messages
- the first resource verification identifier may be carried by the HTTP request message or by the HTTP protocol layer, which is not made in this application. limit.
- the legality verification process is different from the above content.
- the first client network element is changed to a third client network element.
- the server network element After the server network element confirms that the first client network element is legal, the server network element receives the fifth request message sent by the third client network element, and the fifth request message carries the first resource verification identifier and the third request message.
- the second resource verification identifier is used to uniquely identify the third client network element, and the server network element will compare the first resource verification identifier carried in the fifth request message with the saved Whether the first resource verification identifier of the first client is consistent, and if so, the server network element updates the resource verification identifier (first resource verification identifier) of the first client network element before the change to the changed resource of the third client network element
- the verification identifier (second resource verification identifier), that is, the server network element deletes the first resource verification identifier and saves the second resource verification identifier.
- the server network element includes an address mapping table
- the information to be verified includes a first client network element identifier and client address information corresponding to the first client network element identifier.
- the legality verification may have the following forms:
- the server network element traverses the address mapping table to determine whether the address mapping table contains the client address information carried in the first request message, if the address mapping table contains If the address information of the client is present, it is confirmed that the network element of the first client is legal.
- the server network element performs legality verification, it can first check whether the first client network element identifier is included in the address mapping table. If so, the server network element then checks the address mapping table for the first client network element identifier. Whether the address information corresponding to the association includes the client address information, and if so, confirming that the first client network element is legal.
- FIG. 6 is a schematic diagram of a correspondence between a first client network element identifier and client address information provided by an embodiment of the present application.
- the first client network element identifier may correspond to one or more client address information, where the client address information may be the IP address of the client.
- the address mapping table in the server network element may include one or more client address information, and may also include one or more client network element identifiers, and the one or more client address information may be the same as the One or more client network element identifiers are associated with each other, and may not be associated with the one or more client network element identifiers, and may also be partially associated with the one or more client network element identifiers, and some are not associated with the one or more client network element identifiers.
- FIG. 7 which is a schematic diagram of an address mapping table provided by an embodiment of the present application, the address mapping table shown in FIG.
- the 7 includes a first client network element identifier and a second client network element identifier,
- the first client network element identifier corresponds to the IP addresses of the three clients
- the second client network element identifier also corresponds to the IP addresses of the three clients
- four client addresses are not associated with the client network element identifiers. correspond.
- S403 The server network element executes the first request message after verifying that the first client network element is legal.
- the server network element can confirm that the first client network element sending the first request message is a legal network element, and execute the first client network element. a request message.
- An embodiment of the present application further provides a resource verification method for a service-oriented interface, as shown in FIG. 8 , which is a schematic flowchart of another resource verification method for a service-oriented interface.
- the method may include the following step:
- S801 The UE sends a session creation request.
- the UE sends a session creation request to the AMF, where the session creation request includes a session identifier.
- the session creation request may be a PDU Session Establishment Request
- the session identifier may be a PDU Session ID
- the PDU Session Establishment Request includes the PDU Session ID.
- S802 The AMF sends a context creation request to the SMF.
- the AMF sends a context creation request to the SMF.
- the AMF is the first client network element
- the SMF is the server network element
- the context creation request is the first request message.
- the context creation request is HTTP request message
- the context creation request includes an HTTP protocol header and a message body
- the HTTP protocol header includes the first client network element type and the first client network element identifier
- the message body includes the first client NE ID.
- the first client network element identifier may be a network element instance identifier, that is, the first client network element identifier may be an AMF-AMF Instance ID, for example, the first client network element identifier may be AMF-00000000-0000-0000-000000000011, for details, please refer to step S401, which will not be repeated here.
- the create context request may be an Nsmf_PDUSession_CreateSMContext Request.
- the SMF is the SMF selected by the AMF.
- the AMF In the 3GPP related protocols, there are roughly two methods for the AMF to select the SMF: one is to use the local configuration of the AMF; the other is to use the NRF discover service, which will not be repeated here, refer to 3GPP relevant agreement. It should be noted that the AMF will save the network element identifier of the selected SMF locally.
- the SMF receives the context creation request sent by the AMF, and verifies the validity of the AMF. Specifically, the first client network element identifier in the HTTP protocol header is matched with the first client network element in the message body. The identifiers are compared, and if they are consistent, the SMF confirms that the AMF is legal, saves the first client network element identifier locally, and performs subsequent operations; if not, the SMF replies a rejection response, and the process ends.
- the SMF sends a registration request, an acquisition request and a subscription request to the UDM.
- the SMF selects the UDM, sends a registration request, an acquisition request, and a subscription request to the UDM to register with the UDM, and acquires contract data and subscribes to the contract data.
- the specific content of the process refers to the relevant 3GPP protocol, which will not be repeated here.
- the registration request may be a Numd_UECM_Registration Request
- the acquisition request may be a Numd_SDM_Get Request
- the subscription request may be a Numd_SDM_Subscribe Request.
- the SMF initiates a registration request to the UDM
- the Nudm_Registration SMF Request service can be used.
- the SMF is the first client network element
- the UDM is the server network element
- the registration request is the first request message.
- the registration request includes an HTTP protocol header and a message body
- the HTTP protocol header includes a first client network element type and a first client network element identifier
- the message body includes the first client network element identifier.
- the first client network element identifier may be a network element instance identifier, that is, the first client network element identifier may be an SMF-SMF Instance ID, for example, the first client network element identifier may be SMF-00000000-0000-0000-000000000012.
- the UDM After receiving the registration request sent by the SMF, the UDM verifies the validity of the SMF, and specifically, compares the first client network element identifier in the HTTP protocol header with the first client network element identifier in the message body. , if they are consistent, the UDM confirms that the SMF network element is legal, saves the identifier of the first client network element locally, and returns a registration response to the SMF, and then continues to process the subsequent process; if not, the UDM responds with a rejection response, and the process ends.
- the SMF sends an acquisition request and a subscription request to the UDM.
- the SMF is the first client network element
- the UDM is the server network element
- the acquisition request and the subscription request are the first request messages.
- the UDM After receiving the acquisition request and subscription request sent by the SMF, the validity of the SMF will be verified. For the specific process, please refer to the relevant content of the registration request initiated by the SMF to the UDM, and will not be repeated here.
- S804 The SMF sends a create context response to the AMF.
- the AMF receives the context creation response sent by the SMF, and the specific content of the process refers to 3GPP related protocols, which will not be repeated here.
- S805 The SMF sends a session policy creation request to the PCF.
- the SMF sends a session policy creation request to the PCF.
- the SMF is the first client network element and the PCF is the server network element
- the session policy creation request is the first request message
- the session policy creation request includes an HTTP protocol header and a message body
- the HTTP protocol header includes the first client network element type and the first client network element identifier
- the message body includes the first client network element. Meta ID.
- the first client network element identifier may be a network element instance identifier, that is, the first client network element identifier may be an SMF-SMF Instance ID, for example, the first client network element identifier may be SMF-00000000-0000-0000-000000000012.
- the session policy creation request may be an Npcf_SMPolicyControl_Create Request
- the SMF determines that PCC authorization is required by sending the Npcf_SMPolicyControl_Create Request and requests to establish an SMPolicy association with the PCF.
- the PCF receives the session policy creation request sent by the SMF, and verifies the validity of the SMF. For details, refer to the processing of the UDM in step 803, and details are not repeated here.
- S806 The SMF sends an N4 session establishment request to the UPF.
- the UPF receives the N4 session establishment request sent by the SMF, and the specific content of the process refers to 3GPP related protocols, which will not be repeated here.
- the SMF sends an N1N2 information transmission request to the AMF.
- the SMF sends an N1N2 information transmission request to the AMF.
- the SMF is the first client network element
- the PCF is the server network element.
- the N1N2 information transmission request is a second request message
- the N1N2 information transmission request includes An HTTP protocol header and a message body, where the HTTP protocol header includes the first client network element type and the first client network element identifier, and the message body includes the first client network element identifier.
- the first client network element identifier may be a network element instance identifier, that is, the first client network element identifier may be an SMF-SMF Instance ID, for example, the first client network element identifier may be SMF-00000000-0000-0000-000000000012.
- the N1N2 information transfer request may be a Namf_Communication_N1N2MessageTransfer Request.
- the AMF receives the N1N2 information transmission request sent by the SMF, verifies the validity of the SMF, and compares the locally stored first client network element identifier (step S802) with the first client network element identifier in the message body. If they are consistent, the AMF will reply to the SMF with a N1N2 information transmission response, and continue to process the subsequent process; if not, the AMF will reply with a rejection response, and the process will end.
- the SMF sends an N1N2 information transmission request to the AMF, and the AMF responds, the AMF also needs to interact with the (R)AN and the UE, that is, the N2 interface process.
- the N2 interface process For the specific content of the N2 interface process, refer to 3GPP related protocols. , and will not be repeated here.
- S808 The AMF sends an update context request to the SMF.
- the AMF sends an update context request to the SMF.
- the AMF is the first client network element
- the SMF is the server network element
- the update context request is the second request message
- the context creation request in step S802 is a first request message
- the update context request includes an HTTP protocol header and a message body
- the HTTP protocol header includes the first client network element type and the first client network element identifier (for example, AMF-AMF Instance ID)
- the message body includes the network element identifier of the first client. It can be understood that, for the specific content of the first client network element identifier, reference may be made to step S401 and step S802, and details are not repeated here.
- the update context request may be an Nsmf_PDUSession_UpdateSMContext Request.
- the SMF receives the update context request sent by the AMF, and verifies the validity of the AMF, specifically, compares the first client network element identifier stored locally by the SMF (step S802 ) with the first client in the message body If the identifiers of the network elements are consistent, the SMF confirms that the AMF is valid and performs subsequent operations; if not, the SMF replies with a rejection response, and the process ends.
- S809 The SMF sends an N4 session modification request to the UPF.
- the UPF receives the N4 session modification request sent by the SMF.
- the relevant 3GPP protocol which will not be repeated here.
- the SMF sends an update context response to the AMF.
- the AMF receives the update context response sent by the SMF, and the specific content of the process refers to the relevant 3GPP protocol, which will not be repeated here.
- the update context response may be an Nsmf_PDUSession_UpdateSMContext Response.
- the SMF after the SMF replies to the AMF (step S804), if the session creation fails, the SMF notifies the AMF by sending Nsmf_PDUSession_SMContextStatusNotify (context status notification) to the AMF.
- Nsmf_PDUSession_SMContextStatusNotify Context status notification
- the specific content of the process refers to 3GPP related protocols, which will not be repeated here. .
- An embodiment of the present application further provides a resource verification method for a service-oriented interface, as shown in FIG. 9 , which is a schematic flowchart of another resource verification method for a service-oriented interface.
- the method may include the following step:
- S901 The UE sends a session creation request.
- the UE sends a session creation request to the AMF, where the session creation request includes a session identifier.
- the session creation request may be a PDU Session Establishment Request
- the session identifier may be a PDU Session ID
- the PDU Session Establishment Request includes the PDU Session ID.
- S902 The AMF sends a context creation request to the SMF.
- the AMF sends a context creation request to the SMF.
- the AMF is the first client network element
- the SMF is the server network element
- the context creation request is a fourth request message
- the fourth request message carries the first A resource verification identifier, where the first resource verification identifier is used to uniquely identify the first client network element.
- the first resource verification identifier may be ID-A.
- the fourth request message may be an HTTP request message or other types of messages, and the resource verification identifier may be carried by the HTTP request message or by the HTTP protocol layer. There are no restrictions on the application.
- the create context request may be an Nsmf_PDUSession_CreateSMContext Request.
- the SMF receives the context creation request sent by the AMF, allocates session resources, and then saves the first resource verification identifier (ID-A).
- S903 The SMF sends a registration request to the UDM.
- the SMF selects the UDM and sends a registration request to the UDM.
- the SMF is the first client network element
- the UDM is the server network element
- the registration request is a fourth request message
- the fourth request message carries the first A resource verification identifier, where the first resource verification identifier is used to uniquely identify the first client network element.
- the first resource verification identifier may be ID-C.
- the registration request may be a Numd_UECM_Registration Request.
- the UDM receives the registration request sent by the UDM, and saves the first resource verification identifier (ID-C).
- S904 The UDM sends a registration response to the SMF.
- the UDM sends a registration response to the SMF.
- the UDM is the first client network element
- the SMF is the server network element
- the registration response is a fourth request message
- the fourth request message carries the first resource verification identifier, where the first resource verification identifier is used to uniquely identify the first client network element.
- the first resource verification identifier may be ID-D.
- the registration response may be a Numd_UECM_Registration Response.
- the SMF receives the registration response sent by the UDM, and saves the first resource verification identifier (ID-D).
- the SMF sends an acquisition request and a subscription request to the UDM.
- the SMF sends an acquisition request and a subscription request to the UDM, thereby acquiring the subscription data and subscribing the subscription data.
- the SMF is the first client network element
- the UDM is the server network element
- the acquisition request and the subscription request are the first network element.
- a request message, the registration request is a fourth request message
- the first request message carries information to be verified
- the information to be verified includes a first resource verification identifier, that is, the acquisition request and the subscription request carry the first Resource verification ID.
- the first resource verification identifier may be ID-C.
- the get request may be a Numd_SDM_Get Request
- the subscription request may be a Numd_SDM_Subscribe Request.
- the UDM receives the acquisition request and the subscription request sent by the SMF, and verifies the validity of the SMF. Specifically, the UDM compares the stored first resource verification identifier (step S903) with the information carried in the acquisition request and the subscription request. The first resource checks whether the identifiers are consistent. If they are consistent, the UDM continues to process the subsequent process, and sends an acquisition response and a subscription response to the SMF. Otherwise, the UDM replies with an abnormal response.
- S906 The SMF sends an update context response to the AMF.
- the SMF sends an update context response to the AMF.
- the SMF is the first client network element
- the AMF is the server network element
- the update context response is a fourth request message
- the fourth request message carries the first A resource verification identifier, where the first resource verification identifier is used to uniquely identify the first client network element.
- the first resource verification identifier may be ID-B.
- the update context response may be an Nsmf_PDUSession_UpdateSMContext Response.
- the AMF receives the update context response sent by the SMF, and saves the first resource verification identifier (ID-B).
- S907 The SMF sends a session policy creation request to the PCF.
- the SMF sends a session policy creation request to the PCF.
- the SMF is the first client network element
- the PCF is the server network element
- the session policy creation request is the fourth request message
- the fourth request message carries a first resource verification identifier
- the first resource verification identifier is used to uniquely identify the first client network element.
- the first resource verification identifier may be ID-E.
- the session policy creation request may be an Npcf_SMPolicyControl_Create Request.
- the PCF receives the session policy creation request sent by the SMF, and stores the first resource verification identifier (ID-E).
- S908 The PCF sends a session policy creation response to the SMF.
- the PCF sends a session policy creation response to the SMF.
- the PCF is the first client network element
- the SMF is the server network element
- the session policy creation response is a fourth request message
- the fourth request message carries A first resource verification identifier, where the first resource verification identifier is used to uniquely identify the first client network element.
- the first resource verification identifier may be ID-F.
- the session policy creation response may be Npcf_SMPolicyControl_Create Response.
- the SMF receives the session creation response sent by the PCF, and stores the first resource verification identifier (ID-F).
- S909 The SMF sends a session policy update request to the PCF.
- the SMF sends a session policy update request to the PCF.
- the SMF is the first client network element
- the PCF is the server network element
- the session policy update request is the first request message
- the session policy creation request is A fourth request message, where the first request message carries information to be verified, and the information to be verified includes a first resource verification identifier, that is, the session policy update request carries the first resource verification identifier, and the fourth request message Carrying a first resource verification identifier, where the first resource verification identifier is used to uniquely identify the first client network element.
- the first resource verification identifier may be ID-E.
- the session policy update request may be an Npcf_SMPolicyControl_Update Request.
- the PCF receives the session policy update request sent by the SMF, and verifies the validity of the SMF. Specifically, the PCF compares the saved first resource verification identifier (step S907) with the first resource verification identifier carried in the session policy update request. Check whether the resource verification identifiers are consistent. If they are consistent, the PCF replies with a session policy update response and continues to process the subsequent process. Otherwise, the PCF replies with an abnormal response.
- step S909 part of the N4 interface process is omitted after step S909, and the relevant specific content refers to the relevant 3GPP protocol, which will not be repeated here.
- the SMF sends an N1N2 information transmission request to the AMF.
- the SMF sends an N1N2 information transmission request to the AMF.
- the SMF is the first client network element
- the AMF is the server network element
- the N1N2 information transmission request is the first request message
- the update context response is the first request message.
- the first request message carries the information to be verified
- the information to be verified includes the first resource verification identifier, that is, the N1N2 information transmission request carries the first resource verification identifier
- the fourth request message carries the first resource verification identifier.
- a first resource verification identifier where the first resource verification identifier is used to uniquely identify the first client network element.
- the first resource verification identifier may be ID-B.
- the N1N2 information transfer request may be a Namf_Communication_N1N2MessageTransfer Request.
- the AMF receives the N1N2 information transmission request sent by the SMF, and verifies the validity of the SMF. Specifically, the AMF compares the stored first resource verification identifier (step S906) with the first resource carried in the N1N2 information transmission request. Check whether the resource verification identifiers are consistent. If they are consistent, the AMF will reply to the N1N2 information transmission response and continue to process the subsequent process. Otherwise, the AMF will reply with an abnormal response.
- the SMF sends an N1N2 information transmission request to the AMF, and the AMF responds, the AMF also needs to interact with the (R)AN and the UE, that is, the N2 interface process.
- the N2 interface process For the specific content of the N2 interface process, refer to 3GPP related protocols. , and will not be repeated here.
- S911 The AMF sends an update context request to the SMF.
- the AMF sends an update context request to the SMF.
- the AMF is the first client network element
- the SMF is the server network element
- the update context request is the first request message
- the context creation request is the fourth request message
- the first request message carries the information to be verified
- the information to be verified includes the first resource verification identifier, that is, the update context request carries the first resource verification identifier
- the fourth request message carries the first resource A verification identifier, where the first resource verification identifier is used to uniquely identify the first client network element.
- the first resource verification identifier may be ID-A.
- the update context request may be an Nsmf_PDUSession_UpdateSMContext Request.
- the SMF receives the update context request sent by the AMF, and verifies the validity of the AMF. Specifically, the SMF compares the saved first resource verification identifier (step S902) with the first resource verification carried in the update context request. Whether the identifiers are consistent, if so, SMF sends an update context response to AMF, and continues to process the subsequent process, otherwise, SMF replies with an abnormal response.
- step S911 part of the N4 interface process is omitted.
- the SMF sends an N4 session modification request to the UPF.
- the specific content of the process refers to 3GPP related protocols, and details are not repeated here.
- the SMF sends a request for releasing session resources to the AMF.
- the SMF sends a session resource release request to the AMF.
- the SMF is the first client network element
- the AMF is the server network element
- the session resource release request is the first request message
- the update context response is the first request message.
- the first request message carries the information to be verified
- the information to be verified includes the first resource verification identifier, that is, the release session resource request carries the first resource verification identifier
- the fourth request message carries the first resource verification identifier.
- a first resource verification identifier where the first resource verification identifier is used to uniquely identify the first client network element.
- the first resource verification identifier may be ID-B.
- the request for releasing session resources may be Nsmf_PDUSession_SMContextStatusNotify.
- the AMF receives the request for releasing session resources sent by the SMF, and verifies the validity of the SMF. It can be understood that the verification process here is the same as the verification process in step S911 , and reference may be made to step S911 , and details are not repeated here.
- step S909 and step S912 are optional processes of the above session creation process, that is, step S909 and step S912 are optional steps.
- An embodiment of the present application further provides a resource verification method for a service-oriented interface, as shown in FIG. 10 , which is a schematic flowchart of another resource verification method for a service-oriented interface.
- the method may include the following step:
- S1001 The UE sends a registration request to the NEW AMF.
- the NEW AMF receives the registration request sent by the UE, and the specific content of the process refers to 3GPP related protocols, which will not be repeated here.
- the registration request may be a Registration Request.
- the context transfer request may be a Namf_Communication_UEContextTransfer Request.
- the OLD AMF receives the context transmission request sent by the NEW AMF, and the specific content of the process refers to 3GPP related protocols, which will not be repeated here.
- the OLD AMF locates user resources, checks the integrity of the context transfer request, and then sends a context transfer response to the NEW AMF, where the context transfer response carries the data stored in the OLD AMF.
- Resource verification marks, the resource verification marks saved in the OLD AMF include but are not limited to session-related resource verification marks and policy-related resource verification marks, and the session-related resource verification marks include but are not limited to session-related network elements
- the identifier of the first client network element when serving as the first client network element, the resource verification identifier related to the policy includes but is not limited to the first client network element when the network element related to the policy is used as the first client network element logo.
- session-related network elements include AMF, SMF, UDM, etc.
- the session-related resource verification identifiers include the first client network element identifier when the AMF is the first client network element, and the SMF as the first client network element.
- the context transfer response may be a Namf_Communication_UEContextTransfer Response.
- the NEW AMF receives the context transmission response sent by the OLD AMF, and the specific content of the process refers to 3GPP related protocols, which will not be repeated here.
- the NEW AMF needs to register with the UDM, obtain the subscription data, and subscribe to the subscription data.
- the specific content of these processes refers to the relevant 3GPP protocols, and will not be repeated here.
- the UDM sends a deregistration request to the OLD AMF.
- the UDM is the first client network element
- the OLD AMF is the server network element
- the deregistration request is a first request message
- the first request message carries Information to be verified
- the information to be verified includes a first resource verification identifier, that is, the deregistration request carries a first resource verification identifier
- the first resource verification identifier is used to uniquely identify the first client network element .
- the UDM sends the fourth request message to the OLD AMF.
- the UDM is the first client network element
- the OLD AMF is the server network element
- the fourth request message Carrying the first resource verification identifier
- the first resource verification identifier is used to uniquely identify the first client network element
- the OLD AMF saves the first resource verification identifier.
- the deregistration request may be Nudm_UECM_DeregistrationNotify Request.
- the OLD AMF receives the de-registration request sent by the UDM, and verifies the validity of the UDM. Specifically, the OLD AMF compares the stored first resource verification identifier with the first resource verification identifier carried by the de-registration request. If they are consistent, OLD AMF sends a deregistration response to UDM and continues to process the subsequent process, otherwise, OLD AMF replies with an abnormal response.
- the OLD AMF sends an unsubscribe request to the UDM.
- the OLD AMF is the first client network element
- the UDM is the server network element
- the unsubscribe request is a first request message
- the first request message carries Information to be verified
- the information to be verified includes a first resource verification identifier, that is, the deregistration request carries a first resource verification identifier
- the first resource verification identifier is used to uniquely identify the first client network element .
- the OLD AMF sends the fourth request message to the UDM.
- the OLD AMF is the first client network element
- the UDM is the server network element.
- the fourth request message Carrying the first resource verification identifier, the first resource verification identifier is used to uniquely identify the first client network element, and the UDM saves the first resource verification identifier.
- the unsubscribe request may be Nudm_SDM_Unsubscribe Request.
- UDM receives the de-subscription request sent by OLD AMF, and verifies the legitimacy of OLD AMF, specifically, UDM compares the first resource verification identifier of the preservation and the first resource verification identifier carried by the de-subscription request. If they are consistent, the UDM sends an unsubscribe response to the OLD AMF and continues to process the subsequent process. Otherwise, the UDM responds with an abnormal response.
- the NEW AMF sends a policy update request to the PCF.
- the NEW AMF is the third client network element
- the OLD AMF is the server network element.
- the policy update request is a fifth request message, and the policy update request carries The second resource verification identifier, the second resource verification identifier is used to uniquely identify the NEW AMF.
- the OLD AMF sends a first request message to the PCF, and the first request message may be a policy update request.
- the OLD AMF is the first client network element
- the PCF is the server network element.
- the first request message includes information to be verified, and the information to be verified includes a first resource verification identifier, and the first resource verification identifier is used to uniquely identify the OLD AMF. It is understandable that the PCF will verify the validity of the OLD AMF, and after verifying that the OLD AMF is legal, the PCF will save the first resource verification identifier.
- the policy update request sent by the NEW AMF to the PCF also carries the first resource verification identifier. It is understandable that after the PCF receives the policy update request sent by the NEW AMF, it will verify the validity of the NEW AMF, and the PCF will compare the Whether the first resource verification identifier carried in the policy update request sent by the NEW AMF to the PCF is consistent with the saved first resource verification identifier, and if they are consistent, the PCF updates the saved first resource verification identifier to the second resource verification identifier , that is, delete the saved first resource verification identifier, save the second resource verification identifier, the PCF replies with a policy update response, and continues to process the subsequent process.
- the policy update request may be an Npcf_AMPolicyControl_Update Request.
- the NEW AMF sends an update context request to the SMF, at this time, the NEW AMF is the third client network element, the OLD AMF is the server network element, the update context request is a fifth request message, and the update context request carries The second resource verification identifier, the second resource verification identifier is used to uniquely identify the NEW AMF.
- the OLD AMF sends a first request message to the SMF, and the first request message may be an update context request.
- the OLD AMF is the first client network element
- the SMF is the server network element.
- the first request message includes information to be verified, and the information to be verified includes a first resource verification identifier, and the first resource verification identifier is used to uniquely identify the OLD AMF. Understandably, the SMF will verify the validity of the OLD AMF, and after the SMF verifies that the OLD AMF is legal, it will save the first resource verification identifier.
- the policy update request sent by the NEW AMF to the SMF also carries the first resource verification identifier. It is understandable that after receiving the policy update request sent by the NEW AMF, the SMF will verify the validity of the NEW AMF, and the SMF will compare the Whether the first resource verification identifier carried in the policy update request sent by the NEW AMF to the PCF is consistent with the stored first resource verification identifier, and if they are consistent, the SMF updates the stored first resource verification identifier to the second resource verification identifier , that is, delete the saved first resource verification identifier, save the second resource verification identifier, and the SMF responds with an update context response, and continues to process the subsequent process.
- the update context request may be an Nsmf_PDUSession_UpdateSMContext Request.
- the NEW AMF sends a context release request to the SMF, and accordingly, the SMF receives the release context request sent by the NEW AMF, and verifies the validity of the NEW AMF.
- the specific process is the same as that of step S1007, and reference may be made to step S1007, which will not be repeated here. .
- the SMF verifies that the NEW AMF is valid, it responds to the release context request and continues to process the subsequent process.
- the release context request may be an Nsmf_PDUSession_ReleaseSMContext Request.
- the NEW AMF will send a registration response to the UE, and the specific content of the process refers to 3GPP related protocols, which will not be repeated here.
- An embodiment of the present application further provides a resource verification method for a service-oriented interface, as shown in FIG. 11 , which is a schematic flowchart of another resource verification method for a service-oriented interface.
- the method may include the following step:
- S1101 The UE sends a session creation request.
- the UE sends a session creation request to the AMF, where the session creation request includes a session identifier.
- the session creation request may be a PDU Session Establishment Request
- the session identifier may be a PDU Session ID
- the PDU Session Establishment Request includes the PDU Session ID.
- the network element when the network element registers the NRF, the network element can add the client address information planned by the network element in the registration request, that is, the registration request will carry the client address information planned by the network element. Therefore, the NRF receives the After the registration request, the client address information of the network element can be obtained. Understandably, the client address information includes but is not limited to the user's IP address.
- FIG. 12 is a schematic diagram of an AMF and an SMF registering an NRF according to an embodiment of the present application.
- the AMF sends a registration request to the NRF, and the registration request carries the client address information planned by the AMF, and the SMF sends a registration request to the NRF.
- a registration request is sent, where the registration request carries the client address information planned by the SMF.
- the AMF sends a request for querying network elements to the NRF.
- the AMF sends a query network element request to the NRF, where the query network element request is used to query the Nsmf_PDUSession service.
- the request for querying network elements may be an Nnrf_NFDiscovery Request.
- S1103 The NRF sends a query network element response to the AMF.
- the NRF after receiving the query network element request sent by the AMF, the NRF queries the SMF that meets the query network element request, and sends a query network element response to the AMF, where the query network element response includes the query network element request that meets the query network element request.
- SMF planning client address information After receiving the query network element request sent by the AMF, the NRF queries the SMF that meets the query network element request, and sends a query network element response to the AMF, where the query network element response includes the query network element request that meets the query network element request.
- the query network element response may be Nnrf_NFDiscovery Response.
- the AMF receives the query network element response sent by the NRF, and saves the client address information planned by the SMF included in the query network element response into the address mapping table of the AMF.
- S1104 The AMF sends a context creation request to the SMF.
- the AMF sends a context creation request to the SMF.
- the AMF is the first client network element
- the SMF is the server network element
- the SMF network element includes an address mapping table
- the address mapping table includes the first client network element.
- the context creation request is the first request message
- the first request message includes information to be verified
- the information to be verified includes the client address information, that is, the context creation request includes the client address information.
- the client address and the server address must be available to send and/or receive HTTP requests. It can be understood that the context creation request belongs to an HTTP request. Therefore, the context creation request It also includes the client address and the server address, that is, the context creation request also includes the client address of the AMF.
- the create context request may be an Nsmf_PDUSession_CreateSMContext Request.
- the first client network element identifier includes but is not limited to a network element instance identifier (NF Instance ID), and the NF Instance ID can be carried through the HTTP protocol layer, or can be carried through an HTTP request.
- NF Instance ID network element instance identifier
- the SMF can configure the client address information of one or more AMFs into the address mapping table of the SMF, and associate one or more network element identifiers with the one or more AMFs.
- the client address information is associated and corresponding, thereby distinguishing the one or more AMFs, and the SMF only uses the client address information of the currently associated AMF (restricts the use of the client address information of other AMFs).
- the SMF may also not store the network element identifier of the AMF in the address mapping table of the SMF, that is, only the client address information of the AMF is stored in the SMF, and the client address information is not associated with the SMF.
- the network element identification of the AMF is associated.
- FIG. 13 is a schematic diagram of the configuration of AMF client address information provided by an embodiment of the present application.
- the SMF configures and saves the client address information of the AMF
- the network element identifier of the AMF is associated with its client address information, so that the SMF can query the corresponding client address information of the AMF through the network element identifier of the AMF.
- FIG. 14 is a schematic diagram of the SMF verifying the validity of the AMF provided by the embodiment of the present application.
- traverse its address mapping table specifically, query the address mapping table of the SMF according to the identifier of the first client network element in the creating context request, if the address mapping table of the SMF contains the address mapping table
- the identifier of the first client network element is to search for the client address information carried in the context creation request in the client address information corresponding to the identifier of the first client network element in the address mapping table of the SMF.
- the client address information carried in the context request is included, and the SMF continues to process the subsequent process and sends a context creation response to the AMF, otherwise, the process terminates; if there is no identifier of the first client network element in the address mapping table of the SMF related records, then directly look up the client address information carried in the context creation request in the address mapping table of the SMF. If the client address information carried in the context creation request is in it, the SMF continues to process the subsequent process and sends the AMF sends a create context response, otherwise, the process terminates.
- the SMF sends an N1N2 information transmission request to the AMF.
- the SMF sends an N1N2 information transmission request to the AMF.
- the SMF is the first client network element
- the AMF is the server network element
- the AMF network element includes an address mapping table
- the address mapping table includes the first client network element.
- the context creation request is the first request message
- the first request message includes information to be verified
- the information to be verified includes the client address information
- the context creation request includes the client address information.
- the client address and the server address must be available to send and/or receive HTTP requests. It is understood that the N1N2 information transmission request is an HTTP request. Therefore, the N1N2 information The transmission request further includes the client address and the server address, that is, the N1N2 information transmission request further includes the client address of the SMF.
- the N1N2 information transfer request may be a Namf_Communication_N1N2MessageTransfer Request.
- the first client network element identifier includes but is not limited to a network element instance identifier (NF Instance ID), and the NF Instance ID can be carried through the HTTP protocol layer, or can be carried through an HTTP request.
- NF Instance ID network element instance identifier
- the AMF can configure one or more SMF client address information into the address mapping table of the AMF, and the related content of the configuration is the same as that of step S1104.
- FIG. 15 is a schematic diagram of the AMF verifying the validity of the SMF provided by the embodiment of the present application.
- the N1N2 information transmission request traverse its address mapping table, specifically, query the address mapping table of the AMF according to the first client network element identifier in the N1N2 information transmission request, if the address mapping table of the AMF is in the address mapping table
- the first client network element identifier exists, and the client address information carried in the N1N2 information transmission request is searched for in the client address information corresponding to the first client network element identifier in the address mapping table of the AMF, If the client address information carried in the N1N2 information transmission request is included, the AMF continues to process the subsequent process and sends an N1N2 information transmission response to the SMF, otherwise, the process terminates; if the AMF address mapping table does not contain the first The relevant record of the client network element identifier, then directly look up the client address information carried in the N1N2 information transmission request in the address mapping table of the AMF, if the client address information carried in the N1N2 information transmission request is in it, The AMF continues to process the subsequent process and sends
- the AMF sends an update context request to the SMF.
- the SMF receives the update context request sent by the AMF, and verifies the validity of the AMF.
- the specific verification method may refer to step S1104, which will not be repeated here.
- the update context request may be an Nsmf_PDUSession_UpdateSMContext Request.
- the SMF will verify the validity of the NEW AMF, and the specific content can refer to step S1104, which will not be repeated here. After the SMF verifies that the NEW AMF is valid, it continues to process the subsequent process, and returns an update context response to the AMF.
- the SMF may send a session resource release request to the AMF.
- the session resource release request may be Nsmf_PDUSession_SMContextStatusNotify (context status notification).
- the AMF will verify the session resource release request after receiving the request. For the validity of the SMF, refer to step S1105 for details of the verification method, and refer to the relevant 3GPP protocol for the specific content of the process, which will not be repeated here.
- the above session creation process omits part of the process after AMF sends a context creation request to SMF, after AMF sends a N1N2 information transmission response to SMF, and after AMF sends an update context request to SMF, the omitted part of the process and
- AMF sends a context creation request to SMF
- N1N2 information transmission response to SMF after AMF sends a N1N2 information transmission response to SMF
- AMF sends an update context request to SMF
- FIG. 16 is a schematic diagram of a network device provided by this application, and the network device is used to execute the service-oriented interface described in FIG. 4 , FIG. 8 , FIG. 9 , FIG. 10 and FIG. 11 .
- Resource verification method This application does not limit the division of the functional units of the network device, and each unit in the network device can be added, decreased or combined as required.
- the operations and/or functions of each unit in the network device are respectively to implement the corresponding processes of the methods described in the above-mentioned FIG. 4 , FIG. 8 , FIG. 9 , FIG. 10 and FIG. .
- Figure 16 exemplarily provides a division of functional units:
- the network device 1600 includes a receiving unit 1610 and a processing unit 1620 .
- the receiving unit 1610 is configured to receive a first request message sent by a first client network element, where the first request message carries information to be verified, and the information to be verified is used to perform verification on the first client network element. Legality verification.
- the processing unit 1620 is configured to verify the validity of the first client network element according to the information to be verified; and execute the first request message after verifying that the first client network element is legal.
- each unit included in the network device 1600 may be a software unit, a hardware unit, or a part of a software unit and a part of a hardware unit.
- the network device shown in FIG. 16 is only an exemplary implementation in the embodiment of the present application, and the network device applicable to the resource verification method for the service-oriented interface in the embodiment of the present application includes but Not limited to the above structure.
- FIG. 17 is a schematic structural diagram of a computing device provided by an embodiment of the present application.
- the computing device 1700 includes a processor 1710 , a communication interface 1720 and a memory 1730 , and the processor 1710 , the communication interface 1720 and the memory 1730 are connected to each other through an internal bus 1740 .
- the computing device 1700 may be the network device in FIG. 16 , and the functions performed by the network device 1600 in FIG. 16 are actually performed by the processor 1710 of the network device 1600 .
- the processor 1710 may be composed of one or more general-purpose processors, such as a central processing unit (Central Processing Unit, CPU), or a combination of a CPU and a hardware chip.
- the above-mentioned hardware chip may be an application-specific integrated circuit (Application-Specific Integrated Circuit, ASIC), a programmable logic device (Programmable Logic Device, PLD) or a combination thereof.
- the above-mentioned PLD can be a complex programmable logic device (Complex Programmable Logic Device, CPLD), a field programmable gate array (Field-Programmable Gate Array, FPGA), a general array logic (Generic Array Logic, GAL) or any combination thereof.
- the communication interface 1720 is used to communicate with other devices or communication networks, such as Ethernet, Radio Access Network (RAN), Core Network, Wireless Local Area Networks (WLAN) and the like.
- RAN Radio Access Network
- WLAN Wireless Local Area Networks
- the bus 1740 may be a peripheral component interconnect standard (Peripheral Component Interconnect, PCI) bus or an Extended Industry Standard Architecture (Extended Industry Standard Architecture, EISA) bus or the like.
- PCI peripheral component interconnect standard
- EISA Extended Industry Standard Architecture
- the bus 1740 can be divided into an address bus, a data bus, a control bus, and the like. For ease of presentation, only one thick line is shown in Figure 17, but it does not mean that there is only one bus or one type of bus.
- the memory 1730 may include a volatile memory (Volatile Memory), such as a random access memory (Random Access Memory, RAM); the memory 1730 may also include a non-volatile memory (Non-Volatile Memory), such as a read-only memory (Read- Only Memory (ROM), flash memory (Flash Memory), hard disk (Hard Disk Drive, HDD) or solid-state drive (Solid-State Drive, SSD); the memory 1730 may also include a combination of the above types.
- the memory 1730 is used to store the program code for executing the above embodiment of the resource verification method for the service-oriented interface. In one embodiment, the memory 1730 can also cache other data, and the execution is controlled by the processor 1710 to realize the above.
- the functional units shown in the network device 1600 are used to implement the method steps in the method embodiments shown in FIG. 4 , FIG. 8 , FIG. 9 , FIG. 10 and FIG. details as follows:
- the processor 1710 controls the communication interface 1720 to receive a first request message sent by the first client network element, where the first request message carries information to be verified, and the to-be-verified information is used to communicate to the first client network element. conduct legality verification;
- the processor 1710 performs legality verification on the first client network element according to the information to be verified;
- the processor 1710 executes the first request message after verifying that the first client network element is legitimate.
- the processor 1710 controls the communication interface 1720 to receive the first request message sent by the first client network element, including: the processor 1710 controls the communication interface 1720 to receive the first client network element according to the hypertext An HTTP request message sent by a transmission protocol, the HTTP request message includes an HTTP protocol header and a message body, the HTTP protocol header includes the first client network element type and the first client network element identifier, and the message body includes the The identifier of the first client network element.
- the processor 1710 performs legality verification on the first client network element according to the information to be verified, including: the processor 1710 compares the first client network element in the HTTP protocol header Whether the element identifier and the first client network element identifier in the message body are consistent, if they are consistent, it is confirmed that the first client network element is legal.
- the processor 1710 performs legality verification on the first client network element according to the to-be-verified information, including: when the first client network element type in the HTTP protocol header is the same as the When the network element types of the server network element are consistent, the processor 1710 compares whether the first client network element identifier in the HTTP protocol header is consistent with the network element instance identifier of the server network element itself. , it is confirmed that the first client network element is legal.
- the method further includes: the processor 1710 saves the identifier of the first client network element; After verifying the validity of the first client network element with the verification information, the method further includes: the processor 1710 controls the communication interface 1720 to receive a second request message sent by the first client network element, the first client network element The second request message carries the identifier of the first client network element; the processor 1710 verifies the validity of the first client network element according to the identifier of the first client network element; the processor 1710 compares the second request Whether the identifier of the first client network element in the message is consistent with the identifier of the first client network element stored by the server network element, if they are the same, the first client network element is confirmed to be legal; the processor 1710 is verifying The second request message is executed after the first client network element is legal.
- the method further includes: the processor 1710 controls the communication interface 1720 to receive the first request message sent by the first client network element
- the method further includes: the processor 1710 controls the communication interface 1720 to receive the second client network element
- the third request message sent, the third request message carries the network element identifier of the second client; the processor 1710 performs legality verification according to the identifier of the second client network element; the processor 1710 is verifying the first client After the end network element is legal, the identifier of the second client network element is stored; before the processor 1710 controls the communication interface 1720 to receive the first request message sent by the first client network element, the method further includes: the processor 1710 compares the Whether the identifier of the first client network element in the HTTP protocol header is consistent with the stored identifier of the second client network element.
- the information to be verified includes a first resource verification identifier
- the method further includes: processing The controller 1710 controls the communication interface 1720 to receive a fourth request message sent by the first client network element, the fourth request message carries the first resource verification identifier, and the first resource verification identifier is used to uniquely identify the the first client network element; the processor 1710 saves the first resource verification identifier; the processor 1710 performs legality verification on the first client network element according to the information to be verified, including: the processor 1710 compares the Whether the first resource verification identifier carried in the first request message and the stored first resource verification identifier are consistent, and if they are consistent, it is confirmed that the first client network element is legal.
- the method further includes: the processor 1710 controls the communication interface 1720 to receive the fifth request message sent by the third client network element, The fifth request message carries the first resource verification identifier and the second resource verification identifier, and the second resource verification identifier is used to uniquely identify the third client network element; the processor 1710 compares the fifth request Whether the first resource verification identifier carried in the message is consistent with the stored first resource verification identifier, and if so, the processor 1710 deletes the first resource verification identifier and saves the second resource verification identifier.
- the memory 1730 includes an address mapping table, and the address mapping table includes a first client network element identifier and client address information corresponding to the first client network element identifier.
- the information includes the client address information
- the processor 1710 performs legality verification on the first client network element according to the information to be verified, including: the processor 1710 traverses the address mapping table to determine the address mapping Whether the table contains the client address information carried in the first request message, and if the address mapping table contains the client address information, it is confirmed that the first client network element is legal.
- Embodiments of the present application further provide a computer-readable storage medium, on which a computer program is stored.
- the program When the program is executed by a processor, it can implement some or all of the steps described in the above method embodiments, and realize the above The function of any one of the functional units described in Figure 16.
- Embodiments of the present application also provide a computer program product, which, when run on a computer or a processor, causes the computer or processor to execute one or more steps in any one of the above methods. If each component module of the above-mentioned device is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in the computer-readable storage medium.
- Embodiments of the present application further provide a chip system, where the chip system includes a processor, configured to support the network device 1600 to implement one or more steps of the method steps in any of the above methods with the network device 1600 as the main body of execution.
- the chip system further includes a memory for storing necessary program instructions and data of the data sending device.
- the chip system may be composed of chips, or may include chips and other discrete devices.
- the size of the sequence numbers of the above-mentioned processes does not mean the sequence of execution, and the execution sequence of each process should be determined by its functions and internal logic, and should not be implemented in the present application.
- the implementation of the examples constitutes no limitation.
- the disclosed system, apparatus and method may be implemented in other manners.
- the apparatus embodiments described above are only illustrative.
- the division of the units is only a logical function division. In actual implementation, there may be other division methods.
- multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
- the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
- each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
- the functions, if implemented in the form of software functional units and sold or used as independent products, may be stored in a computer-readable storage medium.
- the technical solution of the present application can be embodied in the form of a software product in essence, or the part that contributes to the prior art or the part of the technical solution.
- the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application.
- the aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program codes .
- the modules in the apparatus of the embodiment of the present application may be combined, divided and deleted according to actual needs.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Power Engineering (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
Abstract
The present application provides a resource checking method for a service-based interface and a related device. The method comprises: a server network element receives a first request message sent by a client network element, wherein the first request message carries information to be checked, and the information to be checked is used for performing legitimacy verification on the client network element; the server network element performs legitimacy verification on the client network element according to the information to be checked; and upon verifying that the client network element is legitimate, the server network element executes the first request message. The method can check the legitimacy of the client network element, and reduce the risks such as the deletion by mistake, accidental tampering and improper transmission of resources.
Description
本申请涉及通信领域,尤其涉及一种面向服务化接口的资源校验方法及相关设备。The present application relates to the field of communications, and in particular, to a service-oriented interface-oriented resource verification method and related equipment.
目前,5G系统架构控制面采用服务化接口技术。在服务化架构中,客户端和服务端之间的通信需要进行合法化校验,而用户资源标识是进行合法化校验的方法之一。但是,3GPP Release 16协议中未提供对应用层用户资源标识的可靠的校验方法。因此,需要一种新的服务化接口资源校验方法来解决对应用层用户资源标识的校验问题。At present, the 5G system architecture control plane adopts service-oriented interface technology. In the service-based architecture, the communication between the client and the server needs to be legalized, and the user resource identifier is one of the methods of legalization. However, the 3GPP Release 16 protocol does not provide a reliable verification method for the user resource identifier of the application layer. Therefore, a new service-oriented interface resource verification method is required to solve the verification problem of the user resource identifier of the application layer.
发明内容SUMMARY OF THE INVENTION
本申请提供了一种面向服务化接口的资源校验方法及相关设备,能够对客户端请求进行合法性校验,避免了服务端按照非预期的客户端请求操作资源,提高了服务端操作的准确性和安全性。The present application provides a service-oriented interface-oriented resource verification method and related equipment, which can verify the validity of client requests, avoid the server from operating resources according to unexpected client requests, and improve the operation efficiency of the server. Accuracy and Safety.
第一方面,本申请提供一种面向服务化接口的资源校验方法,所述方法可包括:服务端网元接收第一客户端网元发送的第一请求消息,所述第一请求消息携带待校验信息,所述待校验信息用于对所述第一客户端网元进行合法性验证;所述服务端网元根据所述待校验信息对所述第一客户端网元进行合法性验证;所述服务端网元在验证所述第一客户端网元合法之后执行所述第一请求消息。In a first aspect, the present application provides a resource verification method for a service-oriented interface, the method may include: a server network element receiving a first request message sent by a first client network element, the first request message carrying Information to be verified, the information to be verified is used to verify the validity of the first client network element; the server network element performs verification on the first client network element according to the information to be verified Legality verification; the server network element executes the first request message after verifying that the first client network element is legal.
在本申请提供的方案中,服务端网元在接收来自客户端网元的消息后,会对客户端网元进行合法性校验,避免了服务端网元按照非预期的客户端请求操作资源,即避免了误操作,降低了资源被错误删除、意外篡改以及不正当传递等风险,提高了服务端网元操作的准确性和安全性。In the solution provided by the present application, after receiving the message from the client network element, the server network element will verify the validity of the client network element, which prevents the server network element from operating resources according to unexpected client requests. , that is, to avoid misoperation, reduce the risk of wrong deletion of resources, accidental tampering and improper transmission, etc., and improve the accuracy and security of network element operations on the server side.
结合第一方面,在第一方面的一种可能的实现方式中,所述服务端网元接收第一客户端网元发送的第一请求消息,包括:所述服务端网元接收所述第一客户端网元根据超文本传输协议发送的HTTP请求消息,所述HTTP请求消息包括HTTP协议头和消息体,所述HTTP协议头包括第一客户端网元类型和第一客户端网元标识。With reference to the first aspect, in a possible implementation manner of the first aspect, the server network element receiving the first request message sent by the first client network element includes: receiving, by the server network element, the first request message sent by the first client network element. An HTTP request message sent by a client network element according to the hypertext transfer protocol, the HTTP request message includes an HTTP protocol header and a message body, and the HTTP protocol header includes the type of the first client network element and the identifier of the first client network element .
在本申请提供的方案中,客户端网元给服务端网元发送的消息可以是HTTP请求消息,所述HTTP请求中包括待校验信息,服务端网元可以根据所述待校验信息对客户端网元进行合法性校验,避免了服务端网元按照非预期的客户端请求操作资源,提高了服务端网元操作的准确性和安全性。In the solution provided in this application, the message sent by the client network element to the server network element may be an HTTP request message, the HTTP request includes information to be verified, and the server network element can The client-side network element performs legality verification, which prevents the server-side network element from operating resources according to unexpected client requests, and improves the accuracy and security of the server-side network element operation.
结合第一方面,在第一方面的一种可能的实现方式中,所述消息体包括所述第一客户端网元标识,所述服务端网元根据所述待校验信息对所述第一客户端网元进行合法性验证,包括:所述服务端网元比较所述HTTP协议头中的第一客户端网元标识和所述消息体中的第一客户端网元标识是否一致,若一致,则确认所述第一客户端网元合法。With reference to the first aspect, in a possible implementation manner of the first aspect, the message body includes the identifier of the first client network element, and the server network element interprets the first client network element according to the information to be verified. A client-side network element performing legality verification, comprising: comparing, by the server-side network element, whether the first client-side network element identifier in the HTTP protocol header is consistent with the first client-side network element identifier in the message body; If they are consistent, it is confirmed that the first client network element is legal.
在本申请提供的方案中,服务端网元可以通过比较所述HTTP协议头中的客户端网元 标识和所述消息体中的客户端网元标识来判断客户端网元是否合法,避免了客户端网元不合法时服务端网元仍进行操作所导致的资源被错误删除、意外篡改以及不正当传递等情况的发生,提高了服务端网元操作的准确性和安全性。In the solution provided by this application, the server network element can judge whether the client network element is legal by comparing the client network element identifier in the HTTP protocol header with the client network element identifier in the message body, avoiding the need for When the client network element is illegal, the server network element is still operating, and the resources are deleted by mistake, accidentally tampered with, and improperly transmitted, which improves the accuracy and security of the server network element operation.
结合第一方面,在第一方面的一种可能的实现方式中,所述服务端网元根据所述待校验信息对所述第一客户端网元进行合法性验证,包括:当所述HTTP协议头中的第一客户端网元类型与所述服务端网元自身的网元类型一致时,所述服务端网元比较所述HTTP协议头中的第一客户端网元标识和所述服务端网元自身的网元实例标识是否一致,若不一致,则确认所述第一客户端网元合法。With reference to the first aspect, in a possible implementation manner of the first aspect, the server network element performs legality verification on the first client network element according to the information to be verified, including: when the When the type of the first client network element in the HTTP protocol header is consistent with the network element type of the server network element itself, the server network element compares the identifier of the first client network element in the HTTP protocol header with that of the server network element. Whether the identity of the network element instance of the server network element itself is consistent, if not, confirming that the first client network element is legal.
在本申请提供的方案中,若涉及客户端网元变更,服务端网元在验证客户端网元的合法性时,可以分别验证网元类型和网元标识,避免了错误执行旧的客户端网元的请求可能导致的资源删除、篡改以及不正当传递等情况的发生,提高了服务端网元操作的准确性和安全性。In the solution provided in this application, if the client network element is changed, the server network element can verify the network element type and network element identification respectively when verifying the legitimacy of the client network element, so as to avoid wrong execution of the old client network element. The resource deletion, tampering, and improper transmission may occur due to the request of the network element, which improves the accuracy and security of the operation of the network element on the server side.
结合第一方面,在第一方面的一种可能的实现方式中,所述确认所述第一客户端网元合法之后,所述方法还包括:所述服务端网元保存所述第一客户端网元标识;所述服务端网元根据所述待校验信息对所述第一客户端网元进行合法性验证之后,所述方法还包括:所述服务端网元接收所述第一客户端网元发送的第二请求消息,所述第二请求消息携带所述第一客户端网元标识;所述服务端网元比较所述第二请求消息中的第一客户端网元标识和所述服务端网元保存的第一客户端网元标识是否一致,若一致,则确认所述第一客户端网元合法;所述服务端网元在验证所述第一客户端网元合法之后执行所述第二请求消息。With reference to the first aspect, in a possible implementation manner of the first aspect, after confirming that the first client network element is legal, the method further includes: the server network element saves the first client After the server network element performs legality verification on the first client network element according to the information to be verified, the method further includes: the server network element receives the first A second request message sent by the client network element, where the second request message carries the identifier of the first client network element; the server network element compares the identifier of the first client network element in the second request message Whether it is consistent with the identifier of the first client network element saved by the server network element, if they are consistent, confirm that the first client network element is legal; the server network element is verifying the first client network element. The second request message is executed after being valid.
在本申请提供的方案中,服务端网元接收客户端网元第一次发送的消息后,会验证客户端网元的合法性,当服务端网元确认客户端网元合法后,将其客户端网元标识保存到本地,等再次收到所述客户端网元发送的消息,此时,服务端网元通过比较所述请求携带的客户端网元标识和所述保存的客户端网元标识来验证所述客户端网元的合法性,避免了服务端按照非预期的客户端请求操作资源,提高了服务端操作的准确性和安全性。In the solution provided by this application, after the server network element receives the message sent by the client network element for the first time, it will verify the legitimacy of the client network element. The client network element identifier is saved locally, and when the message sent by the client network element is received again, the server network element compares the client network element identifier carried in the request with the saved client network element. The element identifier is used to verify the legitimacy of the client network element, which prevents the server from operating resources according to unexpected client requests, and improves the accuracy and security of the server operation.
结合第一方面,在第一方面的一种可能的实现方式中,所述服务端网元接收第一客户端网元发送的第一请求消息之前,所述方法还包括:所述服务端网元接收第二客户端网元发送的第三请求消息,所述第三请求消息携带第二客户端网元标识;所述服务端网元根据所述第二客户端网元标识进行合法性验证;所述服务端网元在验证所述第一客户端网元合法之后保存所述第二客户端网元标识;所述服务端网元接收第一客户端网元发送的第一请求消息之后,所述方法还包括:所述服务端网元比较所述HTTP协议头中的第一客户端网元标识和所述保存的第二客户端网元标识是否一致。With reference to the first aspect, in a possible implementation manner of the first aspect, before the server network element receives the first request message sent by the first client network element, the method further includes: the server network element element receives the third request message sent by the second client network element, the third request message carries the identifier of the second client network element; the server network element performs legality verification according to the identifier of the second client network element ; the server network element saves the identifier of the second client network element after verifying that the first client network element is legal; after the server network element receives the first request message sent by the first client network element , the method further includes: comparing, by the server network element, whether the identifier of the first client network element in the HTTP protocol header is consistent with the stored identifier of the second client network element.
在本申请提供的方案中,若涉及客户端网元的变更,新的客户端网元向服务端网元发送消息,服务端网元可以进行两次验证,比较所述消息携带的客户端网元标识与服务端网元本地保存的客户端网元是否一致,若不一致,再比较所述请求中的HTTP协议头和消息体中的客户端网元标识,提高了合法性验证的正确率,也就意味着,提高了服务端操作的准确性和安全性。In the solution provided by this application, if the client network element is changed, the new client network element sends a message to the server network element, and the server network element can perform two verifications, and compare the client network element carried in the message. Whether the element identifier is consistent with the client network element stored locally by the server network element, if not, then compare the HTTP protocol header in the request with the client network element identifier in the message body, which improves the accuracy of legality verification. This means that the accuracy and security of server-side operations are improved.
结合第一方面,在第一方面的一种可能的实现方式中,所述待校验信息包括第一资源核查标识,在服务端网元接收第一客户端网元发送的第一请求消息之前,所述方法还包括: 所述服务端网元接收所述第一客户端网元发送的第四请求消息,所述第四请求消息携带所述第一资源核查标识,所述第一资源核查标识用于唯一标识所述第一客户端网元;所述服务端网元保存所述第一资源核查标识;所述服务端网元根据所述待校验信息对所述第一客户端网元进行合法性验证,包括:所述服务端网元比较所述第一请求消息携带的第一资源核查标识与保存的第一资源核查标识是否一致,若一致,则确认所述第一客户端网元合法。With reference to the first aspect, in a possible implementation manner of the first aspect, the information to be verified includes a first resource verification identifier, and before the server network element receives the first request message sent by the first client network element , the method further includes: receiving, by the server network element, a fourth request message sent by the first client network element, where the fourth request message carries the first resource verification identifier, and the first resource verification The identifier is used to uniquely identify the first client network element; the server network element saves the first resource verification identifier; the server network element checks the first client network element according to the information to be verified. The validity verification of the element includes: comparing, by the server network element, whether the first resource verification identifier carried in the first request message is consistent with the stored first resource verification identifier, and if they are consistent, confirming the first client The network element is legal.
在本申请提供的方案中,服务端网元还可以根据资源核查标识来对客户端网元进行验证,服务端网元通过资源核查标识验证客户端合法性需要首先保存所述资源核查标识,可理解,客户端网元首次向服务端网元发送消息时,服务端网元会将所述消息中的资源核查标识保存起来,若客户端网元再次向服务端网元发送消息,服务端网元通过比较所述保存的资源核查标识和后来接收的消息中的资源核查标识来验证客户端网元的合法性,避免了服务端按照非预期的客户端请求操作资源,提高了服务端操作的准确性和安全性。In the solution provided by this application, the server network element can also verify the client network element according to the resource verification identifier, and the server network element to verify the legitimacy of the client through the resource verification identifier needs to first save the resource verification identifier, which can be It is understood that when the client network element sends a message to the server network element for the first time, the server network element will save the resource verification identifier in the message. If the client network element sends a message to the server network element again, the server network element will The element verifies the legitimacy of the client network element by comparing the saved resource verification identifier with the resource verification identifier in the message received later, which prevents the server from operating resources according to unexpected client requests, and improves the operation efficiency of the server. Accuracy and Safety.
结合第一方面,在第一方面的一种可能的实现方式中,所述确认所述第一客户端网元合法之后,所述方法还包括:所述服务端网元接收第三客户端网元发送的第五请求消息,所述第五请求消息携带所述第一资源核查标识和第二资源核查标识,所述第二资源核查标识用于唯一标识所述第三客户端网元;所述服务端网元比较所述第五请求消息携带的第一资源核查标识与所述保存的第一资源核查标识是否一致,若一致,所述服务端网元删除所述第一资源核查标识,保存所述第二资源核查标识。With reference to the first aspect, in a possible implementation manner of the first aspect, after confirming that the first client network element is legal, the method further includes: receiving, by the server network element, a third client network element The fifth request message sent by the client, the fifth request message carries the first resource verification identifier and the second resource verification identifier, and the second resource verification identifier is used to uniquely identify the third client network element; the The server network element compares whether the first resource verification identifier carried in the fifth request message is consistent with the saved first resource verification identifier, and if they are consistent, the server network element deletes the first resource verification identifier, The second resource verification identifier is saved.
在本申请提供的方案中,若涉及客户端网元的更新,服务端网元会将保存在本地的旧的客户端网元的资源核查标识更新为变更后的客户端网元的资源核查标识,从而便于后续对变更后的客户端网元的合法性验证,使得服务端操作的准确性和安全性大大提高。In the solution provided by the present application, if the update of the client network element is involved, the server network element will update the resource verification identifier of the old client network element stored locally to the changed resource verification identifier of the client network element , so as to facilitate the subsequent legality verification of the changed client network element, so that the accuracy and security of the server operation are greatly improved.
结合第一方面,在第一方面的一种可能的实现方式中,所述服务端网元包括地址映射表,所述地址映射表包括第一客户端网元标识和所述第一客户端网元标识对应的客户端地址信息,所述待校验信息包括所述客户端地址信息,所述服务端网元根据所述待校验信息对所述第一客户端网元进行合法性验证,包括:所述服务端网元遍历所述地址映射表,判断所述地址映射表中是否包含所述第一请求消息携带的客户端地址信息,若所述地址映射表中包含所述客户端地址信息,则确认所述第一客户端网元合法。With reference to the first aspect, in a possible implementation manner of the first aspect, the server network element includes an address mapping table, and the address mapping table includes a first client network element identifier and the first client network element. The client address information corresponding to the element identifier, the information to be verified includes the client address information, and the server network element performs legality verification on the first client network element according to the information to be verified, Including: the server network element traverses the address mapping table, and determines whether the address mapping table contains the client address information carried in the first request message, if the address mapping table contains the client address information, it is confirmed that the first client network element is legal.
在本申请提供的方案中,服务端网元还可以通过客户端地址信息来验证客户端网元的合法性,从而避免服务端按照非预期的客户端请求操作资源,提高了服务端操作的准确性和安全性。In the solution provided by this application, the server network element can also verify the legitimacy of the client network element through the client address information, thereby avoiding the server operating resources according to unexpected client requests, and improving the accuracy of the server operation. sex and safety.
第二方面,提供了一种网络设备,所述网络设备可包括:接收单元,用于接收第一客户端网元发送的第一请求消息,所述第一请求消息携带待校验信息,所述待校验信息用于对所述第一客户端网元进行合法性验证;处理单元,用于根据所述待校验信息对所述第一客户端网元进行合法性验证;在验证所述第一客户端网元合法之后执行所述第一请求消息。In a second aspect, a network device is provided. The network device may include: a receiving unit configured to receive a first request message sent by a first client network element, where the first request message carries information to be verified, and the The information to be verified is used to verify the validity of the first client network element; the processing unit is used to verify the legality of the first client network element according to the information to be verified; The first request message is executed after the first client network element is legal.
结合第二方面,在第二方面的一种可能的实现方式中,所述接收单元,在用于接收第一客户端网元发送的第一请求消息时,具体用于:接收所述第一客户端网元根据超文本传输协议发送的HTTP请求消息,所述HTTP请求消息包括HTTP协议头和消息体,所述HTTP协议头包括第一客户端网元类型和第一客户端网元标识。With reference to the second aspect, in a possible implementation manner of the second aspect, when the receiving unit is configured to receive the first request message sent by the first client network element, the receiving unit is specifically configured to: receive the first request message sent by the first client network element. The HTTP request message sent by the client network element according to the hypertext transfer protocol, the HTTP request message includes an HTTP protocol header and a message body, and the HTTP protocol header includes the first client network element type and the first client network element identifier.
结合第二方面,在第二方面的一种可能的实现方式中,所述消息体包括所述第一客户端网元标识,所述处理单元,在用于根据所述待校验信息对所述第一客户端网元进行合法性验证时,具体用于:比较所述HTTP协议头中的第一客户端网元标识和所述消息体中的第一客户端网元标识是否一致,若一致,则确认所述第一客户端网元合法。With reference to the second aspect, in a possible implementation manner of the second aspect, the message body includes the identifier of the network element of the first client, and the processing unit is configured to perform an analysis on the information to be verified according to the information to be verified. When the first client network element performs legality verification, it is specifically used to: compare whether the first client network element identifier in the HTTP protocol header is consistent with the first client network element identifier in the message body, and if If they are consistent, it is confirmed that the first client network element is legal.
结合第二方面,在第二方面的一种可能的实现方式中,所述处理单元,在用于根据所述待校验信息对所述第一客户端网元进行合法性验证时,具体用于:当所述HTTP协议头中的第一客户端网元类型与所述服务端网元自身的网元类型一致时,比较所述HTTP协议头中的第一客户端网元标识和所述服务端网元自身的网元实例标识是否一致,若不一致,则确认所述第一客户端网元合法。With reference to the second aspect, in a possible implementation manner of the second aspect, when the processing unit is used to verify the validity of the first client network element according to the information to be verified, specifically use In: when the first client network element type in the HTTP protocol header is consistent with the network element type of the server network element itself, compare the first client network element identifier in the HTTP protocol header with the Whether the network element instance identifiers of the server network element itself are consistent, if not, it is confirmed that the first client network element is legal.
结合第二方面,在第二方面的一种可能的实现方式中,所述接收单元接收第一客户端网元发送的第一请求消息之后,所述处理单元,还用于保存所述第一客户端网元标识;所述处理单元根据所述待校验信息对所述第一客户端网元进行合法性验证之后,所述接收单元还用于接收所述第一客户端网元发送的第二请求消息,所述第二请求消息携带所述第一客户端网元标识;所述处理单元,还用于:比较所述第二请求消息中的第一客户端网元标识和所述服务端网元保存的第一客户端网元标识是否一致,若一致,则确认所述第一客户端网元合法;在验证所述第一客户端网元合法之后执行所述第二请求消息。With reference to the second aspect, in a possible implementation manner of the second aspect, after the receiving unit receives the first request message sent by the first client network element, the processing unit is further configured to save the first request message Client network element identifier; after the processing unit verifies the validity of the first client network element according to the information to be verified, the receiving unit is further configured to receive the information sent by the first client network element a second request message, where the second request message carries the identifier of the network element of the first client; the processing unit is further configured to: compare the identifier of the network element of the first client in the second request message with the identifier of the network element of the first client Whether the identifiers of the first client NEs saved by the server NE are consistent, if they are consistent, confirm that the first client NE is legal; execute the second request message after verifying that the first client NE is legal .
结合第二方面,在第二方面的一种可能的实现方式中,所述接收单元接收第一客户端网元发送的第一请求消息之前,所述接收单元,还用于:接收第二客户端网元发送的第三请求消息,所述第三请求消息携带第二客户端网元标识;所述处理单元,还用于:根据所述第二客户端网元标识进行合法性验证;在验证所述第一客户端网元合法之后保存所述第二客户端网元标识;所述接收单元接收第一客户端网元发送的第一请求消息之后,所述处理单元,还用于:比较所述HTTP协议头中的第一客户端网元标识和所述保存的第二客户端网元标识是否一致。With reference to the second aspect, in a possible implementation manner of the second aspect, before the receiving unit receives the first request message sent by the first client network element, the receiving unit is further configured to: receive the second client a third request message sent by the end network element, where the third request message carries the identifier of the second client network element; the processing unit is further configured to: perform legality verification according to the identifier of the second client network element; After verifying that the first client network element is legal, save the identifier of the second client network element; after the receiving unit receives the first request message sent by the first client network element, the processing unit is further configured to: Compare whether the identifier of the first client network element in the HTTP protocol header is consistent with the stored identifier of the second client network element.
结合第二方面,在第二方面的一种可能的实现方式中,所述待校验信息包括第一资源核查标识,所述接收单元接收第一客户端网元发送的第一请求消息之前,所述接收单元,还用于:接收所述第一客户端网元发送的第四请求消息,所述第四请求消息携带所述第一资源核查标识,所述第一资源核查标识用于唯一标识所述第一客户端网元;所述处理单元,还用于:保存所述第一资源核查标识;根据所述待校验信息对所述第一客户端网元进行合法性验证,包括:比较所述第一请求消息携带的第一资源核查标识与保存的第一资源核查标识是否一致,若一致,则确认所述第一客户端网元合法。With reference to the second aspect, in a possible implementation manner of the second aspect, the information to be verified includes a first resource verification identifier, and before the receiving unit receives the first request message sent by the first client network element, The receiving unit is further configured to: receive a fourth request message sent by the first client network element, where the fourth request message carries the first resource verification identifier, and the first resource verification identifier is used to uniquely Identifies the first client network element; the processing unit is further configured to: save the first resource verification identifier; perform legality verification on the first client network element according to the information to be verified, including : Compare whether the first resource verification identifier carried in the first request message is consistent with the stored first resource verification identifier, and if they are consistent, confirm that the first client network element is legal.
结合第二方面,在第二方面的一种可能的实现方式中,所述确认所述第一客户端网元合法之后,所述接收单元,还用于:接收第三客户端网元发送的第五请求消息,所述第五请求消息携带所述第一资源核查标识和第二资源核查标识,所述第二资源核查标识用于唯一标识所述第三客户端网元;所述处理单元,还用于:比较所述第五请求消息携带的第一资源核查标识与所述保存的第一资源核查标识是否一致,若一致,删除所述第一资源核查标识,保存所述第二资源核查标识。With reference to the second aspect, in a possible implementation manner of the second aspect, after confirming that the first client network element is legal, the receiving unit is further configured to: receive the data sent by the third client network element. a fifth request message, where the fifth request message carries the first resource verification identifier and the second resource verification identifier, and the second resource verification identifier is used to uniquely identify the third client network element; the processing unit , and is also used to: compare whether the first resource verification identifier carried in the fifth request message is consistent with the saved first resource verification identifier, and if they are consistent, delete the first resource verification identifier and save the second resource Check mark.
结合第二方面,在第二方面的一种可能的实现方式中,所述设备包括地址映射表,所述地址映射表包括第一客户端网元标识和所述第一客户端网元标识对应的客户端地址信 息,所述待校验信息包括所述客户端地址信息,所述处理单元,在用于根据所述待校验信息对所述第一客户端网元进行合法性验证时,具体用于:遍历所述地址映射表,判断所述地址映射表中是否包含所述第一请求消息携带的客户端地址信息,若所述地址映射表中包含所述客户端地址信息,则确认所述第一客户端网元合法。With reference to the second aspect, in a possible implementation manner of the second aspect, the device includes an address mapping table, and the address mapping table includes a first client network element identifier corresponding to the first client network element identifier The client address information, the information to be verified includes the client address information, and the processing unit, when used to verify the validity of the first client network element according to the information to be verified, It is specifically used for: traversing the address mapping table, judging whether the address mapping table contains the client address information carried in the first request message, and confirming if the address mapping table contains the client address information The first client network element is legal.
第三方面,提供了一种计算设备,该计算设备中包括处理器,处理器被配置为支持该电子设备实现第一方面以及结合上述第一方面中的任意一种实现方式所提供的面向服务化接口的资源校验方法中相应的功能。该计算设备还可以包括存储器,存储器用于与处理器耦合,其保存该电子设备必要的程序指令和数据。该计算设备还可以包括通信接口,用于该计算设备与其他设备或通信网络通信。In a third aspect, a computing device is provided, the computing device includes a processor, and the processor is configured to support the electronic device to implement the first aspect and the service-oriented provided in combination with any one of the above-mentioned first aspects. The corresponding function in the resource verification method of the interface. The computing device may also include a memory for coupling with the processor that holds program instructions and data necessary for the electronic device. The computing device may also include a communication interface for the computing device to communicate with other devices or a communication network.
第四方面,提供了计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,当该计算机程序被处理器执行时,可以实现上述第一方面以及结合上述第一方面中的任意一种实现方式所提供的面向服务化接口的资源校验方法的功能。In a fourth aspect, a computer-readable storage medium is provided, and the computer-readable storage medium stores a computer program. When the computer program is executed by the processor, the first aspect and any one of the first aspect can be implemented. The function of the resource verification method for the service-oriented interface provided by this implementation.
第五方面,本申请提供了一种计算机程序产品,该计算机程序包括指令,当该计算机程序被计算机执行时,使得计算机可以执行上述第一方面以及结合上述第一方面中的任意一种实现方式所提供的面向服务化接口的资源校验方法的流程。In a fifth aspect, the present application provides a computer program product, the computer program includes instructions that, when the computer program is executed by a computer, enables the computer to execute the above-mentioned first aspect and any implementation manner in combination with the above-mentioned first aspect The process of the provided service-oriented interface resource verification method.
第六方面,本申请提供了一种芯片系统,该芯片系统包括处理器,用于支持网络设备实现上述第一方面中所涉及的功能,例如,生成或处理上述第一方面面向服务化接口的资源校验方法中所涉及的信息。在一种可能的设计中,所述芯片系统还包括存储器,所述存储器,用于保存数据发送设备必要的程序指令和数据。该芯片系统,可以由芯片构成,也可以包含芯片和其他分立器件。In a sixth aspect, the present application provides a chip system, the chip system includes a processor for supporting a network device to implement the functions involved in the first aspect, for example, generating or processing the service-oriented interface of the first aspect. Information involved in the resource verification method. In a possible design, the chip system further includes a memory for storing necessary program instructions and data of the data sending device. The chip system may be composed of chips, or may include chips and other discrete devices.
可以理解地,上述提供的第二方面提供的一种网络设备、第三方面提供的一种计算设备、第四方面提供的一种计算机可读存储介质、第五方面提供的一种计算机程序产品,以及第六方面提供的芯片系统均用于执行第一方面所提供的面向服务化接口的资源校验方法。因此,其所能达到的有益效果可参考第一方面所提供的面向服务化接口的资源校验方法中的有益效果,此处不再赘述。It can be understood that the network device provided by the second aspect, the computing device provided by the third aspect, the computer-readable storage medium provided by the fourth aspect, and the computer program product provided by the fifth aspect , and the chip system provided by the sixth aspect is used to execute the service-oriented interface-oriented resource verification method provided by the first aspect. Therefore, for the beneficial effects that can be achieved, reference may be made to the beneficial effects of the service-oriented interface-oriented resource verification method provided in the first aspect, which will not be repeated here.
图1为本申请实施例提供的一种会话创建流程的示意图;1 is a schematic diagram of a session creation process provided by an embodiment of the present application;
图2为本申请实施例提供的一种PDU会话重建流程的示意图;FIG. 2 is a schematic diagram of a PDU session reconstruction process provided by an embodiment of the present application;
图3为本申请实施例提供的一种5G服务化架构示意图;FIG. 3 is a schematic diagram of a 5G service-oriented architecture provided by an embodiment of the present application;
图4为本申请实施例提供的一种面向服务化接口的资源校验方法的流程示意图;4 is a schematic flowchart of a resource verification method for a service-oriented interface provided by an embodiment of the present application;
图5为本申请实施例提供的一种用户移动更新的流程示意图;FIG. 5 is a schematic flowchart of a user mobile update provided by an embodiment of the present application;
图6为本申请实施例提供的一种第一客户端网元标识与客户端地址信息的对应关系示意图;6 is a schematic diagram of a correspondence between a first client network element identifier and client address information according to an embodiment of the present application;
图7为本申请实施例提供的一种地址映射表的示意图;7 is a schematic diagram of an address mapping table provided by an embodiment of the present application;
图8为本申请实施例提供的又一种面向服务化接口的资源校验方法的流程示意图;FIG. 8 is a schematic flowchart of yet another service-oriented interface-oriented resource verification method provided by an embodiment of the present application;
图9为本申请实施例提供的又一种面向服务化接口的资源校验方法的流程示意图;9 is a schematic flowchart of yet another service-oriented interface-oriented resource verification method provided by an embodiment of the present application;
图10为本申请实施例提供的又一种面向服务化接口的资源校验方法的流程示意图;10 is a schematic flowchart of yet another service-oriented interface-oriented resource verification method provided by an embodiment of the present application;
图11为本申请实施例提供的又一种面向服务化接口的资源校验方法的流程示意图;11 is a schematic flowchart of yet another service-oriented interface-oriented resource verification method provided by an embodiment of the present application;
图12为本申请实施例提供的AMF和SMF注册NRF的示意图;FIG. 12 is a schematic diagram of AMF and SMF registering NRF provided by an embodiment of the present application;
图13为本申请实施例提供的AMF客户端地址信息配置的示意图;FIG. 13 is a schematic diagram of an AMF client address information configuration provided by an embodiment of the present application;
图14为本申请实施例提供的SMF验证AMF合法性的示意图;14 is a schematic diagram of the SMF verifying the validity of the AMF provided by the embodiment of the present application;
图15为本申请实施例提供的AMF验证SMF合法性的示意图;FIG. 15 is a schematic diagram of an AMF verifying the validity of an SMF provided by an embodiment of the present application;
图16为本申请实施例提供的一种网络设备的示意图;FIG. 16 is a schematic diagram of a network device according to an embodiment of the present application;
图17为本申请实施例提供的一种计算设备的结构示意图。FIG. 17 is a schematic structural diagram of a computing device according to an embodiment of the present application.
下面结合附图对本申请实施例中的技术方案进行清楚、完整的描述,显然,所描述的实施例仅仅是本申请的一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings. Obviously, the described embodiments are only a part of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.
首先,对本申请中所涉及的部分用语和相关技术进行解释说明,以便于本领域技术人员理解。First, some terms and related technologies involved in this application are explained so as to facilitate the understanding of those skilled in the art.
统一资源标识符(Uniform Resource Identifier,URI),表示的是web上每一种可用的资源,如HTML文档、图像、视频片段、程序等都由一个URI进行标识的。Uniform Resource Identifier (URI) means that every resource available on the web, such as HTML documents, images, video clips, programs, etc., is identified by a URI.
国际移动用户识别码(International Mobile Subscriber Identity,IMSI)是用于区分蜂窝网络中不同用户,且在所有蜂窝网络中不会重复的识别码。手机将IMSI存储于一个64比特的字段发送给网络。IMSI可以用来在归属位置寄存器(Home Location Register,HLR)或拜访位置寄存器(Visitor Location Register,VLR)中查询用户的信息。The International Mobile Subscriber Identity (IMSI) is an identification code used to distinguish different users in a cellular network and will not be repeated in all cellular networks. The phone stores the IMSI in a 64-bit field and sends it to the network. The IMSI can be used to query the user's information in the Home Location Register (HLR) or the Visitor Location Register (VLR).
5G全局唯一的临时UE标识(5G Globally Unique Temporary UE Identity,5G-GUTI)由两部分组成:第一部分标识是由哪个AMF分配的5G-GUTI;第二部分表示UE在AMF内唯一的id。5G系统下使用5G-GUTI的目的是减少在通信中显示使用UE的永久性标识,可以提升安全性。The 5G Globally Unique Temporary UE Identity (5G-GUTI) consists of two parts: the first part identifies the 5G-GUTI allocated by which AMF; the second part represents the UE's unique id within the AMF. The purpose of using 5G-GUTI under the 5G system is to reduce the display of the permanent identity of the UE in communication, which can improve security.
通用公共用户标识(Generic Public Subscription Identifier,GPSI)等同于4G的MSISDN,用户永久标识符(Subscription Permanent Identifier,SUPI)和GPSI之间不一定一一对应,用户如果访问不同的数据网络,就会存在多个GPSI标识,网络需要将外部网络GPSI与SUPI建立关系。Generic Public Subscription Identifier (GPSI) is equivalent to 4G MSISDN. There is not necessarily a one-to-one correspondence between Subscription Permanent Identifier (SUPI) and GPSI. If users access different data networks, there will be Multiple GPSI identifiers, the network needs to establish a relationship between the external network GPSI and SUPI.
PDU会话标识(PDU Session ID)是用来标识PDU会话的ID,此ID对每个终端来说是唯一的,编号范围仅限发起PDU会话的UE。The PDU Session ID (PDU Session ID) is an ID used to identify the PDU session. This ID is unique to each terminal, and the number range is limited to the UE that initiated the PDU session.
SMF分配的会话上下文标识(SM context reference assigned by the SMF during the Create SM Context service operation,smContextRef)用于响应AMF的请求,表示SMF可以处理后续流程。The session context identifier (SM context reference assigned by the SMF during the Create SM Context service operation, smContextRef) assigned by the SMF is used to respond to the AMF request, indicating that the SMF can process subsequent processes.
用户终端设备(User Equipment,UE),又可以称之为终端设备、移动台(Mobile Station,MS)、移动终端(Mobile Terminal,MT)等,是一种向用户提供语音和/或数据连通性的设备。终端设备可以为手持终端、笔记本电脑、用户单元(Subscriber Unit)、蜂窝电话(Cellular Phone)、智能电话(Smart Phone)、无线数据卡、个人数字助理(Personal Digital Assistant,PDA)电脑、平板型电脑、无线调制解调器(Modem)、手持设备(Handheld)、膝上型电脑(Laptop Computer)、无绳电话(Cordless Phone)或者无线本地环路(Wireless Local Loop,WLL)台、机器类型通信(Machine Type Communication,MTC)终端,可穿戴设备(例如智能手表、智能手环、计步器等),车载设备(例如,汽车、自行车、电动车、飞机、船舶、火车、高铁等)、虚拟现实(Virtual Reality,VR)设备、增强现实(Augmented Reality,AR)设备、工业控制(Industrial Control)中的无线终端、智能家居设备(例如,冰箱、电视、空调、电表等)、智能机器人、车间设备、无人驾驶(Self-Driving)中的无线终端、远程手术(Remote Medical Surgery)中的无线终端、智能电网(Smart Grid)中的无线终端、运输安全(Transportation Safety)中的无线终端、智慧城市(Smart City)中的无线终端,或智慧家庭(Smart Home)中的无线终端、飞行设备(例如,智能机器人、热气球、无人机、飞机)或其他可以接入网络的设备。图3中终端设备以UE示出,仅作为示例,并不对终端设备进行限定。UE可以通过建立UE-(R)AN设备-UPF-DN之间的会话,即协议数据单元(Protocol Data Unit,PDU)会话,来访问DN。User equipment (User Equipment, UE), also known as terminal equipment, mobile station (Mobile Station, MS), mobile terminal (Mobile Terminal, MT), etc., is a device that provides voice and/or data connectivity to users. device of. The terminal device can be a handheld terminal, a notebook computer, a subscriber unit (Subscriber Unit), a cellular phone (Cellular Phone), a smart phone (Smart Phone), a wireless data card, a personal digital assistant (Personal Digital Assistant, PDA) computer, tablet computer , Wireless Modem (Modem), Handheld Device (Handheld), Laptop Computer (Laptop Computer), Cordless Phone (Cordless Phone) or Wireless Local Loop (WLL) station, Machine Type Communication, MTC) terminals, wearable devices (such as smart watches, smart bracelets, pedometers, etc.), in-vehicle devices (such as cars, bicycles, electric vehicles, airplanes, ships, trains, high-speed rail, etc.), virtual reality (Virtual Reality, VR) equipment, Augmented Reality (AR) equipment, wireless terminals in industrial control (Industrial Control), smart home equipment (for example, refrigerators, TVs, air conditioners, electricity meters, etc.), intelligent robots, workshop equipment, unmanned driving Wireless Terminals in Self-Driving, Wireless Terminals in Remote Medical Surgery, Wireless Terminals in Smart Grid, Wireless Terminals in Transportation Safety, Smart City Wireless terminals in smart homes, or wireless terminals in Smart Homes, flying devices (eg, smart robots, hot air balloons, drones, airplanes), or other devices that can access the network. The terminal device in FIG. 3 is shown as a UE, which is only an example and does not limit the terminal device. The UE can access the DN by establishing a session between the UE-(R)AN device-UPF-DN, that is, a protocol data unit (Protocol Data Unit, PDU) session.
(无线)接入网络((Radio)Access Network,(R)AN)设备是为UE提供无线接入的设备,主要负责空口侧的无线资源管理、服务质量(Quality of Service,QoS)流管理、数据压缩和加密等功能。(R)AN设备可以包括各种形式的基站,例如:宏基站,微基站(也称为小站),中继站,接入点等。(R)AN设备还可以包括无线上网(Wireless Fidelity,Wi-Fi)接入节点(Access Point,AP)。(R)AN设备还可以包括全球微波互联接入(Worldwide Interoperability for Microwave Access,WiMAX)基站(Base Station,BS)。The (Radio) Access Network ((R)AN) device is a device that provides wireless access to the UE, and is mainly responsible for radio resource management, Quality of Service (QoS) flow management on the air interface side, Features such as data compression and encryption. (R)AN devices may include various forms of base stations, such as: macro base stations, micro base stations (also called small stations), relay stations, access points, and the like. The (R)AN device may also include a Wireless Fidelity (Wi-Fi) access node (Access Point, AP). The (R)AN device may also include a Worldwide Interoperability for Microwave Access (WiMAX) base station (Base Station, BS).
用户面功能(User plane Function,UPF)网元主要负责对用户报文进行处理,如转发、计费等。可以从DN接收用户报文,并通过RAN设备传输给UE;也可以通过RAN设备从UE接收用户报文,并转发到DN。UPF网元为UE提供服务的传输资源和调度功能由SMF网元管理控制。The user plane function (UPF) network element is mainly responsible for processing user packets, such as forwarding and charging. The user packet can be received from the DN and transmitted to the UE through the RAN device; the user packet can also be received from the UE through the RAN device and forwarded to the DN. The transmission resources and scheduling functions provided by the UPF network element to serve the UE are managed and controlled by the SMF network element.
数据网络(Data Network,DN)可以是因特网(Internet)、IP多媒体业务(IP Multimedia Service,IMS)网络、区域网络,即本地网络,例如多接入边缘计算(Multi-Access Edge Computing,MEC)网络,等。DN是UE的PDU会话访问的目的地。DN中包括或部署有应用服务器,应用服务器可以与UE进行数据传输,为UE提供业务服务。The data network (Data Network, DN) can be the Internet (Internet), IP Multimedia Service (IP Multimedia Service, IMS) network, regional network, that is, local network, such as Multi-Access Edge Computing (Multi-Access Edge Computing, MEC) network ,Wait. The DN is the destination of the UE's PDU session access. An application server is included or deployed in the DN, and the application server can perform data transmission with the UE and provide business services for the UE.
鉴权服务功能(Authentication Server Function,AUSF)网元可以负责对UE的接入进行认证鉴权,还负责计费。The authentication server function (Authentication Server Function, AUSF) network element can be responsible for the authentication and authentication of the access of the UE, and also responsible for the charging.
接入及移动性管理功能(Access and Mobility Management Function,AMF)网元可以通过N1接口接入UE的非接入层(Non Access Stratum,NAS)信令(包括会话管理(Session Management,SM)信令)和N2接口接入RAN的信令,完成UE的注册流程和SM信令的转发以及移动性管理。The Access and Mobility Management Function (AMF) network element can access the UE's non-access stratum (Non Access Stratum, NAS) signaling (including session management (Session Management, SM) signaling through the N1 interface. Command) and the N2 interface to access the RAN signaling to complete the UE registration process and SM signaling forwarding and mobility management.
会话管理功能(Session Management Function,SMF)网元主要负责移动网络中的会话管理,如会话的建立、修改、释放、更新等流程。具体功能如为用户分配IP地址、选择提供报文转发功能的UPF网元等。The session management function (Session Management Function, SMF) network element is mainly responsible for session management in the mobile network, such as session establishment, modification, release, update and other processes. Specific functions include assigning IP addresses to users and selecting UPF network elements that provide packet forwarding functions.
网络切片选择功能(Network Slice Selection Function,NSSF)网元是5G的新增网元, 主要应用于5G的切片业务,负责管理网络切片相关的信心。The Network Slice Selection Function (NSSF) network element is a new network element of 5G. It is mainly used in 5G slice services and is responsible for managing network slice-related confidence.
网络业务呈现功能(Network Exposure Function,NEF)网元负责对外开放网络数据。The Network Exposure Function (NEF) network element is responsible for opening network data to the outside world.
网元数据仓库功能(NF Repository Function,NRF)网元负责对NF进行登记、管理和状态检测,可实现所有NF的自动化管理。每个NF启动时,必须要到NRF进行注册登记才能提供服务。The network element data warehouse function (NF Repository Function, NRF) network element is responsible for the registration, management and status detection of the NF, which can realize the automatic management of all NFs. When each NF is started, it must register with the NRF before it can provide services.
策略控制功能(Policy Control function,PCF)网元可以负责终端设备策略管理,既包括移动性相关策略,也包括PDU会话相关策略,如QoS策略、计费策略等。The Policy Control Function (PCF) network element can be responsible for terminal device policy management, including both mobility-related policies and PDU session-related policies, such as QoS policies and charging policies.
统一数据管理功能(Unified Data Management,UDM)网元负责用户密钥管理、用户标识处理、订阅数据的访问授权、UE的网络功能实体管理、会话和业务连续性管理、短消息推送、合法监听、签约管理、短消息管理、用于管控用户数据,如签约信息的管理。The Unified Data Management (UDM) network element is responsible for user key management, user identification processing, access authorization for subscription data, UE network function entity management, session and business continuity management, short message push, legal interception, Contract management, short message management, used to manage and control user data, such as contract information management.
应用层功能(Application Function,AF)网元主要支持与第三代合作伙伴计划(3rd Generation Partnership Project,3GPP)核心网交互来提供服务,来影响业务流路由、接入网能力开放、策略控制等。The Application Function (AF) network element mainly supports interaction with the 3rd Generation Partnership Project (3GPP) core network to provide services to affect service flow routing, access network capability opening, policy control, etc. .
服务化接口是5G架构所引入的一种不同的网络实体之间的模型化的交互方式,通过对网络功能块和网络实体之间的接口和连接的灵活的定义来实现5G网络对于多样的特定的服务类型在各个协议层的灵活的处理方法和处理流程的实现。一般来说,一个服务化接口只针对一个网络功能块,网络功能块通过这个接口与其它的功能块进行交互,而其他的功能块通过相应的另一个接口与此功能块进行交互。The service-oriented interface is a modeled interaction method between different network entities introduced by the 5G architecture. Through the flexible definition of the interfaces and connections between network function blocks and network entities, the 5G network can be used for various specific tasks. The realization of flexible processing methods and processing flow of the service types at each protocol layer. Generally speaking, a service interface is only for one network function block, the network function block interacts with other function blocks through this interface, and other function blocks interact with this function block through another corresponding interface.
策略控制与计费(Policy and Charging Control)是一种将应用层级会话服务数据流的QoS要求映射为IP-CAN的架构,接入传输网络承载级服务的QoS要求来保障数据传输,还可根据运营商的计费策略实现服务数据流层级的计费功能。Policy and Charging Control is an architecture that maps the QoS requirements of application-level session service data streams to IP-CAN, and accesses the QoS requirements of transport network bearer-level services to ensure data transmission. The operator's charging policy implements the charging function at the service data flow level.
超文本传输协议(Hyper Text Transfer Protocol,HTTP)是一个简单的请求-响应协议,它通常运行在TCP之上。它指定了客户端可能发送给服务器什么样的消息以及得到什么样的响应。请求和响应消息的头以ASCII码形式给出;而消息内容则具有一个类似多用途互联网邮件扩展类型(Multipurpose Internet Mail Extensions,MIME)的格式。Hyper Text Transfer Protocol (HTTP) is a simple request-response protocol that usually runs on top of TCP. It specifies what kind of messages the client might send to the server and what kind of response it gets. The headers of the request and response messages are given in ASCII; the message content has a format similar to Multipurpose Internet Mail Extensions (MIME).
HTTP消息由客户端到服务器的请求和服务器到客户端的响应组成。请求消息和响应消息都是由开始行(对于请求消息,开始行就是请求行,对于响应消息,开始行就是状态行),消息报头(可选),空行(只有CRLF的行),消息正文(可选)组成。HTTP messages consist of client-to-server requests and server-to-client responses. Both the request message and the response message consist of a start line (for a request message, the start line is the request line, for a response message, the start line is the status line), message header (optional), blank line (only CRLF lines), message body (Optional) Composition.
HTTP消息报头包括普通报头、请求报头、响应报头、实体报头。HTTP message headers include normal headers, request headers, response headers, and entity headers.
1、普通报头1. Ordinary header
在普通报头中,有少数报头域用于所有的请求和响应消息,但并不用于被传输的实体,只用于传输的消息。Among the normal headers, there are a few header fields that are used for all request and response messages, but not for the entity being transported, only for the message being transported.
2、请求报头2. Request header
请求报头允许客户端向服务器端传递请求的附加信息以及客户端自身的信息。Request headers allow the client to pass additional information about the request to the server as well as information about the client itself.
常用的请求报头如下所示:Commonly used request headers are as follows:
Accept,用于指定客户端接受哪些类型的信息。Accept, which is used to specify what types of information the client accepts.
例如:Accept:image/gif,表明客户端希望接受GIF图像格式的资源;Accept:text/html,表明客户端希望接受html文本。For example: Accept: image/gif, indicating that the client wants to accept resources in GIF image format; Accept: text/html, indicating that the client wants to accept html text.
Accept-Charset,用于指定客户端接受的字符集。Accept-Charset, which is used to specify the character set accepted by the client.
例如:Accept-Charset:iso-8859-1,gb2312,表示如果在请求消息中没有设置这个域,缺省是任何字符集都可以接受。For example: Accept-Charset: iso-8859-1, gb2312, indicating that if this field is not set in the request message, the default is that any character set is acceptable.
Accept-Encoding,类似于Accept,但是它是用于指定可接受的内容编码。Accept-Encoding, similar to Accept, but it is used to specify acceptable content encodings.
例如:Accept-Encoding:gzip.deflate.如果请求消息中没有设置这个域服务器假定客户端对各种内容编码都可以接受。For example: Accept-Encoding: gzip.deflate. If this is not set in the request message, the domain server assumes that the client accepts various content encodings.
Accept-Language,类似于Accept,但是它是用于指定一种自然语言。Accept-Language, similar to Accept, but it is used to specify a natural language.
例如:Accept-Language:zh-cn.如果请求消息中没有设置这个报头域,服务器假定客户端对各种语言都可以接受。For example: Accept-Language: zh-cn. If this header field is not set in the request message, the server assumes that all languages are acceptable to the client.
Authorization,主要用于证明客户端有权查看某个资源。当浏览器访问一个页面时,如果收到服务器的响应代码为401(未授权),可以发送一个包含Authorization请求报头域的请求,要求服务器对其进行验证。Authorization is mainly used to prove that the client has the right to view a resource. When a browser accesses a page, if it receives a response code of 401 (unauthorized) from the server, it can send a request containing the Authorization request header field, asking the server to authenticate it.
Host(发送请求时,该报头域是必需的),主要用于指定被请求资源的Internet主机和端口号,它通常从HTTP URL中提取出来的。Host (this header field is required when sending a request) is mainly used to specify the Internet host and port number of the requested resource, which is usually extracted from the HTTP URL.
User-Agent,用于获取客户端的操作系统、浏览器和其它属性。User-Agent, used to obtain the client's operating system, browser and other properties.
例如:上网登陆论坛的时候,往往会看到一些信息,这些信息包括操作系统的名称和版本、浏览器的名称和版本,实际上,这些信息是服务器应用程序从User-Agent请求报头域中获取到的。User-Agent请求报头域允许客户端将它的操作系统、浏览器和其它属性告诉服务器。For example, when you log in to a forum online, you will often see some information, including the name and version of the operating system, and the name and version of the browser. In fact, this information is obtained by the server application from the User-Agent request header field. arrived. The User-Agent request header field allows the client to tell the server its operating system, browser, and other attributes.
3、响应报头3. Response header
响应报头允许服务器传递不能放在状态行中的附加响应信息,以及关于服务器的信息和对Request-URI所标识的资源进行下一步访问的信息。Response headers allow the server to pass additional response information that cannot be placed in the status line, as well as information about the server and further access to the resource identified by the Request-URI.
常用的响应报头如下所示:Commonly used response headers are as follows:
Location,用于重定向接受者到一个新的位置。Location响应报头域常用在更换域名的时候。Location, which redirects the recipient to a new location. The Location response header field is often used when changing the domain name.
Server,包含了服务器用来处理请求的软件信息。与User-Agent请求报头域是相对应的。Server, contains software information that the server uses to process requests. Corresponds to the User-Agent request header field.
4、实体报头4. Entity header
请求和响应消息都可以传送一个实体。一个实体由实体报头域和实体正文组成,但并不是说实体报头域和实体正文要在一起发送,可以只发送实体报头域。实体报头定义了关于实体正文(例如:有无实体正文)和请求所标识的资源的元信息。Both request and response messages can convey an entity. An entity consists of the entity header field and the entity body, but it does not mean that the entity header field and the entity body should be sent together, and only the entity header field can be sent. The entity header defines meta-information about the entity body (eg, the presence or absence of an entity body) and the resource identified by the request.
常用的实体报头如下所示:Commonly used entity headers are as follows:
Content-Encoding,被用作媒体类型的修饰符,它的值指示了已经被应用到实体正文的附加内容的编码,因而要获得Content-Type报头域中所引用的媒体类型,必须采用相应的解码机制。Content-Encoding, used as a modifier for the media type, its value indicates the encoding of the additional content that has been applied to the entity body, so to obtain the media type referenced in the Content-Type header field, the corresponding decoding must be used mechanism.
Content-Language,描述了资源所用的自然语言。没有设置这个报头域则认为实体内容将提供给所有的语言阅读者。Content-Language, which describes the natural language used by the resource. If this header field is not set, the entity content is assumed to be available to all language readers.
Content-Length,用于指明实体正文的长度,以字节方式存储的十进制数字来表示。Content-Length, used to indicate the length of the entity body, expressed as a decimal number stored in bytes.
Content-Type,用于指明发送给接收者的实体正文的媒体类型。Content-Type, used to indicate the media type of the entity body sent to the recipient.
Last-Modified,用于指示资源的最后修改日期和时间。Last-Modified, which indicates the date and time when the resource was last modified.
Expires,用于给出响应过期的日期和时间。Expires, giving the date and time when the response expires.
通用唯一识别码(Universally Unique Identifier,UUID)定义为一个字符串主键,采用32位数字组成,编码采用16进制,定义了在时间和空间都完全惟一的系统信息。UUID包括当前日期和时间、时钟序列和全局唯一的IEEE机器识别号等内容。UUID的唯一缺陷在于生成的结果串会比较长。关于UUID这个标准使用最普遍的是微软的全局唯一标识符(Globals Unique Identifiers,GUID)。Universally Unique Identifier (UUID) is defined as a string primary key, which is composed of 32 digits and encoded in hexadecimal, which defines system information that is completely unique in time and space. The UUID includes the current date and time, the clock sequence, and the globally unique IEEE machine identification number. The only drawback of UUIDs is that the resulting string of results can be long. The most commonly used standard for UUID is Microsoft's Globals Unique Identifiers (GUID).
另外,标准的UUID格式为:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx(8-4-4-4-12),其编码规则如下:In addition, the standard UUID format is: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx (8-4-4-4-12), and the encoding rules are as follows:
(1)1~8位采用系统时间,在系统时间上精确到毫秒级以保证时间上的惟一性;(1) Bits 1 to 8 adopt the system time, and the system time is accurate to the millisecond level to ensure the uniqueness of time;
(2)9~16位采用底层的IP地址,保证在服务器集群中的惟一性;(2) 9 to 16 bits use the underlying IP address to ensure uniqueness in the server cluster;
(3)17~24位采用当前对象的Hash Code值,保证在一个内部对象上的惟一性;(3) Bits 17 to 24 adopt the Hash Code value of the current object to ensure uniqueness on an internal object;
(4)25~32位采用调用方法的一个随机数,保证在一个对象内的毫秒级的惟一性。(4) 25-32 bits use a random number of the calling method to ensure millisecond-level uniqueness within an object.
目前,客户端发送的请求消息中会携带URI、用户标识(如IMSI、5G-GUTI、GPSI等)和特殊的资源标识(如PDU Session ID、smContextRef、订阅标识等),而服务端通过这些标识定位本地用户上下文,进而完成客户端请求操作。但是,上述标识是通用的标识,并且部分标识的范围有限,这也就意味着这些标识无法支撑服务端校验合法性,很可能造成误操作,导致错误删除资源、意外篡改资源以及不正当传递资源等不安全情况发生。At present, the request message sent by the client will carry URI, user identifier (such as IMSI, 5G-GUTI, GPSI, etc.) and special resource identifiers (such as PDU Session ID, smContextRef, subscription identifier, etc.), and the server uses these identifiers Locate the local user context, and then complete the client request operation. However, the above-mentioned identifiers are general identifiers, and some identifiers have a limited scope, which means that these identifiers cannot support the validity of the server-side verification, which is likely to cause misoperation, resulting in incorrect deletion of resources, accidental tampering of resources, and improper transmission. Insecure situations such as resources occur.
以会话创建流程为例,如图1所示,图1是本申请实施例提供的一种会话创建流程的示意图。图1中,用户请求创建PDU会话,所述PDU会话的会话ID为5,PDU5之前关联的SMF是SMF1,当前关联的SMF是SMF2,因为是同一个会话——PDU5,所以SMF1和SMF2中都有会话PDU5的上下文。若SMF1请求AMF释放用户的会话,AMF错误执行业务请求。Taking a session creation process as an example, as shown in FIG. 1 , FIG. 1 is a schematic diagram of a session creation process provided by an embodiment of the present application. In Figure 1, the user requests to create a PDU session, the session ID of the PDU session is 5, the SMF associated before PDU5 is SMF1, and the currently associated SMF is SMF2, because it is the same session - PDU5, so both SMF1 and SMF2 are in the same session. There is a context for session PDU5. If the SMF1 requests the AMF to release the user's session, the AMF performs the service request incorrectly.
再如图2所示,图2是本申请实施例提供的一种PDU会话重建流程的示意图。图2中,PDU5之前关联的SMF是SMF1,现在AMF为会话PDU5选择了新的SMF——SMF2,所以此时PDU5关联的SMF是SMF2。由于出现异常通信故障,AMF通知SMF1删除PDU5的上下文的请求没有发送成功,导致SMF1中仍存在PDU5的上下文,而AMF则继续处理会话重建流程。因为维护命令触发或者资源释放定时器超时触发资源释放等原因,SMF1释放PDU5的上下文,并通知AMF删除PDU5的上下文。若此时SMF2再请求处理PDU5的上下文,AMF因无上下文而回复异常,导致会话重建流程异常。As shown in FIG. 2 again, FIG. 2 is a schematic diagram of a PDU session reestablishment process provided by an embodiment of the present application. In Figure 2, the SMF associated with PDU5 before is SMF1, and now AMF selects a new SMF-SMF2 for session PDU5, so the SMF associated with PDU5 is SMF2 at this time. Due to an abnormal communication failure, the AMF notifies the SMF1 that the request to delete the context of the PDU5 is not sent successfully, resulting in the context of the PDU5 still existing in the SMF1, and the AMF continues to process the session re-establishment process. The SMF1 releases the context of the PDU5 and notifies the AMF to delete the context of the PDU5 due to reasons such as the maintenance command triggering or the resource release timer timeout triggering the resource release. If the SMF2 then requests to process the context of PDU5 at this time, the AMF will reply abnormally because there is no context, resulting in an abnormal session re-establishment process.
图1中,SMF1是客户端网元,其带有的标识是PDU5,这是通用标识且范围有限(1-15),AMF作为服务端网元无法检验客户端网元的合法性,会导致错误操作。图2中,SMF1通知AMF删除PDU5的上下文时,SMF1是客户端网元,其携带的标识是PDU5,这是通用标识且范围有限(1-15),AMF作为服务端网元无法检验客户端网元的合法性,造成AMF错误删除PDU5上下文,从而导致后续会话重建流程异常。In Figure 1, SMF1 is the client network element, and its identifier is PDU5, which is a general identifier and has a limited range (1-15). As a server network element, AMF cannot verify the legitimacy of the client network element, which will lead to wrong operation. In Figure 2, when SMF1 notifies AMF to delete the context of PDU5, SMF1 is a client network element, and the identifier it carries is PDU5, which is a general identifier and has a limited range (1-15). AMF, as a server network element, cannot verify the client The validity of the network element causes the AMF to delete the PDU5 context by mistake, resulting in an abnormality in the subsequent session re-establishment process.
基于上述内容,本申请提供了一种面向服务化接口的资源校验方法及相关设备,可以让客户端网元携带更多的信息,从而能支持服务端网元进行合法化校验,避免出现资源被错误删除、错误篡改、不正当传递等误操作的情况,提高了服务端网元操作的准确性和安全性。Based on the above content, the present application provides a service-oriented interface-oriented resource verification method and related equipment, which can allow the client network element to carry more information, so as to support the server network element to perform legal verification and avoid occurrence of Misoperations such as wrong deletion, wrong tampering, and improper transmission of resources improve the accuracy and security of server-side network element operations.
本申请实施例的技术方案可以应用于服务化接口通信下各种需要对客户端请求的合法性校验的场景,包括但不限于会话创建流程、会话重建流程、用户移动更新流程。The technical solutions of the embodiments of the present application can be applied to various scenarios requiring legality verification of client requests under service-based interface communication, including but not limited to session creation procedures, session reconstruction procedures, and user mobility update procedures.
为了更好地理解本申请实施例公开的一种面向服务化接口的资源校验方法及相关设备,下面先对本申请实施例使用的网络架构进行描述。请参阅图3,图3是本申请实施例公开的一种5G服务化架构示意图。如图3所示,所述5G服务化架构可以包括UE、(R)AN设备、UPF网元、DN、AUSF网元、AMF网元、SMF网元、NSSF网元、NEF网元、NRF网元、PCF网元、UDM网元、AF网元等,还包括服务化接口(Service Based Interface,SBI),如Nnssf、Nnef、Nnrf、Npcf等,还包括参考点,如N1、N2、N3、N4、N6,其中,N1是UE和AMF之间的参考点,N2是(R)AN和AMF之间的参考点,N3是(R)AN和UPF之间的参考点,N4是SMF和UPF之间的参考点,N6是UPF和DN之间的参考点。不同网元或设备之间可以通过接口和参考点进行通信,图3所示的接口名称和参考点只是一个示例说明,本申请实施例对此不作具体限定。In order to better understand a service-oriented interface-oriented resource verification method and related devices disclosed in the embodiments of the present application, the network architecture used in the embodiments of the present application is first described below. Please refer to FIG. 3. FIG. 3 is a schematic diagram of a 5G service-oriented architecture disclosed in an embodiment of the present application. As shown in Figure 3, the 5G service-oriented architecture may include UE, (R)AN equipment, UPF network element, DN, AUSF network element, AMF network element, SMF network element, NSSF network element, NEF network element, NRF network element element, PCF network element, UDM network element, AF network element, etc., also includes Service Based Interface (SBI), such as Nnssf, Nnef, Nnrf, Npcf, etc., and also includes reference points, such as N1, N2, N3, N4, N6, where N1 is the reference point between UE and AMF, N2 is the reference point between (R)AN and AMF, N3 is the reference point between (R)AN and UPF, and N4 is SMF and UPF N6 is the reference point between UPF and DN. Different network elements or devices may communicate through interfaces and reference points. The interface names and reference points shown in FIG. 3 are just an example, which is not specifically limited in this embodiment of the present application.
核心网中的以上各个网元也可以称为功能实体,既可以是在专用硬件上实现的网络元件,也可以是在专用硬件上运行的软件实例,或者是在适当平台上虚拟化功能的实例,例如,上述虚拟化平台可以为云平台。Each of the above network elements in the core network can also be referred to as functional entities, which can be either network elements implemented on dedicated hardware, software instances running on dedicated hardware, or instances of virtualized functions on an appropriate platform For example, the above-mentioned virtualization platform may be a cloud platform.
需要说明的是,图3中的网元在执行具体功能时,可能是作为服务端网元,也可能是作为客户端网元,当其作为服务端网元时,在接收来自客户端网元发送的信息后,需要对该客户端网元进行合法性校验,再根据校验结果判断是否进行后续操作。It should be noted that when the network element in FIG. 3 performs specific functions, it may be a server network element or a client network element. After the information is sent, it is necessary to verify the validity of the client network element, and then determine whether to perform subsequent operations according to the verification result.
需要说明的是,图3所示的系统架构中不限于图中所示的网元,还可以包括其它未在图中表示的设备,在此处不再一一列举。It should be noted that the system architecture shown in FIG. 3 is not limited to the network elements shown in the figure, and may also include other devices not shown in the figure, which will not be listed one by one here.
需要说明的是,本申请实施例并不限定核心网中各个网元的分布形式,图3所示的分布形式只是示例性的,本申请不作限定。It should be noted that the embodiments of the present application do not limit the distribution form of each network element in the core network, and the distribution form shown in FIG. 3 is only exemplary and is not limited in the present application.
应理解,本申请中所有网元的名称仅仅作为示例,在未来通信中,如6G中,还可以称为其它名称,或者在未来通信中,如6G中,本申请涉及的网元还可以通过其它具有相同功能的实体或者设备等来替代,本申请对此均不作限定。这里做统一说明,后续不再赘述。It should be understood that the names of all network elements in this application are only examples, and in future communications, such as 6G, they may also be called other names, or in future communications, such as 6G, the network elements involved in this application can also be referred to by It can be replaced by other entities or devices with the same function, which are not limited in this application. A unified description is made here, and will not be repeated in the future.
需要说明的是,图3所示的5G网络架构,并不构成对5G网络的限定。可选地,本申请实施例的方法还适用于未来的各种通信系统,例如6G或者其他通信网络等。It should be noted that the 5G network architecture shown in FIG. 3 does not constitute a limitation on the 5G network. Optionally, the methods in the embodiments of the present application are also applicable to various future communication systems, such as 6G or other communication networks.
为了避免资源被错误删除、错误篡改、不正当传递等误操作情况的发生,解决服务端网元对客户端网元合法性校验不足的问题,提高操作的安全性和可靠性,本申请实施例提供了一种面向服务化接口的资源校验方法。请参考附图4,图4是本申请实施例提供的一种面向服务化接口的资源校验方法的流程示意图,所述方法可应用于上述图3中所示的5G服务化架构,所述方法包括但不限于以下步骤:In order to avoid the occurrence of misoperations such as wrong deletion of resources, wrong tampering, and improper transmission, solve the problem of insufficient legality verification of the client network element by the server network element, and improve the security and reliability of operation, this application implements This example provides a service-oriented interface-oriented resource verification method. Please refer to FIG. 4. FIG. 4 is a schematic flowchart of a service-oriented interface-oriented resource verification method provided by an embodiment of the present application. The method can be applied to the 5G service-oriented architecture shown in FIG. 3. The The method includes but is not limited to the following steps:
S401:服务端网元接收第一客户端网元发送的第一请求消息。S401: The server network element receives the first request message sent by the first client network element.
具体地,第一客户端网元向服务端网元发送第一请求消息,服务端网元接收第一客户端网元发送的第一请求消息,所述第一请求消息携带待校验信息,所述待校验信息用于对所述第一客户端网元进行合法性验证。Specifically, the first client network element sends a first request message to the server network element, and the server network element receives the first request message sent by the first client network element, where the first request message carries the information to be verified, The to-be-verified information is used to verify the validity of the first client network element.
在本申请的一个实施例中,所述服务端网元接收所述第一客户端网元根据超文本传输协议发送的HTTP请求消息,即所述第一请求消息可以为HTTP请求消息,所述HTTP请求消息包括HTTP协议头和消息体,所述HTTP协议头包括第一客户端网元类型和第一客户端网元标识,所述消息体包括所述第一客户端网元标识,即所述待校验信息包括第一客户端网元类型和第一客户端网元标识。In an embodiment of the present application, the server network element receives an HTTP request message sent by the first client network element according to the hypertext transfer protocol, that is, the first request message may be an HTTP request message, and the The HTTP request message includes an HTTP protocol header and a message body, the HTTP protocol header includes the first client network element type and the first client network element identifier, and the message body includes the first client network element identifier, that is, the The information to be verified includes the first client network element type and the first client network element identifier.
可理解,所述第一客户端网元标识可以是网元实例标识,具体地,根据3GPP TS 29.500服务化接口协议,HTTP协议头包含Accept、Accept-Encoding、Context-Length、Context-Type、User-Agent等信息,其中,协议定义User-Agent的形式为“NF Type-”,NF Type是指网元类型,“-”后面的内容是可选信息,设备商可以自定义。在一种实现方式中,可以将所述可选信息自定义为网元实例标识(NF Instance ID),并在User-Agent中将所述NF Instance ID改成必选内容,即自定义操作完成后的User-Agent的形式为“NF Type-NF Instance ID”,也就意味着,HTTP协议头可以包括网元类型和网元实例标识。示例性的,对AMF网元来说,HTTP协议头中的User-Agent为AMF-AMF Instance ID,AMF Instance ID是指AMF的实例标识,例如,所述User-Agent可以为AMF-00000000-0000-0000-0000-000000000011,此时,AMF的实例标识为00000000-0000-0000-0000-000000000011。另外,所述第一客户端网元标识还可以是服务网元标识(Serving NF ID),所述Serving NF ID可以如上述NF Instance ID一样由HTTP协议头携带。It can be understood that the first client network element identifier can be a network element instance identifier. Specifically, according to the 3GPP TS 29.500 service-oriented interface protocol, the HTTP protocol header includes Accept, Accept-Encoding, Context-Length, Context-Type, User -Agent and other information, where the protocol defines User-Agent in the form of "NF Type-", NF Type refers to the network element type, and the content after "-" is optional information, which can be customized by equipment manufacturers. In an implementation manner, the optional information can be customized as a network element instance ID (NF Instance ID), and the NF Instance ID can be changed to mandatory content in the User-Agent, that is, the customization operation is completed The form of the latter User-Agent is "NF Type-NF Instance ID", which means that the HTTP protocol header can include the NE type and NE instance ID. Exemplarily, for the AMF network element, the User-Agent in the HTTP protocol header is the AMF-AMF Instance ID, and the AMF Instance ID refers to the instance identifier of the AMF. For example, the User-Agent may be AMF-00000000-0000 -0000-0000-000000000011, at this time, the instance identifier of AMF is 00000000-0000-0000-0000-000000000011. In addition, the first client network element identifier may also be a serving network element identifier (Serving NF ID), and the Serving NF ID may be carried by the HTTP protocol header like the above-mentioned NF Instance ID.
在本申请的一个实施例中,所述第一请求消息携带待校验信息,所述待校验信息包括第一资源核查标识,所述第一资源核查标识用于唯一标识所述第一客户端网元,即所述第一请求信息携带所述第一资源核查标识。可理解,所述第一请求消息可以是HTTP请求消息,也可以是其他类型的消息,因此,所述第一资源核查标识可以通过HTTP请求消息携带,也可以通过HTTP协议层携带,本申请对此不作限制。另外,所述资源核查标识包括但不限于网元实例标识(NF Instance ID),所述网元实例标识可以通过HTTP协议层携带。In an embodiment of the present application, the first request message carries information to be verified, the information to be verified includes a first resource verification identifier, and the first resource verification identifier is used to uniquely identify the first client The end network element, that is, the first request information carries the first resource verification identifier. It can be understood that the first request message may be an HTTP request message or other types of messages. Therefore, the first resource verification identifier may be carried by the HTTP request message or by the HTTP protocol layer. This is not limited. In addition, the resource verification identifier includes but is not limited to a network element instance identifier (NF Instance ID), and the network element instance identifier can be carried through the HTTP protocol layer.
在本申请的一个实施例中,所述服务端网元包括地址映射表,所述待校验信息包括第一客户端网元标识和所述第一客户端网元标识对应的客户端地址信息,可理解,所述第一客户端网元标识与所述客户端地址信息之间有映射关系,这也就意味着,可以通过所述第一客户端网元标识找到所述客户端地址信息。可理解,如上文所述,第一客户端网元标识可以为网元实例标识,也可以为服务网元标识。In an embodiment of the present application, the server network element includes an address mapping table, and the information to be verified includes a first client network element identifier and client address information corresponding to the first client network element identifier , it can be understood that there is a mapping relationship between the first client network element identifier and the client address information, which means that the client address information can be found through the first client network element identifier . It can be understood that, as described above, the first client network element identifier may be a network element instance identifier or a service network element identifier.
S402:服务端网元对第一客户端网元进行合法性验证。S402: The server network element performs legality verification on the first client network element.
具体地,服务端网元接收第一客户端网元发送的第一请求消息后,根据所述第一请求消息所携带的待校验信息对第一客户端网元进行合法性验证。Specifically, after receiving the first request message sent by the first client network element, the server network element performs legality verification on the first client network element according to the information to be verified carried in the first request message.
由步骤S401可得:第一请求消息为HTTP请求消息,所述HTTP请求消息包括HTTP协议头和消息体,所述HTTP协议头包括第一客户端网元类型和第一客户端网元标识,所述消息体包括所述第一客户端网元标识。在这种情况下,所述合法性验证可以有如下形式:It can be obtained from step S401 that the first request message is an HTTP request message, the HTTP request message includes an HTTP protocol header and a message body, and the HTTP protocol header includes the first client network element type and the first client network element identifier, The message body includes the network element identifier of the first client. In this case, the legality verification may have the following forms:
在本申请的一个实施例中,服务端网元比较所述HTTP协议头中的第一客户端网元标识和所述消息体中的第一客户端网元标识是否一致,若一致,则确认所述第一客户端网元合法。上述合法性过程可以发生在服务端网元首次接收来自第一客户端网元的消息时,即所述第一请求消息可以是第一客户端网元首次向服务端网元发送的消息。In an embodiment of the present application, the server network element compares whether the first client network element identifier in the HTTP protocol header is consistent with the first client network element identifier in the message body, and if they are consistent, confirms The first client network element is legal. The above-mentioned validity process may occur when the server network element receives the message from the first client network element for the first time, that is, the first request message may be the message sent by the first client network element to the server network element for the first time.
在本申请的一个实施例中,当服务端网元确认发送第一请求消息的第一客户端网元合法后,服务端网元保存所述第一客户端网元标识,若第一客户端网元向服务端网元发送第二请求消息,所述第二请求消息包括第一客户端网元标识,服务端网元根据第一客户端网元标识对第一客户端网元进行合法性验证,具体地,服务端网元比较第二请求消息中的第一客户端网元标识和服务端网元所保存的第一客户端网元标识是否一致,若一致,则确认发送第二请求消息的第一客户端网元合法。In an embodiment of the present application, after the server network element confirms that the first client network element that sent the first request message is legal, the server network element saves the identifier of the first client network element. The network element sends a second request message to the server network element, where the second request message includes the first client network element identifier, and the server network element checks the validity of the first client network element according to the first client network element identifier Verification, specifically, the server network element compares whether the first client network element identifier in the second request message is consistent with the first client network element identifier saved by the server network element, and if they are consistent, confirms sending the second request The first client network element of the message is legal.
另外,当涉及网元变更(即网元变更为其他相同类型的网元)时,也需要对网元进行合法性校验,在本申请的一个实施例中,服务端网元和第一客户端网元是相同类型的不同网元,当服务端网元需要变更为第一客户端网元时,第一客户端网元向服务端网元发送第一请求消息来获取服务端网元中的信息,此时,服务端网元接收所述第一请求消息后,会比较所述HTTP协议头中的第一客户端网元类型与服务端网元自身的网元类型是否一致,若一致,服务端网元继续比较所述HTTP协议头中的第一客户端网元标识和所述服务端网元自身的网元实例标识是否一致,若不一致,则确认所述第一客户端网元合法。In addition, when the network element is changed (that is, the network element is changed to another network element of the same type), the validity of the network element also needs to be checked. In an embodiment of the present application, the server network element and the first client The end network elements are different network elements of the same type. When the server network element needs to be changed to the first client network element, the first client network element sends a first request message to the server network element to obtain the information in the server network element. At this time, after receiving the first request message, the server network element will compare whether the first client network element type in the HTTP protocol header is consistent with the server network element's own network element type. , the server network element continues to compare whether the identifier of the first client network element in the HTTP protocol header is consistent with the identifier of the network element instance of the server network element itself, and if not, confirm the first client network element legitimate.
示例性的,如图5所示,图5为本申请实施例提供的一种用户移动更新的流程示意图,UE向NEW AMF发送注册请求,NEW AMF在接收UE发送的注册请求后,确定UE发起了AMF变化的移动更新流程,然后NEW AMF向OLD AMF发送上下文传输请求以获取用户上下文。可理解,NEW AMF和OLD AMF是相同类型的不同网元,此时,NEW AMF为第一客户端网元,OLD AMF为服务端网元,所述上下文传输请求为第一请求消息。可理解,所述上下文传输请求为HTTP请求消息,其HTTP协议头中User-Agent为AMF-AMF Instance ID,即所述HTTP协议头中的第一客户端网元类型为AMF,所述HTTP协议头中的第一客户端网元标识为AMF Instance ID,例如,所述第一客户端网元标识可以为AMF-00000000-0000-0000-0000-000000000011。相应地,OLD AMF接收所述上下文传输请求,比较所述HTTP协议头中的第一客户端网元类型与OLD AMF自身的网元类型是否一致,可知,NEW AMF和OLD AMF都是AMF网元,即所述HTTP协议头中的第一客户端网元类型与OLD AMF自身的网元类型一致,OLD AMF继续比较所述HTTP协议头中的第一客户端网元标识和所述服务端网元自身的网元实例标识是否一致,即比较所述HTTP协议头中的AMF Instance ID和OLD AMF自身的AMF Instance ID是否一致,若不一致,则说明NEW AMF可以作为OLD AMF变更后的网元,此时,NEW AMF可以继续处理所述上下文传输请求,并向OLD AMF发送上下文传输响应。Exemplarily, as shown in FIG. 5 , which is a schematic flowchart of a user mobility update provided by an embodiment of the present application, the UE sends a registration request to the NEW AMF, and the NEW AMF determines that the UE initiates a registration request after receiving the registration request sent by the UE. After the mobile update process of AMF changes, the NEW AMF sends a context transfer request to the OLD AMF to obtain the user context. It can be understood that the NEW AMF and the OLD AMF are different network elements of the same type. At this time, the NEW AMF is the first client network element, the OLD AMF is the server network element, and the context transmission request is the first request message. It can be understood that the context transfer request is an HTTP request message, and the User-Agent in the HTTP protocol header is the AMF-AMF Instance ID, that is, the first client network element type in the HTTP protocol header is AMF, and the HTTP protocol header is AMF. The first client network element identifier in the header is AMF Instance ID, for example, the first client network element identifier may be AMF-00000000-0000-0000-0000-000000000011. Correspondingly, the OLD AMF receives the context transmission request, and compares whether the first client network element type in the HTTP protocol header is consistent with the network element type of the OLD AMF itself. It can be seen that both the NEW AMF and the OLD AMF are AMF network elements. , that is, the first client network element type in the HTTP protocol header is consistent with the network element type of the OLD AMF itself, and the OLD AMF continues to compare the first client network element identifier in the HTTP protocol header with the server network element. Whether the identity of the network element instance of the element itself is consistent, that is, compare whether the AMF Instance ID in the HTTP protocol header is consistent with the AMF Instance ID of the OLD AMF itself. At this point, the NEW AMF may continue to process the context transfer request and send a context transfer response to the OLD AMF.
可理解,在一种实现方式中,所述上下文传输请求可以是Namf_Communication_UEContextTransfer Request。It can be understood that, in an implementation manner, the context transfer request may be a Namf_Communication_UEContextTransfer Request.
在本申请的一个实施例中,第一客户端网元为第二客户端网元变更后的网元,也就意味着,第一客户端网元向服务端网元发送第一请求消息这一过程发生在上述变更过程后,可理解,服务端网元接收第一客户端发送的第一请求消息之前,服务端网元接收第二客户 端网元发送的第三请求消息,所述第三请求消息携带第二客户端网元标识,服务端网元会根据第二客户端网元标识对第二客户端网元进行合法性验证,并且,服务端网元在验证所述第二客户端网元合法之后会保存所述第二客户端实例标识。当服务端网元接收第一客户端网元发送的第一请求消息后,服务端网元会比较所述HTTP协议头中的第一客户端网元标识和其保存的第二客户端网元标识,若不一致,服务端网元会继续比较所述HTTP协议头中的第一客户端网元标识和所述消息体中的第一客户端网元标识是否一致,若一致,则服务端网元确认所述第一客户端网元合法。In an embodiment of the present application, the first client network element is a changed network element of the second client network element, which means that the first client network element sends the first request message to the server network element. A process occurs after the above modification process. It can be understood that before the server network element receives the first request message sent by the first client, the server network element receives the third request message sent by the second client network element. The third request message carries the identifier of the second client network element, the server network element will verify the validity of the second client network element according to the second client network element identifier, and the server network element is verifying the second client network element. After the end network element is legal, the second client instance identifier will be saved. After the server-side network element receives the first request message sent by the first client-side network element, the server-side network element compares the identifier of the first client-side network element in the HTTP protocol header with the second client-side network element stored therein If they are inconsistent, the server network element will continue to compare whether the first client network element identifier in the HTTP protocol header is consistent with the first client network element identifier in the message body. The element confirms that the first client network element is legal.
示例性的,如图5所示,在OLD AMF变更为NEW AMF后,NEW AMF可以发起会话更新流程,具体地,NEW AMF向SMF发送更新上下文请求,此时,NEW AMF为第一客户端网元,SMF为服务端网元,所述更新上下文请求为第一请求消息。Exemplarily, as shown in Figure 5, after the OLD AMF is changed to the NEW AMF, the NEW AMF may initiate a session update process. Specifically, the NEW AMF sends a context update request to the SMF. At this time, the NEW AMF is the first client network. element, SMF is a server network element, and the update context request is a first request message.
可理解,所述更新上下文请求为HTTP请求消息,其HTTP协议头中User-Agent为AMF-AMF Instance ID,即所述HTTP协议头中的第一客户端网元类型为AMF,所述HTTP协议头中的第一客户端网元标识为AMF Instance ID,例如,所述User-Agent可以为AMF-00000000-0000-0000-0000-000000000012。It can be understood that the update context request is an HTTP request message, and the User-Agent in the HTTP protocol header is the AMF-AMF Instance ID, that is, the first client network element type in the HTTP protocol header is AMF, and the HTTP protocol The first client network element identifier in the header is AMF Instance ID, for example, the User-Agent may be AMF-00000000-0000-0000-0000-000000000012.
可理解,在一种实现方式中,所述更新上下文请求可以是Nsmf_PDUSession_UpdateSMContext Request。It can be understood that, in an implementation manner, the update context request may be an Nsmf_PDUSession_UpdateSMContext Request.
需要说明的是,在OLD AMF变更为NEW AMF之前,OLD AMF会向SMF发送会话创建请求,即在SMF接收NEW AMF发送的更新上下文请求之前,SMF会接收OLD AMF发送的会话创建请求。可理解,OLD AMF为第二客户端网元,SMF为服务端网元,所述会话创建请求为第三请求消息,所述第三请求消息携带第二客户端网元标识。SMF接收OLD AMF发送的会话创建请求之后,会对OLD AMF进行合法性验证,具体验证过程可参考上文,在此不再赘述,若SMF经过验证确定OLD AMF合法,SMF会保存所述第二客户端网元标识。It should be noted that before the OLD AMF is changed to the NEW AMF, the OLD AMF will send a session creation request to the SMF, that is, before the SMF receives the update context request sent by the NEW AMF, the SMF will receive the session creation request sent by the OLD AMF. It can be understood that the OLD AMF is the second client network element, the SMF is the server network element, the session creation request is a third request message, and the third request message carries the identifier of the second client network element. After the SMF receives the session creation request sent by the OLD AMF, it will verify the validity of the OLD AMF. For the specific verification process, please refer to the above. Client NE ID.
可理解,所述会话创建请求为HTTP请求消息,其HTTP协议头中User-Agent为AMF-AMF Instance ID,即所述HTTP协议头中的第一客户端网元类型为AMF,所述HTTP协议头中的第二客户端网元标识为AMF Instance ID,例如,所述User-Agent可以为AMF-00000000-0000-0000-0000-000000000011。It can be understood that the session creation request is an HTTP request message, and the User-Agent in the HTTP protocol header is the AMF-AMF Instance ID, that is, the first client network element type in the HTTP protocol header is AMF, and the HTTP protocol header is AMF. The second client network element identifier in the header is AMF Instance ID, for example, the User-Agent may be AMF-00000000-0000-0000-0000-000000000011.
而SMF接收NEW AMF发送的更新上下文请求之后,SMF会比较所述更新上下文请求的HTTP协议头中的第一客户端网元标识和其保存的第二客户端网元标识是否一致,若不一致,SMF会继续比较所述HTTP协议头中的第一客户端网元标识和所述更新上下文请求的消息体中的第一客户端网元标识是否一致,若一致,则SMF确认所述第一客户端网元合法,此时,SMF可以继续处理所述更新上下文请求,并向NEW AMF发送更新上下文响应。After the SMF receives the update context request sent by the NEW AMF, the SMF will compare whether the first client network element identifier in the HTTP protocol header of the update context request is consistent with the second client network element identifier stored in it. SMF will continue to compare whether the first client network element identifier in the HTTP protocol header is consistent with the first client network element identifier in the message body of the update context request. If they are consistent, SMF confirms the first client network element identifier. The end network element is legal. At this time, the SMF can continue to process the update context request and send the update context response to the NEW AMF.
需要说明的是,NEW AMF还可以向SMF发送释放上下文请求,SMF对NEW AMF进行合法性验证的过程可参考上文,在此不再赘述。可理解,上述NEW AMF向SMF发送更新上下文请求以及释放上下文请求的相关流程为图5所示的用户移动更新流程的可选流程,另外,图5所示的用户移动更新流程中省略了部分内容,具体可参考3GPP相关协议,在此不再赘述。It should be noted that the NEW AMF can also send a context release request to the SMF, and the process of SMF's verification of the validity of the NEW AMF can be referred to above, and will not be repeated here. It can be understood that the above-mentioned relevant process of the NEW AMF sending the update context request and the release context request to the SMF is an optional process of the user mobile update process shown in FIG. 5. In addition, some content is omitted in the user mobile update process shown in FIG. 5. , for details, please refer to 3GPP related protocols, which will not be repeated here.
由步骤S401可得:所述第一请求消息包括所述待校验信息,所述待校验信息包括第一资源核查标识,所述第一资源核查标识用于唯一标识所述第一客户端网元,即所述第一请求信息携带所述第一资源核查标识。在这种情况下,所述合法性验证可以有如下形式:It can be obtained from step S401 that: the first request message includes the information to be verified, the information to be verified includes a first resource verification identifier, and the first resource verification identifier is used to uniquely identify the first client A network element, that is, the first request information carries the first resource verification identifier. In this case, the legality verification may have the following forms:
在本申请的一个实施例中,第一客户端网元向服务端网元发送第一请求消息之前,还会向服务端网元发送第四请求消息,所述第四请求消息携带所述第一资源核查标识,所述第一资源核查标识用于唯一标识所述第一客户端网元,服务端网元接收第四请求消息之后,会保存所述第一资源核查标识,然后对第一客户端网元进行合法性验证,具体地,服务端网元比较第一请求消息携带的第一资源核查标识和所述保存的第一资源核查标识是否一致,若一致,服务端网元确认第一客户端网元合法。In an embodiment of the present application, before sending the first request message to the server network element, the first client network element will also send a fourth request message to the server network element, where the fourth request message carries the first request message. A resource verification identifier, the first resource verification identifier is used to uniquely identify the first client network element, after receiving the fourth request message, the server network element will save the first resource verification identifier, and then The client network element performs legality verification. Specifically, the server network element compares the first resource verification identifier carried in the first request message with the stored first resource verification identifier. If they are consistent, the server network element confirms the first resource verification identifier. A client NE is legal.
可理解,所述第四请求消息可以是HTTP请求消息,也可以是其他类型的消息,所述第一资源核查标识可以通过HTTP请求消息携带,也可以通过HTTP协议层携带,本申请对此不作限制。It can be understood that the fourth request message may be an HTTP request message or other types of messages, and the first resource verification identifier may be carried by the HTTP request message or by the HTTP protocol layer, which is not made in this application. limit.
可理解,当涉及网元变更(即网元变更为其他相同类型的网元)时,所述合法性验证过程与上述内容有区别,例如,第一客户端网元变更为第三客户端网元,服务端网元确认第一客户端网元合法之后,服务端网元接收第三客户端网元发送的第五请求消息,所述第五请求消息携带所述第一资源核查标识和第二资源核查标识,所述第二资源核查标识用于唯一标识所述第三客户端网元,服务端网元会比较所述第五请求消息携带的所述第一资源核查标识和所述保存的第一资源核查标识是否一致,若一致,服务端网元将变更前的第一客户端网元的资源核查标识(第一资源核查标识)更新为变更后的第三客户端网元的资源核查标识(第二资源核查标识),即服务端网元删除所述第一资源核查标识,保存所述第二资源核查标识。It can be understood that when the network element is changed (that is, the network element is changed to another network element of the same type), the legality verification process is different from the above content. For example, the first client network element is changed to a third client network element. After the server network element confirms that the first client network element is legal, the server network element receives the fifth request message sent by the third client network element, and the fifth request message carries the first resource verification identifier and the third request message. Two resource verification identifiers, the second resource verification identifier is used to uniquely identify the third client network element, and the server network element will compare the first resource verification identifier carried in the fifth request message with the saved Whether the first resource verification identifier of the first client is consistent, and if so, the server network element updates the resource verification identifier (first resource verification identifier) of the first client network element before the change to the changed resource of the third client network element The verification identifier (second resource verification identifier), that is, the server network element deletes the first resource verification identifier and saves the second resource verification identifier.
由步骤S401可得:所述服务端网元包括地址映射表,所述待校验信息包括第一客户端网元标识和所述第一客户端网元标识对应的客户端地址信息。在这种情况下,所述合法性验证可以有如下形式:It can be obtained from step S401 that the server network element includes an address mapping table, and the information to be verified includes a first client network element identifier and client address information corresponding to the first client network element identifier. In this case, the legality verification may have the following forms:
在本申请的一个实施例中,服务端网元遍历所述地址映射表,判断所述地址映射表中是否包含所述第一请求消息携带的客户端地址信息,若所述地址映射表中包含所述客户端地址信息,则确认所述第一客户端网元合法。服务端网元进行合法性验证时,可以先查看地址映射表中是否包含所述第一客户端网元标识,若包含,服务端网元再查看地址映射表中第一客户端网元标识所关联对应的地址信息是否包含所述客户端地址信息,若包含,确认第一客户端网元合法。In an embodiment of the present application, the server network element traverses the address mapping table to determine whether the address mapping table contains the client address information carried in the first request message, if the address mapping table contains If the address information of the client is present, it is confirmed that the network element of the first client is legal. When the server network element performs legality verification, it can first check whether the first client network element identifier is included in the address mapping table. If so, the server network element then checks the address mapping table for the first client network element identifier. Whether the address information corresponding to the association includes the client address information, and if so, confirming that the first client network element is legal.
示例性的,如图6所示,图6为本申请实施例提供的一种第一客户端网元标识与客户端地址信息的对应关系示意图,第一客户端网元标识可以对应一个或多个客户端地址信息,所述客户端地址信息可以为客户端的IP地址。Exemplarily, as shown in FIG. 6 , FIG. 6 is a schematic diagram of a correspondence between a first client network element identifier and client address information provided by an embodiment of the present application. The first client network element identifier may correspond to one or more client address information, where the client address information may be the IP address of the client.
可理解,服务端网元中的地址映射表可以包括一个或多个客户端地址信息,还可以包括一个或多个客户端网元标识,所述一个或多个客户端地址信息可以和所述一个或多个客户端网元标识关联对应,也可以不和所述一个或多个客户端网元标识关联对应,还可以部分和所述一个或多个客户端网元标识关联对应,部分不和所述一个或多个客户端网元标识 关联对应。例如,如图7所示,图7为本申请实施例提供的一种地址映射表的示意图,图7所示的地址映射表包括第一客户端网元标识和第二客户端网元标识,所述第一客户端网元标识对应3个客户端的IP地址,所述第二客户端网元标识也对应3个客户端的IP地址,还有4个客户端地址没有和客户端网元标识关联对应。It can be understood that the address mapping table in the server network element may include one or more client address information, and may also include one or more client network element identifiers, and the one or more client address information may be the same as the One or more client network element identifiers are associated with each other, and may not be associated with the one or more client network element identifiers, and may also be partially associated with the one or more client network element identifiers, and some are not associated with the one or more client network element identifiers. Corresponding to the one or more client network element identifiers. For example, as shown in FIG. 7 , which is a schematic diagram of an address mapping table provided by an embodiment of the present application, the address mapping table shown in FIG. 7 includes a first client network element identifier and a second client network element identifier, The first client network element identifier corresponds to the IP addresses of the three clients, the second client network element identifier also corresponds to the IP addresses of the three clients, and four client addresses are not associated with the client network element identifiers. correspond.
S403:服务端网元在验证第一客户端网元合法之后执行第一请求消息。S403: The server network element executes the first request message after verifying that the first client network element is legal.
具体地,服务端网元在根据所述待校验信息对第一客户端网元进行合法性验证之后,可以确认发送第一请求消息的第一客户端网元是合法网元,并执行第一请求消息。Specifically, after verifying the validity of the first client network element according to the information to be verified, the server network element can confirm that the first client network element sending the first request message is a legal network element, and execute the first client network element. a request message.
本申请实施例还提供了一种面向服务化接口的资源校验方法,如图8所示,图8为又一种面向服务化接口的资源校验方法的流程示意图,所述方法可以包括以下步骤:An embodiment of the present application further provides a resource verification method for a service-oriented interface, as shown in FIG. 8 , which is a schematic flowchart of another resource verification method for a service-oriented interface. The method may include the following step:
S801:UE发送会话创建请求。S801: The UE sends a session creation request.
具体地,UE向AMF发送会话创建请求,所述会话创建请求包括会话标识。Specifically, the UE sends a session creation request to the AMF, where the session creation request includes a session identifier.
在一种实现方式中,所述会话创建请求可以是PDU Session Establishment Request,所述会话标识可以是PDU Session ID,所述PDU Session Establishment Request包括PDU Session ID。In an implementation manner, the session creation request may be a PDU Session Establishment Request, the session identifier may be a PDU Session ID, and the PDU Session Establishment Request includes the PDU Session ID.
S802:AMF向SMF发送创建上下文请求。S802: The AMF sends a context creation request to the SMF.
具体地,AMF向SMF发送创建上下文请求,此时,AMF为第一客户端网元,SMF为服务端网元,所述创建上下文请求为第一请求消息,可理解,所述创建上下文请求为HTTP请求消息,所述创建上下文请求包括HTTP协议头和消息体,所述HTTP协议头包括第一客户端网元类型和第一客户端网元标识,所述消息体包括所述第一客户端网元标识。Specifically, the AMF sends a context creation request to the SMF. At this time, the AMF is the first client network element, the SMF is the server network element, and the context creation request is the first request message. It can be understood that the context creation request is HTTP request message, the context creation request includes an HTTP protocol header and a message body, the HTTP protocol header includes the first client network element type and the first client network element identifier, and the message body includes the first client NE ID.
可理解,所述第一客户端网元标识可以是网元实例标识,即所述第一客户端网元标识可以为AMF-AMF Instance ID,例如,所述第一客户端网元标识可以为AMF-00000000-0000-0000-0000-000000000011,相关具体内容可参考步骤S401,在此不再赘述。It can be understood that the first client network element identifier may be a network element instance identifier, that is, the first client network element identifier may be an AMF-AMF Instance ID, for example, the first client network element identifier may be AMF-00000000-0000-0000-0000-000000000011, for details, please refer to step S401, which will not be repeated here.
在一种实现方式中,所述创建上下文请求可以是Nsmf_PDUSession_CreateSMContext Request。In one implementation, the create context request may be an Nsmf_PDUSession_CreateSMContext Request.
可理解,所述SMF为AMF选择的SMF,在3GPP相关协议中,AMF选择SMF大概有两种方法:一是利用AMF的本地配置;二是利用NRF discover服务,在此不再赘述,参考3GPP相关协议即可。需要说明的是,AMF会将所选择的SMF的网元标识保存到本地。It can be understood that the SMF is the SMF selected by the AMF. In the 3GPP related protocols, there are roughly two methods for the AMF to select the SMF: one is to use the local configuration of the AMF; the other is to use the NRF discover service, which will not be repeated here, refer to 3GPP relevant agreement. It should be noted that the AMF will save the network element identifier of the selected SMF locally.
相应地,SMF接收AMF发送的创建上下文请求,并验证AMF的合法性,具体地,将所述HTTP协议头里的第一客户端网元标识与所述消息体中的第一客户端网元标识进行比较,若一致,SMF确认所述AMF合法,并将所述第一客户端网元标识保存到本地,并执行后续操作;若不一致,SMF回复拒绝响应,流程结束。Correspondingly, the SMF receives the context creation request sent by the AMF, and verifies the validity of the AMF. Specifically, the first client network element identifier in the HTTP protocol header is matched with the first client network element in the message body. The identifiers are compared, and if they are consistent, the SMF confirms that the AMF is legal, saves the first client network element identifier locally, and performs subsequent operations; if not, the SMF replies a rejection response, and the process ends.
S803:SMF向UDM发送注册请求、获取请求和订阅请求。S803: The SMF sends a registration request, an acquisition request and a subscription request to the UDM.
具体地,SMF选择UDM,向UDM发送注册请求、获取请求和订阅请求,来向所述UDM注册,并且获取签约数据,订阅签约数据,流程的具体内容参考3GPP相关协议,在此不再赘述。Specifically, the SMF selects the UDM, sends a registration request, an acquisition request, and a subscription request to the UDM to register with the UDM, and acquires contract data and subscribes to the contract data. The specific content of the process refers to the relevant 3GPP protocol, which will not be repeated here.
在一种实现方式中,所述注册请求可以是Numd_UECM_Registration Request,所述获取请求可以是Numd_SDM_Get Request,所述订阅请求可以是Numd_SDM_Subscribe Request。In an implementation manner, the registration request may be a Numd_UECM_Registration Request, the acquisition request may be a Numd_SDM_Get Request, and the subscription request may be a Numd_SDM_Subscribe Request.
需要说明的是,若SMF向UDM发起注册请求,可利用Nudm_Registration SMF Request服务,此时,SMF为第一客户端网元,UDM为服务端网元,所述注册请求为第一请求消息,所述注册请求包括HTTP协议头和消息体,所述HTTP协议头包括第一客户端网元类型和第一客户端网元标识,所述消息体包括所述第一客户端网元标识。It should be noted that if the SMF initiates a registration request to the UDM, the Nudm_Registration SMF Request service can be used. At this time, the SMF is the first client network element, the UDM is the server network element, and the registration request is the first request message. The registration request includes an HTTP protocol header and a message body, the HTTP protocol header includes a first client network element type and a first client network element identifier, and the message body includes the first client network element identifier.
可理解,所述第一客户端网元标识可以是网元实例标识,即所述第一客户端网元标识可以为SMF-SMF Instance ID,例如,所述第一客户端网元标识可以为SMF-00000000-0000-0000-0000-000000000012。It can be understood that the first client network element identifier may be a network element instance identifier, that is, the first client network element identifier may be an SMF-SMF Instance ID, for example, the first client network element identifier may be SMF-00000000-0000-0000-0000-000000000012.
相应地,UDM接收SMF发送的注册请求后,验证SMF的合法性,具体地,比较所述HTTP协议头中的第一客户端网元标识和所述消息体中的第一客户端网元标识,若一致,UDM确认SMF网元合法,保存所述第一客户端网元标识到本地,并向SMF回复注册响应,然后继续处理后续流程;若不一致,UDM回复拒绝响应,流程结束。Correspondingly, after receiving the registration request sent by the SMF, the UDM verifies the validity of the SMF, and specifically, compares the first client network element identifier in the HTTP protocol header with the first client network element identifier in the message body. , if they are consistent, the UDM confirms that the SMF network element is legal, saves the identifier of the first client network element locally, and returns a registration response to the SMF, and then continues to process the subsequent process; if not, the UDM responds with a rejection response, and the process ends.
另外,所述SMF向UDM发送获取请求和订阅请求,此时,SMF为第一客户端网元,UDM为服务端网元,所述获取请求和订阅请求为第一请求消息,相应地,UDM接收SMF发送的获取请求和订阅请求后,会验证SMF的合法性,具体过程可参考SMF向UDM发起注册请求的相关内容,在此不再赘述。In addition, the SMF sends an acquisition request and a subscription request to the UDM. At this time, the SMF is the first client network element, the UDM is the server network element, and the acquisition request and the subscription request are the first request messages. Correspondingly, the UDM After receiving the acquisition request and subscription request sent by the SMF, the validity of the SMF will be verified. For the specific process, please refer to the relevant content of the registration request initiated by the SMF to the UDM, and will not be repeated here.
S804:SMF向AMF发送创建上下文响应。S804: The SMF sends a create context response to the AMF.
相应地,AMF接收SMF发送的创建上下文响应,流程的具体内容参考3GPP相关协议,在此不再赘述。Correspondingly, the AMF receives the context creation response sent by the SMF, and the specific content of the process refers to 3GPP related protocols, which will not be repeated here.
S805:SMF向PCF发送会话策略创建请求。S805: The SMF sends a session policy creation request to the PCF.
具体地,若所创建的会话部署动态PCC,SMF向PCF发送会话策略创建请求,此时,SMF为第一客户端网元,PCF为服务端网元,所述会话策略创建请求为第一请求消息,所述会话策略创建请求包括HTTP协议头和消息体,所述HTTP协议头包括第一客户端网元类型和第一客户端网元标识,所述消息体包括所述第一客户端网元标识。Specifically, if a dynamic PCC is deployed for the created session, the SMF sends a session policy creation request to the PCF. At this time, the SMF is the first client network element and the PCF is the server network element, and the session policy creation request is the first request message, the session policy creation request includes an HTTP protocol header and a message body, the HTTP protocol header includes the first client network element type and the first client network element identifier, and the message body includes the first client network element. Meta ID.
可理解,所述第一客户端网元标识可以是网元实例标识,即所述第一客户端网元标识可以为SMF-SMF Instance ID,例如,所述第一客户端网元标识可以为SMF-00000000-0000-0000-0000-000000000012。It can be understood that the first client network element identifier may be a network element instance identifier, that is, the first client network element identifier may be an SMF-SMF Instance ID, for example, the first client network element identifier may be SMF-00000000-0000-0000-0000-000000000012.
在一种实现方式中,所述会话策略创建请求可以是Npcf_SMPolicyControl_Create Request,SMF通过发送所述Npcf_SMPolicyControl_Create Request确定需要PCC授权并请求与PCF建立SM Policy关联。In an implementation manner, the session policy creation request may be an Npcf_SMPolicyControl_Create Request, and the SMF determines that PCC authorization is required by sending the Npcf_SMPolicyControl_Create Request and requests to establish an SMPolicy association with the PCF.
相应地,PCF接收SMF发送的会话策略创建请求,验证SMF的合法性,具体内容参考步骤803中UDM的处理,在此不再赘述。Correspondingly, the PCF receives the session policy creation request sent by the SMF, and verifies the validity of the SMF. For details, refer to the processing of the UDM in step 803, and details are not repeated here.
S806:SMF向UPF发送N4会话建立请求。S806: The SMF sends an N4 session establishment request to the UPF.
相应地,UPF接收SMF发送的N4会话建立请求,流程的具体内容参考3GPP相关协议,在此不再赘述。Correspondingly, the UPF receives the N4 session establishment request sent by the SMF, and the specific content of the process refers to 3GPP related protocols, which will not be repeated here.
S807:SMF向AMF发送N1N2信息传输请求。S807: The SMF sends an N1N2 information transmission request to the AMF.
具体地,SMF向AMF发送N1N2信息传输请求,此时,SMF为第一客户端网元,PCF为服务端网元,所述N1N2信息传输请求为第二请求消息,所述N1N2信息传输请求包括HTTP协议头和消息体,所述HTTP协议头包括第一客户端网元类型和第一客户端网元标识,所述消息体包括所述第一客户端网元标识。Specifically, the SMF sends an N1N2 information transmission request to the AMF. At this time, the SMF is the first client network element, and the PCF is the server network element. The N1N2 information transmission request is a second request message, and the N1N2 information transmission request includes An HTTP protocol header and a message body, where the HTTP protocol header includes the first client network element type and the first client network element identifier, and the message body includes the first client network element identifier.
可理解,所述第一客户端网元标识可以是网元实例标识,即所述第一客户端网元标识可以为SMF-SMF Instance ID,例如,所述第一客户端网元标识可以为SMF-00000000-0000-0000-0000-000000000012。It can be understood that the first client network element identifier may be a network element instance identifier, that is, the first client network element identifier may be an SMF-SMF Instance ID, for example, the first client network element identifier may be SMF-00000000-0000-0000-0000-000000000012.
在一种实现方式中,所述N1N2信息传输请求可以是Namf_Communication_N1N2MessageTransfer Request。In an implementation manner, the N1N2 information transfer request may be a Namf_Communication_N1N2MessageTransfer Request.
相应地,AMF接收SMF发送的N1N2信息传输请求,并验证SMF的合法性,比较本地保存的第一客户端网元标识(步骤S802)和所述消息体中的第一客户端网元标识是否一致,若一致,AMF向SMF回复N1N2信息传输响应,并继续处理后续流程;若不一致,AMF回复拒绝响应,流程结束。Correspondingly, the AMF receives the N1N2 information transmission request sent by the SMF, verifies the validity of the SMF, and compares the locally stored first client network element identifier (step S802) with the first client network element identifier in the message body. If they are consistent, the AMF will reply to the SMF with a N1N2 information transmission response, and continue to process the subsequent process; if not, the AMF will reply with a rejection response, and the process will end.
可理解,当SMF向AMF发送N1N2信息传输请求,且AMF做出回复后,AMF还需要与(R)AN、UE进行交互,即N2接口流程,所述N2接口流程的具体内容参考3GPP相关协议,在此不再赘述。It can be understood that when the SMF sends an N1N2 information transmission request to the AMF, and the AMF responds, the AMF also needs to interact with the (R)AN and the UE, that is, the N2 interface process. For the specific content of the N2 interface process, refer to 3GPP related protocols. , and will not be repeated here.
S808:AMF向SMF发送更新上下文请求。S808: The AMF sends an update context request to the SMF.
具体地,AMF向SMF发送更新上下文请求,此时,AMF为第一客户端网元,SMF为服务端网元,所述更新上下文请求为第二请求消息,步骤S802中的所述创建上下文请求为第一请求消息,所述更新上下文请求包括HTTP协议头和消息体,所述HTTP协议头包括第一客户端网元类型和第一客户端网元标识(例如,AMF-AMF Instance ID),所述消息体包括所述第一客户端网元标识。可理解,关于所述第一客户端网元标识的具体内容可参考步骤S401和步骤S802,在此不再赘述。Specifically, the AMF sends an update context request to the SMF. At this time, the AMF is the first client network element, the SMF is the server network element, the update context request is the second request message, and the context creation request in step S802 is a first request message, the update context request includes an HTTP protocol header and a message body, and the HTTP protocol header includes the first client network element type and the first client network element identifier (for example, AMF-AMF Instance ID), The message body includes the network element identifier of the first client. It can be understood that, for the specific content of the first client network element identifier, reference may be made to step S401 and step S802, and details are not repeated here.
在一种实现方式中,所述更新上下文请求可以是Nsmf_PDUSession_UpdateSMContext Request。In one implementation, the update context request may be an Nsmf_PDUSession_UpdateSMContext Request.
相应地,SMF收到AMF发送的更新上下文请求,并验证AMF的合法性,具体地,比较SMF本地保存的第一客户端网元标识(步骤S802)与所述消息体中的第一客户端网元标识,若一致,SMF确认所述AMF合法,并执行后续操作;若不一致,SMF回复拒绝响应,流程结束。Correspondingly, the SMF receives the update context request sent by the AMF, and verifies the validity of the AMF, specifically, compares the first client network element identifier stored locally by the SMF (step S802 ) with the first client in the message body If the identifiers of the network elements are consistent, the SMF confirms that the AMF is valid and performs subsequent operations; if not, the SMF replies with a rejection response, and the process ends.
S809:SMF向UPF发送N4会话修改请求。S809: The SMF sends an N4 session modification request to the UPF.
相应地,UPF接收SMF发送的N4会话修改请求,流程的具体内容参考3GPP相关协议,在此不再赘述。Correspondingly, the UPF receives the N4 session modification request sent by the SMF. For the specific content of the process, refer to the relevant 3GPP protocol, which will not be repeated here.
S810:SMF向AMF发送更新上下文响应。S810: The SMF sends an update context response to the AMF.
相应地,AMF接收SMF发送的更新上下文响应,流程的具体内容参考3GPP相关协议,在此不再赘述。Correspondingly, the AMF receives the update context response sent by the SMF, and the specific content of the process refers to the relevant 3GPP protocol, which will not be repeated here.
在一种实现方式中,所述更新上下文响应可以是Nsmf_PDUSession_UpdateSMContext Response。In one implementation, the update context response may be an Nsmf_PDUSession_UpdateSMContext Response.
可选的,SMF回复AMF(步骤S804)之后,若会话创建失败,则SMF通过向AMF 发送Nsmf_PDUSession_SMContextStatusNotify(上下文状态通知)来通知AMF,所述流程的具体内容参考3GPP相关协议,在此不再赘述。Optionally, after the SMF replies to the AMF (step S804), if the session creation fails, the SMF notifies the AMF by sending Nsmf_PDUSession_SMContextStatusNotify (context status notification) to the AMF. The specific content of the process refers to 3GPP related protocols, which will not be repeated here. .
另外,需要说明的是,如上文所述,图8中省略了部分流程,具体请参考3GPP相关协议,在此不再赘述。In addition, it should be noted that, as described above, part of the process is omitted in FIG. 8 , and for details, please refer to 3GPP related protocols, which will not be repeated here.
本申请实施例还提供了一种面向服务化接口的资源校验方法,如图9所示,图9为又一种面向服务化接口的资源校验方法的流程示意图,所述方法可以包括以下步骤:An embodiment of the present application further provides a resource verification method for a service-oriented interface, as shown in FIG. 9 , which is a schematic flowchart of another resource verification method for a service-oriented interface. The method may include the following step:
S901:UE发送会话创建请求。S901: The UE sends a session creation request.
具体地,UE向AMF发送会话创建请求,所述会话创建请求包括会话标识。Specifically, the UE sends a session creation request to the AMF, where the session creation request includes a session identifier.
在一种实现方式中,所述会话创建请求可以是PDU Session Establishment Request,所述会话标识可以是PDU Session ID,所述PDU Session Establishment Request包括PDU Session ID。In an implementation manner, the session creation request may be a PDU Session Establishment Request, the session identifier may be a PDU Session ID, and the PDU Session Establishment Request includes the PDU Session ID.
S902:AMF向SMF发送创建上下文请求。S902: The AMF sends a context creation request to the SMF.
具体地,AMF向SMF发送创建上下文请求,此时,AMF为第一客户端网元,SMF为服务端网元,所述创建上下文请求为第四请求消息,所述第四请求消息携带第一资源核查标识,所述第一资源核查标识用于唯一标识所述第一客户端网元。示例性的,所述第一资源核查标识可以为ID-A。Specifically, the AMF sends a context creation request to the SMF. At this time, the AMF is the first client network element, the SMF is the server network element, and the context creation request is a fourth request message, and the fourth request message carries the first A resource verification identifier, where the first resource verification identifier is used to uniquely identify the first client network element. Exemplarily, the first resource verification identifier may be ID-A.
如上文(步骤S402)所述,所述第四请求消息可以是HTTP请求消息,也可以是其他类型的消息,所述资源核查标识可以通过HTTP请求消息携带,也可以通过HTTP协议层携带,本申请对此不作限制。As described above (step S402), the fourth request message may be an HTTP request message or other types of messages, and the resource verification identifier may be carried by the HTTP request message or by the HTTP protocol layer. There are no restrictions on the application.
在一种实现方式中,所述创建上下文请求可以是Nsmf_PDUSession_CreateSMContext Request。In one implementation, the create context request may be an Nsmf_PDUSession_CreateSMContext Request.
相应地,SMF收到AMF发送的创建上下文请求,并分配会话资源,然后保存所述第一资源核查标识(ID-A)。Correspondingly, the SMF receives the context creation request sent by the AMF, allocates session resources, and then saves the first resource verification identifier (ID-A).
S903:SMF向UDM发送注册请求。S903: The SMF sends a registration request to the UDM.
具体地,SMF选择UDM,向UDM发送注册请求,此时,SMF为第一客户端网元,UDM为服务端网元,所述注册请求为第四请求消息,所述第四请求消息携带第一资源核查标识,所述第一资源核查标识用于唯一标识所述第一客户端网元。示例性的,所述第一资源核查标识可以为ID-C。Specifically, the SMF selects the UDM and sends a registration request to the UDM. At this time, the SMF is the first client network element, the UDM is the server network element, and the registration request is a fourth request message, and the fourth request message carries the first A resource verification identifier, where the first resource verification identifier is used to uniquely identify the first client network element. Exemplarily, the first resource verification identifier may be ID-C.
在一种实现方式中,所述注册请求可以是Numd_UECM_Registration Request。In one implementation, the registration request may be a Numd_UECM_Registration Request.
相应地,UDM接收UDM发送的注册请求,保存所述第一资源核查标识(ID-C)。Correspondingly, the UDM receives the registration request sent by the UDM, and saves the first resource verification identifier (ID-C).
S904:UDM向SMF发送注册响应。S904: The UDM sends a registration response to the SMF.
具体地,UDM向SMF发送注册响应,此时,UDM为第一客户端网元,SMF为服务端网元,所述注册响应为第四请求消息,所述第四请求消息携带第一资源核查标识,所述第一资源核查标识用于唯一标识所述第一客户端网元。示例性的,所述第一资源核查标识可以为ID-D。Specifically, the UDM sends a registration response to the SMF. At this time, the UDM is the first client network element, the SMF is the server network element, and the registration response is a fourth request message, and the fourth request message carries the first resource verification identifier, where the first resource verification identifier is used to uniquely identify the first client network element. Exemplarily, the first resource verification identifier may be ID-D.
在一种实现方式中,所述注册响应可以是Numd_UECM_Registration Response。In one implementation, the registration response may be a Numd_UECM_Registration Response.
相应地,SMF收到UDM发送的注册响应,保存所述第一资源核查标识(ID-D)。Correspondingly, the SMF receives the registration response sent by the UDM, and saves the first resource verification identifier (ID-D).
S905:SMF向UDM发送获取请求和订阅请求。S905: The SMF sends an acquisition request and a subscription request to the UDM.
具体地,SMF向UDM发送获取请求和订阅请求,从而获取签约数据,订阅签约数据,此时,SMF为第一客户端网元,UDM为服务端网元,所述获取请求和订阅请求为第一请求消息,所述注册请求为第四请求消息,所述第一请求消息携带待校验信息,所述待校验信息包括第一资源核查标识,即所述获取请求和订阅请求携带第一资源核查标识。示例性的,所述第一资源核查标识可以为ID-C。Specifically, the SMF sends an acquisition request and a subscription request to the UDM, thereby acquiring the subscription data and subscribing the subscription data. At this time, the SMF is the first client network element, and the UDM is the server network element, and the acquisition request and the subscription request are the first network element. A request message, the registration request is a fourth request message, the first request message carries information to be verified, and the information to be verified includes a first resource verification identifier, that is, the acquisition request and the subscription request carry the first Resource verification ID. Exemplarily, the first resource verification identifier may be ID-C.
在一种实现方式中,所述获取请求可以是Numd_SDM_Get Request,所述订阅请求可以是Numd_SDM_Subscribe Request。In an implementation manner, the get request may be a Numd_SDM_Get Request, and the subscription request may be a Numd_SDM_Subscribe Request.
相应地,UDM接收SMF发送的获取请求和订阅请求,并验证SMF的合法性,具体地,UDM比较所述保存的第一资源核查标识(步骤S903)与所述获取请求和订阅请求所携带的第一资源核查标识是否一致,若一致,UDM继续处理后续流程,并向SMF发送获取响应和订阅响应,否则,UDM回复异常响应。Correspondingly, the UDM receives the acquisition request and the subscription request sent by the SMF, and verifies the validity of the SMF. Specifically, the UDM compares the stored first resource verification identifier (step S903) with the information carried in the acquisition request and the subscription request. The first resource checks whether the identifiers are consistent. If they are consistent, the UDM continues to process the subsequent process, and sends an acquisition response and a subscription response to the SMF. Otherwise, the UDM replies with an abnormal response.
S906:SMF向AMF发送更新上下文响应。S906: The SMF sends an update context response to the AMF.
具体地,SMF向AMF发送更新上下文响应,此时,SMF为第一客户端网元,AMF为服务端网元,所述更新上下文响应为第四请求消息,所述第四请求消息携带第一资源核查标识,所述第一资源核查标识用于唯一标识所述第一客户端网元。示例性的,所述第一资源核查标识可以为ID-B。Specifically, the SMF sends an update context response to the AMF. At this time, the SMF is the first client network element, the AMF is the server network element, and the update context response is a fourth request message, and the fourth request message carries the first A resource verification identifier, where the first resource verification identifier is used to uniquely identify the first client network element. Exemplarily, the first resource verification identifier may be ID-B.
在一种实现方式中,所述更新上下文响应可以是Nsmf_PDUSession_UpdateSMContext Response。In one implementation, the update context response may be an Nsmf_PDUSession_UpdateSMContext Response.
相应地,AMF接收SMF发送的更新上下文响应,保存所述第一资源核查标识(ID-B)。Correspondingly, the AMF receives the update context response sent by the SMF, and saves the first resource verification identifier (ID-B).
S907:SMF向PCF发送会话策略创建请求。S907: The SMF sends a session policy creation request to the PCF.
具体地,若所创建的会话部署动态PCC,SMF向PCF发送会话策略创建请求,此时,SMF为第一客户端网元,PCF为服务端网元,所述会话策略创建请求为第四请求消息,所述第四请求消息携带第一资源核查标识,所述第一资源核查标识用于唯一标识所述第一客户端网元。示例性的,所述第一资源核查标识可以为ID-E。Specifically, if the created session deploys a dynamic PCC, the SMF sends a session policy creation request to the PCF. At this time, the SMF is the first client network element, the PCF is the server network element, and the session policy creation request is the fourth request message, the fourth request message carries a first resource verification identifier, and the first resource verification identifier is used to uniquely identify the first client network element. Exemplarily, the first resource verification identifier may be ID-E.
在一种实现方式中,所述会话策略创建请求可以为Npcf_SMPolicyControl_Create Request。In an implementation manner, the session policy creation request may be an Npcf_SMPolicyControl_Create Request.
相应地,PCF接收SMF发送的会话策略创建请求,保存所述第一资源核查标识(ID-E)。Correspondingly, the PCF receives the session policy creation request sent by the SMF, and stores the first resource verification identifier (ID-E).
S908:PCF向SMF发送会话策略创建响应。S908: The PCF sends a session policy creation response to the SMF.
具体地,PCF向SMF发送会话策略创建响应,此时,PCF为第一客户端网元,SMF为服务端网元,所述会话策略创建响应为第四请求消息,所述第四请求消息携带第一资源核查标识,所述第一资源核查标识用于唯一标识所述第一客户端网元。示例性的,所述第一资源核查标识可以为ID-F。Specifically, the PCF sends a session policy creation response to the SMF. At this time, the PCF is the first client network element, the SMF is the server network element, and the session policy creation response is a fourth request message, and the fourth request message carries A first resource verification identifier, where the first resource verification identifier is used to uniquely identify the first client network element. Exemplarily, the first resource verification identifier may be ID-F.
在一种实现方式中,所述会话策略创建响应可以为Npcf_SMPolicyControl_Create Response。In an implementation manner, the session policy creation response may be Npcf_SMPolicyControl_Create Response.
相应地,SMF接收PCF发送的会话创建响应,保存所述第一资源核查标识(ID-F)。Correspondingly, the SMF receives the session creation response sent by the PCF, and stores the first resource verification identifier (ID-F).
S909:SMF向PCF发送会话策略更新请求。S909: The SMF sends a session policy update request to the PCF.
具体地,SMF向PCF发送会话策略更新请求,此时,SMF为第一客户端网元,PCF 为服务端网元,所述会话策略更新请求为第一请求消息,所述会话策略创建请求为第四请求消息,所述第一请求消息携带待校验信息,所述待校验信息包括第一资源核查标识,即所述会话策略更新请求携带第一资源核查标识,所述第四请求消息携带第一资源核查标识,所述第一资源核查标识用于唯一标识所述第一客户端网元。示例性的,所述第一资源核查标识可以为ID-E。Specifically, the SMF sends a session policy update request to the PCF. At this time, the SMF is the first client network element, the PCF is the server network element, the session policy update request is the first request message, and the session policy creation request is A fourth request message, where the first request message carries information to be verified, and the information to be verified includes a first resource verification identifier, that is, the session policy update request carries the first resource verification identifier, and the fourth request message Carrying a first resource verification identifier, where the first resource verification identifier is used to uniquely identify the first client network element. Exemplarily, the first resource verification identifier may be ID-E.
在一种实现方式中,所述会话策略更新请求可以为Npcf_SMPolicyControl_Update Request。In an implementation manner, the session policy update request may be an Npcf_SMPolicyControl_Update Request.
相应地,PCF接收SMF发送的会话策略更新请求,并验证SMF的合法性,具体地,PCF比较所述保存的第一资源核查标识(步骤S907)与所述会话策略更新请求所携带的第一资源核查标识是否一致,若一致,PCF回复会话策略更新响应,并继续处理后续流程,否则,PCF回复异常响应。Correspondingly, the PCF receives the session policy update request sent by the SMF, and verifies the validity of the SMF. Specifically, the PCF compares the saved first resource verification identifier (step S907) with the first resource verification identifier carried in the session policy update request. Check whether the resource verification identifiers are consistent. If they are consistent, the PCF replies with a session policy update response and continues to process the subsequent process. Otherwise, the PCF replies with an abnormal response.
可理解步骤S909之后省略了部分N4接口流程,相关具体内容参考3GPP相关协议,在此不再赘述。It can be understood that part of the N4 interface process is omitted after step S909, and the relevant specific content refers to the relevant 3GPP protocol, which will not be repeated here.
S910:SMF向AMF发送N1N2信息传输请求。S910: The SMF sends an N1N2 information transmission request to the AMF.
具体地,SMF向AMF发送N1N2信息传输请求,此时,SMF为第一客户端网元,AMF为服务端网元,所述N1N2信息传输请求为第一请求消息,所述更新上下文响应为第四请求消息,所述第一请求消息携带待校验信息,所述待校验信息包括第一资源核查标识,即所述N1N2信息传输请求携带第一资源核查标识,所述第四请求消息携带第一资源核查标识,所述第一资源核查标识用于唯一标识所述第一客户端网元。示例性的,所述第一资源核查标识可以为ID-B。Specifically, the SMF sends an N1N2 information transmission request to the AMF. At this time, the SMF is the first client network element, the AMF is the server network element, the N1N2 information transmission request is the first request message, and the update context response is the first request message. Four request messages, the first request message carries the information to be verified, and the information to be verified includes the first resource verification identifier, that is, the N1N2 information transmission request carries the first resource verification identifier, and the fourth request message carries the first resource verification identifier. A first resource verification identifier, where the first resource verification identifier is used to uniquely identify the first client network element. Exemplarily, the first resource verification identifier may be ID-B.
在一种实现方式中,所述N1N2信息传输请求可以是Namf_Communication_N1N2MessageTransfer Request。In an implementation manner, the N1N2 information transfer request may be a Namf_Communication_N1N2MessageTransfer Request.
相应地,AMF接收SMF发送的N1N2信息传输请求,并验证SMF的合法性,具体地,AMF比较所述保存的第一资源核查标识(步骤S906)与所述N1N2信息传输请求所携带的第一资源核查标识是否一致,若一致,AMF回复N1N2信息传输响应,并继续处理后续流程,否则,AMF回复异常响应。Correspondingly, the AMF receives the N1N2 information transmission request sent by the SMF, and verifies the validity of the SMF. Specifically, the AMF compares the stored first resource verification identifier (step S906) with the first resource carried in the N1N2 information transmission request. Check whether the resource verification identifiers are consistent. If they are consistent, the AMF will reply to the N1N2 information transmission response and continue to process the subsequent process. Otherwise, the AMF will reply with an abnormal response.
可理解,当SMF向AMF发送N1N2信息传输请求,且AMF做出回复后,AMF还需要与(R)AN、UE进行交互,即N2接口流程,所述N2接口流程的具体内容参考3GPP相关协议,在此不再赘述。It can be understood that when the SMF sends an N1N2 information transmission request to the AMF, and the AMF responds, the AMF also needs to interact with the (R)AN and the UE, that is, the N2 interface process. For the specific content of the N2 interface process, refer to 3GPP related protocols. , and will not be repeated here.
S911:AMF向SMF发送更新上下文请求。S911: The AMF sends an update context request to the SMF.
具体地,AMF向SMF发送更新上下文请求,此时,AMF为第一客户端网元,SMF为服务端网元,所述更新上下文请求为第一请求消息,所述创建上下文请求为第四请求消息,所述第一请求消息携带待校验信息,所述待校验信息包括第一资源核查标识,即所述更新上下文请求携带第一资源核查标识,所述第四请求消息携带第一资源核查标识,所述第一资源核查标识用于唯一标识所述第一客户端网元。示例性的,所述第一资源核查标识可以为ID-A。Specifically, the AMF sends an update context request to the SMF. At this time, the AMF is the first client network element, the SMF is the server network element, the update context request is the first request message, and the context creation request is the fourth request message, the first request message carries the information to be verified, and the information to be verified includes the first resource verification identifier, that is, the update context request carries the first resource verification identifier, and the fourth request message carries the first resource A verification identifier, where the first resource verification identifier is used to uniquely identify the first client network element. Exemplarily, the first resource verification identifier may be ID-A.
在一种实现方式中,所述更新上下文请求可以是Nsmf_PDUSession_UpdateSMContext Request。In one implementation, the update context request may be an Nsmf_PDUSession_UpdateSMContext Request.
相应地,SMF接收AMF发送的更新上下文请求,并验证AMF的合法性,具体地,SMF比较所述保存的第一资源核查标识(步骤S902)与所述更新上下文请求所携带的第一资源核查标识是否一致,若一致,SMF向AMF发送更新上下文响应,并继续处理后续流程,否则,SMF回复异常响应。Correspondingly, the SMF receives the update context request sent by the AMF, and verifies the validity of the AMF. Specifically, the SMF compares the saved first resource verification identifier (step S902) with the first resource verification carried in the update context request. Whether the identifiers are consistent, if so, SMF sends an update context response to AMF, and continues to process the subsequent process, otherwise, SMF replies with an abnormal response.
可理解,步骤S911之后省略了部分N4接口流程,例如,SMF向UPF发送N4会话修改请求,流程的具体内容参考3GPP相关协议,在此不再赘述。It can be understood that after step S911, part of the N4 interface process is omitted. For example, the SMF sends an N4 session modification request to the UPF. The specific content of the process refers to 3GPP related protocols, and details are not repeated here.
S912:SMF向AMF发送释放会话资源请求。S912: The SMF sends a request for releasing session resources to the AMF.
具体地,SMF向AMF发送释放会话资源请求,此时,SMF为第一客户端网元,AMF为服务端网元,所述释放会话资源请求为第一请求消息,所述更新上下文响应为第四请求消息,所述第一请求消息携带待校验信息,所述待校验信息包括第一资源核查标识,即所述释放会话资源请求携带第一资源核查标识,所述第四请求消息携带第一资源核查标识,所述第一资源核查标识用于唯一标识所述第一客户端网元。示例性的,所述第一资源核查标识可以为ID-B。Specifically, the SMF sends a session resource release request to the AMF. At this time, the SMF is the first client network element, the AMF is the server network element, the session resource release request is the first request message, and the update context response is the first request message. Four request messages, the first request message carries the information to be verified, and the information to be verified includes the first resource verification identifier, that is, the release session resource request carries the first resource verification identifier, and the fourth request message carries the first resource verification identifier. A first resource verification identifier, where the first resource verification identifier is used to uniquely identify the first client network element. Exemplarily, the first resource verification identifier may be ID-B.
在一种实现方式中,所述释放会话资源请求可以为Nsmf_PDUSession_SMContextStatusNotify。In an implementation manner, the request for releasing session resources may be Nsmf_PDUSession_SMContextStatusNotify.
相应地,AMF接收SMF发送的释放会话资源请求,并验证SMF的合法性。可理解,此处验证过程与步骤S911中的验证过程相同,可参考步骤S911,在此不再赘述。Correspondingly, the AMF receives the request for releasing session resources sent by the SMF, and verifies the validity of the SMF. It can be understood that the verification process here is the same as the verification process in step S911 , and reference may be made to step S911 , and details are not repeated here.
另外,需要说明的是,步骤S909和步骤S912是上述会话创建流程的可选流程,即步骤S909和步骤S912为可选步骤。In addition, it should be noted that step S909 and step S912 are optional processes of the above session creation process, that is, step S909 and step S912 are optional steps.
还需要说明的是,如上文所述,图9中省略了部分流程,具体请参考3GPP相关协议,在此不再赘述。It should also be noted that, as described above, part of the process is omitted in FIG. 9 , for details, please refer to the 3GPP related protocols, which will not be repeated here.
本申请实施例还提供了一种面向服务化接口的资源校验方法,如图10所示,图10为又一种面向服务化接口的资源校验方法的流程示意图,所述方法可以包括以下步骤:An embodiment of the present application further provides a resource verification method for a service-oriented interface, as shown in FIG. 10 , which is a schematic flowchart of another resource verification method for a service-oriented interface. The method may include the following step:
S1001:UE向NEW AMF发送注册请求。S1001: The UE sends a registration request to the NEW AMF.
相应地,NEW AMF接收UE发送的注册请求,流程的具体内容参考3GPP相关协议,在此不再赘述。Correspondingly, the NEW AMF receives the registration request sent by the UE, and the specific content of the process refers to 3GPP related protocols, which will not be repeated here.
在一种实现方式中,所述注册请求可以为Registration Request。In an implementation manner, the registration request may be a Registration Request.
S1002:NEW AMF向OLD AMF发送上下文传输请求。S1002: The NEW AMF sends a context transfer request to the OLD AMF.
在一种实现方式中,所述上下文传输请求可以是Namf_Communication_UEContextTransfer Request。In one implementation, the context transfer request may be a Namf_Communication_UEContextTransfer Request.
相应地,OLD AMF接收NEW AMF发送的上下文传输请求,流程的具体内容参考3GPP相关协议,在此不再赘述。Correspondingly, the OLD AMF receives the context transmission request sent by the NEW AMF, and the specific content of the process refers to 3GPP related protocols, which will not be repeated here.
S1003:OLD AMF向NEW AMF发送上下文传输响应。S1003: The OLD AMF sends a context transfer response to the NEW AMF.
具体地,OLD AMF接收NEW AMF发送的上下文传输请求后,定位用户资源,同时检查所述上下文传输请求的完整性,然后向NEW AMF发送上下文传输响应,所述上下文传输响应携带OLD AMF中保存的资源核查标识,所述OLD AMF中保存的资源核查标识包括但不限于会话相关的资源核查标识和策略相关的资源核查标识,所述会话相关的资源 核查标识包括但不限于与会话相关的网元作为第一客户端网元时的第一客户端网元标识,所述策略相关的资源核查标识包括但不限于与策略相关的网元作为第一客户端网元时的第一客户端网元标识。示例性的,与会话相关的网元包括AMF、SMF、UDM等,所以会话相关的资源核查标识包括以AMF为第一客户端网元时的第一客户端网元标识、以SMF为第一客户端网元时的第一客户端网元标识、以UDM为第一客户端网元时的第一客户端网元标识。Specifically, after receiving the context transfer request sent by the NEW AMF, the OLD AMF locates user resources, checks the integrity of the context transfer request, and then sends a context transfer response to the NEW AMF, where the context transfer response carries the data stored in the OLD AMF. Resource verification marks, the resource verification marks saved in the OLD AMF include but are not limited to session-related resource verification marks and policy-related resource verification marks, and the session-related resource verification marks include but are not limited to session-related network elements The identifier of the first client network element when serving as the first client network element, the resource verification identifier related to the policy includes but is not limited to the first client network element when the network element related to the policy is used as the first client network element logo. Exemplarily, session-related network elements include AMF, SMF, UDM, etc., so the session-related resource verification identifiers include the first client network element identifier when the AMF is the first client network element, and the SMF as the first client network element. The identifier of the first client network element when the client network element is used, and the identifier of the first client network element when the UDM is used as the first client network element.
在一种实现方式中,所述上下文传输响应可以是Namf_Communication_UEContextTransfer Response。In one implementation, the context transfer response may be a Namf_Communication_UEContextTransfer Response.
相应地,NEW AMF接收OLD AMF发送的上下文传输响应,流程的具体内容参考3GPP相关协议,在此不再赘述。Correspondingly, the NEW AMF receives the context transmission response sent by the OLD AMF, and the specific content of the process refers to 3GPP related protocols, which will not be repeated here.
可理解,NEW AMF需要向UDM注册、获取签约数据以及订阅签约数据,这些流程的具体内容参考3GPP相关协议,在此不再赘述。It is understandable that the NEW AMF needs to register with the UDM, obtain the subscription data, and subscribe to the subscription data. The specific content of these processes refers to the relevant 3GPP protocols, and will not be repeated here.
S1004:UDM向OLD AMF发送去注册请求。S1004: The UDM sends a deregistration request to the OLD AMF.
具体地,UDM向OLD AMF发送去注册请求,此时,UDM为第一客户端网元,OLD AMF为服务端网元,所述去注册请求为第一请求消息,所述第一请求消息携带待校验信息,所述待校验信息包括第一资源核查标识,即所述去注册请求携带第一资源核查标识,所述第一资源核查标识用于唯一标识所述第一客户端网元。Specifically, the UDM sends a deregistration request to the OLD AMF. At this time, the UDM is the first client network element, the OLD AMF is the server network element, and the deregistration request is a first request message, and the first request message carries Information to be verified, the information to be verified includes a first resource verification identifier, that is, the deregistration request carries a first resource verification identifier, and the first resource verification identifier is used to uniquely identify the first client network element .
可理解,在UDM向OLD AMF发送去注册请求之前,UDM向OLD AMF发送第四请求消息,此时,UDM为第一客户端网元,OLD AMF为服务端网元,所述第四请求消息携带所述第一资源核查标识,所述第一资源核查标识用于唯一标识所述第一客户端网元,OLD AMF保存所述第一资源核查标识。Understandably, before the UDM sends the deregistration request to the OLD AMF, the UDM sends the fourth request message to the OLD AMF. At this time, the UDM is the first client network element, the OLD AMF is the server network element, and the fourth request message Carrying the first resource verification identifier, the first resource verification identifier is used to uniquely identify the first client network element, and the OLD AMF saves the first resource verification identifier.
在一种实现方式中,所述去注册请求可以为Nudm_UECM_DeregistrationNotify Request。In an implementation manner, the deregistration request may be Nudm_UECM_DeregistrationNotify Request.
相应的,OLD AMF收到UDM发送的去注册请求,并验证UDM的合法性,具体地,OLD AMF比较所述保存的第一资源核查标识与所述去注册请求所携带的第一资源核查标识是否一致,若一致,OLD AMF向UDM发送去注册响应,并继续处理后续流程,否则,OLD AMF回复异常响应。Correspondingly, the OLD AMF receives the de-registration request sent by the UDM, and verifies the validity of the UDM. Specifically, the OLD AMF compares the stored first resource verification identifier with the first resource verification identifier carried by the de-registration request. If they are consistent, OLD AMF sends a deregistration response to UDM and continues to process the subsequent process, otherwise, OLD AMF replies with an abnormal response.
S1005:OLD AMF向UDM发送去订阅请求。S1005: The OLD AMF sends an unsubscribe request to the UDM.
具体地,OLD AMF向UDM发送去订阅请求,此时,OLD AMF为第一客户端网元,UDM为服务端网元,所述去订阅请求为第一请求消息,所述第一请求消息携带待校验信息,所述待校验信息包括第一资源核查标识,即所述去注册请求携带第一资源核查标识,所述第一资源核查标识用于唯一标识所述第一客户端网元。Specifically, the OLD AMF sends an unsubscribe request to the UDM. At this time, the OLD AMF is the first client network element, the UDM is the server network element, and the unsubscribe request is a first request message, and the first request message carries Information to be verified, the information to be verified includes a first resource verification identifier, that is, the deregistration request carries a first resource verification identifier, and the first resource verification identifier is used to uniquely identify the first client network element .
可理解,在OLD AMF向UDM发送去订阅请求之前,OLD AMF向UDM发送第四请求消息,此时,OLD AMF为第一客户端网元,UDM为服务端网元,所述第四请求消息携带所述第一资源核查标识,所述第一资源核查标识用于唯一标识所述第一客户端网元,UDM保存所述第一资源核查标识。It can be understood that before the OLD AMF sends the de-subscription request to the UDM, the OLD AMF sends the fourth request message to the UDM. At this time, the OLD AMF is the first client network element, and the UDM is the server network element. The fourth request message Carrying the first resource verification identifier, the first resource verification identifier is used to uniquely identify the first client network element, and the UDM saves the first resource verification identifier.
在一种实现方式中,所述去订阅请求可以为Nudm_SDM_Unsubscribe Request。In an implementation manner, the unsubscribe request may be Nudm_SDM_Unsubscribe Request.
相应地,UDM接收OLD AMF发送的去订阅请求,并验证OLD AMF的合法性,具体 地,UDM比较所述保存的第一资源核查标识与所述去订阅请求所携带的第一资源核查标识是否一致,若一致,UDM向OLD AMF发送去订阅响应,并继续处理后续流程,否则,UDM回复异常响应。Correspondingly, UDM receives the de-subscription request sent by OLD AMF, and verifies the legitimacy of OLD AMF, specifically, UDM compares the first resource verification identifier of the preservation and the first resource verification identifier carried by the de-subscription request. If they are consistent, the UDM sends an unsubscribe response to the OLD AMF and continues to process the subsequent process. Otherwise, the UDM responds with an abnormal response.
S1006:NEW AMF向PCF发送策略更新请求。S1006: NEW AMF sends a policy update request to the PCF.
具体地,NEW AMF向PCF发送策略更新请求,此时,NEW AMF为第三客户端网元,OLD AMF为服务端网元,所述策略更新请求为第五请求消息,所述策略更新请求携带第二资源核查标识,所述第二资源核查标识用于唯一标识NEW AMF。Specifically, the NEW AMF sends a policy update request to the PCF. At this time, the NEW AMF is the third client network element, and the OLD AMF is the server network element. The policy update request is a fifth request message, and the policy update request carries The second resource verification identifier, the second resource verification identifier is used to uniquely identify the NEW AMF.
而在所述变更发生之前,OLD AMF向PCF发送第一请求消息,所述第一请求消息可以是策略更新请求,此时,OLD AMF为第一客户端网元,PCF为服务端网元,所述第一请求消息包括待校验信息,所述待校验信息包括第一资源核查标识,所述第一资源核查标识用于唯一标识OLD AMF。可理解,PCF会对OLD AMF进行合法性验证,PCF验证OLD AMF合法之后,会保存所述第一资源核查标识。Before the change occurs, the OLD AMF sends a first request message to the PCF, and the first request message may be a policy update request. At this time, the OLD AMF is the first client network element, and the PCF is the server network element. The first request message includes information to be verified, and the information to be verified includes a first resource verification identifier, and the first resource verification identifier is used to uniquely identify the OLD AMF. It is understandable that the PCF will verify the validity of the OLD AMF, and after verifying that the OLD AMF is legal, the PCF will save the first resource verification identifier.
需要说明的是,所述NEW AMF向PCF发送的策略更新请求还携带第一资源核查标识,可理解,PCF接收NEW AMF发送的策略更新请求之后,会对NEW AMF进行合法性验证,PCF会比较所述NEW AMF向PCF发送的策略更新请求携带的第一资源核查标识和所述保存的第一资源核查标识是否一致,若一致,PCF将保存的第一资源核查标识更新为第二资源核查标识,即删除所述保存的第一资源核查标识,保存所述第二资源核查标识,PCF回复策略更新响应,并继续处理后续流程。It should be noted that the policy update request sent by the NEW AMF to the PCF also carries the first resource verification identifier. It is understandable that after the PCF receives the policy update request sent by the NEW AMF, it will verify the validity of the NEW AMF, and the PCF will compare the Whether the first resource verification identifier carried in the policy update request sent by the NEW AMF to the PCF is consistent with the saved first resource verification identifier, and if they are consistent, the PCF updates the saved first resource verification identifier to the second resource verification identifier , that is, delete the saved first resource verification identifier, save the second resource verification identifier, the PCF replies with a policy update response, and continues to process the subsequent process.
在一种实现方式中,所述策略更新请求可以是Npcf_AMPolicyControl_Update Request。In one implementation, the policy update request may be an Npcf_AMPolicyControl_Update Request.
S1007:NEW AMF向SMF发送更新上下文请求。S1007: NEW AMF sends an update context request to SMF.
具体地,NEW AMF向SMF发送更新上下文请求,此时,NEW AMF为第三客户端网元,OLD AMF为服务端网元,所述更新上下文请求为第五请求消息,所述更新上下文请求携带第二资源核查标识,所述第二资源核查标识用于唯一标识NEW AMF。Specifically, the NEW AMF sends an update context request to the SMF, at this time, the NEW AMF is the third client network element, the OLD AMF is the server network element, the update context request is a fifth request message, and the update context request carries The second resource verification identifier, the second resource verification identifier is used to uniquely identify the NEW AMF.
而在所述变更发生之前,OLD AMF向SMF发送第一请求消息,所述第一请求消息可以是更新上下文请求,此时,OLD AMF为第一客户端网元,SMF为服务端网元,所述第一请求消息包括待校验信息,所述待校验信息包括第一资源核查标识,所述第一资源核查标识用于唯一标识OLD AMF。可理解,SMF会对OLD AMF进行合法性验证,SMF验证OLD AMF合法之后,会保存所述第一资源核查标识。Before the change occurs, the OLD AMF sends a first request message to the SMF, and the first request message may be an update context request. At this time, the OLD AMF is the first client network element, and the SMF is the server network element. The first request message includes information to be verified, and the information to be verified includes a first resource verification identifier, and the first resource verification identifier is used to uniquely identify the OLD AMF. Understandably, the SMF will verify the validity of the OLD AMF, and after the SMF verifies that the OLD AMF is legal, it will save the first resource verification identifier.
需要说明的是,所述NEW AMF向SMF发送的策略更新请求还携带第一资源核查标识,可理解,SMF接收NEW AMF发送的策略更新请求之后,会对NEW AMF进行合法性验证,SMF会比较所述NEW AMF向PCF发送的策略更新请求携带的第一资源核查标识和所述保存的第一资源核查标识是否一致,若一致,SMF将保存的第一资源核查标识更新为第二资源核查标识,即删除所述保存的第一资源核查标识,保存所述第二资源核查标识,SMF回复更新上下文响应,并继续处理后续流程。It should be noted that the policy update request sent by the NEW AMF to the SMF also carries the first resource verification identifier. It is understandable that after receiving the policy update request sent by the NEW AMF, the SMF will verify the validity of the NEW AMF, and the SMF will compare the Whether the first resource verification identifier carried in the policy update request sent by the NEW AMF to the PCF is consistent with the stored first resource verification identifier, and if they are consistent, the SMF updates the stored first resource verification identifier to the second resource verification identifier , that is, delete the saved first resource verification identifier, save the second resource verification identifier, and the SMF responds with an update context response, and continues to process the subsequent process.
在一种实现方式中,所述更新上下文请求可以是Nsmf_PDUSession_UpdateSMContext Request。In one implementation, the update context request may be an Nsmf_PDUSession_UpdateSMContext Request.
S1008:NEW AMF向SMF发送释放上下文请求。S1008: NEW AMF sends a context release request to SMF.
具体地,NEW AMF向SMF发送释放上下文请求,相应地,SMF接收NEW AMF发 送的释放上下文请求,并验证NEW AMF的合法性,具体过程与步骤S1007相同,可参考步骤S1007,在此不再赘述。SMF验证NEW AMF合法后,回复释放上下文请求响应,并且继续处理后续流程。Specifically, the NEW AMF sends a context release request to the SMF, and accordingly, the SMF receives the release context request sent by the NEW AMF, and verifies the validity of the NEW AMF. The specific process is the same as that of step S1007, and reference may be made to step S1007, which will not be repeated here. . After the SMF verifies that the NEW AMF is valid, it responds to the release context request and continues to process the subsequent process.
在一种实现方式中,所述释放上下文请求可以是Nsmf_PDUSession_ReleaseSMContext Request。In an implementation manner, the release context request may be an Nsmf_PDUSession_ReleaseSMContext Request.
S1009:NEW AMF向UE发送注册响应。S1009: NEW AMF sends a registration response to the UE.
可理解,NEW AMF会向UE发送注册响应,流程的具体内容参考3GPP相关协议,在此不再赘述。It is understandable that the NEW AMF will send a registration response to the UE, and the specific content of the process refers to 3GPP related protocols, which will not be repeated here.
另外,需要说明的是,如上文所述,图10中省略了部分流程,具体请参考3GPP相关协议,在此不再赘述。In addition, it should be noted that, as mentioned above, part of the process is omitted in FIG. 10 , for details, please refer to the relevant 3GPP protocol, which will not be repeated here.
本申请实施例还提供了一种面向服务化接口的资源校验方法,如图11所示,图11为又一种面向服务化接口的资源校验方法的流程示意图,所述方法可以包括以下步骤:An embodiment of the present application further provides a resource verification method for a service-oriented interface, as shown in FIG. 11 , which is a schematic flowchart of another resource verification method for a service-oriented interface. The method may include the following step:
S1101:UE发送会话创建请求。S1101: The UE sends a session creation request.
具体地,UE向AMF发送会话创建请求,所述会话创建请求包括会话标识。Specifically, the UE sends a session creation request to the AMF, where the session creation request includes a session identifier.
在一种实现方式中,所述会话创建请求可以是PDU Session Establishment Request,所述会话标识可以是PDU Session ID,所述PDU Session Establishment Request包括PDU Session ID。In an implementation manner, the session creation request may be a PDU Session Establishment Request, the session identifier may be a PDU Session ID, and the PDU Session Establishment Request includes the PDU Session ID.
需要说明的是,在网元注册NRF时,网元可在注册请求中增加网元规划的客户端地址信息,即注册请求会携带网元规划的客户端地址信息,因此,NRF收到所述注册请求后就能获得网元的客户端地址信息。可理解,所述客户端地址信息包括但不限于用户的IP地址。It should be noted that when the network element registers the NRF, the network element can add the client address information planned by the network element in the registration request, that is, the registration request will carry the client address information planned by the network element. Therefore, the NRF receives the After the registration request, the client address information of the network element can be obtained. Understandably, the client address information includes but is not limited to the user's IP address.
示例性的,如图12所示,图12为本申请实施例提供的AMF和SMF注册NRF的示意图,AMF向NRF发送注册请求,所述注册请求携带AMF规划的客户端地址信息,SMF向NRF发送注册请求,所述注册请求携带SMF规划的客户端地址信息。Exemplarily, as shown in FIG. 12, FIG. 12 is a schematic diagram of an AMF and an SMF registering an NRF according to an embodiment of the present application. The AMF sends a registration request to the NRF, and the registration request carries the client address information planned by the AMF, and the SMF sends a registration request to the NRF. A registration request is sent, where the registration request carries the client address information planned by the SMF.
S1102:AMF向NRF发送查询网元请求。S1102: The AMF sends a request for querying network elements to the NRF.
具体地,AMF向NRF发送查询网元请求,所述查询网元请求用于查询Nsmf_PDUSession服务。Specifically, the AMF sends a query network element request to the NRF, where the query network element request is used to query the Nsmf_PDUSession service.
在一种实现方式中,所述查询网元请求可以是Nnrf_NFDiscovery Request。In an implementation manner, the request for querying network elements may be an Nnrf_NFDiscovery Request.
S1103:NRF向AMF发送查询网元响应。S1103: The NRF sends a query network element response to the AMF.
具体地,NRF接收AMF发送的查询网元请求后,查询符合所述查询网元请求的SMF,向AMF发送查询网元响应,所述查询网元响应中包括所述符合所述查询网元请求的SMF规划的客户端地址信息。Specifically, after receiving the query network element request sent by the AMF, the NRF queries the SMF that meets the query network element request, and sends a query network element response to the AMF, where the query network element response includes the query network element request that meets the query network element request. SMF planning client address information.
在一种实现方式中,所述查询网元响应可以是Nnrf_NFDiscovery Response。In an implementation manner, the query network element response may be Nnrf_NFDiscovery Response.
相应地,AMF接收NRF发送的查询网元响应,并将所述查询网元响应包括的SMF规划的客户端地址信息保存到AMF的地址映射表中。Correspondingly, the AMF receives the query network element response sent by the NRF, and saves the client address information planned by the SMF included in the query network element response into the address mapping table of the AMF.
S1104:AMF向SMF发送创建上下文请求。S1104: The AMF sends a context creation request to the SMF.
具体地,AMF向SMF发送创建上下文请求,此时,AMF为第一客户端网元,SMF为服务端网元,SMF网元中包括地址映射表,所述地址映射表包括第一客户端网元标识和 所述第一客户端网元标识对应的客户端地址信息,即所述地址映射表包括AMF的网元标识和其对应的客户端地址信息,所述创建上下文请求为第一请求消息,所述第一请求消息包括待校验信息,所述待校验信息包括所述客户端地址信息,即所述创建上下文请求包括所述客户端地址信息。Specifically, the AMF sends a context creation request to the SMF. At this time, the AMF is the first client network element, the SMF is the server network element, and the SMF network element includes an address mapping table, and the address mapping table includes the first client network element. The client address information corresponding to the meta identifier and the first client network element identifier, that is, the address mapping table includes the network element identifier of the AMF and its corresponding client address information, and the context creation request is the first request message , the first request message includes information to be verified, and the information to be verified includes the client address information, that is, the context creation request includes the client address information.
需要说明的是,根据HTTP协议栈的相关要求,必须有客户端地址和服务端地址才能发送和/或接收HTTP请求,可理解,所述创建上下文请求属于HTTP请求,因此,所述创建上下文请求还包括客户端地址和服务端地址,即所述创建上下文请求还包括所述AMF的客户端地址。It should be noted that, according to the relevant requirements of the HTTP protocol stack, the client address and the server address must be available to send and/or receive HTTP requests. It can be understood that the context creation request belongs to an HTTP request. Therefore, the context creation request It also includes the client address and the server address, that is, the context creation request also includes the client address of the AMF.
在一种实现方式中,所述创建上下文请求可以是Nsmf_PDUSession_CreateSMContext Request。In one implementation, the create context request may be an Nsmf_PDUSession_CreateSMContext Request.
由步骤S401可知,所述第一客户端网元标识包括但不限于网元实例标识(NF Instance ID),所述NF Instance ID可以通过HTTP协议层携带,也可以通过HTTP请求携带。It can be known from step S401 that the first client network element identifier includes but is not limited to a network element instance identifier (NF Instance ID), and the NF Instance ID can be carried through the HTTP protocol layer, or can be carried through an HTTP request.
需要说明的是,在组网规划时,SMF可以配置一个或多个AMF的客户端地址信息到SMF的地址映射表中,并将一个或多个网元标识与所述一个或多个AMF的客户端地址信息关联对应,从而区分所述一个或多个AMF,并且,SMF只使用当前关联的AMF的客户端地址信息(限制其他AMF的客户端地址信息的使用)。It should be noted that, during networking planning, the SMF can configure the client address information of one or more AMFs into the address mapping table of the SMF, and associate one or more network element identifiers with the one or more AMFs. The client address information is associated and corresponding, thereby distinguishing the one or more AMFs, and the SMF only uses the client address information of the currently associated AMF (restricts the use of the client address information of other AMFs).
可理解,如步骤S402中所述,SMF还可以不将AMF的网元标识保存到SMF的地址映射表中,即SMF中只保存AMF的客户端地址信息,而不将这些客户端地址信息与AMF的网元标识关联。It can be understood that, as described in step S402, the SMF may also not store the network element identifier of the AMF in the address mapping table of the SMF, that is, only the client address information of the AMF is stored in the SMF, and the client address information is not associated with the SMF. The network element identification of the AMF is associated.
示例性的,如图13所示,图13为本申请实施例提供的AMF客户端地址信息配置的示意图,SMF将AMF的客户端地址信息配置并保存到SMF的地址映射表中,并将不同AMF的网元标识与其客户端地址信息关联对应,使得SMF可以通过AMF的网元标识查询所述AMF相应的客户端地址信息。Exemplarily, as shown in FIG. 13, FIG. 13 is a schematic diagram of the configuration of AMF client address information provided by an embodiment of the present application. The SMF configures and saves the client address information of the AMF The network element identifier of the AMF is associated with its client address information, so that the SMF can query the corresponding client address information of the AMF through the network element identifier of the AMF.
可理解,上述配置客户端地址信息的方法也可以应用于其他网元,本申请对此不作限制。It is understandable that the above method for configuring client address information can also be applied to other network elements, which is not limited in this application.
相应地,SMF接收AMF发送的创建上下文请求,并验证AMF的合法性,具体地,如图14所示,图14为本申请实施例提供的SMF验证AMF合法性的示意图,SMF接收AMF发送的创建上下文请求后,遍历其地址映射表,具体地,根据所述创建上下文请求中的第一客户端网元标识查询所述SMF的地址映射表,若所述SMF的地址映射表中存在所述第一客户端网元标识,在所述SMF的地址映射表中的第一客户端网元标识所对应的客户端地址信息中查找所述创建上下文请求携带的客户端地址信息,若所述创建上下文请求携带的客户端地址信息在其中,SMF继续处理后续流程,并向AMF发送创建上下文响应,否则,流程终止;若所述SMF的地址映射表中没有所述第一客户端网元标识的相关记录,则直接在所述SMF的地址映射表中查找所述创建上下文请求携带的客户端地址信息,若所述创建上下文请求携带的客户端地址信息在其中,SMF继续处理后续流程,并向AMF发送创建上下文响应,否则,流程终止。Correspondingly, the SMF receives the context creation request sent by the AMF, and verifies the validity of the AMF. Specifically, as shown in FIG. 14 , FIG. 14 is a schematic diagram of the SMF verifying the validity of the AMF provided by the embodiment of the present application. After creating the context request, traverse its address mapping table, specifically, query the address mapping table of the SMF according to the identifier of the first client network element in the creating context request, if the address mapping table of the SMF contains the address mapping table The identifier of the first client network element is to search for the client address information carried in the context creation request in the client address information corresponding to the identifier of the first client network element in the address mapping table of the SMF. The client address information carried in the context request is included, and the SMF continues to process the subsequent process and sends a context creation response to the AMF, otherwise, the process terminates; if there is no identifier of the first client network element in the address mapping table of the SMF related records, then directly look up the client address information carried in the context creation request in the address mapping table of the SMF. If the client address information carried in the context creation request is in it, the SMF continues to process the subsequent process and sends the AMF sends a create context response, otherwise, the process terminates.
S1105:SMF向AMF发送N1N2信息传输请求。S1105: The SMF sends an N1N2 information transmission request to the AMF.
具体地,SMF向AMF发送N1N2信息传输请求,此时,SMF为第一客户端网元,AMF 为服务端网元,AMF网元中包括地址映射表,所述地址映射表包括第一客户端网元标识和所述第一客户端网元标识对应的客户端地址信息,即所述地址映射表包括SMF的网元标识和其对应的客户端地址信息,所述创建上下文请求为第一请求消息,所述第一请求消息包括待校验信息,所述待校验信息包括所述客户端地址信息,即所述创建上下文请求包括所述客户端地址信息。Specifically, the SMF sends an N1N2 information transmission request to the AMF. At this time, the SMF is the first client network element, the AMF is the server network element, and the AMF network element includes an address mapping table, and the address mapping table includes the first client network element. The network element identifier and the client address information corresponding to the first client network element identifier, that is, the address mapping table includes the network element identifier of the SMF and its corresponding client address information, and the context creation request is the first request message, the first request message includes information to be verified, and the information to be verified includes the client address information, that is, the context creation request includes the client address information.
需要说明的是,根据HTTP协议栈的相关要求,必须有客户端地址和服务端地址才能发送和/或接收HTTP请求,可理解,所述N1N2信息传输请求属于HTTP请求,因此,所述N1N2信息传输请求还包括客户端地址和服务端地址,即所述N1N2信息传输请求还包括所述SMF的客户端地址。It should be noted that, according to the relevant requirements of the HTTP protocol stack, the client address and the server address must be available to send and/or receive HTTP requests. It is understood that the N1N2 information transmission request is an HTTP request. Therefore, the N1N2 information The transmission request further includes the client address and the server address, that is, the N1N2 information transmission request further includes the client address of the SMF.
在一种实现方式中,所述N1N2信息传输请求可以是Namf_Communication_N1N2MessageTransfer Request。In an implementation manner, the N1N2 information transfer request may be a Namf_Communication_N1N2MessageTransfer Request.
由步骤S401可知,所述第一客户端网元标识包括但不限于网元实例标识(NF Instance ID),所述NF Instance ID可以通过HTTP协议层携带,也可以通过HTTP请求携带。It can be known from step S401 that the first client network element identifier includes but is not limited to a network element instance identifier (NF Instance ID), and the NF Instance ID can be carried through the HTTP protocol layer, or can be carried through an HTTP request.
可理解,所述AMF可以配置一个或多个SMF的客户端地址信息到AMF的地址映射表中,配置的相关内容与步骤S1104相同,具体内容参考步骤S1104即可,在此不再赘述。It can be understood that the AMF can configure one or more SMF client address information into the address mapping table of the AMF, and the related content of the configuration is the same as that of step S1104.
相应地,AMF接收SMF发送的N1N2信息传输请求,并验证SMF的合法性,具体地,如图15所示,图15为本申请实施例提供的AMF验证SMF合法性的示意图,AMF接收SMF发送的N1N2信息传输请求后,遍历其地址映射表,具体地,根据所述N1N2信息传输请求中的第一客户端网元标识查询所述AMF的地址映射表,若所述AMF的地址映射表中存在所述第一客户端网元标识,在所述AMF的地址映射表中的第一客户端网元标识所对应的客户端地址信息中查找所述N1N2信息传输请求携带的客户端地址信息,若所述N1N2信息传输请求携带的客户端地址信息在其中,AMF继续处理后续流程,并向SMF发送N1N2信息传输响应,否则,流程终止;若所述AMF的地址映射表中没有所述第一客户端网元标识的相关记录,则直接在所述AMF的地址映射表中查找所述N1N2信息传输请求携带的客户端地址信息,若所述N1N2信息传输请求携带的客户端地址信息在其中,AMF继续处理后续流程,并向SMF发送N1N2信息传输响应,否则,流程终止。Correspondingly, the AMF receives the N1N2 information transmission request sent by the SMF, and verifies the validity of the SMF. Specifically, as shown in FIG. 15 , FIG. 15 is a schematic diagram of the AMF verifying the validity of the SMF provided by the embodiment of the present application. After the N1N2 information transmission request, traverse its address mapping table, specifically, query the address mapping table of the AMF according to the first client network element identifier in the N1N2 information transmission request, if the address mapping table of the AMF is in the address mapping table The first client network element identifier exists, and the client address information carried in the N1N2 information transmission request is searched for in the client address information corresponding to the first client network element identifier in the address mapping table of the AMF, If the client address information carried in the N1N2 information transmission request is included, the AMF continues to process the subsequent process and sends an N1N2 information transmission response to the SMF, otherwise, the process terminates; if the AMF address mapping table does not contain the first The relevant record of the client network element identifier, then directly look up the client address information carried in the N1N2 information transmission request in the address mapping table of the AMF, if the client address information carried in the N1N2 information transmission request is in it, The AMF continues to process the subsequent process and sends a N1N2 information transmission response to the SMF, otherwise, the process terminates.
S1106:AMF向SMF发送更新上下文请求。S1106: The AMF sends an update context request to the SMF.
相应地,SMF接收AMF发送的更新上下文请求,并验证AMF的合法性,具体验证方式参考步骤S1104即可,在此不再赘述。Correspondingly, the SMF receives the update context request sent by the AMF, and verifies the validity of the AMF. The specific verification method may refer to step S1104, which will not be repeated here.
在一种实现方式中,所述更新上下文请求可以是Nsmf_PDUSession_UpdateSMContext Request。In one implementation, the update context request may be an Nsmf_PDUSession_UpdateSMContext Request.
需要说明的是,如果所述更新上下文请求涉及AMF的变化,SMF会验证NEW AMF的合法性,具体内容参考步骤S1104即可,在此不再赘述。当SMF验证NEW AMF合法后,继续处理后续流程,并向AMF回复更新上下文响应。It should be noted that, if the update context request involves the change of AMF, the SMF will verify the validity of the NEW AMF, and the specific content can refer to step S1104, which will not be repeated here. After the SMF verifies that the NEW AMF is valid, it continues to process the subsequent process, and returns an update context response to the AMF.
可选的,SMF可以向AMF发送释放会话资源请求,在一种实现方式中,所述释放会话资源请求可以为Nsmf_PDUSession_SMContextStatusNotify(上下文状态通知),相应地,AMF接收所述释放会话资源请求后会验证SMF的合法性,具体看核查方式参考步骤S1105,且所述流程的具体内容参考3GPP相关协议,在此不再赘述。Optionally, the SMF may send a session resource release request to the AMF. In an implementation manner, the session resource release request may be Nsmf_PDUSession_SMContextStatusNotify (context status notification). Accordingly, the AMF will verify the session resource release request after receiving the request. For the validity of the SMF, refer to step S1105 for details of the verification method, and refer to the relevant 3GPP protocol for the specific content of the process, which will not be repeated here.
需要说明的是,上述会话创建流程在AMF向SMF发送创建上下文请求后、AMF向SMF发送N1N2信息传输响应后以及AMF向SMF发送更新上下文请求后,省略了部分流程,所述省略的部分流程以及上述步骤S1101-S1106中未详述的流程可参考3GPP相关协议,在此不再赘述。It should be noted that, the above session creation process omits part of the process after AMF sends a context creation request to SMF, after AMF sends a N1N2 information transmission response to SMF, and after AMF sends an update context request to SMF, the omitted part of the process and For the processes not described in detail in the above steps S1101-S1106, reference may be made to 3GPP related protocols, which will not be repeated here.
上述详细阐述了本申请实施例的方法,为了便于更好的实施本申请实施例上述方案,相应地,下面还提供用于配合实施上述方案的相关设备。The methods of the embodiments of the present application are described in detail above. In order to facilitate better implementation of the above solutions in the embodiments of the present application, correspondingly, related equipment for implementing the above solutions is also provided below.
如图16所示,图16为本申请提供的一种网络设备的示意图,所述网络设备用于执行上述图4、图8、图9、图10以及图11所述的面向服务化接口的资源校验方法。本申请对所述网络设备的功能单元的划分不做限定,可以根据需要对所述网络设备中的各个单元进行增加、减少或合并。此外,所述网络设备中的各个单元的操作和/或功能分别为了实现上述图4、图8、图9、图10以及图11所描述的方法的相应流程,为了简洁,在此不再赘述。图16示例性的提供了一种功能单元的划分:As shown in FIG. 16 , FIG. 16 is a schematic diagram of a network device provided by this application, and the network device is used to execute the service-oriented interface described in FIG. 4 , FIG. 8 , FIG. 9 , FIG. 10 and FIG. 11 . Resource verification method. This application does not limit the division of the functional units of the network device, and each unit in the network device can be added, decreased or combined as required. In addition, the operations and/or functions of each unit in the network device are respectively to implement the corresponding processes of the methods described in the above-mentioned FIG. 4 , FIG. 8 , FIG. 9 , FIG. 10 and FIG. . Figure 16 exemplarily provides a division of functional units:
网络设备1600包括接收单元1610、处理单元1620。The network device 1600 includes a receiving unit 1610 and a processing unit 1620 .
接收单元1610,用于接收第一客户端网元发送的第一请求消息,所述第一请求消息携带待校验信息,所述待校验信息用于对所述第一客户端网元进行合法性验证。The receiving unit 1610 is configured to receive a first request message sent by a first client network element, where the first request message carries information to be verified, and the information to be verified is used to perform verification on the first client network element. Legality verification.
处理单元1620,用于根据所述待校验信息对所述第一客户端网元进行合法性验证;在验证所述第一客户端网元合法之后执行所述第一请求消息。The processing unit 1620 is configured to verify the validity of the first client network element according to the information to be verified; and execute the first request message after verifying that the first client network element is legal.
上述两个单元之间互相可通过通信通路进行数据传输,应理解,所述网络设备1600包括的各单元可以为软件单元、也可以为硬件单元、或部分为软件单元部分为硬件单元。The above-mentioned two units can transmit data to each other through a communication channel. It should be understood that each unit included in the network device 1600 may be a software unit, a hardware unit, or a part of a software unit and a part of a hardware unit.
可以理解的是,图16中所示的网络设备只是本申请实施例中的一种示例性的实施方式,本申请实施例中可应用于面向服务化接口的资源校验方法的网络设备包括但不仅限于以上结构。It can be understood that the network device shown in FIG. 16 is only an exemplary implementation in the embodiment of the present application, and the network device applicable to the resource verification method for the service-oriented interface in the embodiment of the present application includes but Not limited to the above structure.
参见图17,图17是本申请实施例提供的一种计算设备的结构示意图。如图17所示,该计算设备1700包括:处理器1710、通信接口1720以及存储器1730,所述处理器1710、通信接口1720以及存储器1730通过内部总线1740相互连接。Referring to FIG. 17 , FIG. 17 is a schematic structural diagram of a computing device provided by an embodiment of the present application. As shown in FIG. 17 , the computing device 1700 includes a processor 1710 , a communication interface 1720 and a memory 1730 , and the processor 1710 , the communication interface 1720 and the memory 1730 are connected to each other through an internal bus 1740 .
所述计算设备1700可以是图16中的网络设备,图16中的网络设备1600所执行的功能实际上是由所述网络设备1600的处理器1710来执行。The computing device 1700 may be the network device in FIG. 16 , and the functions performed by the network device 1600 in FIG. 16 are actually performed by the processor 1710 of the network device 1600 .
所述处理器1710可以由一个或者多个通用处理器构成,例如中央处理器(Central Processing Unit,CPU),或者CPU和硬件芯片的组合。上述硬件芯片可以是专用集成电路(Application-Specific Integrated Circuit,ASIC)、可编程逻辑器件(Programmable Logic Device,PLD)或其组合。上述PLD可以是复杂可编程逻辑器件(Complex Programmable Logic Device,CPLD)、现场可编程逻辑门阵列(Field-Programmable Gate Array,FPGA)、通用阵列逻辑(Generic Array Logic,GAL)或其任意组合。The processor 1710 may be composed of one or more general-purpose processors, such as a central processing unit (Central Processing Unit, CPU), or a combination of a CPU and a hardware chip. The above-mentioned hardware chip may be an application-specific integrated circuit (Application-Specific Integrated Circuit, ASIC), a programmable logic device (Programmable Logic Device, PLD) or a combination thereof. The above-mentioned PLD can be a complex programmable logic device (Complex Programmable Logic Device, CPLD), a field programmable gate array (Field-Programmable Gate Array, FPGA), a general array logic (Generic Array Logic, GAL) or any combination thereof.
通信接口1720用于与其他设备或通信网络通信,如以太网,无线接入网(RAN),核心网,无线局域网(Wireless Local Area Networks,WLAN)等。The communication interface 1720 is used to communicate with other devices or communication networks, such as Ethernet, Radio Access Network (RAN), Core Network, Wireless Local Area Networks (WLAN) and the like.
总线1740可以是外设部件互连标准(Peripheral Component Interconnect,PCI)总线或扩展工业标准结构(Extended Industry Standard Architecture,EISA)总线等。所述总线1740可以分为地址总线、数据总线、控制总线等。为便于表示,图17中仅用一条粗线表示,但 不表示仅有一根总线或一种类型的总线。The bus 1740 may be a peripheral component interconnect standard (Peripheral Component Interconnect, PCI) bus or an Extended Industry Standard Architecture (Extended Industry Standard Architecture, EISA) bus or the like. The bus 1740 can be divided into an address bus, a data bus, a control bus, and the like. For ease of presentation, only one thick line is shown in Figure 17, but it does not mean that there is only one bus or one type of bus.
存储器1730可以包括易失性存储器(Volatile Memory),例如随机存取存储器(Random Access Memory,RAM);存储器1730也可以包括非易失性存储器(Non-Volatile Memory),例如只读存储器(Read-Only Memory,ROM)、快闪存储器(Flash Memory)、硬盘(Hard Disk Drive,HDD)或固态硬盘(Solid-State Drive,SSD);存储器1730还可以包括上述种类的组合。存储器1730用于存储执行上述面向服务化接口的资源校验方法实施例的程序代码,在一种实施方式中,存储器1730还可以缓存其他数据,并由处理器1710来控制执行,以实现所述网络设备1600所示的功能单元,或者用于实现图4、图8、图9、图10以及图11所示的方法实施例中以所述网络设备1600为执行主体的方法步骤。具体如下:The memory 1730 may include a volatile memory (Volatile Memory), such as a random access memory (Random Access Memory, RAM); the memory 1730 may also include a non-volatile memory (Non-Volatile Memory), such as a read-only memory (Read- Only Memory (ROM), flash memory (Flash Memory), hard disk (Hard Disk Drive, HDD) or solid-state drive (Solid-State Drive, SSD); the memory 1730 may also include a combination of the above types. The memory 1730 is used to store the program code for executing the above embodiment of the resource verification method for the service-oriented interface. In one embodiment, the memory 1730 can also cache other data, and the execution is controlled by the processor 1710 to realize the above. The functional units shown in the network device 1600 are used to implement the method steps in the method embodiments shown in FIG. 4 , FIG. 8 , FIG. 9 , FIG. 10 and FIG. details as follows:
处理器1710控制通信接口1720接收第一客户端网元发送的第一请求消息,所述第一请求消息携带待校验信息,所述待校验信息用于对所述第一客户端网元进行合法性验证;The processor 1710 controls the communication interface 1720 to receive a first request message sent by the first client network element, where the first request message carries information to be verified, and the to-be-verified information is used to communicate to the first client network element. conduct legality verification;
处理器1710根据所述待校验信息对所述第一客户端网元进行合法性验证;The processor 1710 performs legality verification on the first client network element according to the information to be verified;
处理器1710在验证所述第一客户端网元合法之后执行所述第一请求消息。The processor 1710 executes the first request message after verifying that the first client network element is legitimate.
在其中一种实现方式中,处理器1710控制通信接口1720接收第一客户端网元发送的第一请求消息,包括:处理器1710控制通信接口1720接收所述第一客户端网元根据超文本传输协议发送的HTTP请求消息,所述HTTP请求消息包括HTTP协议头和消息体,所述HTTP协议头包括第一客户端网元类型和第一客户端网元标识,所述消息体包括所述第一客户端网元标识。In one implementation manner, the processor 1710 controls the communication interface 1720 to receive the first request message sent by the first client network element, including: the processor 1710 controls the communication interface 1720 to receive the first client network element according to the hypertext An HTTP request message sent by a transmission protocol, the HTTP request message includes an HTTP protocol header and a message body, the HTTP protocol header includes the first client network element type and the first client network element identifier, and the message body includes the The identifier of the first client network element.
在其中一种实现方式中,处理器1710根据所述待校验信息对所述第一客户端网元进行合法性验证,包括:处理器1710比较所述HTTP协议头中的第一客户端网元标识和所述消息体中的第一客户端网元标识是否一致,若一致,则确认所述第一客户端网元合法。In one implementation manner, the processor 1710 performs legality verification on the first client network element according to the information to be verified, including: the processor 1710 compares the first client network element in the HTTP protocol header Whether the element identifier and the first client network element identifier in the message body are consistent, if they are consistent, it is confirmed that the first client network element is legal.
在其中一种实现方式中,处理器1710根据所述待校验信息对所述第一客户端网元进行合法性验证,包括:当所述HTTP协议头中的第一客户端网元类型与所述服务端网元自身的网元类型一致时,处理器1710比较所述HTTP协议头中的第一客户端网元标识和所述服务端网元自身的网元实例标识是否一致,若不一致,则确认所述第一客户端网元合法。In one implementation manner, the processor 1710 performs legality verification on the first client network element according to the to-be-verified information, including: when the first client network element type in the HTTP protocol header is the same as the When the network element types of the server network element are consistent, the processor 1710 compares whether the first client network element identifier in the HTTP protocol header is consistent with the network element instance identifier of the server network element itself. , it is confirmed that the first client network element is legal.
在其中一种实现方式中,处理器1710确认所述第一客户端网元合法之后,所述方法还包括:处理器1710保存所述第一客户端网元标识;处理器1710根据所述待校验信息对所述第一客户端网元进行合法性验证之后,所述方法还包括:处理器1710控制通信接口1720接收所述第一客户端网元发送的第二请求消息,所述第二请求消息携带所述第一客户端网元标识;处理器1710根据所述第一客户端网元标识对所述第一客户端网元进行合法性验证;处理器1710比较所述第二请求消息中的第一客户端网元标识和所述服务端网元保存的第一客户端网元标识是否一致,若一致,则确认所述第一客户端网元合法;处理器1710在验证所述第一客户端网元合法之后执行所述第二请求消息。In one implementation manner, after the processor 1710 confirms that the first client network element is legal, the method further includes: the processor 1710 saves the identifier of the first client network element; After verifying the validity of the first client network element with the verification information, the method further includes: the processor 1710 controls the communication interface 1720 to receive a second request message sent by the first client network element, the first client network element The second request message carries the identifier of the first client network element; the processor 1710 verifies the validity of the first client network element according to the identifier of the first client network element; the processor 1710 compares the second request Whether the identifier of the first client network element in the message is consistent with the identifier of the first client network element stored by the server network element, if they are the same, the first client network element is confirmed to be legal; the processor 1710 is verifying The second request message is executed after the first client network element is legal.
在其中一种实现方式中,处理器1710控制通信接口1720接收第一客户端网元发送的第一请求消息之前,所述方法还包括:处理器1710控制通信接口1720接收第二客户端网元发送的第三请求消息,所述第三请求消息携带第二客户端网元标识;处理器1710根据所述第二客户端网元标识进行合法性验证;处理器1710在验证所述第一客户端网元合法之后保存所述第二客户端网元标识;处理器1710控制通信接口1720接收第一客户端网元发送 的第一请求消息之前,所述方法还包括:处理器1710比较所述HTTP协议头中的第一客户端网元标识和所述保存的第二客户端网元标识是否一致。In one implementation manner, before the processor 1710 controls the communication interface 1720 to receive the first request message sent by the first client network element, the method further includes: the processor 1710 controls the communication interface 1720 to receive the second client network element The third request message sent, the third request message carries the network element identifier of the second client; the processor 1710 performs legality verification according to the identifier of the second client network element; the processor 1710 is verifying the first client After the end network element is legal, the identifier of the second client network element is stored; before the processor 1710 controls the communication interface 1720 to receive the first request message sent by the first client network element, the method further includes: the processor 1710 compares the Whether the identifier of the first client network element in the HTTP protocol header is consistent with the stored identifier of the second client network element.
在其中一种实现方式中,所述待校验信息包括第一资源核查标识,处理器1710控制通信接口1720接收第一客户端网元发送的第一请求消息之前,所述方法还包括:处理器1710控制通信接口1720接收所述第一客户端网元发送的第四请求消息,所述第四请求消息携带所述第一资源核查标识,所述第一资源核查标识用于唯一标识所述第一客户端网元;处理器1710保存所述第一资源核查标识;处理器1710根据所述待校验信息对所述第一客户端网元进行合法性验证,包括:处理器1710比较所述第一请求消息携带的第一资源核查标识与保存的第一资源核查标识是否一致,若一致,则确认所述第一客户端网元合法。In one implementation manner, the information to be verified includes a first resource verification identifier, and before the processor 1710 controls the communication interface 1720 to receive the first request message sent by the first client network element, the method further includes: processing The controller 1710 controls the communication interface 1720 to receive a fourth request message sent by the first client network element, the fourth request message carries the first resource verification identifier, and the first resource verification identifier is used to uniquely identify the the first client network element; the processor 1710 saves the first resource verification identifier; the processor 1710 performs legality verification on the first client network element according to the information to be verified, including: the processor 1710 compares the Whether the first resource verification identifier carried in the first request message and the stored first resource verification identifier are consistent, and if they are consistent, it is confirmed that the first client network element is legal.
在其中一种实现方式中,处理器1710确认所述第一客户端网元合法之后,所述方法还包括:处理器1710控制通信接口1720接收第三客户端网元发送的第五请求消息,所述第五请求消息携带所述第一资源核查标识和第二资源核查标识,所述第二资源核查标识用于唯一标识所述第三客户端网元;处理器1710比较所述第五请求消息携带的第一资源核查标识与所述保存的第一资源核查标识是否一致,若一致,处理器1710删除所述第一资源核查标识,保存所述第二资源核查标识。In one implementation manner, after the processor 1710 confirms that the first client network element is legal, the method further includes: the processor 1710 controls the communication interface 1720 to receive the fifth request message sent by the third client network element, The fifth request message carries the first resource verification identifier and the second resource verification identifier, and the second resource verification identifier is used to uniquely identify the third client network element; the processor 1710 compares the fifth request Whether the first resource verification identifier carried in the message is consistent with the stored first resource verification identifier, and if so, the processor 1710 deletes the first resource verification identifier and saves the second resource verification identifier.
在其中一种实现方式中,存储器1730包括地址映射表,所述地址映射表包括第一客户端网元标识和所述第一客户端网元标识对应的客户端地址信息,所述待校验信息包括所述客户端地址信息,处理器1710根据所述待校验信息对所述第一客户端网元进行合法性验证,包括:处理器1710遍历所述地址映射表,判断所述地址映射表中是否包含所述第一请求消息携带的客户端地址信息,若所述地址映射表中包含所述客户端地址信息,则确认所述第一客户端网元合法。In one implementation manner, the memory 1730 includes an address mapping table, and the address mapping table includes a first client network element identifier and client address information corresponding to the first client network element identifier. The information includes the client address information, and the processor 1710 performs legality verification on the first client network element according to the information to be verified, including: the processor 1710 traverses the address mapping table to determine the address mapping Whether the table contains the client address information carried in the first request message, and if the address mapping table contains the client address information, it is confirmed that the first client network element is legal.
本申请实施例还提供一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时,可以实现上述方法实施例中记载的任意一种的部分或全部步骤,以及实现上述图16所描述的任意一个功能单元的功能。Embodiments of the present application further provide a computer-readable storage medium, on which a computer program is stored. When the program is executed by a processor, it can implement some or all of the steps described in the above method embodiments, and realize the above The function of any one of the functional units described in Figure 16.
本申请实施例还提供了一种计算机程序产品,当其在计算机或处理器上运行时,使得计算机或处理器执行上述任一个方法中的一个或多个步骤。上述所涉及的设备的各组成模块如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在所述计算机可读取存储介质中。Embodiments of the present application also provide a computer program product, which, when run on a computer or a processor, causes the computer or processor to execute one or more steps in any one of the above methods. If each component module of the above-mentioned device is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in the computer-readable storage medium.
本申请实施例还提供了一种芯片系统,该芯片系统包括处理器,用于支持所述网络设备1600实现上述任一个方法中以网络设备1600为执行主体的方法步骤的一个或多个步骤。在一种可能的设计中,所述芯片系统还包括存储器,所述存储器,用于保存数据发送设备必要的程序指令和数据。该芯片系统,可以由芯片构成,也可以包含芯片和其他分立器件。Embodiments of the present application further provide a chip system, where the chip system includes a processor, configured to support the network device 1600 to implement one or more steps of the method steps in any of the above methods with the network device 1600 as the main body of execution. In a possible design, the chip system further includes a memory for storing necessary program instructions and data of the data sending device. The chip system may be composed of chips, or may include chips and other discrete devices.
在上述实施例中,对各个实施例的描述各有侧重,某个实施例中没有详述的部分,可以参见其它实施例的相关描述。In the above-mentioned embodiments, the description of each embodiment has its own emphasis. For parts that are not described in detail in a certain embodiment, reference may be made to the relevant descriptions of other embodiments.
应理解,本文中涉及的第一、第二、第三、第四以及各种数字编号仅为描述方便进行的区分,并不用来限制本申请的范围。It should be understood that the first, the second, the third, the fourth and various numeral numbers mentioned herein are only for the convenience of description, and are not used to limit the scope of the present application.
应理解,本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在 三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。It should be understood that the term "and/or" in this document is only an association relationship to describe associated objects, indicating that there can be three kinds of relationships, for example, A and/or B, which can mean that A exists alone, and A and B exist at the same time , there are three cases of B alone. In addition, the character "/" in this document generally indicates that the related objects are an "or" relationship.
还应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。It should also be understood that, in various embodiments of the present application, the size of the sequence numbers of the above-mentioned processes does not mean the sequence of execution, and the execution sequence of each process should be determined by its functions and internal logic, and should not be implemented in the present application. The implementation of the examples constitutes no limitation.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Those of ordinary skill in the art can realize that the units and algorithm steps of each example described in conjunction with the embodiments disclosed herein can be implemented in electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the technical solution. Skilled artisans may implement the described functionality using different methods for each particular application, but such implementations should not be considered beyond the scope of this application.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that, for the convenience and brevity of description, the specific working process of the above-described systems, devices and units may refer to the corresponding processes in the foregoing method embodiments, which will not be repeated here.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the apparatus embodiments described above are only illustrative. For example, the division of the units is only a logical function division. In actual implementation, there may be other division methods. For example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented. On the other hand, the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。The functions, if implemented in the form of software functional units and sold or used as independent products, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application can be embodied in the form of a software product in essence, or the part that contributes to the prior art or the part of the technical solution. The computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application. The aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program codes .
本申请实施例方法中的步骤可以根据实际需要进行顺序调整、合并和删减。The steps in the method of the embodiment of the present application may be adjusted, combined and deleted in sequence according to actual needs.
本申请实施例装置中的模块可以根据实际需要进行合并、划分和删减。The modules in the apparatus of the embodiment of the present application may be combined, divided and deleted according to actual needs.
以上所述,以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的范围。As mentioned above, the above embodiments are only used to illustrate the technical solutions of the present application, but not to limit them; although the present application has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art should understand: The technical solutions described in the embodiments are modified, or some technical features thereof are equivalently replaced; and these modifications or replacements do not make the essence of the corresponding technical solutions deviate from the scope of the technical solutions of the embodiments of the present application.
Claims (20)
- 一种面向服务化接口的资源校验方法,其特征在于,所述方法包括:A service-oriented interface-oriented resource verification method, characterized in that the method includes:服务端网元接收第一客户端网元发送的第一请求消息,所述第一请求消息携带待校验信息,所述待校验信息用于对所述第一客户端网元进行合法性验证;The server network element receives the first request message sent by the first client network element, the first request message carries information to be verified, and the to-be-verified information is used to verify the validity of the first client network element verify;所述服务端网元根据所述待校验信息对所述第一客户端网元进行合法性验证;The server network element performs legality verification on the first client network element according to the information to be verified;所述服务端网元在验证所述第一客户端网元合法之后执行所述第一请求消息。The server network element executes the first request message after verifying that the first client network element is legal.
- 如权利要求1所述的方法,其特征在于,所述服务端网元接收第一客户端网元发送的第一请求消息,包括:The method according to claim 1, wherein the server network element receiving the first request message sent by the first client network element comprises:所述服务端网元接收所述第一客户端网元根据超文本传输协议发送的HTTP请求消息,所述HTTP请求消息包括HTTP协议头和消息体,所述HTTP协议头包括第一客户端网元类型和第一客户端网元标识。The server network element receives an HTTP request message sent by the first client network element according to the hypertext transfer protocol, the HTTP request message includes an HTTP protocol header and a message body, and the HTTP protocol header includes the first client network element. The element type and the identifier of the first client network element.
- 如权利要求2所述的方法,其特征在于,所述消息体包括所述第一客户端网元标识,所述服务端网元根据所述待校验信息对所述第一客户端网元进行合法性验证,包括:The method according to claim 2, wherein the message body includes the identifier of the first client network element, and the server network element sends a message to the first client network element according to the information to be verified. Conduct legality verification, including:所述服务端网元比较所述HTTP协议头中的第一客户端网元标识和所述消息体中的第一客户端网元标识是否一致,若一致,则确认所述第一客户端网元合法。The server network element compares whether the first client network element identifier in the HTTP protocol header and the first client network element identifier in the message body are consistent, and if they are consistent, confirms the first client network element. Yuan is legal.
- 如权利要求2所述的方法,其特征在于,所述服务端网元根据所述待校验信息对所述第一客户端网元进行合法性验证,包括:The method according to claim 2, wherein the server network element performs legality verification on the first client network element according to the information to be verified, comprising:当所述HTTP协议头中的第一客户端网元类型与所述服务端网元自身的网元类型一致时,所述服务端网元比较所述HTTP协议头中的第一客户端网元标识和所述服务端网元自身的网元实例标识是否一致,若不一致,则确认所述第一客户端网元合法。When the type of the first client network element in the HTTP protocol header is consistent with the network element type of the server network element itself, the server network element compares the first client network element in the HTTP protocol header Whether the identifier is consistent with the identifier of the network element instance of the server network element itself, if not, confirming that the first client network element is legal.
- 如权利要求2或3所述的方法,其特征在于,所述确认所述第一客户端网元合法之后,所述方法还包括:The method according to claim 2 or 3, wherein after confirming that the first client network element is legal, the method further comprises:所述服务端网元保存所述第一客户端网元标识;The server network element saves the first client network element identifier;所述服务端网元根据所述待校验信息对所述第一客户端网元进行合法性验证之后,所述方法还包括:After the server network element performs legality verification on the first client network element according to the information to be verified, the method further includes:所述服务端网元接收所述第一客户端网元发送的第二请求消息,所述第二请求消息携带所述第一客户端网元标识;receiving, by the server network element, a second request message sent by the first client network element, where the second request message carries the identifier of the first client network element;所述服务端网元比较所述第二请求消息中的第一客户端网元标识和所述服务端网元保存的第一客户端网元标识是否一致,若一致,则确认所述第一客户端网元合法;The server network element compares whether the first client network element identifier in the second request message is consistent with the first client network element identifier saved by the server network element, and if they are consistent, confirms the first client network element identifier. The client network element is legal;所述服务端网元在验证所述第一客户端网元合法之后执行所述第二请求消息。The server network element executes the second request message after verifying that the first client network element is legal.
- 如权利要求3所述的方法,其特征在于,所述服务端网元接收第一客户端网元发送 的第一请求消息之前,所述方法还包括:The method according to claim 3, wherein before the server network element receives the first request message sent by the first client network element, the method further comprises:所述服务端网元接收第二客户端网元发送的第三请求消息,所述第三请求消息携带第二客户端网元标识;receiving, by the server network element, a third request message sent by the second client network element, where the third request message carries the identifier of the second client network element;所述服务端网元根据所述第二客户端网元标识进行合法性验证;The server network element performs legality verification according to the identifier of the second client network element;所述服务端网元在验证所述第一客户端网元合法之后保存所述第二客户端网元标识;The server network element saves the identifier of the second client network element after verifying that the first client network element is legal;所述服务端网元接收第一客户端网元发送的第一请求消息之后,所述方法还包括:After the server network element receives the first request message sent by the first client network element, the method further includes:所述服务端网元比较所述HTTP协议头中的第一客户端网元标识和所述保存的第二客户端网元标识是否一致。The server network element compares whether the identifier of the first client network element in the HTTP protocol header is consistent with the stored identifier of the second client network element.
- 如权利要求1所述的方法,其特征在于,所述待校验信息包括第一资源核查标识,在服务端网元接收第一客户端网元发送的第一请求消息之前,所述方法还包括:The method according to claim 1, wherein the information to be verified includes a first resource verification identifier, and before the server network element receives the first request message sent by the first client network element, the method further comprises: include:所述服务端网元接收所述第一客户端网元发送的第四请求消息,所述第四请求消息携带所述第一资源核查标识,所述第一资源核查标识用于唯一标识所述第一客户端网元;The server network element receives a fourth request message sent by the first client network element, where the fourth request message carries the first resource verification identifier, and the first resource verification identifier is used to uniquely identify the the first client network element;所述服务端网元保存所述第一资源核查标识;The server network element saves the first resource verification identifier;所述服务端网元根据所述待校验信息对所述第一客户端网元进行合法性验证,包括:The server network element performs legality verification on the first client network element according to the information to be verified, including:所述服务端网元比较所述第一请求消息携带的第一资源核查标识与所述保存的第一资源核查标识是否一致,若一致,则确认所述第一客户端网元合法。The server network element compares whether the first resource verification identifier carried in the first request message is consistent with the stored first resource verification identifier, and if they are consistent, confirms that the first client network element is legal.
- 如权利要求7所述的方法,其特征在于,所述确认所述第一客户端网元合法之后,所述方法还包括:The method according to claim 7, wherein after confirming that the first client network element is legal, the method further comprises:所述服务端网元接收第三客户端网元发送的第五请求消息,所述第五请求消息携带所述第一资源核查标识和第二资源核查标识,所述第二资源核查标识用于唯一标识所述第三客户端网元;The server network element receives the fifth request message sent by the third client network element, the fifth request message carries the first resource verification identifier and the second resource verification identifier, and the second resource verification identifier is used for uniquely identify the third client network element;所述服务端网元比较所述第五请求消息携带的第一资源核查标识与所述保存的第一资源核查标识是否一致,若一致,所述服务端网元删除所述第一资源核查标识,保存所述第二资源核查标识。The server network element compares whether the first resource verification identifier carried in the fifth request message is consistent with the saved first resource verification identifier, and if they are consistent, the server network element deletes the first resource verification identifier , and save the second resource verification identifier.
- 如权利要求1所述的方法,其特征在于,所述服务端网元包括地址映射表,所述地址映射表包括第一客户端网元标识和所述第一客户端网元标识对应的客户端地址信息,所述待校验信息包括所述客户端地址信息,所述服务端网元根据所述待校验信息对所述第一客户端网元进行合法性验证,包括:The method of claim 1, wherein the server network element includes an address mapping table, and the address mapping table includes a first client network element identifier and a client corresponding to the first client network element identifier terminal address information, the information to be verified includes the client address information, and the server network element performs legality verification on the first client network element according to the information to be verified, including:所述服务端网元遍历所述地址映射表,判断所述地址映射表中是否包含所述第一请求消息携带的客户端地址信息,若所述地址映射表中包含所述客户端地址信息,则确认所述第一客户端网元合法。The server network element traverses the address mapping table, and determines whether the address mapping table includes the client address information carried in the first request message, and if the address mapping table includes the client address information, Then, it is confirmed that the first client network element is legal.
- 一种网络设备,其特征在于,所述网络设备包括:A network device, characterized in that the network device includes:接收单元,用于接收第一客户端网元发送的第一请求消息,所述第一请求消息携带待校验信息,所述待校验信息用于对所述第一客户端网元进行合法性验证;A receiving unit, configured to receive a first request message sent by a first client network element, where the first request message carries information to be verified, and the to-be-verified information is used for validating the first client network element sexual verification;处理单元,用于根据所述待校验信息对所述第一客户端网元进行合法性验证;在验证所述第一客户端网元合法之后执行所述第一请求消息。The processing unit is configured to verify the validity of the first client network element according to the information to be verified; and execute the first request message after verifying that the first client network element is legal.
- 如权利要求10所述的方法,其特征在于,所述接收单元,在用于接收第一客户端网元发送的第一请求消息时,具体用于:The method according to claim 10, wherein, when the receiving unit is configured to receive the first request message sent by the first client network element, it is specifically configured to:接收所述第一客户端网元根据超文本传输协议发送的HTTP请求消息,所述HTTP请求消息包括HTTP协议头和消息体,所述HTTP协议头包括第一客户端网元类型和第一客户端网元标识所述消息体包括所述第一客户端网元标识。Receive an HTTP request message sent by the first client network element according to the hypertext transfer protocol, the HTTP request message includes an HTTP protocol header and a message body, and the HTTP protocol header includes the first client network element type and the first client End network element identification The message body includes the first client network element identification.
- 如权利要求11所述的方法,其特征在于,所述消息体包括所述第一客户端网元标识,所述处理单元,在用于根据所述待校验信息对所述第一客户端网元进行合法性验证时,具体用于:The method according to claim 11, wherein the message body includes the network element identifier of the first client, and the processing unit is configured to perform an operation on the first client according to the information to be verified. When the NE performs legality verification, it is specifically used for:比较所述HTTP协议头中的第一客户端网元标识和所述消息体中的第一客户端网元标识是否一致,若一致,则确认所述第一客户端网元合法。Compare whether the first client network element identifier in the HTTP protocol header and the first client network element identifier in the message body are consistent, and if they are consistent, confirm that the first client network element is legal.
- 如权利要求11所述的方法,其特征在于,所述处理单元,在用于根据所述待校验信息对所述第一客户端网元进行合法性验证时,具体用于:The method according to claim 11, wherein, when the processing unit is used to verify the validity of the first client network element according to the information to be verified, the processing unit is specifically configured to:当所述HTTP协议头中的第一客户端网元类型与所述服务端网元自身的网元类型一致时,比较所述HTTP协议头中的第一客户端网元标识和所述服务端网元自身的网元实例标识是否一致,若不一致,则确认所述第一客户端网元合法。When the type of the first client network element in the HTTP protocol header is consistent with the network element type of the server network element itself, compare the identifier of the first client network element in the HTTP protocol header with that of the server network element Whether the identifiers of the network element instances of the network elements themselves are consistent, and if they are inconsistent, it is confirmed that the first client network element is legal.
- 如权利要求11或12所述的方法,其特征在于,所述接收单元接收第一客户端网元发送的第一请求消息之后,所述处理单元,还用于保存所述第一客户端网元标识;The method according to claim 11 or 12, wherein after the receiving unit receives the first request message sent by the first client network element, the processing unit is further configured to save the first client network element meta-id;所述处理单元根据所述待校验信息对所述第一客户端网元进行合法性验证之后,所述接收单元还用于接收所述第一客户端网元发送的第二请求消息,所述第二请求消息携带所述第一客户端网元标识;所述处理单元,还用于:比较所述第二请求消息中的第一客户端网元标识和所述服务端网元保存的第一客户端网元标识是否一致,若一致,则确认所述第一客户端网元合法;在验证所述第一客户端网元合法之后执行所述第二请求消息。After the processing unit verifies the validity of the first client network element according to the information to be verified, the receiving unit is further configured to receive the second request message sent by the first client network element, where the The second request message carries the identifier of the network element of the first client; the processing unit is further configured to: compare the identifier of the network element of the first client in the second request message with the identifier of the network element of the server saved Whether the identifiers of the first client network elements are the same, if they are consistent, it is confirmed that the first client network element is legal; the second request message is executed after verifying that the first client network element is legal.
- 如权利要求12所述的方法,其特征在于,所述接收单元接收第一客户端网元发送的第一请求消息之前,所述接收单元,还用于:接收第二客户端网元发送的第三请求消息,所述第三请求消息携带第二客户端网元标识;所述处理单元,还用于:根据所述第二客户端网元标识进行合法性验证;在验证所述第一客户端网元合法之后保存所述第二客户端网元标识;The method according to claim 12, wherein before the receiving unit receives the first request message sent by the first client network element, the receiving unit is further configured to: receive the first request message sent by the second client network element a third request message, where the third request message carries the identifier of the network element of the second client; the processing unit is further configured to: perform legality verification according to the identifier of the network element of the second client; After the client network element is legal, the identifier of the second client network element is stored;所述接收单元接收第一客户端网元发送的第一请求消息之后,所述处理单元,还用于:比较所述HTTP协议头中的第一客户端网元标识和所述保存的第二客户端网元标识是否一致。After the receiving unit receives the first request message sent by the first client network element, the processing unit is further configured to: compare the identifier of the first client network element in the HTTP protocol header with the stored second request message. Check whether the client NE IDs are consistent.
- 如权利要求10所述的方法,其特征在于,所述待校验信息包括第一资源核查标识,所述接收单元接收第一客户端网元发送的第一请求消息之前,所述接收单元,还用于:接收所述第一客户端网元发送的第四请求消息,所述第四请求消息携带所述第一资源核查标识,所述第一资源核查标识用于唯一标识所述第一客户端网元;The method according to claim 10, wherein the information to be verified includes a first resource verification identifier, and before the receiving unit receives the first request message sent by the first client network element, the receiving unit: is further used for: receiving a fourth request message sent by the first client network element, where the fourth request message carries the first resource verification identifier, and the first resource verification identifier is used to uniquely identify the first client network element;所述处理单元,还用于:保存所述第一资源核查标识;根据所述待校验信息对所述第一客户端网元进行合法性验证,包括:比较所述第一请求消息携带的第一资源核查标识与保存的第一资源核查标识是否一致,若一致,则确认所述第一客户端网元合法。The processing unit is further configured to: save the first resource verification identifier; perform legality verification on the first client network element according to the information to be verified, including: comparing the information carried in the first request message Whether the first resource verification identifier and the stored first resource verification identifier are consistent, and if they are consistent, it is confirmed that the first client network element is legal.
- 如权利要求16所述的方法,其特征在于,所述确认所述第一客户端网元合法之后,所述接收单元,还用于:接收第三客户端网元发送的第五请求消息,所述第五请求消息携带所述第一资源核查标识和第二资源核查标识,所述第二资源核查标识用于唯一标识所述第三客户端网元;The method according to claim 16, wherein after confirming that the first client network element is legal, the receiving unit is further configured to: receive a fifth request message sent by a third client network element, The fifth request message carries the first resource verification identifier and a second resource verification identifier, where the second resource verification identifier is used to uniquely identify the third client network element;所述处理单元,还用于:比较所述第五请求消息携带的第一资源核查标识与所述保存的第一资源核查标识是否一致,若一致,删除所述第一资源核查标识,保存所述第二资源核查标识。The processing unit is further configured to: compare whether the first resource verification identifier carried in the fifth request message is consistent with the saved first resource verification identifier, and if they are consistent, delete the first resource verification identifier, and save the saved first resource verification identifier. The second resource verification identifier is described.
- 如权利要求10所述的方法,其特征在于,所述设备包括地址映射表,所述地址映射表包括第一客户端网元标识和所述第一客户端网元标识对应的客户端地址信息,所述待校验信息包括所述客户端地址信息,所述处理单元,在用于根据所述待校验信息对所述第一客户端网元进行合法性验证时,具体用于:The method of claim 10, wherein the device comprises an address mapping table, and the address mapping table comprises a first client network element identifier and client address information corresponding to the first client network element identifier , the to-be-verified information includes the client address information, and the processing unit, when used to verify the validity of the first client network element according to the to-be-verified information, is specifically configured to:遍历所述地址映射表,判断所述地址映射表中是否包含所述第一请求消息携带的客户端地址信息,若所述地址映射表中包含所述客户端地址信息,则确认所述第一客户端网元合法。Traverse the address mapping table, determine whether the address mapping table contains the client address information carried in the first request message, and if the address mapping table contains the client address information, confirm the first The client NE is legal.
- 一种计算设备,其特征在于,所述计算设备包括存储器和处理器,所述处理器执行所述存储器存储的计算机指令,使得所述计算设备执行权利要求1-9任一项所述的方法。A computing device, characterized in that the computing device includes a memory and a processor, and the processor executes computer instructions stored in the memory, so that the computing device executes the method according to any one of claims 1-9 .
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机程序,该计算机程序被处理器执行时实现上述权利要求1-9任意一项所述的方法。A computer-readable storage medium, characterized in that, the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, the method described in any one of the preceding claims 1-9 is implemented.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/141127 WO2022141132A1 (en) | 2020-12-29 | 2020-12-29 | Resource checking method for service-based interface and related device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/141127 WO2022141132A1 (en) | 2020-12-29 | 2020-12-29 | Resource checking method for service-based interface and related device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022141132A1 true WO2022141132A1 (en) | 2022-07-07 |
Family
ID=82259937
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/141127 WO2022141132A1 (en) | 2020-12-29 | 2020-12-29 | Resource checking method for service-based interface and related device |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2022141132A1 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110784434A (en) * | 2018-07-31 | 2020-02-11 | 华为技术有限公司 | Communication method and device |
WO2020141356A1 (en) * | 2019-01-04 | 2020-07-09 | Telefonaktiebolaget Lm Ericsson (Publ) | Flexible authorization in 5g service based core network |
CN112087412A (en) * | 2019-06-14 | 2020-12-15 | 大唐移动通信设备有限公司 | Service access processing method and device based on unique token |
-
2020
- 2020-12-29 WO PCT/CN2020/141127 patent/WO2022141132A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110784434A (en) * | 2018-07-31 | 2020-02-11 | 华为技术有限公司 | Communication method and device |
WO2020141356A1 (en) * | 2019-01-04 | 2020-07-09 | Telefonaktiebolaget Lm Ericsson (Publ) | Flexible authorization in 5g service based core network |
CN112087412A (en) * | 2019-06-14 | 2020-12-15 | 大唐移动通信设备有限公司 | Service access processing method and device based on unique token |
Non-Patent Citations (3)
Title |
---|
CHINA MOBILE: "Living Document:Security of Service Based Architecture of 5G phase 1", 3GPP TSG SA WG3 (SECURITY) MEETING #91BIS, S3-181812, 25 May 2018 (2018-05-25), XP051502434 * |
NOKIA: "OAuth based service authorization framework for SBA", 3GPP TSG SA WG3 (SECURITY) MEETING #90BIS, S3-180678, 2 March 2018 (2018-03-02), XP051409103 * |
NOKIA: "OAuth based service authorization framework for SBA", 3GPP TSG SA WG3 (SECURITY) MEETING #90BIS, S3-180680, 2 March 2018 (2018-03-02), XP051409105 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12028341B2 (en) | Network slice authentication | |
US10659952B2 (en) | Network slice selection policy updating method and apparatus | |
WO2020147760A1 (en) | Local area network communication method, device, and system | |
EP3726806B1 (en) | Method for remotely controlling vehicle on the basis of smart apparatus | |
EP3800934A1 (en) | Method for routing internet of things service | |
JP4541411B2 (en) | Integrated method and apparatus for managing mobile devices and services | |
WO2021093438A1 (en) | Network access method and communication apparatus | |
WO2019042378A1 (en) | Method and apparatus for providing user identity information, and storage medium | |
RU2473184C2 (en) | Method and device for subscriber data base | |
EP4131808A1 (en) | Method for controlling media stream service transmission, electronic device, user terminal, network node, system, and storage medium | |
US9225579B2 (en) | Renewing registrations for a plurality of client applications that are associated with the same host server via an explicit piggybacking scheme | |
US12063508B2 (en) | Methods and apparatus for device authentication and authorisation | |
WO2018112327A1 (en) | Methods of concurrency control for block transfer in coap publish-subscribe architecture | |
WO2019154017A1 (en) | Multipath establishing method and apparatus | |
KR102647498B1 (en) | Methods for transmitting a notification message for M2M system and Apparatuses thereof | |
CN110771117B (en) | Session layer communication using ID-oriented network | |
JP2024511907A (en) | Network function registration method, discovery method, equipment, device and medium | |
WO2022067831A1 (en) | Method and apparatus for establishing secure communication | |
WO2022141132A1 (en) | Resource checking method for service-based interface and related device | |
US11943684B2 (en) | Systems and methods for improved access to user data | |
WO2022110919A1 (en) | Information subscription method and apparatus | |
WO2022067509A1 (en) | Device upgrade control method and apparatus, and computer device and storage medium | |
US20080162586A1 (en) | Automatic syncml client profile creation for new servers | |
WO2021081900A1 (en) | Communication method and related apparatus | |
WO2021092765A1 (en) | Method and apparatus for accessing network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20967480 Country of ref document: EP Kind code of ref document: A1 |