WO2022247812A1 - Authentication method, communication device, and system - Google Patents

Authentication method, communication device, and system Download PDF

Info

Publication number
WO2022247812A1
WO2022247812A1 PCT/CN2022/094595 CN2022094595W WO2022247812A1 WO 2022247812 A1 WO2022247812 A1 WO 2022247812A1 CN 2022094595 W CN2022094595 W CN 2022094595W WO 2022247812 A1 WO2022247812 A1 WO 2022247812A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication
app
terminal device
request
instance
Prior art date
Application number
PCT/CN2022/094595
Other languages
French (fr)
Chinese (zh)
Inventor
胡翔
夏渊
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2022247812A1 publication Critical patent/WO2022247812A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent

Definitions

  • the present application relates to the technical field of communication, and more specifically, to an authentication method, communication device and system.
  • the application In a scenario where a terminal device accesses an application through a mobile communication network, the application usually belongs to a different system for the mobile communication network.
  • NEF network exposure function
  • This application provides an authentication method, communication device and system, which can realize the security authentication of APP instances before accessing the 5G network, ensure that the APP instances meet the security requirements for accessing the 5G network, and then incorporate them into the 5G network In the secure trust domain, the APP instance can be safely connected to the 5G network.
  • an authentication method including: a first authentication functional entity receives a first authentication request, and the first authentication request includes identification information of an application instance and first authentication information corresponding to the identification information , the APP instance is an instance of the running application APP; the first authentication functional entity authenticates the APP instance according to the identification information of the APP instance and the first authentication information; the first authentication functional entity sends a first authentication response , the first authentication response includes an authentication result for the APP instance.
  • this application can realize the security authentication of the APP instance before accessing the 5G network, ensure that the APP instance meets the security requirements for accessing the 5G network, and then incorporate it into the security trust domain of the 5G network to realize Connect it to the 5G network.
  • the identification information of the APP instance includes a device identification of the APP instance and/or a service identification of the APP instance.
  • this application authenticates the APP instances accessing the network through the core network (it can be understood that the core network includes the first authentication functional entity), and only the legitimate APP instances that pass the authentication are allowed to access the network , to provide services to end users and ensure the security of the 5G network.
  • the authenticated APP instance can also be included in the trust domain of the 5G core network, allowing terminal devices in the 5G network to perform access control and reserve Strategies such as resources and guaranteed experience.
  • the first authentication functional entity authenticates the APP instance according to the identification information of the APP instance and the first authentication information, including: determining the identity of the local and APP instance The second authentication information corresponding to the information; comparing the first authentication information with the second authentication information.
  • this application can realize that the first authentication function entity authenticates the APP instance through the identification information of the APP instance and the first authentication information corresponding to the identification information, so as to ensure that the safe APP instance can access to In the 5G network, unsafe APP instances cannot be connected to the 5G network, thereby ensuring the security of the 5G network.
  • the APP instance authentication when the first authentication information is consistent with the second authentication information, the APP instance authentication is successful; or, when the first authentication information is consistent with the second authentication information If the two authentication information comparisons are inconsistent, the APP instance authentication fails.
  • this application can realize that when the APP instance authentication fails, it means that the APP instance is not safe, and it is not allowed to provide virtual business network services to the outside, so that the security of the 5G network can be guaranteed.
  • the authentication result of the APP instance includes information indicating successful authentication of the APP instance or information indicating authentication failure of the APP instance.
  • the present application can instruct the session management function network element of the authentication result of the APP instance, thereby instructing the session management function network element to perform corresponding operations based on the authentication result, for example, if the APP instance passes the authentication, Then a session can be established for the APP instance, and if the authentication of the APP instance fails, the establishment of a session for the APP instance can be refused.
  • the receiving the first authentication request by the first authentication functional entity includes: the first authentication functional entity receives the first authentication request from the session management function network element, And the first authentication function entity sending the first authentication response includes: the first authentication function entity sends the first authentication response to the session management function network element; or, the first authentication function entity receiving the first authentication request includes: The first authentication function entity receives the first authentication request from the security anchor function entity, and the first authentication function entity sends the first authentication response includes: the first authentication function entity sends the first authentication function entity to the security anchor function entity The first authentication response.
  • the first authentication functional entity receives a second authentication request, and the second authentication request includes identification information of a terminal device accessing the APP, an application identifier of the APP, and The third authentication information corresponding to the identification information of the terminal device and the application identification of the APP; the first authentication function entity performs secondary authentication on the terminal device according to the identification information of the terminal device, the application identification of the APP and the third authentication information Authorization; the first authentication function entity sends a second authentication response, where the second authentication response includes an authentication result for the terminal device.
  • the present application can centrally perform business-level authentication and authentication procedures between the APP instance and the terminal device in the same virtual service network through the first authentication functional entity, thereby ensuring the communication between the terminal device and the APP instance.
  • the security and trustworthiness of mutual access in the 5G network is conducive to the authorized access of APP instances and terminal devices, and avoids the occurrence of fraud or attack scenarios.
  • the identification information of the terminal device includes a device identification of the terminal device and/or a service identification of the terminal device.
  • this application authenticates the terminal device through the first authentication functional entity, and only the terminal device that passes the authentication is allowed to access the APP service provided by the APP instance in the 5G network.
  • the first authentication functional entity performs secondary authentication on the terminal device according to the identification information of the terminal device, the application identifier of the APP, and the third authentication information, including : Determine local fourth authentication information corresponding to the identification information of the terminal device and the application identifier of the APP; compare the third authentication information with the fourth authentication information.
  • the present application can realize that the first authentication functional entity uses the identification information of the terminal device, the application identification of the APP, and the third authentication information corresponding to the identification information of the terminal device and the application identification of the APP to authenticate the terminal device. Authentication is performed, so as to ensure the safe access behavior between the terminal device and the APP, thereby ensuring the security of the 5G network.
  • the terminal device authentication when the third authentication information is consistent with the fourth authentication information, the authentication of the terminal device is successful; or, when the third authentication information is consistent with the fourth authentication information When the four authentication information comparisons are inconsistent, the terminal device authentication fails.
  • the present application can realize that when the authentication of the terminal equipment fails, the session management function network element can control the policy delivery of the session, for example, when the terminal equipment authentication is successful, the session management function network element can Issue policies that allow mutual visits between terminal devices and APP instances; Alternatively, a policy for denying mutual access between the terminal device and the APP instance may be issued, so that the mutual access between the terminal device and the APP instance may be rejected, thereby ensuring the security of the 5G network.
  • the authentication result of the terminal device includes information indicating successful authentication of the terminal device or information indicating authentication failure of the terminal device.
  • the present application can instruct the session management function network element of the authentication result of the terminal device, thereby instructing the session management function network element to perform corresponding operations based on the authentication result, for example, if the terminal device passes the authentication, Then a session may be established for the terminal device, and if the authentication of the terminal device fails, no session may be established for the terminal device.
  • the receiving the second authentication request by the first authentication functional entity includes: the first authentication functional entity receives the second authentication request from the session management function network element, And the first authentication function entity sending the second authentication response includes: the first authentication function entity sends the second authentication response to the session management function network element; or, the first authentication function entity receiving the second authentication request includes: The first authentication functional entity receives the second authentication request from the security anchor functional entity, and the first authentication functional entity sends the second authentication response includes: the first authentication functional entity sends the security anchor functional entity Second authentication response.
  • an authentication method including: a first authentication functional entity receives a second authentication request, and the second authentication request includes identification information of a terminal device accessing the APP, an application identification of the APP, and a connection with the terminal Third authentication information corresponding to the identification information of the device and the application identification of the APP; the first authentication functional entity performs secondary authentication on the terminal device according to the identification information of the terminal device, the application identification of the APP, and the third authentication information; The first authentication function entity sends a second authentication response, where the second authentication response includes an authentication result for the terminal device.
  • the present application can centrally perform business-level authentication and authentication procedures between the APP instance and the terminal device in the same virtual service network through the first authentication functional entity, thereby ensuring the communication between the terminal device and the APP instance.
  • the security and trustworthiness of mutual access in the 5G network is conducive to the authorized access of APP instances and terminal devices, and avoids the occurrence of fraud or attack scenarios.
  • the identification information of the terminal device includes a device identification of the terminal device and/or a service identification of the terminal device.
  • this application authenticates the terminal device through the first authentication functional entity, and only the terminal device that passes the authentication is allowed to access the APP service provided by the APP instance in the 5G network.
  • the first authentication functional entity performs secondary authentication on the terminal device according to the identification information of the terminal device, the application identifier of the APP, and the third authentication information, including : Determine local fourth authentication information corresponding to the identification information of the terminal device and the application identifier of the APP; compare the third authentication information with the fourth authentication information.
  • the present application can realize that the first authentication functional entity uses the identification information of the terminal device, the application identification of the APP, and the third authentication information corresponding to the identification information of the terminal device and the application identification of the APP to authenticate the terminal device. Authentication is performed, so as to ensure the safe access behavior between the terminal device and the APP, thereby ensuring the security of the 5G network.
  • the authentication of the terminal device when the third authentication information is consistent with the fourth authentication information, the authentication of the terminal device is successful; or, when the third authentication information is consistent with the fourth authentication information When the four authentication information comparisons are inconsistent, the terminal device authentication fails.
  • the present application can realize that when the authentication fails, the session management function network element will reject the mutual access between the terminal device and the APP, thereby ensuring the security of the 5G network.
  • the authentication result of the terminal device includes information indicating successful authentication of the terminal device or information indicating authentication failure of the terminal device.
  • the present application can instruct the session management function network element of the authentication result of the terminal device, thereby instructing the session management function network element to perform corresponding operations based on the authentication result, for example, if the terminal device passes the authentication, Then a session may be established for the terminal device, and if the authentication of the terminal device fails, no session may be established for the terminal device.
  • the receiving the second authentication request by the first authentication functional entity includes: the first authentication functional entity receives the second authentication request from the session management function network element, And the first authentication function entity sending the second authentication response includes: the first authentication function entity sends the second authentication response to the session management function network element; or, the first authentication function entity receiving the second authentication request includes: The first authentication functional entity receives the second authentication request from the security anchor functional entity, and the first authentication functional entity sends the second authentication response includes: the first authentication functional entity sends the security anchor functional entity Second authentication response.
  • an authentication method including: a session management function network element sends a first authentication request to a first authentication function entity, and the first authentication request includes the identification information of the application APP instance and the identification information correspondence The first authentication information, the APP instance is an instance of the running application APP; the session management function network element receives the first authentication response from the first authentication function entity, and the first authentication response includes the authentication result of the APP instance .
  • this application can realize the security authentication of the APP instance before accessing the 5G network, ensure that the APP instance meets the security requirements for accessing the 5G network, and then incorporate it into the security trust domain of the 5G network to realize Connect it to the 5G network.
  • the method before the session management function network element sends the first authentication request to the first authentication function entity, the method further includes: the session management function network element receives the first session An establishment request, the first session establishment request is used to request establishment of a first session between the APP instance and the core network, and the first session establishment request includes identification information of the APP instance and first authentication information.
  • this application can implement the authentication process on the APP instance before the session management function network element formally establishes a session with the APP, thereby ensuring the authenticity of the APP instance. Security, thereby maintaining the security of the 5G network.
  • the identification information of the APP instance includes a device identification of the APP instance and/or a service identification of the APP instance.
  • this application authenticates the APP instances accessing the network through the core network, and only the legitimate APP instances that pass the authentication are allowed to access the network, provide services to end users, and ensure the security of the 5G network.
  • the authenticated APP instance can be included in the trust domain of the 5G core network, allowing policies such as access control, resource reservation, and experience guarantee.
  • the authentication result of the APP instance includes information indicating successful authentication of the APP instance or information indicating authentication failure of the APP instance.
  • the present application can indicate the authentication result of the APP instance to the session management function network element, thereby instructing the session management function network element to perform corresponding operations based on the authentication result, for example, if the APP authentication passes, then A session can be established for an APP instance, and if the authentication of the APP instance fails, no session can be established for the APP instance.
  • the session management function network element when the APP instance authentication fails, rejects the establishment of the first session; or, the session management function network element rejects the connection between the terminal device and the APP instance exchange of visits.
  • this application can realize that when the APP instance authentication fails, the session management function network element refuses to establish the first session, or rejects the mutual access between the APP instance and the terminal equipment in the 5G network at the service level , so as to ensure the security of 5G network.
  • the method further includes: the session management function network element sends a second authentication request to the first authentication function entity, where the second authentication request includes the access APP The identification information of the terminal device, the application identification of the APP, and the third authentication information corresponding to the identification information of the terminal equipment and the application identification of the APP; the session management function network element receives the second authentication response from the first authentication function entity , the second authentication response includes an authentication result for the terminal device.
  • this application can centrally perform business-level authentication and authentication processes between APP instances and terminal devices in the same virtual service network through SAF, thereby ensuring mutual access between terminal devices and APP instances in 5G
  • the security and trustworthiness in the network is conducive to the authorized access of APP instances and terminal devices, and avoids the occurrence of fraud or attack scenarios.
  • the method before the session management function network element sends the second authentication request to the first authentication function entity, the method further includes: the session management function network element receives the second session The establishment request, the second session establishment message is used to request establishment of a second session between the terminal device and the first application, and the second session establishment request includes identification information of the terminal device and third authentication information.
  • this application can realize the safe mutual access behavior between the APP and the terminal device in the 5G network , so as to maintain the security of the 5G network.
  • the method before the session management function network element sends the second authentication request to the first authentication function entity, the method further includes: the The session management function network element receives a first session modification request, the first session modification request is used to request modification of the session between the terminal device and the APP, and the first session modification request includes identification information of the terminal device, The application identifier of the APP and the third authentication information.
  • the operator can authenticate the terminal device to access a specific APP instance, ensure that the terminal has the corresponding application instance access authority, enhance the security of the APP instance, and prevent illegal users from accessing the APP instance. Instance attacks and non-compliant access behaviors.
  • the APP application instances allowed to be accessed by the same terminal device after completing the secondary authentication are also in the same security field, which prevents non-compliant APP instances from providing services to end users and improves the security of end users in APP access behaviors. .
  • the method before the session management function network element sends the second authentication request to the first authentication function entity, the method further includes: the The session management functional network element receives a third authentication request from the user plane functional network element, the third authentication request is used to request authentication of the terminal device accessing the APP, and the third authentication request includes the The identification information of the terminal device, the application identification of the APP, and the third authentication information.
  • the operator can authenticate the terminal device to access a specific APP instance, ensure that the terminal has the corresponding application instance access authority, enhance the security of the APP instance, and prevent illegal users from accessing the APP instance. Instance attacks and non-compliant access behaviors.
  • the APP application instances allowed to be accessed by the same terminal device after completing the secondary authentication are also in the same security field, which prevents non-compliant APP instances from providing services to end users and improves the security of end users in APP access behaviors. .
  • the identification information of the terminal device includes a device identification of the terminal device and/or a service identification of the terminal device.
  • the application authenticates the terminal device through the core network, and only the terminal device that passes the authentication is allowed to access the APP, thereby ensuring the security of the 5G network.
  • the authentication result of the terminal device includes information indicating successful authentication of the terminal device or information indicating authentication failure of the terminal device.
  • the present application can instruct the session management function network element of the authentication result of the terminal device, thereby instructing the session management function network element to perform corresponding operations based on the authentication result, for example, if the terminal device passes the authentication, Then a session can be established for the terminal device, and if the authentication of the terminal device fails, the establishment of a session for the terminal device is refused.
  • the session management function network element when the authentication of the terminal device fails, rejects the establishment of the second session; or, the session management function network element rejects the connection between the terminal device and the APP instance exchange of visits.
  • the session management function network element rejects the establishment of the second session, or issues a policy that prohibits mutual access between the terminal device and the APP instance, or, the session management function The network element does not issue a policy that allows mutual access between the terminal device and the APP instance.
  • this application can realize that when the authentication of the terminal device fails, the network element with the session management function refuses to establish the second session, or refuses the mutual access on the service level between the terminal device and the APP instance, so as to ensure the 5G network security.
  • the method further includes: the session management function network element sends a policy update request to the policy control function network element, and the policy update request is used to request the policy control function network element to allow the terminal Service access between the device and the APP: the session management function network element receives a policy update response from the policy control function network element, and the policy update response includes information indicating that service access between the terminal device and the APP is allowed.
  • the operator can authenticate the terminal's access to a specific APP instance, ensure that the terminal has the corresponding application instance access authority, enhance the security of the APP instance, and prevent illegal users from accessing the APP instance. Attacks and non-compliant access behaviors.
  • the APP application instance that the same terminal is allowed to access after completing the secondary authentication is also in the same security field, which prevents non-compliant APP instances from providing services to end users and improves the security of end users in APP access behavior.
  • an authentication method including: a session management function network element sends a second authentication request to a first authentication functional entity, and the second authentication request includes identification information of a terminal device accessing the APP, APP The application identification of the terminal device and the third authentication information corresponding to the identification information of the terminal device and the application identification of the APP; the session management function network element receives the second authentication response from the first authentication function entity, and the second authentication response includes The authentication result of the terminal device.
  • this application can centrally perform business-level authentication and authentication processes between APP instances and terminal devices in the same virtual service network through SAF, thereby ensuring mutual access between terminal devices and APP instances in 5G
  • the security and trustworthiness in the network is conducive to the authorized access of APP instances and terminal devices, and avoids the occurrence of fraud or attack scenarios.
  • the method before the session management function network element sends the second authentication request to the first authentication function entity, the method further includes: the session management function network element receives the second session The establishment request, the second session establishment message is used to request establishment of a second session between the terminal device and the APP, and the second session establishment request includes identification information of the terminal device and third authentication information.
  • this application can realize the safe mutual access behavior between the APP and the terminal device in the 5G network , so as to maintain the security of the 5G network.
  • the method before the session management function network element sends the second authentication request to the first authentication function entity, the method further includes: the session management function network element receives the first session The modification request, the first session modification request is used to request modification of the session between the terminal device and the APP, and the first session modification request includes the identification information of the terminal device, the application identification of the APP, and the third authentication information.
  • the method before the session management function network element sends the second authentication request to the first authentication function entity, the method further includes: the session management function network element receives the request from the user plane The third authentication request of the functional network element.
  • the third authentication request is used to request the terminal device accessing the APP to be authenticated.
  • the third authentication request includes the identification information of the terminal device, the application identification of the APP, and the third authentication information .
  • the identification information of the terminal device includes a device identification of the terminal device and/or a service identification of the terminal device.
  • the application authenticates the terminal device through the core network, and only the terminal device that passes the authentication is allowed to access the APP, thereby ensuring the security of the 5G network.
  • the authentication result of the terminal device includes information indicating successful authentication of the terminal device or information indicating authentication failure of the terminal device.
  • the present application can instruct the session management function network element of the authentication result of the terminal device, thereby instructing the session management function network element to perform corresponding operations based on the authentication result, for example, if the terminal device passes the authentication, Then a session can be established for the terminal device, and if the authentication of the terminal device fails, the establishment of a session for the terminal device is refused.
  • the session management function network element when the authentication of the terminal device fails, rejects the establishment of the second session; or, the session management function network element rejects the connection between the terminal device and the APP instance exchange of visits.
  • the session management function network element rejects the establishment of the second session, or issues a policy that prohibits mutual access between the terminal device and the APP instance, or, the session management function The network element does not issue a policy that allows mutual access between the terminal device and the APP instance.
  • this application can realize that when the authentication of the terminal device fails, the network element with the session management function refuses to establish the second session, or refuses the mutual access on the service level between the terminal device and the APP instance, so as to ensure the 5G network security.
  • the method further includes: the session management function network element sends a policy update request to the policy control function network element, and the policy update request is used to request the policy control function network element to allow the terminal Service access between the device and the APP: the session management function network element receives a policy update response from the policy control function network element, and the policy update response includes information indicating that service access between the terminal device and the APP is allowed.
  • a communication device including: a transceiver unit, configured to receive a first authentication request, where the first authentication request includes identification information of an application APP instance and first authentication information corresponding to the identification information,
  • the APP instance is an instance of the running application APP;
  • the processing unit is used to authenticate the APP instance according to the identification information of the APP instance and the first authentication information;
  • the transceiver unit is also used to send the first authentication response, the first authentication
  • the authorization response includes the authentication result of the APP instance.
  • the identification information of the APP instance includes a device identification of the APP instance and/or a service identification of the APP instance.
  • the processing unit is configured to: determine the second authentication information locally corresponding to the identification information of the APP instance; compare the first authentication information and the second authentication information Compare.
  • the APP instance authentication when the first authentication information is consistent with the second authentication information, the APP instance authentication succeeds; or, when the first authentication information is consistent with the second authentication information If the two authentication information comparisons are inconsistent, the APP instance authentication fails.
  • the authentication result of the APP instance includes information indicating that the APP instance has authenticated successfully or information indicating that the APP instance has failed in authentication.
  • the first authentication functional entity receiving the first authentication request includes: the first authentication functional entity receiving the first authentication request from the session management function network element, And the first authentication function entity sending the first authentication response includes: the first authentication function entity sends the first authentication response to the session management function network element; or, the first authentication function entity receiving the first authentication request includes: The first authentication function entity receives the first authentication request from the security anchor function entity, and the first authentication function entity sends the first authentication response includes: the first authentication function entity sends the first authentication function entity to the security anchor function entity The first authentication response.
  • the apparatus is further configured to: receive a second authentication request, where the second authentication request includes the identification information of the terminal device accessing the APP, the application identifier of the APP, and Third authentication information corresponding to the identification information of the terminal device and the application identification of the APP; perform secondary authentication on the terminal device according to the identification information of the terminal device, the application identification of the APP, and the third authentication information; send the second An authentication response, where the second authentication response includes an authentication result for the terminal device.
  • the identification information of the terminal device includes a device identification of the terminal device and/or a service identification of the terminal device.
  • the processing unit is configured to: determine locally fourth authentication information corresponding to the identification information of the terminal device; Compare.
  • the authentication of the terminal device when the third authentication information is consistent with the fourth authentication information, the authentication of the terminal device is successful; or, when the third authentication information is consistent with the fourth authentication information When the four authentication information comparisons are inconsistent, the terminal device authentication fails.
  • the authentication result of the terminal device includes information indicating successful authentication of the terminal device or information indicating failed authentication of the terminal device.
  • the receiving the second authentication request by the first authentication functional entity includes: the first authentication functional entity receives the second authentication request from the session management function network element, And the first authentication function entity sending the second authentication response includes: the first authentication function entity sends the second authentication response to the session management function network element; or, the first authentication function entity receiving the second authentication request includes: The first authentication functional entity receives the second authentication request from the security anchor functional entity, and the first authentication functional entity sends the second authentication response includes: the first authentication functional entity sends the security anchor functional entity Second authentication response.
  • a communication device including: a transceiver unit, configured to receive a second authentication request, the second authentication request including identification information of a terminal device accessing an APP, an application identifier of the APP, and a connection with the terminal device The third authentication information corresponding to the identification information of the APP and the application identification of the APP; the processing unit is used to perform secondary authentication on the terminal equipment according to the identification information of the terminal equipment, the application identification of the APP and the third authentication information; The unit is further configured to send a second authentication response, where the second authentication response includes an authentication result for the terminal device.
  • the identification information of the terminal device includes a device identification of the terminal device and/or a service identification of the terminal device.
  • the processing unit is configured to: determine locally fourth authentication information corresponding to the identification information of the terminal device; Compare.
  • the authentication of the terminal device when the third authentication information is consistent with the fourth authentication information, the authentication of the terminal device is successful; or, when the third authentication information is consistent with the fourth authentication information When the four authentication information comparisons are inconsistent, the terminal device authentication fails.
  • the authentication result of the terminal device includes information indicating successful authentication of the terminal device or information indicating failed authentication of the terminal device.
  • the receiving the second authentication request by the first authentication functional entity includes: the first authentication functional entity receives the second authentication request from the session management function network element, And the first authentication function entity sending the second authentication response includes: the first authentication function entity sends the second authentication response to the session management function network element; or, the first authentication function entity receiving the second authentication request includes: The first authentication functional entity receives the second authentication request from the security anchor functional entity, and the first authentication functional entity sends the second authentication response includes: the first authentication functional entity sends the security anchor functional entity Second authentication response.
  • a communication device including: a transceiver unit, configured to send a first authentication request to a first authentication functional entity, where the first authentication request includes identification information of an application APP instance and the identification information corresponds to The first authentication information, the APP instance is an instance of the running application APP; the transceiver unit is also used to receive the first authentication response from the first authentication functional entity, the first authentication response includes the authentication of the APP instance right result.
  • the transceiving unit is further configured to: receive a first session establishment request, where the first session establishment request is used to request establishment of a first session between the APP instance and the core network,
  • the first session establishment request includes identification information of the APP instance and first authentication information.
  • the identification information of the APP instance includes a device identification of the APP instance and/or a service identification of the APP instance.
  • the authentication result of the APP instance includes information indicating that the APP instance authentication is successful or information indicating that the APP instance authentication fails.
  • the session management function network element when the APP instance authentication fails, the session management function network element refuses to establish the first session; or, the session management function network element rejects the connection between the terminal device and the APP instance exchange of visits.
  • the transceiver unit is further configured to: send a second authentication request to the first authentication functional entity, where the second authentication request includes the ID of the terminal device accessing the APP. Identification information, the application identification of the APP, and third authentication information corresponding to the identification information of the terminal device and the application identification of the APP; receiving a second authentication response from the first authentication functional entity, the second authentication response includes The authentication result of the terminal device.
  • the transceiver unit is further configured to: receive a second session establishment request, where the second session establishment message is used to request establishment of a second session between the terminal device and the first application
  • the second session establishment request includes the identification information of the terminal device, the application identification of the APP, and third authentication information corresponding to the identification information of the terminal device and the application identification of the APP.
  • the transceiver unit is further configured to: receive a first session modification request, the first session modification request is used to request modification of the session between the terminal device and the APP, the first session modification The request includes identification information of the terminal device, application identification of the APP, and third authentication information.
  • the transceiver unit is further configured to: receive a third authentication request from a functional network element of the user plane, and the third authentication request is used to request a terminal that accesses the APP
  • the device performs authentication, and the third authentication request includes the identification information of the terminal device, the application identification of the APP, and the third authentication information.
  • the identification information of the terminal device includes a device identification of the terminal device and/or a service identification of the terminal device.
  • the authentication result of the terminal device includes information indicating successful authentication of the terminal device or information indicating failed authentication of the terminal device.
  • the network element with the session management function when the authentication of the terminal device fails, the network element with the session management function refuses to establish the second session; or, the network element with the session management function rejects the connection between the terminal device and the APP instance exchange of visits.
  • the session management function network element rejects the establishment of the second session, or issues a policy that prohibits mutual access between the terminal device and the APP instance, or, the session management function The network element does not issue a policy that allows mutual access between the terminal device and the APP instance.
  • the transceiver unit is further configured to: send a policy update request to the policy control function network element, where the policy update request is used to request the policy control function network element to allow the terminal device to communicate with the Service access between APPs: receiving a policy update response from the policy control function network element, where the policy update response includes information indicating that service access between the terminal device and the APP is allowed.
  • a communication device including: a transceiver unit, configured to send a second authentication request to a first authentication functional entity, where the second authentication request includes identification information of a terminal device accessing an APP, an APP's The application identification and the third authentication information corresponding to the identification information of the terminal device and the application identification of the APP; the transceiver unit is also used to receive a second authentication response from the first authentication functional entity, and the second authentication response Including the authentication result of the terminal device.
  • the transceiving unit is further configured to: receive a second session establishment request, where the second session establishment message is used to request establishment of a second session between the terminal device and the first application
  • the second session establishment request includes the identification information of the terminal device, the application identification of the APP, and third authentication information corresponding to the identification information of the terminal device and the application identification of the APP.
  • the transceiver unit is further configured to: receive a first session modification request, the first session modification request is used to request modification of the session between the terminal device and the APP, the first session modification The request includes identification information of the terminal device, application identification of the APP, and third authentication information.
  • the transceiving unit is further configured to: receive a third authentication request from a functional network element of the user plane, and the third authentication request is used to request the terminal accessing the APP
  • the device performs authentication, and the third authentication request includes the identification information of the terminal device, the application identification of the APP, and the third authentication information.
  • the identification information of the terminal device includes a device identification of the terminal device and/or a service identification of the terminal device.
  • the authentication result of the terminal device includes information indicating successful authentication of the terminal device or information indicating authentication failure of the terminal device.
  • the network element with the session management function when the authentication of the terminal device fails, the network element with the session management function refuses to establish the second session; or, the network element with the session management function rejects the connection between the terminal device and the APP instance exchange of visits.
  • the session management function network element rejects the establishment of the second session, or issues a policy that prohibits mutual access between the terminal device and the APP instance, or, the session management function The network element does not issue a policy that allows mutual access between the terminal device and the APP instance.
  • the transceiver unit is further configured to: send a policy update request to the network element with the policy control function, where the policy update request is used to request the network element with the policy control function to allow the terminal device to communicate with the Service access between APPs: receiving a policy update response from the policy control function network element, where the policy update response includes information indicating that service access between the terminal device and the APP is allowed.
  • a communication device including at least one processor, and the at least one processor is used to execute a computer program stored in a memory, so that the device realizes any possibility of the first aspect and the first aspect Implement the method described in any one of the manners.
  • a communication device including at least one processor, and the at least one processor is used to execute a computer program stored in a memory, so that the device realizes any possibility of the second aspect and the second aspect Implement the method described in any one of the manners.
  • a communication device including at least one processor, and the at least one processor is used to execute a computer program stored in a memory, so that the device implements any one of the third aspect and the third aspect.
  • a communication device including at least one processor, and the at least one processor is used to execute a computer program stored in a memory, so that the device implements any one of the fourth aspect and the fourth aspect.
  • a communication system including: a first authentication functional entity and a session management functional network element, where the first authentication functional entity performs the first aspect and any possible implementation manner of the first aspect
  • a communication system including: a first authentication functional entity and a session management functional network element, where the first authentication functional entity performs the second aspect and any possible implementation manner of the second aspect
  • a computer-readable storage medium storing a computer program or instruction, and the computer program or instruction is used to implement the method described in the first aspect and any possible implementation manner of the first aspect.
  • a computer-readable storage medium storing a computer program or instruction, and the computer program or instruction is used to implement the second aspect and the method described in any possible implementation manner of the second aspect.
  • a computer-readable storage medium storing a computer program or instruction, and the computer program or instruction is used to implement the method described in the third aspect and any possible implementation manner of the third aspect.
  • a computer-readable storage medium storing a computer program or instruction, and the computer program or instruction is used to implement the fourth aspect and the method described in any possible implementation manner of the fourth aspect.
  • a computer program product is provided.
  • the computer program product is run on a computer, the computer is made to execute the method described in the first aspect and any possible implementation manner of the first aspect.
  • a computer program product is provided.
  • the computer program product runs on a computer, the computer executes the method described in the second aspect and any possible implementation manner of the second aspect.
  • a computer program product is provided, and when the computer program product is run on a computer, the computer is made to execute the third aspect and the method described in any possible implementation manner of the third aspect .
  • a computer program product is provided, and when the computer program product is run on a computer, the computer is made to execute the method described in the fourth aspect and any possible implementation manner of the fourth aspect .
  • FIG. 1 is a schematic diagram of the architecture of a communication system.
  • Fig. 2 is a schematic diagram of deployment of an APP instance access module.
  • Fig. 3 is a schematic diagram of the application of a communication system in a 5G network.
  • Fig. 4 is a schematic flowchart of an authentication method provided by the present application.
  • Fig. 5 is a schematic flowchart of another authentication method provided by the present application.
  • Fig. 6 shows a schematic diagram of an authentication method applicable to this application.
  • Fig. 7 shows a schematic diagram of another authentication method applicable to the present application.
  • Fig. 8 shows a schematic diagram of another authentication method applicable to the present application.
  • Fig. 9 is a schematic block diagram of a communication device provided by the present application.
  • Fig. 10 is a schematic block diagram of another communication device provided by the present application.
  • GSM global system of mobile communication
  • CDMA code division multiple access
  • WCDMA broadband code division multiple access
  • general packet radio service general packet radio service, GPRS
  • long term evolution long term evolution
  • LTE long term evolution
  • LTE frequency division duplex frequency division duplex
  • FDD frequency division duplex
  • UMTS Universal Mobile Telecommunications System
  • WiMAX Worldwide Interoperability for Microwave Access
  • 5G Fifth Generation
  • NR new radio
  • the terminal equipment in the embodiment of the present application may refer to user equipment, access terminal, subscriber unit, subscriber station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent, or user device.
  • the terminal device may also be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a Functional handheld devices, computing devices or other processing devices connected to wireless modems, vehicle-mounted devices, wearable devices, terminal devices in 5G networks or terminal devices in public land mobile network (PLMN), etc.,
  • SIP session initiation protocol
  • WLL wireless local loop
  • PDA personal digital assistant
  • Functional handheld devices computing devices or other processing devices connected to wireless modems, vehicle-mounted devices, wearable devices, terminal devices in 5G networks or terminal devices in public land mobile network (PLMN), etc.
  • the network device in the embodiment of the present application may be a device for communicating with a terminal device, and the network device may be a base station (base transceiver station, BTS) in a GSM system or a CDMA system, or a base station (nodeB) in a WCDMA system.
  • BTS base transceiver station
  • CDMA Code Division Multiple Access
  • NodeB base station
  • NB can also be an evolved base station (evolutional nodeB, eNB or eNodeB) in an LTE system, or a wireless controller in a cloud radio access network (cloud radio access network, CRAN) scenario, or the network device It may be a relay station, an access point, a vehicle-mounted device, a wearable device, a network device in a 5G network, or a network device in a PLMN network, etc., which is not limited in this embodiment of the present application.
  • evolutional nodeB, eNB or eNodeB in an LTE system
  • a wireless controller in a cloud radio access network (cloud radio access network, CRAN) scenario
  • the network device It may be a relay station, an access point, a vehicle-mounted device, a wearable device, a network device in a 5G network, or a network device in a PLMN network, etc., which is not limited in this embodiment of the present application.
  • APP in this application refers to a certain type of application service that can provide a certain type of application service, for example, a certain type of application service that provides Internet services.
  • the APP may be Taobao, which is used to provide Internet services for online shopping; or, the APP may be Tencent Video, which is used to provide Internet services for watching videos online, and so on.
  • the APP instance in this application refers to the instance running the APP.
  • the corresponding APP instance refers to the instance running Taobao; or, when the APP is Tencent Video, the corresponding APP instance refers to the instance running Tencent Video.
  • the network element or entity corresponding to the APP instance may be, for example, an application as user equipment function (APP as user equipment function, AUEF).
  • APP user equipment function
  • AUEF user equipment function
  • each APP can deploy multiple APP instances to jointly provide services, that is, one APP can correspond to multiple APP instances.
  • the APP instance usually runs in the application server, which is described in a unified manner here, and will not be described in detail below.
  • anchor user plane function user plane function
  • intermediate UPF intermediate UPF
  • the anchor UPF may be a protocol data unit (protocol data unit, PDU) session anchor (PDU session anchor, PSA)-UPF.
  • PDU protocol data unit
  • PSA protocol data unit
  • the anchor point UPF of the entire session will not change, and the anchor point UPF is responsible for issuing the downlink routing policy of the terminal device Internet protocol (internet protocol, IP), and the message sent to the terminal device will be Based on the downlink routing policy, it is forwarded to the anchor UPF for processing.
  • IP Internet protocol
  • the I-UPF is located between a radio access network (radio access network, RAN) device and an anchor UPF, and will switch continuously as the terminal device moves.
  • RAN radio access network
  • the primary tasks of the network include: authentication and authentication of terminal devices accessing the network. Only after passing the authentication and authentication, a terminal network can access the mobile communication network, and further request to establish a session to access services on the data network.
  • the secondary authentication refers to the authentication performed by the terminal device before accessing the specific APP instance after completing the network access authentication, and is allowed to access the specific APP instance after the authentication is passed, thereby further improving the security of the system.
  • service authentication function service authentication function, SAF:
  • the SAF can be used as an authorization functional entity in the self-organizing network to implement authentication processing of APP instances accessing the network, terminal devices accessing APPs, and other processes.
  • the ad hoc network refers to a mutually accessible data network defined by an operator, a terminal device, or a user and composed of one or more terminal device users and one or more APP instances.
  • FIG 1 is a schematic diagram of a communication system architecture.
  • An authentication method provided by this application can be used in this network architecture, and of course it can also be used in future network architectures, such as the sixth generation (6th generation, 6G) network Architecture, etc., which are not specifically limited in this application.
  • 6G sixth generation
  • the communication system 100 includes a session management function network element 101 and a first authentication function entity 102 .
  • the communication system 100 further includes an APP instance access module 103 .
  • any two of the session management functional entity 101, the first authentication functional entity 102, or the APP instance access module 103 can communicate directly, or communicate through forwarding by other devices, and this application does not make specific details on this limited.
  • the session management function network element 101 is configured to receive a first connection request from the APP instance access module 103, where the first connection request includes identification information of the APP instance and first authentication information (authentication information) corresponding to the identification information, or is the first authentication information, which is not limited in this application.
  • the session management function network element 101 is further configured to send a first authentication request to the first authentication function entity 102, the first authentication request is used to request the first authentication function entity 102 to authenticate the APP instance, and the first authentication function entity 102
  • the authorization request includes identification information of the APP instance and first authentication information corresponding to the identification information.
  • the first authentication function entity 102 is configured to receive the first authentication request from the session management function network element 101, and send a first authentication response to the session management function network element 101, the first authentication response includes the APP instance Authentication result.
  • the session management functional entity and the first authentication functional entity in the mobile communication network establish a connection between the APP instance and the mobile communication network for the APP instance for authentication. That is to say, this solution can use the APP instance as a special terminal device to access the mobile communication network.
  • an APP instance is a specific running instance of an application, based on this solution, the flexibility of data interaction between the application and the mobile communication network can be improved.
  • applications can be incorporated into mobile communication network planning to implement plug-and-play applications in mobile communication systems, thereby realizing dynamic arrangement and path optimization of application services. This is conducive to realizing a new business deployment and cooperation mode between operators and application service providers.
  • the APP instance access module 103 is used to assist the APP instance to access the mobile communication network.
  • the APP instance access module 103 in this application may be integrated in an APP instance, and the APP instance may run in an application server.
  • the application server shown in Figure 2 may also include other APP instances.
  • This application only uses the APP instance on the application server as an example for illustration, but there is no specific limitation on whether the application server also runs other APP instances. .
  • the communication system 100 shown in FIG. 1 may be applied to a current 4G network, a 5G network or other networks in the future, which is not specifically limited in this application.
  • the network element or entity corresponding to the session management function entity 101 in the communication system 100 shown in FIG. 1 may be It is a session management function network element (session management function, SMF) in the 5G network architecture, and the network element or entity corresponding to the first authentication function entity 102 may be an authentication network function (authentication server function, AUSF) in the 5G network architecture. ) or SAF, or other network elements or entities that complete the function of the first authentication function entity, wherein, if the first authentication function entity is AUSF, the existing functions of AUSF can be extended to complete the The role of the first authentication functional entity.
  • SMF session management function network element
  • AUSF authentication server function
  • the network element or entity corresponding to the APP instance access module 103 shown in FIG. 1 may be an application as user equipment function (APP as user equipment function, AUEF). As shown in Figure 2, the AUEF can be deployed in the APP instance in the application server.
  • APP user equipment function
  • AUEF user equipment function
  • AUEF may also have other deployment methods, such as deploying on other existing functions or devices or platforms, or deploying on other newly added functions or devices or platforms, etc., which is not specifically limited in this application.
  • the current 5G network can also include access and mobility management function (AMF), capability exposure function (network exposure function, NEF), network function storage function (network exposure function repository function, NRF), unified data management (unified data management, UDM), radio access network (radio access network, RAN), policy control function (policy control function, PCF), user equipment (user equipment, UE), policy Control function (policy control function, PCF) and other user plane functions (user plane function, UPF) (such as the first anchor UPF and I-UPF corresponding to the terminal device in Figure 3), the embodiment of the present application does not specifically limit this .
  • the current 5G network may also include an AUSF and a network slice selection function (network slice selection function, NSSF) and the like.
  • each network element the main functions of each network element are described as follows:
  • UE can be called terminal equipment, access terminal, subscriber unit, subscriber station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent or user device.
  • a terminal device may be a device that provides voice/data connectivity to users, for example, a handheld device with a wireless connection function, a vehicle-mounted device, and the like.
  • examples of some terminals can be: mobile phone (mobile phone), tablet computer (pad), computer with wireless transceiver function (such as notebook computer, palmtop computer, etc.), mobile internet device (mobile internet device, MID), virtual reality (virtual reality, VR) equipment, augmented reality (augmented reality, AR) equipment, wireless terminals in industrial control (industrial control), wireless terminals in self driving (self driving), wireless in remote medical (remote medical) Terminals, wireless terminals in smart grid, wireless terminals in transportation safety, wireless terminals in smart city, wireless terminals in smart home, cellular phones, cordless Phone, SIP phone, WLL station, PDA, handheld device with wireless communication function, computing device or other processing device connected to a wireless modem, vehicle-mounted device, wearable device, terminal device in 5G network or terminal device in PLMN, etc. .
  • the terminal device may also be a terminal device in an Internet of Things (internet of things, IoT) system.
  • IoT Internet of Things
  • Its main technical feature is to connect objects to the network through communication technology, so as to realize the intelligent network of human-machine interconnection and object interconnection.
  • IoT technology can achieve massive connections, deep coverage, and terminal power saving through, for example, narrow band NB technology.
  • terminal equipment can also include sensors such as smart printers, train detectors, and gas stations.
  • the main functions include collecting data (partial terminal equipment), receiving control information and downlink data from network equipment, and sending electromagnetic waves to transmit uplink data to network equipment. .
  • the terminal device may be any device that can access the network.
  • a certain air interface technology may be used to communicate with each other between the terminal device and the access network device.
  • the service authentication agent (service authentication agent, SAA) can be used as a software function module on the UE, and the UE calls this module to implement the UE's secondary authentication process before accessing each APP instance.
  • some APP instances can integrate a specific SAA to complete the secondary authentication process for the UE to access the APP instance.
  • R wireless access network
  • the RAN equipment in this application includes but is not limited to: next-generation base station (gnodeB, gNB), evolved node B (evolved node B, eNB), radio network controller (radio network controller, RNC), node B ( node B, NB), base station controller (base station controller, BSC), base transceiver station (base transceiver station, BTS), home base station (for example, home evolved nodeB, or home node B, HNB), base band unit (base band unit, BBU), transmission point (transmitting and receiving point, TRP), transmission point (transmitting point, TP), mobile switching center, etc.
  • gnodeB next-generation base station
  • gNB next-generation base station
  • eNB evolved node B
  • eNB radio network controller
  • RNC radio network controller
  • node B node B
  • base station controller base station controller
  • BTS base transceiver station
  • home base station for example, home evolved nodeB, or home node
  • UDM It can be understood as the naming of unified data management network elements in the 5G architecture.
  • the unified data management network element mainly includes the following functions: unified data management, support for authentication credential processing in the 3GPP authentication and key agreement mechanism, user identity processing, access authorization, registration and mobility management, subscription management, SMS management, etc.
  • UDR It can be understood as the naming of unified data storage network elements in the 5G architecture.
  • the unified data storage network element mainly includes the following functions: the access function of contract data, policy data, application data and other types of data.
  • PCF It can be understood as the naming of policy control function network elements in the 5G architecture.
  • the policy control function network element is mainly responsible for policy control functions such as charging for sessions and service flow levels, quality of service (quality of service, QoS) bandwidth guarantee, mobility management, and UE policy decision-making.
  • the PCFs connected by AMF and SMF are access and mobility control PCF (PCF for access and mobility control, AM PCF) and SM PCF respectively.
  • PCF access and mobility control
  • AM PCF access and mobility control
  • SM PCF SM PCF respectively.
  • AM PCF and SM PCF may not be the same PCF entity.
  • SMF It can be understood as the naming of session management function network elements in the 5G architecture.
  • the session management function network element mainly performs functions such as session management, execution of control policies issued by the PCF, selection of UPF, and allocation of UE IP addresses.
  • the SMF can also be integrated with a security anchor function (security anchor function, SEAF) module, and the SEAF module is mainly responsible for initiating an authentication request.
  • SEAF security anchor function
  • SEAF security anchor function
  • AMF It can be understood as the naming of mobility management network elements in the 5G architecture.
  • the mobility management network element mainly includes the following functions: connection management, mobility management, registration management, access authentication and authorization, reachability management, security context management and other functions related to access and mobility.
  • UPF It can be understood as the naming of user plane functional network elements in the 5G architecture.
  • the user plane function network element mainly includes the following functions: data packet routing and transmission, packet detection, service usage reporting, QoS processing, legal interception, uplink packet detection, downlink data packet storage and other user plane related functions.
  • AUSF mainly used for user authentication, etc.
  • NEF It is mainly used to support the opening of capabilities and events, such as safely opening services and capabilities provided by 3GPP network functions to the outside.
  • the terminal device accesses the 5G network through the RAN device.
  • the terminal device communicates with the AMF through the N1 interface (N1 for short).
  • the RAN device communicates with the AMF through an N2 interface (N2 for short).
  • the RAN device communicates with the I-UPF through an N3 interface (N3 for short).
  • the I-UPF communicates with the second anchor point UPF through the N9 interface (N9 for short).
  • the second anchor UPF communicates with the first anchor UPF through an N19 interface (N19 for short).
  • the SMF network element communicates with the I-UPF, the second anchor UPF and the first anchor UPF respectively through the N4 interface (N4 for short).
  • the SMF network element communicates with the AUEF through the Nx interface (Nx for short).
  • the first anchor UPF communicates with the AUEF through an Nd interface (Nd for short).
  • control plane functions such as AMF, SMF, NEF, NRF, PCF, or UDM shown in FIG. 3 may also use service interfaces for interaction.
  • the service interface provided by AMF may be Namf.
  • the service interface provided by the SMF may be Nsmf.
  • the service interface provided by NEF can be Nnef.
  • the service interface provided by the NRF may be Nnrf.
  • the service interface provided by the PCF may be Npcf.
  • the service interface provided by UDM can be Nudm.
  • the access network device, session management function network element, policy control network element, or application function network element in this application may also be referred to as a communication device or a communication device, which may be a general-purpose device or a dedicated device. This application does not specifically limit it.
  • the relevant functions of the session management functional entity, the first authentication functional entity, or the APP instance access module in this application can be implemented by one device, or jointly implemented by multiple devices, or can be implemented by a device implemented by one or more functional modules, which is not specifically limited in the present application.
  • the above functions can be network elements in hardware devices, software functions running on dedicated hardware, or a combination of hardware and software, or instantiated on a platform (for example, a cloud platform) virtualization capabilities.
  • each network element such as PCF, AMF, etc.
  • the above-mentioned network elements may also have other names, which are not specifically limited in this application.
  • some or all of the above-mentioned network elements may use the terms in 5G, or may be named by other names, etc., which will be described in a unified manner here, and will not be described in detail below.
  • the interaction between the network elements shown in FIG. 3 is only an exemplary description.
  • the 5G system may also include other network elements that interact with the network elements shown in the figure, which are not described here. repeat.
  • AF can use NEF in the core network to authenticate AF as an APP application service to use some network functions.
  • NEF the key network cannot be completely opened to AF. and user sensitive information, which will affect the implementation of access control, optimization guarantee, and security interaction strategies between terminal devices and APP instances in the 5G network, which is not conducive to APP's use of the 5G network to better serve users.
  • this application proposes an authentication method, which can realize the security authentication of the APP instance before accessing the 5G network, ensure that the APP instance meets the security requirements for accessing the 5G network, and then incorporate it into the 5G network in the security trust domain.
  • FIG. 4 shows an authentication method provided by the present application, which is used for network access authentication when an APP instance accesses the network, that is, one-time authentication.
  • the method mainly includes the following steps S401-S403.
  • the APP instance access module sends a first session establishment request to a session management function network element, where the first session establishment request includes identification information of the APP instance and first authentication information corresponding to the identification information of the APP instance.
  • the APP instance when an APP instance accesses the network or performs authentication, the APP instance can be used as a special terminal device to send a session establishment request to the session management function network element, and the session establishment request includes the identification information of the APP instance and the APP instance The first authentication information corresponding to the identification information.
  • the first authentication information may be a first authorization code corresponding to the identification information of the APP instance, which is specifically used when the first authentication functional entity authenticates or authenticates the APP instance.
  • the first authentication function entity is assisted in authenticating the APP instance.
  • the ID information of the APP instance may include a device ID of the APP instance and/or a service ID of the APP instance.
  • the device identifier is used to identify information such as the ownership, location, and type of the APP instance.
  • the device identifier of the APP instance can be used to uniquely determine an APP instance, such as the location information of the APP instance.
  • the service identifier is used to identify the identity authentication information of the service provided by the APP instance, such as APP name, identity (identifier, ID) or domain name (domain).
  • the location information of the APP instance may be the home public land mobile network (home public land mobile network, HPLMN) to which the APP instance subscribes; or, the location information of the APP instance may be the area of the tracking area served by the APP instance ID; or, the location information of the APP instance may be the cell ID of the cell served by the APP instance, etc.
  • HPLMN home public land mobile network
  • the service identifier of an APP instance is used to identify the identity authentication information of the APP instance's business to provide external services, and can uniquely determine an APP.
  • the service identifier of an APP instance can be the application name or application domain name information.
  • the device identifier of the APP instance may be an APP instance equipment permanent identifier (AIP instance equipment permanent identifier, AIEPI) or an APP instance equipment concealed identifier (APP instance equipment concealed identifier, AIECI).
  • AIP instance equipment permanent identifier AIEPI
  • AIECI APP instance equipment concealed identifier
  • the service identifier of the APP instance may be an APP instance service permanent identifier (AIEPI) or an APP instance service concealed identifier (APP instance service concealed identifier, AIECI).
  • AIEPI APP instance service permanent identifier
  • AIECI APP instance service concealed identifier
  • a hidden ID corresponding to a permanent ID can be generated by means of encryption or Hash for transmission.
  • first session establishment request may be used to establish a first session for the APP instance and the core network, so that the APP instance may subsequently perform data communication with other devices through the first session.
  • the first session here may be a packet data network (packet data network, PDN) connection in 4G or a PDU session in 5G, and may also be other connections in other networks in the future, which will be uniformly described here, and will not be described below Let me repeat.
  • PDN packet data network
  • the session management functional network element sends a first authentication request to the first authentication functional entity, for requesting the first authentication functional entity to authenticate the APP instance.
  • the first authentication request includes the identification information of the APP instance and the APP instance.
  • the first authentication information corresponding to the identification information.
  • the session management function network element may be an SMF network element in the 5G system.
  • the session management function network element is specifically the SMF including the SEAF function.
  • the SMF and the SEAF are different modules or functional entities, that is, the SEAF is not on the SMF, the SMF sends the first session establishment request to the SEAF, and then the SEAF sends the first authentication request to the first authentication functional entity.
  • the first authentication functional entity may be a newly added network element SAF of the core network, or an extended AUSF network element having the function of the first authentication functional entity, that is, the first authentication functional entity may be an existing network element, It may also be a newly added network element, and this application does not limit the network element corresponding to the first authentication functional entity.
  • the first authentication function entity authenticates the APP instance according to the identification information of the APP instance and the first authentication information corresponding to the identification information of the APP instance, and sends a first authentication response to the session management function network element, the first authentication response
  • An authentication response includes the authentication result for the APP instance.
  • the first authentication function entity authenticates the APP instance according to the identification information of the APP instance and the first authentication information.
  • the first authentication functional entity determines locally the second authentication information corresponding to the identification information, for example, the second authentication information may also be an authorization code; the first authentication functional entity The authentication information is compared with the second authentication information. If the first authentication information is consistent with the second authentication information, the APP instance authentication is successful. Conversely, if the first authentication information is compared with the second authentication information If they are inconsistent, the APP instance authentication fails.
  • the first authentication functional entity may determine whether the identification information of the APP instance exists in the authorization database of the core network, and if so, verify whether the first authentication information corresponding to the identification information of the APP instance is correct, and if it is correct, Then the APP instance authentication passes, so that when the APP instance authentication fails, the APP instance is not safe, and the 5G network does not allow it to provide services, thereby ensuring the security of the 5G network.
  • the authentication result of the APP instance may include information indicating the successful authentication of the APP instance or information indicating that the authentication of the APP instance failed, so as to indicate the authentication result of the APP instance to the session management function network element, thereby indicating the session
  • the management network element performs corresponding operations based on the authentication result. For example, if the APP authentication passes, a session can be established for the APP instance; if the APP instance fails authentication, a session cannot be established for the APP instance.
  • the session management function network element receives the first authentication response indicating that the APP instance is authenticated, and then selects a user plane functional entity to establish the first session for the APP instance.
  • the session management function network element receives the first authentication response indicating that the APP instance authentication result is failed, and sends a first session establishment failure message to the APP instance access module.
  • the session management function network element refuses to establish the first session for the APP instance, or, the session management function network element rejects the connection between the APP instance and the terminal device in the 5G network.
  • the UE wants to access the data network provided by the APP, such as the APP, in addition to the network access authentication, a second authentication is still required.
  • the APP instance After the APP instance completes the authentication process for accessing the 5G network, when the UE accesses the APP, the APP instance may provide services to the UE after identity verification is completed.
  • the first authentication function entity may receive the first authentication request from the session management function network element, or may receive the first authentication request from the SEAF, depending on the session management function network element. Whether the element integrates the SEAF module. If the session management function network element integrates the SEAF module, the first authentication function entity receives the first authentication request from the session management function network element, and sends a first authentication response to the session management function network element; if the If the session management functional network element does not integrate the SEAF module, the first authentication functional entity receives the first authentication request from the SEAF, and sends the first authentication request to the SEAF.
  • the session management function network element integrates the SEAF module
  • the first authentication request sent by the session management function network element to the first authentication function entity may also carry a virtual service network identifier, which is a virtual service network planned and allocated by the operator.
  • the unique identifier of the network is a virtual service network planned and allocated by the operator.
  • the virtual service network includes APP instances that can provide services externally, end users who can access APP instances, and user parameters that divide the virtual service network, such as: subscription information, location information, slices, DNN, applications, etc.
  • this application authenticates the APP instances that access the network through the first authentication functional entity, and only legal instances that pass the authentication are allowed to access the network, provide services to end users, and ensure the security of the 5G network.
  • the authenticated APP instance can also be included in the trust domain of the 5G core network, allowing policies such as access control, resource reservation, and experience guarantee.
  • the present application provides another authentication method, which is used to perform secondary authentication when the UE accesses a specific APP instance.
  • the method mainly includes the following steps S501-S502.
  • the session management functional network element sends a second authentication request to the first authentication functional entity, where the second authentication request is used to request the first authentication functional entity to perform a second authentication on the terminal device accessing the APP.
  • the authentication request includes the identification information of the terminal device, the application identification of the APP, and third authentication information corresponding to the identification information of the terminal device and the application identification of the APP.
  • the third authentication information may be a third authorization code corresponding to the identification information of the terminal device and the application identification of the APP, which is specifically used when the first authentication functional entity authenticates the terminal device.
  • the functional entity compares the third authorization code with the locally generated fourth authentication information corresponding to the identification information of the terminal device and the application identification of the APP, or the fourth authorization code, thereby assisting the first authentication functional entity Authenticate the terminal device.
  • the application identifier of the APP may be an APP name, or an APP identity identifier, which is specifically used to identify the type or identity of the APP.
  • the first authentication function entity can determine which APPs the terminal device can access based on the identification information of the terminal device, and determine which APPs the terminal device can access by using the application identifier of the APP. Whether the APP is included in the APP, if it can be found, the first authentication functional entity compares the third authentication information with the fourth authentication information. If the comparison is consistent, the authentication of the terminal device passes. If the comparison is inconsistent, the authentication of the terminal device fails, and the APP cannot be accessed. However, this application does not limit whether the terminal device can access other APPs except the APP. . If it cannot be queried, the authentication failure indication information will be returned by default.
  • the first authentication function entity first queries the subscribed terminal device that the APP can provide services, and uses the identification information of the terminal device to determine whether the terminal device belongs to the terminal device that can access the APP. If it can be found, then The first authentication function entity compares the third authentication information with the fourth authentication information. If the comparison is consistent, the authentication of the terminal device passes. If the comparison is inconsistent, the authentication of the terminal device fails, and the APP cannot be accessed. However, this application does not limit whether the terminal device can access other APPs except the APP. . If no query is found, the authentication failure indication information will be returned by default.
  • the session management function network element before the session management function network element sends the second authentication request to the first authentication function entity, the session management function network element receives the first session modification request, and the first session modification request is used to request modification of the terminal device and APP session, the first session modification request includes the identification information of the terminal device, the application identification of the APP, and the third authentication information.
  • the operator can authenticate the terminal's access to a specific APP instance, ensure that the terminal has the corresponding application instance access authority, enhance the security of the APP instance, and prevent illegal users from accessing the APP instance. Attacks and non-compliant access behaviors.
  • the APP application instance that the same terminal is allowed to access after completing the secondary authentication is also in the same security field, which prevents non-compliant APP instances from providing services to end users and improves the security of end users in APP access behavior.
  • the session management functional network element receives a third authentication request from the user plane functional network element, and the third authentication request uses
  • the third authentication request includes identification information of the terminal device, an application identification of the APP, and third authentication information.
  • the operator can authenticate the terminal's access to a specific APP instance, ensure that the terminal has the corresponding application instance access authority, enhance the security of the APP instance, and prevent illegal users from accessing the APP instance. Attacks and non-compliant access behaviors.
  • the APP application instance that the same terminal is allowed to access after completing the secondary authentication is also in the same security field, which prevents non-compliant APP instances from providing services to end users and improves the security of end users in APP access behavior.
  • the terminal device can pass through the data plane, that is, it can send the identification information of the terminal device, the application identifier of the APP, and the connection with the terminal device to the functional network element of the user plane.
  • the identification information and the third authentication information corresponding to the application identification of the APP are transferred from the user plane functional network element to the session management functional network element.
  • the terminal device may directly send the secondary authentication request to the session management function network element, and may not The foregoing is first sent to the user plane functional network element and then forwarded to the session management functional network element by the user plane functional network element.
  • the secondary authentication request initiated by the terminal device through the control plane can be borne by extending a new information element from an existing session modification request message, or it can be borne by a new message.
  • the identification information of the terminal device includes a device identification and/or a service identification of the terminal device.
  • the device identifier of the terminal device can uniquely determine a terminal device, and the identifier of the terminal device can be the registration identifier of the terminal user under a specific application, such as a user name, but the same terminal device identifier may have different access behaviors for different applications. business ID.
  • the UE accesses the APP when creating a new session
  • the session management function network element before the session management function network element sends the second authentication request to the first authentication functional entity, it receives a second session establishment request from the UE for requesting establishment and The second session of the APP instance to achieve data exchange with the APP instance.
  • the second session establishment request includes identification information of the UE and third authentication information corresponding to the identification information.
  • the UE accesses the APP in an existing session, before the session management functional network element sends the second authentication request to the first authentication functional entity, it receives a session modification request from the UE, which is used to request modification of the APP Instance sessions to achieve data exchange with APP instances.
  • the session modification request includes identification information of the UE and third authentication information corresponding to the identification information.
  • the UE accesses the APP in an existing session, before the session management function network element sends the second authentication request to the first authentication function entity, it receives an authentication request from the anchor UPF that provides services for the UE through the data plane.
  • a secondary authentication request where the secondary authentication request includes identification information of the UE and third authentication information corresponding to the identification information.
  • the first authentication functional entity authenticates the terminal device based on the identification information of the terminal device, the application identifier of the APP, and the third authentication information corresponding to the identification information of the terminal device and the application identifier of the APP, and sends an authentication report to the session
  • the management function network element sends a second authentication response, where the second authentication response includes an authentication result for the terminal device.
  • the first authentication functional entity determines locally the fourth authentication information corresponding to the identification information of the terminal device and the application identifier of the APP, for example, the fourth authentication information may also be an authorization code; the first authentication The authorization functional entity compares the third authentication information with the fourth authentication information. If the third authentication information is consistent with the fourth authentication information, the terminal device authentication succeeds. Otherwise, if the third authentication information If the comparison with the fourth authentication information is inconsistent, the authentication of the terminal device fails.
  • the first authentication functional entity can first determine the type or identity of the APP through the application identifier of the APP, and then determine whether the identification information of the terminal device exists in the authorization database of the APP, and if so, further verify Whether the third authentication information is correct, if correct, the terminal device authentication passes, otherwise, the terminal device authentication fails.
  • the authentication result of the terminal device may include information indicating that the terminal device has passed authentication or information indicating that the terminal device has failed authentication, so as to indicate the session management function network element the authentication result of the terminal device, thereby indicating The session management function network element performs corresponding operations based on the authentication result. For example, if the terminal device passes the authentication, it can establish a session for the terminal device; if the terminal device fails the authentication, it does not need to establish a session for the terminal device. session.
  • the session management function network element establishes a session for the UE and the APP instance of the APP.
  • the specific process can refer to the existing technology, which will not be repeated here repeat.
  • the session management function network element sends a policy update request to the policy control function network element to request the policy control function network element to change the rules Allow UE and APP instance to access each other's data, so that based on the authentication result, it can request to issue a policy that allows or prohibits mutual access, improving the security of end users and APP instances, and avoiding non-compliant access behaviors or attacks.
  • the session management function network element refuses to establish the second session; or, the session management function network element rejects the mutual access between the terminal device and the APP instance, so that the 5G network can be guaranteed security.
  • the session management function network element can issue a policy that prohibits the mutual access between the terminal device and the APP instance to the user plane function network element, or does not issue a policy that allows the terminal device to communicate with the APP instance.
  • the inter-access policy between APP instances is given to the user plane functional network element, and the user plane functional network element implements the corresponding policy of allowing or prohibiting access.
  • the first authentication function entity may receive the second authentication request from the session management function network element, or may receive the second authentication request from the SEAF, depending on the session management function network element. Whether the element integrates the SEAF module. If the session management function network element integrates the SEAF module, the first authentication function entity receives the second authentication request from the session management function network element, and sends a second authentication response to the session management function network element; if the If the session management function network element does not integrate the SEAF module, the first authentication function entity receives the second authentication request from the SEAF, and sends the second authentication request to the SEAF.
  • the session management function network element does not integrate the SEAF module
  • the first authentication request sent by the session management function network element to the first authentication function entity may also carry a virtual service network identifier, which is a virtual service network planned and allocated by the operator.
  • the unique identifier of the network is a virtual service network planned and allocated by the operator.
  • the virtual service network includes APP instances that can provide services externally, end users who can access APP instances, and user parameters that divide the virtual service network, such as: subscription information, location information, slices, DNN, applications, etc.
  • the present application can centrally perform business-level authentication and authentication procedures between the APP instance and the terminal device in the same virtual service network through the first authentication functional entity, thereby ensuring the communication between the terminal device and the APP instance.
  • the security and trustworthiness of mutual access in the 5G network is conducive to the authorized access of APP instances and terminal devices, and avoids the occurrence of fraud or attack scenarios.
  • FIG. 5 may be an independent technical solution, and may also be combined with the authentication method described in FIG. 4 , which is not limited in this application.
  • FIG. 6 shows a method for authenticating an APP instance provided by this application.
  • AUEF may be a module integrated in the APP instance, or may be a public capability provided by the application service platform for the APP instance.
  • the SMF including the SEAF is used as the session management function network element, and the SAF is used as the first authentication function entity to perform authentication for the APP instance to access the network.
  • a possible implementation of the authentication method includes the following steps.
  • the AUEF sends an Nsmf_PDU session creation (PDU session create) request to the SMF.
  • the SMF receives the Nsmf_PDU session creation request from the AUEF.
  • the Nsmf_PDU session creation request includes the identification information of the APP instance and the first authentication information corresponding to the identification information, and is used to request to create a PDU session for the APP instance.
  • Nsmf_PDU session creation request in this application is only an example of the first session establishment request in FIG. 4 , and the first session establishment request can also have other names, which are not limited in this application.
  • the SMF is the selected SMF that supports the establishment of a PDU session for an APP instance as an example.
  • the identification information may include the device identification and/or service identification of the APP instance, the device identification is used to identify the ownership, location, type, etc. of the APP instance, and the service identification is used to identify the business of the APP instance that provides services Identity authentication information, for example, APP name, ID or domain name, and first authentication information corresponding to the identification information, so as to perform authentication and authorization procedures.
  • the AUEF when the AUEF initiates a session establishment process to the SMF, the AUEF will send the identification information and the first authentication information corresponding to the identification information to the SMF, for example, the device identification, service identification, authorization code, etc. of the APP instance, or can add An independent authentication message or process, for example, Nsmf_PDU Session_Create SM Context Request or Nsmf_PDU Session_App Authentication Request message, initiates an authentication process to SMF or other devices that support authentication.
  • Nsmf_PDU Session_Create SM Context Request or Nsmf_PDU Session_App Authentication Request message initiates an authentication process to SMF or other devices that support authentication.
  • the SMF sends an Nsaf_APP authentication request (authentication request) to the SAF.
  • the SAF receives the Nsaf_APP authentication request from the SMF.
  • the Nsaf_APP authentication request includes identification information of the APP instance and first authentication information corresponding to the identification information, and is used to request authentication for the APP instance.
  • Nsaf_APP authentication request in this application is only an example of the first authentication request in FIG. 4 , and the first authentication request can also have other names, which are not limited in this application.
  • the SMF can send the identification information of the APP instance and the first authentication information corresponding to the identification information of the APP instance to the SAF through the SEAF.
  • SMF and SEAF are two different modules or functional entities, then SMF will first send the identification information of the APP instance and the first authentication information corresponding to the identification information of the APP instance to SEAF, and then SEAF will Send the identification information and the first authentication information to the SAF.
  • the SEAF security anchor function entity of the APP can query the virtual service network information to which the APP instance belongs according to the identification information of the APP instance, and can also carry the APP instance when initiating the authentication and authentication process of the APP instance to the SAF identification information.
  • the SAF performs authentication processing on the APP instance.
  • the SAF performs authentication processing on the APP instance according to the identification information of the APP instance and the first authentication information corresponding to the identification information of the APP instance.
  • the SAF obtains the identification information and the first authentication information of the APP instance, and the SAF determines the local second authentication information corresponding to the identification information.
  • the second authentication information may also be an authorization code;
  • the first authentication information is compared with the second authentication information. If the first authentication information is consistent with the second authentication information, the APP instance authentication is successful. On the contrary, if the first authentication information is consistent with the second authentication information If the authorization information is inconsistent, the APP instance authentication fails, indicating that the APP is not safe, and the APP instance is not allowed to provide services, thereby ensuring the security of the 5G network.
  • the SAF judges whether the identification information of the APP instance exists in the authorization database of the core network. If it exists, it verifies whether the first authentication information corresponding to the identification information of the APP instance is correct. right to success.
  • SAF determines whether the identifier is a device identifier or a service identifier or both according to the identifier information of the APP instance, and then searches the authorization database for the corresponding identifier in the core network. An authorization code, or the first authentication information, is verified.
  • the SAF obtains the device identification information of the APP instance and the first authentication information corresponding to the device identification information, and then searches the authorization database of the device identification to determine whether the device identification of the APP instance is in the authorization database, and if so, Verify the first authentication information corresponding to the device ID of the APP instance. If the verification passes, the APP instance authentication succeeds. If the verification fails, the APP instance authentication fails; if the APP instance device ID does not exist in the authorization database, the APP instance Instance authentication failed.
  • the verification method can be a fixed authorization code string comparison, or the authorization code strings can be calculated through some dynamic secret key algorithms and parameters for comparison, and if the comparison is consistent, the authentication is passed.
  • the SAF obtains the service identification information of the APP instance and the first authentication information corresponding to the service identification information, then searches the authorization database of the service identification, and determines whether the service identification of the APP instance is in the authorization database, and if it exists, The first authentication information corresponding to the service identification information of the APP instance is verified. If the verification passes, the APP instance authentication succeeds; if it does not exist in the authorization database, the APP instance authentication fails.
  • the above authentication information corresponding to the device identifier of the APP instance and the authentication information corresponding to the service identifier of the APP instance may be the same or different, which is not limited in this application.
  • the above authorization database is stored in UDM.
  • the SAF sends an Nsaf_APP authentication response (authentication response) to the SMF.
  • the SMF receives the Nsaf_APP authentication response from the SAF.
  • the Nsaf_APP authentication response includes an authentication result for the APP instance, and the authentication result may be that the APP instance authentication passes or the APP instance authentication fails.
  • Nsaf_APP authentication response in this application is only an example of the first authentication response in FIG. 4 , and the first authentication response can also have other names, which are not specifically limited in this application.
  • the SMF may send a PDU session establishment rejection to the AUEF to refuse access to the PDU session.
  • the APP instance when the APP instance authentication fails, the APP instance can also be prohibited from providing virtual service network services through rules, and the AUEF can be fed back that the APP instance authentication fails, and a new authentication process can be re-initiated.
  • the SMF selects the anchor point UPF to establish a PDU session for the APP instance.
  • the SMF sends an N4 session establishment request (N4 session establishment request) to the second anchor point UPF.
  • N4 session establishment request N4 session establishment request
  • the second anchor UPF receives the N4 session establishment request from the SMF.
  • the N4 session establishment request includes identification information of the APP instance, and is used for requesting establishment of a PDU session for the APP instance.
  • N4 session establishment request in this application is an example of a session establishment request message, and may also be other messages, which are not specifically limited in this application.
  • the SMF selects the second anchor UPF to establish a session for the APP instance, and the second anchor UPF can assign an IP address or a MAC address to the APP instance.
  • the second anchor point UPF sends an N4 session establishment response (N4 session establishment response) to the SMF.
  • the SMF receives the N4 session setup response from the second anchor UPF.
  • the N4 session establishment response includes a session establishment result, and the session establishment result may be success or failure, for example.
  • the second anchor UPF establishes a session tunnel with the APP instance before sending the N4 session establishment response to the SMF, and the N4 session establishment response also includes tunnel identification information for the second anchor UPF to establish a session for the APP instance.
  • the SMF After the SMF determines that the session is established successfully, the SMF sends an Nsmf_PDU session create (PDU session create) response to the AUEF.
  • Nsmf_PDU session create PDU session create
  • the AUEF receives the Nsmf_PDU session establishment response from the SMF.
  • the Nsmf_PDU session creation response includes the first address allocated by the second anchor point UPF for establishing the session of the APP instance.
  • the first address may be the tunnel identification information assigned by the second anchor point UPF to establish a session for the APP instance, for example: full qualified tunnel endpoint ID, and for example, the first address is the second anchor point UPF The IP address allocated for the APP instance to establish a session.
  • the Nsmf_PDU session creation response further includes key exchange information related to the AUEF authentication of the first instance APP.
  • the AUEF After the AUEF completes the authentication process, based on the IP address assigned by the mobile communication network, the AUEF publishes routes to provide services, and also establishes a tunnel connection with the second anchor point UPF to realize session establishment in the mobile communication network.
  • tunnel in this application may also be called a path or other names, which is not specifically limited in this application.
  • tunnel identification information may be replaced with path identification information
  • first tunnel may be replaced with the first address, etc., which will not be repeated here.
  • this application can implement authentication processing on the device ID, service ID, authorization code and other information to which the APP instance belongs when the APP instance is connected to the 5G network, so as to realize the authentication of the APP instance before connecting to the 5G network.
  • Security certification work to ensure that the APP instance meets the security requirements for accessing the 5G network, and the APP instance is included in the security trust domain of the 5G network.
  • the APP instance Based on the security level authorized after the authentication, the APP instance can be connected with the terminal equipment in the 5G network. secure interaction with other network elements.
  • FIG. 7 shows an authentication method provided by the embodiment of the present application.
  • SMF or SMF+SEAF is used as the session management function network element, and SAF is used as the first authentication function entity to perform authentication for the UE to access the first instance APP when creating a new session. right.
  • a possible implementation manner of the authentication method includes the following steps.
  • the PCF sends user equipment routing selection policy (user equipment routing selection policy, URSP) rule content to the UE.
  • user equipment routing selection policy user equipment routing selection policy, URSP
  • the UE receives the URSP rule content sent by the PCF.
  • the URSP rule content adds an APP secondary authentication flag (APP Authenticate Flag), and the secondary authentication flag requires the UE to carry it when accessing the virtual service network served by the APP.
  • the UE performs an authentication process on the identification information of the virtual service network (the authentication information that needs to be carried when accessing some APPs can also be configured by the UE itself).
  • APP Authenticate Flag the secondary authentication flag requires the UE to carry it when accessing the virtual service network served by the APP.
  • the UE performs an authentication process on the identification information of the virtual service network (the authentication information that needs to be carried when accessing some APPs can also be configured by the UE itself).
  • the UE sends a PDU session establishment request (PDU session establishment request) to the SMF.
  • PDU session establishment request PDU session establishment request
  • the SMF receives the PDU session establishment request sent from the UE.
  • the PDU session establishment request includes the identification information of the UE, the application identification of the APP, and third authentication information corresponding to the identification information of the UE and the application identification of the APP.
  • PDU session establishment request in the embodiment of the present application is only an example of the second session establishment request in Figure 5, and the second session establishment request can also have other names, which are not limited in the embodiment of the present application.
  • the identification information of the UE includes a device identification of the UE and/or a service identification of an APP accessed by the UE.
  • the UE matches the URSP rule, it executes step 501, and confirms that it needs to perform service access. For the scenario that carries the identifier, it sends to the SMF a message that includes the UE's identity information, the APP's application identity, and the third authentication information. PDU session establishment request.
  • the UE does not need to perform step 501 .
  • the UE configures the identification information of the terminal equipment that needs to be carried to access the APP and the third authentication information corresponding to the identification information, and then sends a PDU session establishment request including the identification information and the third authentication information to the SMF.
  • the SMF sends an Nsaf_Vsn_UE authentication request (authenticate request) to the SAF.
  • the SAF receives the Nsaf_Vsn_UE authentication request from the SMF.
  • the Nsaf_Vsn_UE authentication request includes the identification information of the UE, the application identification of the APP, and third authentication information corresponding to the identification information and the application identification of the APP.
  • Nsaf_Vsn_UE authentication request in this application is only an example of the second authentication request in FIG. 5 , and the second authentication request may have other names, which are not limited in this application.
  • the SEAF functional entity may query the information of the virtual service network to which the UE belongs, and may also carry the identification information of the UE when initiating the authentication or authentication process of the UE to the SAF.
  • the SMF will send the UE identification information, the APP application identification and the corresponding third authentication information to the SEAF, and then the SEAF will send the above information to the SAF.
  • SMF and SEAF are two different modules or functional entities, then SMF will first send the identification information of UE, the application identification of APP and the corresponding third authentication information to SEAF, and then SEAF will send the above The information is sent to SAF.
  • the SAF performs authentication processing on the UE.
  • the SAF performs secondary authentication on whether the UE can access the service of the APP based on the identification information of the UE included in the Nsaf_Vsn_UE authentication request, the application identification of the APP, and the corresponding third authentication information.
  • the SAF can determine which APPs the terminal device can access based on the identification information of the terminal device, and determine whether the APPs that the terminal device can access include the APP by using the application identifier of the APP. If the APP can be found, the SAF compares the third authentication information with the fourth authentication information. If the comparison is consistent, the authentication of the terminal device passes. If the comparison is inconsistent, the authentication of the terminal device fails, and the APP cannot be accessed. However, this application does not limit whether the terminal device can access other APPs except the APP. . If it cannot be queried, the authentication failure indication information will be returned by default.
  • the SAF first inquires about the contracted terminal equipment that the APP can provide services, and uses the identification information of the terminal equipment to determine whether the terminal equipment belongs to the terminal equipment that can access the APP. If it can be found, the SAF performs the third authentication comparison between the authorization information and the fourth authentication information. If the comparison is consistent, the authentication of the terminal device passes. If the comparison is inconsistent, the authentication of the terminal device fails, and the APP cannot be accessed. However, this application does not limit whether the terminal device can access other APPs except the APP. . If no query is found, the authentication failure indication information will be returned by default.
  • the SAF obtains the identification information of the UE, determines whether the identification is a device identification or a service identification or both, and then searches in the authorization database of the corresponding identification, and after querying the authorization information, authenticates the third authentication information .
  • the SAF acquires the UE's device ID and third authentication information, and then searches the APP's authorization database on the device ID to determine whether the UE's device ID is in the authorization database. If it exists, the UE's third The authentication information is verified. If the verification is passed, it means that the terminal device has successfully authenticated. If the verification fails, it means that the terminal device has failed to authenticate. If the UE's device identifier does not exist in the authorization database, the terminal device has failed to authenticate.
  • the verification method can be fixed authorization code string comparison, or the authorization code string can be calculated by some dynamic secret key algorithm and parameters for comparison, and if the comparison is consistent, the authentication is passed.
  • the SAF obtains the UE's service ID and the third authentication information, and then searches the APP's authorization database about the service ID to determine whether the UE's service ID is in the authorization database.
  • Three authentication information is verified, if the verification is passed, it means that the terminal device is authenticated successfully; if the verification is not passed, it means that the terminal device fails to authenticate; if the UE's service identifier does not exist in the authorization database, the terminal device fails to be authorized.
  • the UE's device ID and the UE's service ID may be the same or different, which is not limited in this application.
  • the above authentication information corresponding to the device identifier of the UE and the authentication information corresponding to the service identifier of the UE may be the same or different, which is not limited in this application.
  • the SAF sends an Nsaf_Vsn_UE authentication response to the SMF.
  • the SMF receives the Nsaf_Vsn_UE authentication response from the SAF.
  • the Nsaf_Vsn_UE authentication response includes an authentication result
  • the authentication result may be, for example, that the terminal device has passed the authentication or that the terminal device has failed the authentication.
  • Nsaf_Vsn_UE authentication response in the embodiment of the present application is only an example of the second authentication request in FIG. 5 , and the second authentication response can also have other names, which are not limited in the present application.
  • the SMF After the UE is authenticated, the SMF sends a PDU session establishment response to the UE.
  • the UE receives a session establishment response from the SMF.
  • the SMF selects an APP instance suitable for the UE, such as an APP instance, provides data services to the UE, and then continues the subsequent session establishment process.
  • an APP instance suitable for the UE such as an APP instance
  • Related implementations can refer to existing technologies. I won't repeat them here.
  • the SMF sends a PDU session establishment rejection to the UE to deny access to the PDU session.
  • SEAF can refuse the establishment of the session, or not deliver the address information of the APP instance, or not deliver the service access policy to the SMF or UPF.
  • the SMF may also deactivate the activated session.
  • a new authentication process may be reinitiated.
  • the second authentication process can be performed in two ways. The specific process is as follows.
  • the difference is that the UE can perform secondary authentication for accessing the APP instance in the existing session by sending a PDU session modification request to the SMF.
  • step 701 the UE sends a PDU session modification request to the SMF.
  • step 707 the SMF sends a PDU session modification response to the UE.
  • Fig. 8 shows another second authentication method provided by this application.
  • the preset rules of the first anchor point UPF that provides services for the UE do not allow business access to the instance of the APP by default, but in the embodiment of this application, the first anchor point UPF opens the service for the second authentication of the UE, allowing the UE Initiate the secondary authentication process through the user plane, that is, provide a service address for the UE to perform secondary authentication, and the UE device establishes a connection by accessing the service address to perform the authentication process.
  • a possible implementation of the authentication method includes the following steps.
  • the UE sends a second authentication message to the first anchor UPF.
  • the first anchor UPF receives the second authentication message from the UE.
  • the secondary authentication message includes the identification information of the UE, the application identification of the APP, and third authentication information corresponding to the identification information of the UE and the application identification of the APP.
  • the UE accesses the virtual service network provided by the instance of the APP by accessing the APP.
  • the UE uses the data to face the application identifier assigned by the first anchor point UPF and the APP, and the first anchor point UPF can monitor the service address, and parse the second authentication message sent by the UE.
  • the terminal device can send the identification information of the terminal device, the application identification of the APP, and the third authentication information corresponding to the identification information of the terminal device and the application identification of the APP to the functional network element of the user plane through the data plane. , and transferred by the user plane functional network element to the session management functional network element.
  • the terminal device may directly send the secondary authentication request to the session management function network element, and may not The foregoing is first sent to the user plane functional network element and then forwarded to the session management functional network element by the user plane functional network element.
  • the secondary authentication request initiated by the terminal device through the control plane may be borne by extending a new cell from an existing session modification request message, or may be borne by a new message.
  • the secondary authentication request initiated by the terminal through the control plane may be borne by extending a new cell from an existing session modification request message, or may be borne by a new message.
  • the UE's secondary authentication information is only a way for the UE to initiate an authentication process to the first anchor point UPF, and may also be other information, which is not limited in this application.
  • the first anchor point UPF sends a packet forwarding control protocol (packet forwarding control protocol, PFCP) session report request (session report request) to the SMF.
  • PFCP packet forwarding control protocol
  • the first anchor UPF can analyze the secondary authentication message sent by the UE by monitoring the authentication service address, and report the secondary authentication information of the UE by sending a PFCP session report request to the SMF.
  • PFCP session report request is only a way for the UE to forward the second authentication process through the first anchor point UPF, and it can also be other request names, such as PFCP_UE authentication request (authentication request). This is not limited.
  • the SMF sends an Nsaf_Vsn_UE authentication request to the SAF.
  • the SAF receives the Nsaf_Vsn_UE authentication request from the SMF.
  • the Nsaf_Vsn_UE authentication request includes UE authentication information.
  • Nsaf_Vsn_UE authentication request in this application is only an example of the second authentication request in FIG. 5
  • the second authentication response can also have other names, which are not limited in this application.
  • the SMF integrates the SEAF module or functional entity
  • the SMF sends the UE identification information of the UE, the application identification of the APP, and the third authentication information corresponding to the identification information of the UE and the application identification of the APP to the SEAF
  • the SEAF sends the identification information of the UE, the application identification of the APP, and the third authentication information corresponding to the identification information of the UE and the application identification of the APP to the SAF.
  • the SMF and the SEAF are different modules or functional entities, the SMF sends the authentication information of the UE to the SEAF, and the SEAF sends the authentication information to the SAF.
  • the SAF performs authentication processing on the UE.
  • the SAF sends an Nsaf_Vsn_UE authentication response to the SMF.
  • the SMF receives the Nsaf_Vsn_UE authentication response from the SAF.
  • the Nsaf_Vsn_UE authentication response includes an authentication result, for example, the authentication result may be pass or fail.
  • the SMF sends a PFCP session report response (session report response) to the first anchor UPF.
  • the SMF sends a PFCP_UE authentication response to the first anchor UPF.
  • the SMF may send a policy update request to the PCF to allow service access between the UE and the APP instance.
  • This implementation includes the following steps S807 and S808.
  • the SMF sends an Npcf_session management policy control update request (session manage policy control update request) to the PCF.
  • the PCF receives the Npcf_session management policy control update request from the SMF.
  • the Npcf_session management policy control update request includes the authentication result of the UE's second authentication, so that the PCF can update the session management policy between the UE and the APP instance, allowing the service between the UE and the APP instance access.
  • the PCF sends an Npcf_session management policy control update response (session manage policy control update response) to the SMF.
  • the PCF triggers a rule update based on the authentication result reported by the SMF that the UE passes the authentication, allowing service access between the UE and the APP instance.
  • the first anchor point UPF sends the second authentication result to the UE.
  • service access between the UE and the APP instance is allowed if the authentication passes.
  • the above steps S807 and S808 can be performed, that is, service access between the UE and the APP instance can be implemented through the PCF issuing updated rules.
  • this application can centrally perform service-level authentication and authentication processes between APP instances and UE terminal equipment in the same virtual service network through SAF, thereby ensuring mutual access between UE and APP in the 5G network
  • the security and trustworthiness in it is conducive to the authorized access of APP instances and UE devices, and avoids the occurrence of fraud or attack scenarios.
  • the method and/or steps implemented by the first authentication functional entity may also be implemented by components that can be used for the first authentication functional entity;
  • the methods and/or steps implemented by the access module can also be implemented by components (such as chips or circuits) that can be used for the APP instance access module;
  • the methods and/or steps implemented by the session management function entity can also be implemented by the A component (such as a chip or a circuit) implementation that manages a functional entity.
  • Fig. 9 is a schematic block diagram of a communication device 900 provided in this application.
  • the communication device 900 may include: a transceiver unit 910 and a processing unit 920 .
  • the communication device 900 may be the session management function network element in the above method embodiment, or may be a chip for realizing the function of the session management function network element in the above method embodiment.
  • the communication device 900 may correspond to the session management function network element according to the embodiment of the present application, and the communication device 900 may include a unit for performing the methods performed by the session management function network element in FIGS. 4 to 8 .
  • each unit in the communication device 900 and the above-mentioned other operations and/or functions are to implement the corresponding processes in FIG. 4 to FIG. 8 .
  • the communication device 900 can implement the actions, steps or methods related to the session management function network element in S401, S402, and S404 in the foregoing method embodiments, and can also implement S501 and S404 in the foregoing method embodiments.
  • S502 involves actions, steps or methods related to the session management function network element.
  • the communication device 900 can also implement other steps, actions or methods related to the session management function network element in the above method embodiment, which will not be repeated here.
  • the communication device 900 may be the first authentication function network element in the above method embodiment, or a network element used to implement the first authentication function in the above method embodiment function chip.
  • the communication device 900 may correspond to the access and mobility management function network element according to the embodiment of the present application, and the communication device 900 may include a device for executing the first authentication function entity in FIGS. 4 to 8 .
  • the unit of the method is to implement the corresponding processes in FIG. 4 to FIG. 8 .
  • each unit in the communication device 900 and the above-mentioned other operations and/or functions are to implement the corresponding processes in FIG. 4 to FIG. 8 . It should be understood that the specific process for each unit to perform the above corresponding steps has been described in detail in the above method embodiments, and for the sake of brevity, details are not repeated here.
  • the communication device 900 can implement the actions, steps or methods related to access and mobility management functional network elements in S403 in the foregoing method embodiments, and can also implement S502 in the foregoing method embodiments Involves actions, steps or methods related to network elements with access and mobility management functions.
  • the communication device 900 can also implement other steps, actions or methods related to the access and mobility management function network element in the above method embodiment, which will not be repeated here.
  • the communication device 900 may be the APP instance access module in the above method embodiment, or a chip for realizing the functions of the APP instance access module in the above method embodiment.
  • the communication device 900 may correspond to the APP instance access module according to the embodiment of the present application, and the communication device 900 may include units for performing the methods performed by the APP instance access module in FIG. 4 and FIG. 6 . Moreover, each unit in the communication device 900 and the above-mentioned other operations and/or functions are for realizing the corresponding processes in FIG. 4 and FIG. 6 respectively. It should be understood that the specific process for each unit to perform the above corresponding steps has been described in detail in the above method embodiments, and for the sake of brevity, details are not repeated here.
  • the communication device 900 can implement the actions, steps or methods related to the APP instance access module in S401 in the foregoing method embodiments.
  • the communication device 900 can also implement other steps, actions or methods related to the APP instance access module in the above method embodiments, which will not be repeated here.
  • the communication device 900 may be the terminal device in the above method embodiment, or a chip for realizing the functions of the terminal device in the above method embodiment.
  • the communication apparatus 900 may correspond to a terminal device according to the embodiment of the present application, and the communication apparatus 900 may include a unit for executing the methods performed by the terminal device in FIG. 5 , FIG. 7 , and FIG. 8 .
  • each unit in the communication device 900 and the above-mentioned other operations and/or functions are for realizing the corresponding processes in FIG. 5 , FIG. 7 and FIG. 8 respectively. It should be understood that the specific process for each unit to perform the above corresponding steps has been described in detail in the above method embodiments, and for the sake of brevity, details are not repeated here.
  • transceiver unit 910 in the communication device 900 may correspond to the transceiver 1020 in the communication device 1000 shown in FIG. 10, and the processing unit 920 in the communication device 900 may correspond to the communication device shown in FIG. Processor 1010 in device 1000 .
  • the communication device 900 when the communication device 900 is a chip, the chip includes a transceiver unit and a processing unit.
  • the transceiver unit may be an input-output circuit or a communication interface
  • the processing unit may be a processor or a microprocessor or an integrated circuit integrated on the chip.
  • the transceiving unit 910 is used to realize the signal sending and receiving operation of the communication device 900
  • the processing unit 920 is used to realize the signal processing operation of the communication device 900 .
  • the communication device 900 further includes a storage unit 930, and the storage unit 930 is configured to store instructions.
  • Fig. 10 is a schematic block diagram of a communication device 1000 provided by an embodiment of the present application.
  • the communication device 1000 includes: at least one processor 1010 and a transceiver 1020 .
  • the processor 1010 is coupled with the memory for executing instructions stored in the memory to control the transceiver 1020 to send signals and/or receive signals.
  • the communications device 1000 further includes a memory 1030 for storing instructions.
  • processor 1010 and the memory 1030 may be combined into one processing device, and the processor 1010 is configured to execute program codes stored in the memory 1030 to implement the above functions.
  • the memory 1030 may also be integrated in the processor 1010 , or be independent of the processor 1010 .
  • the transceiver 1020 may include a receiver (or called a receiver) and a transmitter (or called a transmitter).
  • the transceiver 1020 may further include antennas, and the number of antennas may be one or more.
  • the transceiver 1020 may be a communication interface or an interface circuit.
  • the chip When the communication device 1000 is a chip, the chip includes a transceiver unit and a processing unit.
  • the transceiver unit may be an input-output circuit or a communication interface;
  • the processing unit may be a processor or a microprocessor or an integrated circuit integrated on the chip.
  • the embodiment of the present application also provides a processing device, including a processor and an interface.
  • the processor may be used to execute the methods in the foregoing method embodiments.
  • the above processing device may be a chip.
  • the processing device may be a field programmable gate array (field programmable gate array, FPGA), an application specific integrated circuit (ASIC), or a system chip (system on chip, SoC). It can be a central processor unit (CPU), a network processor (network processor, NP), a digital signal processing circuit (digital signal processor, DSP), or a microcontroller (micro controller unit) , MCU), can also be a programmable controller (programmable logic device, PLD) or other integrated chips.
  • CPU central processor unit
  • NP network processor
  • DSP digital signal processor
  • microcontroller micro controller unit
  • PLD programmable logic device
  • each step of the above method can be completed by an integrated logic circuit of hardware in a processor or an instruction in the form of software.
  • the steps of the methods disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or implemented by a combination of hardware and software modules in the processor.
  • the software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register.
  • the storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware. To avoid repetition, no detailed description is given here.
  • the embodiment of the present application further provides a computer-readable storage medium, on which computer instructions for implementing the method performed by the first authentication function network element in the above method embodiment are stored.
  • the computer when the computer program is executed by a computer, the computer can implement the method performed by the first authentication function network element in the above method embodiment.
  • the embodiment of the present application further provides a computer-readable storage medium, on which computer instructions for implementing the method performed by the session management function network element in the above method embodiment are stored.
  • the computer when the computer program is executed by a computer, the computer can implement the method performed by the session management function network element in the foregoing method embodiments.
  • the embodiment of the present application also provides a computer-readable storage medium, on which computer instructions for implementing the method executed by the APP instance access module in the above method embodiment are stored.
  • the computer program when executed by a computer, the computer can implement the methods performed by the APP instance access module in the above method embodiments.
  • the embodiment of the present application also provides a computer program product including instructions, when the instructions are executed by a computer, the computer can implement the method executed by the first authentication function network element in the above method embodiment, or executed by the session management function network element method, or a method executed by the APP instance access module.
  • the embodiment of the present application also provides a communication system, the communication system is composed of a session management function network element and a first authentication function entity, wherein the session management function network element is used to execute the session management function network element in the foregoing method embodiment The steps of the method to be executed, and the first authentication functional entity is used to execute the steps of the method executed by the first authentication functional entity in the foregoing method embodiments.
  • the communication system may further include a network element with a policy control function, which is configured to execute the steps of the method performed by the network element with the policy control function in the foregoing method embodiments.
  • the communication system may further include a terminal device configured to perform the steps of the method performed by the terminal device in the foregoing method embodiments.
  • the communication system may further include a user plane functional network element configured to execute the steps of the method performed by the user plane functional network element in the foregoing method embodiments.
  • the embodiment of the present application does not specifically limit the specific structure of the execution subject of the method provided in the embodiment of the present application, as long as the program that records the code of the method provided in the embodiment of the present application can be executed according to the method provided in the embodiment of the present application Just communicate.
  • the subject of execution of the method provided by the embodiment of the present application may be a terminal device or a network device, or a functional module in the terminal device or network device that can call a program and execute the program.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
  • Usable media may include, but are not limited to, magnetic media or magnetic storage devices (for example, floppy disks, hard disks (such as removable hard disks), tapes), optical media (for example, optical disks, compact discs, etc.) , CD), digital versatile disc (digital versatile disc, DVD, etc.), smart cards and flash memory devices (such as erasable programmable read-only memory (EPROM), card, stick or key drive, etc. ), or semiconductor media (such as solid state disk (SSD), U disk, read-only memory (ROM), random access memory (RAM), etc. can store programs The medium of the code.
  • SSD solid state disk
  • U disk read-only memory
  • RAM random access memory
  • Various storage media described herein can represent one or more devices and/or other machine-readable media for storing information.
  • the term "machine-readable medium” may include, but is not limited to, wireless channels and various other media capable of storing, containing and/or carrying instructions and/or data.
  • the memory mentioned in the embodiments of the present application may be a volatile memory or a nonvolatile memory, or may include both volatile memory and nonvolatile memory.
  • the non-volatile memory can be read-only memory (read-only memory, ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically programmable Erases programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory (RAM).
  • RAM can be used as an external cache.
  • RAM may include the following forms: static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), synchronous dynamic random access memory (synchronous DRAM, SDRAM) , double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection dynamic random access memory (synchlink DRAM, SLDRAM) and Direct memory bus random access memory (direct rambus RAM, DR RAM).
  • static random access memory static random access memory
  • dynamic RAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • SDRAM synchronous DRAM
  • double data rate SDRAM double data rate SDRAM
  • DDR SDRAM double data rate SDRAM
  • ESDRAM enhanced synchronous dynamic random access memory
  • SLDRAM synchronous connection dynamic random access memory
  • Direct memory bus random access memory direct rambus RAM, DR RAM
  • the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic devices, discrete gate or transistor logic devices, or discrete hardware components
  • the memory storage module may be integrated in the processor.
  • memories described herein are intended to include, but are not limited to, these and any other suitable types of memories.
  • the disclosed devices and methods may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the above units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components can be combined or can be Integrate into another system, or some features may be ignored, or not implemented.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
  • the units described above as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to implement the solutions provided in this application.
  • each functional unit in each embodiment of the present application may be integrated into one unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
  • a computer When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions.
  • the computer program instructions When the computer program instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part.
  • a computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus.
  • the computer can be a personal computer, a server, or a network device, etc.
  • Computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, computer instructions may be transmitted from a website site, computer, server or data center by wire (such as Coaxial cable, optical fiber, digital subscriber line) or wireless (such as infrared, wireless, microwave, etc.) to another website site, computer, server or data center.
  • wire such as Coaxial cable, optical fiber, digital subscriber line
  • wireless such as infrared, wireless, microwave, etc.
  • a corresponds to B means that B is associated with A, and B can be determined according to A.
  • determining B according to A does not mean determining B only according to A, and B may also be determined according to A and/or other information.

Abstract

The present application provides an authentication method, a communication device, and a system. The authentication method comprises: a first authentication function entity receives a first authentication request, the first authentication request comprising identification information of an Application (APP) instance and first authentication information corresponding to the identification information, and the APP instance being an instance for operating an APP; the first authentication function entity authenticates the APP instance according to the identification information of the APP instance and the first authentication information; and the first authentication function entity sends a first authentication response, the first authentication response comprising an authentication result for the APP instance. According to the method, the present application can implement security authentication of the APP instance before accessing a 5G network, ensure that the APP instance satisfies security requirements for accessing the 5G network, and then incorporate the APP instance into a secure trust domain of the 5G network.

Description

一种鉴权方法、通信装置和系统An authentication method, communication device and system
本申请要求于2021年05月28提交国家知识产权局、申请号为202110589801.6、申请名称为“一种鉴权方法、通信装置和系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese patent application filed with the State Intellectual Property Office on May 28, 2021, with the application number 202110589801.6 and the application name "An authentication method, communication device and system", the entire content of which is incorporated by reference In this application.
技术领域technical field
本申请涉及通信技术领域,更具体地,涉及一种鉴权方法、通信装置和系统。The present application relates to the technical field of communication, and more specifically, to an authentication method, communication device and system.
背景技术Background technique
终端设备通过移动通信网络访问应用的场景中,应用对于移动通信网络来说,通常属于不同的体系。In a scenario where a terminal device accesses an application through a mobile communication network, the application usually belongs to a different system for the mobile communication network.
虽然,当前3GPP标准中针对应用的访问或订阅能力开放有专门的描述,同时还增加了网络开放功能(network exposure function,NEF)来实现对应用功能(application function,AF)的能力开放,即AF可以通过NEF实现对其他网络功能(network function,NF)的访问,但是基于上述的NEF功能无法完全对AF开放关键的网络和用户敏感信息,从而会影响5G网络中终端设备、APP实例之间的访问控制、优化保障、安全交互等方面策略的实施,不利于APP利用5G网络更好的为用户提供服务。Although the current 3GPP standard has a special description for application access or subscription capability exposure, it also adds a network exposure function (network exposure function, NEF) to realize the capability exposure of the application function (application function, AF), that is, AF Access to other network functions (network function, NF) can be achieved through NEF, but based on the above-mentioned NEF functions, key network and user sensitive information cannot be completely opened to AF, which will affect the communication between terminal devices and APP instances in the 5G network. The implementation of strategies such as access control, optimization guarantee, and secure interaction is not conducive to APP's use of 5G networks to better serve users.
因此,如何实现将APP实例安全接入到5G网络中是目前亟需解决的技术问题。Therefore, how to securely connect the APP instance to the 5G network is a technical problem that needs to be solved urgently.
发明内容Contents of the invention
本申请提供一种鉴权方法、通信装置和系统,能够实现对APP实例接入到5G网络前的安全认证工作,确保APP实例符合接入5G网络中的安全要求,继而将其纳入到5G网络的安全信任域中,实现将APP实例安全接入到5G网络中。This application provides an authentication method, communication device and system, which can realize the security authentication of APP instances before accessing the 5G network, ensure that the APP instances meet the security requirements for accessing the 5G network, and then incorporate them into the 5G network In the secure trust domain, the APP instance can be safely connected to the 5G network.
第一方面,提供了一种鉴权方法,包括:第一鉴权功能实体接收第一鉴权请求,该第一鉴权请求包括应用实例的标识信息和该标识信息对应的第一鉴权信息,该APP实例为运行应用APP的实例;该第一鉴权功能实体根据该APP实例的标识信息和第一鉴权信息对APP实例进行鉴权;第一鉴权功能实体发送第一鉴权响应,该第一鉴权响应包括对APP实例的鉴权结果。In a first aspect, an authentication method is provided, including: a first authentication functional entity receives a first authentication request, and the first authentication request includes identification information of an application instance and first authentication information corresponding to the identification information , the APP instance is an instance of the running application APP; the first authentication functional entity authenticates the APP instance according to the identification information of the APP instance and the first authentication information; the first authentication functional entity sends a first authentication response , the first authentication response includes an authentication result for the APP instance.
通过上述技术方案,本申请能够实现对APP实例接入到5G网络前的安全认证工作,确保APP实例符合接入5G网络中的安全要求,继而将其纳入到5G网络的安全信任域中,实现将其接入到5G网络中。Through the above technical solution, this application can realize the security authentication of the APP instance before accessing the 5G network, ensure that the APP instance meets the security requirements for accessing the 5G network, and then incorporate it into the security trust domain of the 5G network to realize Connect it to the 5G network.
结合第一方面,在第一方面的某些实现方式中,APP实例的标识信息包括APP实例的设备标识和/或APP实例的业务标识。With reference to the first aspect, in some implementation manners of the first aspect, the identification information of the APP instance includes a device identification of the APP instance and/or a service identification of the APP instance.
通过上述技术方案,本申请通过核心网(可以理解的是,核心网包括第一鉴权功能实体)对接入网络的APP实例进行鉴权,只有鉴权通过的合法APP实例才允许接入网络, 对终端用户提供服务,并能够保证5G网络的安全,也可以将经过鉴权之后的APP实例纳入到5G核心网的信任域中,允许5G网络中的终端设备对其进行访问控制、预留资源和保障体验等策略。Through the above technical solution, this application authenticates the APP instances accessing the network through the core network (it can be understood that the core network includes the first authentication functional entity), and only the legitimate APP instances that pass the authentication are allowed to access the network , to provide services to end users and ensure the security of the 5G network. The authenticated APP instance can also be included in the trust domain of the 5G core network, allowing terminal devices in the 5G network to perform access control and reserve Strategies such as resources and guaranteed experience.
结合第一方面,在第一方面的某些实现方式中,第一鉴权功能实体根据APP实例的标识信息和第一鉴权信息对APP实例进行鉴权,包括:确定本地与APP实例的标识信息对应的第二鉴权信息;将第一鉴权信息与第二鉴权信息进行比对。With reference to the first aspect, in some implementations of the first aspect, the first authentication functional entity authenticates the APP instance according to the identification information of the APP instance and the first authentication information, including: determining the identity of the local and APP instance The second authentication information corresponding to the information; comparing the first authentication information with the second authentication information.
通过上述技术方案,本申请能够实现第一鉴权功能实体通过APP实例的标识信息和该标识信息对应的第一鉴权信息对APP实例进行鉴权,从而能够保障安全的APP实例能够接入到5G网络中来,不安全的APP实例不能够接入到5G网络中,从而保障5G网络的安全性。Through the above technical solution, this application can realize that the first authentication function entity authenticates the APP instance through the identification information of the APP instance and the first authentication information corresponding to the identification information, so as to ensure that the safe APP instance can access to In the 5G network, unsafe APP instances cannot be connected to the 5G network, thereby ensuring the security of the 5G network.
结合第一方面,在第一方面的某些实现方式中,当第一鉴权信息与第二鉴权信息比对一致时,则APP实例鉴权成功;或者,当第一鉴权信息与第二鉴权信息比对不一致时,则APP实例鉴权失败。With reference to the first aspect, in some implementations of the first aspect, when the first authentication information is consistent with the second authentication information, the APP instance authentication is successful; or, when the first authentication information is consistent with the second authentication information If the two authentication information comparisons are inconsistent, the APP instance authentication fails.
通过上述技术方案,本申请能够实现当APP实例鉴权失败时,则表示该APP实例不安全,则不允许其向外提供虚拟业务网络服务,从而可以保障5G网络的安全性。Through the above technical solution, this application can realize that when the APP instance authentication fails, it means that the APP instance is not safe, and it is not allowed to provide virtual business network services to the outside, so that the security of the 5G network can be guaranteed.
结合第一方面,在第一方面的某些实现方式中,APP实例的鉴权结果包括指示APP实例鉴权成功的信息或指示APP实例鉴权失败的信息。With reference to the first aspect, in some implementation manners of the first aspect, the authentication result of the APP instance includes information indicating successful authentication of the APP instance or information indicating authentication failure of the APP instance.
通过上述技术方案,本申请能够指示会话管理功能网元该APP实例的鉴权结果,从而能够指示会话管理功能网元基于该鉴权结果做出相应的操作,例如,如果APP实例鉴权通过,则可以为APP实例建立会话,如果APP实例鉴权失败,则可以拒绝为APP实例建立会话。Through the above technical solution, the present application can instruct the session management function network element of the authentication result of the APP instance, thereby instructing the session management function network element to perform corresponding operations based on the authentication result, for example, if the APP instance passes the authentication, Then a session can be established for the APP instance, and if the authentication of the APP instance fails, the establishment of a session for the APP instance can be refused.
结合第一方面,在第一方面的某些实现方式中,第一鉴权功能实体接收第一鉴权请求包括:第一鉴权功能实体接收来自会话管理功能网元的第一鉴权请求,以及第一鉴权功能实体发送第一鉴权响应包括:第一鉴权功能实体向会话管理功能网元发送第一鉴权响应;或者,第一鉴权功能实体接收第一鉴权请求包括:第一鉴权功能实体接收来自安全锚点功能实体的第一鉴权请求,以及第一鉴权功能实体发送第一鉴权响应包括:第一鉴权功能实体向所述安全锚点功能实体发送第一鉴权响应。With reference to the first aspect, in some implementation manners of the first aspect, the receiving the first authentication request by the first authentication functional entity includes: the first authentication functional entity receives the first authentication request from the session management function network element, And the first authentication function entity sending the first authentication response includes: the first authentication function entity sends the first authentication response to the session management function network element; or, the first authentication function entity receiving the first authentication request includes: The first authentication function entity receives the first authentication request from the security anchor function entity, and the first authentication function entity sends the first authentication response includes: the first authentication function entity sends the first authentication function entity to the security anchor function entity The first authentication response.
结合第一方面,在第一方面的某些实现方式中,第一鉴权功能实体接收第二鉴权请求,该第二鉴权请求包括访问APP的终端设备的标识信息、APP的应用标识以及与终端设备的标识信息和APP的应用标识对应的第三鉴权信息;第一鉴权功能实体根据终端设备的标识信息、APP的应用标识和该第三鉴权信息对终端设备进行二次鉴权;第一鉴权功能实体发送第二鉴权响应,该第二鉴权响应包括对终端设备的鉴权结果。With reference to the first aspect, in some implementations of the first aspect, the first authentication functional entity receives a second authentication request, and the second authentication request includes identification information of a terminal device accessing the APP, an application identifier of the APP, and The third authentication information corresponding to the identification information of the terminal device and the application identification of the APP; the first authentication function entity performs secondary authentication on the terminal device according to the identification information of the terminal device, the application identification of the APP and the third authentication information Authorization; the first authentication function entity sends a second authentication response, where the second authentication response includes an authentication result for the terminal device.
通过上述技术方案,本申请能够通过第一鉴权功能实体集中对同一个虚拟业务网络中的APP实例和终端设备之间进行业务层面的认证和鉴权流程,从而保证终端设备和APP实例之间的相互访问在5G网络中的安全可信,有利于APP实例和终端设备的授权访问,避免欺诈或攻击场景的出现。Through the above technical solution, the present application can centrally perform business-level authentication and authentication procedures between the APP instance and the terminal device in the same virtual service network through the first authentication functional entity, thereby ensuring the communication between the terminal device and the APP instance. The security and trustworthiness of mutual access in the 5G network is conducive to the authorized access of APP instances and terminal devices, and avoids the occurrence of fraud or attack scenarios.
结合第一方面,在第一方面的某些实现方式中,终端设备的标识信息包括终端设备的设备标识和/或终端设备的业务标识。With reference to the first aspect, in some implementation manners of the first aspect, the identification information of the terminal device includes a device identification of the terminal device and/or a service identification of the terminal device.
通过上述技术方案,本申请通过第一鉴权功能实体对该终端设备进行鉴权,只有鉴权 通过的终端设备才被允许访问接入5G网络中的APP实例提供的APP的业务服务。Through the above technical solution, this application authenticates the terminal device through the first authentication functional entity, and only the terminal device that passes the authentication is allowed to access the APP service provided by the APP instance in the 5G network.
结合第一方面,在第一方面的某些实现方式中,第一鉴权功能实体根据终端设备的标识信息、APP的应用标识和该第三鉴权信息对终端设备进行二次鉴权,包括:确定本地与终端设备的标识信息和APP的应用标识对应的第四鉴权信息;将第三鉴权信息与第四鉴权信息进行比对。With reference to the first aspect, in some implementations of the first aspect, the first authentication functional entity performs secondary authentication on the terminal device according to the identification information of the terminal device, the application identifier of the APP, and the third authentication information, including : Determine local fourth authentication information corresponding to the identification information of the terminal device and the application identifier of the APP; compare the third authentication information with the fourth authentication information.
通过上述技术方案,本申请能够实现第一鉴权功能实体通过终端设备的标识信息、APP的应用标识以及与该终端设备的标识信息和APP的应用标识对应的第三鉴权信息对该终端设备进行鉴权,从而能够保障终端设备与APP之间的安全的访问行为,从而保障5G网络的安全性。Through the above technical solution, the present application can realize that the first authentication functional entity uses the identification information of the terminal device, the application identification of the APP, and the third authentication information corresponding to the identification information of the terminal device and the application identification of the APP to authenticate the terminal device. Authentication is performed, so as to ensure the safe access behavior between the terminal device and the APP, thereby ensuring the security of the 5G network.
结合第一方面,在第一方面的某些实现方式中,当第三鉴权信息与第四鉴权信息比对一致时,则终端设备鉴权成功;或者,当第三鉴权信息与第四鉴权信息比对不一致时,则终端设备鉴权失败。With reference to the first aspect, in some implementations of the first aspect, when the third authentication information is consistent with the fourth authentication information, the authentication of the terminal device is successful; or, when the third authentication information is consistent with the fourth authentication information When the four authentication information comparisons are inconsistent, the terminal device authentication fails.
通过上述技术方案,本申请能够实现当终端设备鉴权失败时,则该会话管理功能网元能够控制会话的策略下发,例如,当终端设备鉴权成功时,则该会话管理功能网元能够下发允许终端设备与APP实例之间互访的策略;例如,当终端设备鉴权失败时,则该会话管理功能网元不下发允许该终端设备与该APP实例之间的互访的策略,或者下发拒绝该终端设备与APP实例之间互访的策略,从而能够拒绝该终端设备与该APP实例之间的互访,从而可以保障5G网络的安全性。Through the above technical solution, the present application can realize that when the authentication of the terminal equipment fails, the session management function network element can control the policy delivery of the session, for example, when the terminal equipment authentication is successful, the session management function network element can Issue policies that allow mutual visits between terminal devices and APP instances; Alternatively, a policy for denying mutual access between the terminal device and the APP instance may be issued, so that the mutual access between the terminal device and the APP instance may be rejected, thereby ensuring the security of the 5G network.
结合第一方面,在第一方面的某些实现方式中,终端设备的鉴权结果包括指示终端设备鉴权成功的信息或指示终端设备鉴权失败的信息。With reference to the first aspect, in some implementation manners of the first aspect, the authentication result of the terminal device includes information indicating successful authentication of the terminal device or information indicating authentication failure of the terminal device.
通过上述技术方案,本申请能够指示会话管理功能网元该终端设备的鉴权结果,从而能够指示会话管理功能网元基于该鉴权结果做出相应的操作,例如,如果终端设备鉴权通过,则可以为该终端设备建立会话,如果该终端设备鉴权失败,则可以不为该终端设备建立会话。Through the above technical solution, the present application can instruct the session management function network element of the authentication result of the terminal device, thereby instructing the session management function network element to perform corresponding operations based on the authentication result, for example, if the terminal device passes the authentication, Then a session may be established for the terminal device, and if the authentication of the terminal device fails, no session may be established for the terminal device.
结合第一方面,在第一方面的某些实现方式中,第一鉴权功能实体接收第二鉴权请求包括:第一鉴权功能实体接收来自会话管理功能网元的第二鉴权请求,以及第一鉴权功能实体发送第二鉴权响应包括:第一鉴权功能实体向会话管理功能网元发送第二鉴权响应;或者,第一鉴权功能实体接收第二鉴权请求包括:第一鉴权功能实体接收来自安全锚点功能实体的第二鉴权请求,以及第一鉴权功能实体发送第二鉴权响应包括:第一鉴权功能实体向所述安全锚点功能实体发送第二鉴权响应。With reference to the first aspect, in some implementation manners of the first aspect, the receiving the second authentication request by the first authentication functional entity includes: the first authentication functional entity receives the second authentication request from the session management function network element, And the first authentication function entity sending the second authentication response includes: the first authentication function entity sends the second authentication response to the session management function network element; or, the first authentication function entity receiving the second authentication request includes: The first authentication functional entity receives the second authentication request from the security anchor functional entity, and the first authentication functional entity sends the second authentication response includes: the first authentication functional entity sends the security anchor functional entity Second authentication response.
第二方面,提供了一种鉴权方法,包括:第一鉴权功能实体接收第二鉴权请求,该第二鉴权请求包括访问APP的终端设备的标识信息、APP的应用标识以及与终端设备的标识信息和APP的应用标识对应的第三鉴权信息;第一鉴权功能实体根据终端设备的标识信息、APP的应用标识和该第三鉴权信息对终端设备进行二次鉴权;第一鉴权功能实体发送第二鉴权响应,该第二鉴权响应包括对终端设备的鉴权结果。In a second aspect, an authentication method is provided, including: a first authentication functional entity receives a second authentication request, and the second authentication request includes identification information of a terminal device accessing the APP, an application identification of the APP, and a connection with the terminal Third authentication information corresponding to the identification information of the device and the application identification of the APP; the first authentication functional entity performs secondary authentication on the terminal device according to the identification information of the terminal device, the application identification of the APP, and the third authentication information; The first authentication function entity sends a second authentication response, where the second authentication response includes an authentication result for the terminal device.
通过上述技术方案,本申请能够通过第一鉴权功能实体集中对同一个虚拟业务网络中的APP实例和终端设备之间进行业务层面的认证和鉴权流程,从而保证终端设备和APP实例之间的相互访问在5G网络中的安全可信,有利于APP实例和终端设备的授权访问,避免欺诈或攻击场景的出现。Through the above technical solution, the present application can centrally perform business-level authentication and authentication procedures between the APP instance and the terminal device in the same virtual service network through the first authentication functional entity, thereby ensuring the communication between the terminal device and the APP instance. The security and trustworthiness of mutual access in the 5G network is conducive to the authorized access of APP instances and terminal devices, and avoids the occurrence of fraud or attack scenarios.
结合第二方面,在第二方面的某些实现方式中,终端设备的标识信息包括终端设备的设备标识和/或终端设备的业务标识。With reference to the second aspect, in some implementation manners of the second aspect, the identification information of the terminal device includes a device identification of the terminal device and/or a service identification of the terminal device.
通过上述技术方案,本申请通过第一鉴权功能实体对该终端设备进行鉴权,只有鉴权通过的终端设备才被允许访问接入5G网络中的APP实例提供的APP的业务服务。Through the above technical solution, this application authenticates the terminal device through the first authentication functional entity, and only the terminal device that passes the authentication is allowed to access the APP service provided by the APP instance in the 5G network.
结合第二方面,在第二方面的某些实现方式中,第一鉴权功能实体根据终端设备的标识信息、APP的应用标识和该第三鉴权信息对终端设备进行二次鉴权,包括:确定本地与终端设备的标识信息和APP的应用标识对应的第四鉴权信息;将第三鉴权信息与第四鉴权信息进行比对。With reference to the second aspect, in some implementations of the second aspect, the first authentication functional entity performs secondary authentication on the terminal device according to the identification information of the terminal device, the application identifier of the APP, and the third authentication information, including : Determine local fourth authentication information corresponding to the identification information of the terminal device and the application identifier of the APP; compare the third authentication information with the fourth authentication information.
通过上述技术方案,本申请能够实现第一鉴权功能实体通过终端设备的标识信息、APP的应用标识以及与该终端设备的标识信息和APP的应用标识对应的第三鉴权信息对该终端设备进行鉴权,从而能够保障终端设备与APP之间的安全的访问行为,从而保障5G网络的安全性。Through the above technical solution, the present application can realize that the first authentication functional entity uses the identification information of the terminal device, the application identification of the APP, and the third authentication information corresponding to the identification information of the terminal device and the application identification of the APP to authenticate the terminal device. Authentication is performed, so as to ensure the safe access behavior between the terminal device and the APP, thereby ensuring the security of the 5G network.
结合第二方面,在第二方面的某些实现方式中,当第三鉴权信息与第四鉴权信息比对一致时,则终端设备鉴权成功;或者,当第三鉴权信息与第四鉴权信息比对不一致时,则终端设备鉴权失败。With reference to the second aspect, in some implementations of the second aspect, when the third authentication information is consistent with the fourth authentication information, the authentication of the terminal device is successful; or, when the third authentication information is consistent with the fourth authentication information When the four authentication information comparisons are inconsistent, the terminal device authentication fails.
通过上述技术方案,本申请能够实现当鉴权失败时,则该会话管理功能网元会拒绝该终端设备与该APP之间的互访,从而可以保障5G网络的安全性。Through the above technical solution, the present application can realize that when the authentication fails, the session management function network element will reject the mutual access between the terminal device and the APP, thereby ensuring the security of the 5G network.
结合第二方面,在第二方面的某些实现方式中,终端设备的鉴权结果包括指示终端设备鉴权成功的信息或指示终端设备鉴权失败的信息。With reference to the second aspect, in some implementation manners of the second aspect, the authentication result of the terminal device includes information indicating successful authentication of the terminal device or information indicating authentication failure of the terminal device.
通过上述技术方案,本申请能够指示会话管理功能网元该终端设备的鉴权结果,从而能够指示会话管理功能网元基于该鉴权结果做出相应的操作,例如,如果终端设备鉴权通过,则可以为该终端设备建立会话,如果该终端设备鉴权失败,则可以不为该终端设备建立会话。Through the above technical solution, the present application can instruct the session management function network element of the authentication result of the terminal device, thereby instructing the session management function network element to perform corresponding operations based on the authentication result, for example, if the terminal device passes the authentication, Then a session may be established for the terminal device, and if the authentication of the terminal device fails, no session may be established for the terminal device.
结合第二方面,在第二方面的某些实现方式中,第一鉴权功能实体接收第二鉴权请求包括:第一鉴权功能实体接收来自会话管理功能网元的第二鉴权请求,以及第一鉴权功能实体发送第二鉴权响应包括:第一鉴权功能实体向会话管理功能网元发送第二鉴权响应;或者,第一鉴权功能实体接收第二鉴权请求包括:第一鉴权功能实体接收来自安全锚点功能实体的第二鉴权请求,以及第一鉴权功能实体发送第二鉴权响应包括:第一鉴权功能实体向所述安全锚点功能实体发送第二鉴权响应。With reference to the second aspect, in some implementation manners of the second aspect, the receiving the second authentication request by the first authentication functional entity includes: the first authentication functional entity receives the second authentication request from the session management function network element, And the first authentication function entity sending the second authentication response includes: the first authentication function entity sends the second authentication response to the session management function network element; or, the first authentication function entity receiving the second authentication request includes: The first authentication functional entity receives the second authentication request from the security anchor functional entity, and the first authentication functional entity sends the second authentication response includes: the first authentication functional entity sends the security anchor functional entity Second authentication response.
第三方面,提供了一种鉴权方法,包括:会话管理功能网元向第一鉴权功能实体发送第一鉴权请求,该第一鉴权请求包括应用APP实例的标识信息和标识信息对应的第一鉴权信息,APP实例为运行应用APP的实例;会话管理功能网元接收来自第一鉴权功能实体的第一鉴权响应,该第一鉴权响应包括对APP实例的鉴权结果。In a third aspect, an authentication method is provided, including: a session management function network element sends a first authentication request to a first authentication function entity, and the first authentication request includes the identification information of the application APP instance and the identification information correspondence The first authentication information, the APP instance is an instance of the running application APP; the session management function network element receives the first authentication response from the first authentication function entity, and the first authentication response includes the authentication result of the APP instance .
通过上述技术方案,本申请能够实现对APP实例接入到5G网络前的安全认证工作,确保APP实例符合接入5G网络中的安全要求,继而将其纳入到5G网络的安全信任域中,实现将其接入到5G网络中。Through the above technical solution, this application can realize the security authentication of the APP instance before accessing the 5G network, ensure that the APP instance meets the security requirements for accessing the 5G network, and then incorporate it into the security trust domain of the 5G network to realize Connect it to the 5G network.
结合第三方面,在第三方面的某些实现方式中,会话管理功能网元向第一鉴权功能实体发送第一鉴权请求前,该方法还包括:会话管理功能网元接收第一会话建立请求,该第一会话建立请求用于请求建立APP实例与核心网的第一会话,第一会话建立请求包括APP 实例的标识信息和第一鉴权信息。With reference to the third aspect, in some implementation manners of the third aspect, before the session management function network element sends the first authentication request to the first authentication function entity, the method further includes: the session management function network element receives the first session An establishment request, the first session establishment request is used to request establishment of a first session between the APP instance and the core network, and the first session establishment request includes identification information of the APP instance and first authentication information.
通过由APP实例向会话管理功能网元发起会话建立请求,本申请能够实现在会话管理功能网元正式建立与APP之间的会话之前能够先进行对APP实例的鉴权过程,从而保证APP实例的安全性,从而维护5G网络的安全性。By initiating a session establishment request from the APP instance to the session management function network element, this application can implement the authentication process on the APP instance before the session management function network element formally establishes a session with the APP, thereby ensuring the authenticity of the APP instance. Security, thereby maintaining the security of the 5G network.
结合第三方面,在第三方面的某些实现方式中,APP实例的标识信息包括APP实例的设备标识和/或APP实例的业务标识。With reference to the third aspect, in some implementation manners of the third aspect, the identification information of the APP instance includes a device identification of the APP instance and/or a service identification of the APP instance.
通过上述技术方案,本申请通过核心网对接入网络的APP实例进行鉴权,只有鉴权通过的合法APP实例才允许接入网络,对终端用户提供服务,并能够保证5G网络的安全,也可以将经过鉴权之后的APP实例纳入到5G核心网的信任域中,允许对其进行访问控制、预留资源和保障体验等策略。Through the above technical solution, this application authenticates the APP instances accessing the network through the core network, and only the legitimate APP instances that pass the authentication are allowed to access the network, provide services to end users, and ensure the security of the 5G network. The authenticated APP instance can be included in the trust domain of the 5G core network, allowing policies such as access control, resource reservation, and experience guarantee.
结合第三方面,在第三方面的某些实现方式中,APP实例的鉴权结果包括指示APP实例鉴权成功的信息或指示APP实例鉴权失败的信息。With reference to the third aspect, in some implementation manners of the third aspect, the authentication result of the APP instance includes information indicating successful authentication of the APP instance or information indicating authentication failure of the APP instance.
通过上述技术方案,本申请能够指示会话管理功能网元该APP实例的鉴权结果,从而能够指示会话管理功能网元基于该鉴权结果做出相应的操作,例如,如果APP鉴权通过,则可以为APP实例建立会话,如果APP实例鉴权失败,则可以不为APP实例建立会话。Through the above technical solution, the present application can indicate the authentication result of the APP instance to the session management function network element, thereby instructing the session management function network element to perform corresponding operations based on the authentication result, for example, if the APP authentication passes, then A session can be established for an APP instance, and if the authentication of the APP instance fails, no session can be established for the APP instance.
结合第三方面,在第三方面的某些实现方式中,当APP实例鉴权失败时,会话管理功能网元拒绝该第一会话建立;或者,会话管理功能网元拒绝终端设备与APP实例之间的互访。With reference to the third aspect, in some implementations of the third aspect, when the APP instance authentication fails, the session management function network element rejects the establishment of the first session; or, the session management function network element rejects the connection between the terminal device and the APP instance exchange of visits.
通过上述技术方案,本申请能够实现当APP实例鉴权失败时,会话管理功能网元拒绝建立该第一会话,或者拒绝APP实例与5G网络中的终端设备之间的在业务层面上的互访,从而保障5G网络的安全性。Through the above technical solution, this application can realize that when the APP instance authentication fails, the session management function network element refuses to establish the first session, or rejects the mutual access between the APP instance and the terminal equipment in the 5G network at the service level , so as to ensure the security of 5G network.
结合第三方面,在第三方面的某些实现方式中,该方法还包括:会话管理功能网元向第一鉴权功能实体发送第二鉴权请求,该第二鉴权请求包括访问APP的终端设备的标识信息、APP的应用标识以及与该终端设备的标识信息和APP的应用标识对应的第三鉴权信息;会话管理功能网元接收来自第一鉴权功能实体的第二鉴权响应,第二鉴权响应包括对终端设备的鉴权结果。With reference to the third aspect, in some implementations of the third aspect, the method further includes: the session management function network element sends a second authentication request to the first authentication function entity, where the second authentication request includes the access APP The identification information of the terminal device, the application identification of the APP, and the third authentication information corresponding to the identification information of the terminal equipment and the application identification of the APP; the session management function network element receives the second authentication response from the first authentication function entity , the second authentication response includes an authentication result for the terminal device.
通过上述技术方案,本申请能够通过SAF集中对同一个虚拟业务网络中的APP实例和终端设备之间进行业务层面的认证和鉴权流程,从而保证终端设备和APP实例之间的相互访问在5G网络中的安全可信,有利于APP实例和终端设备的授权访问,避免欺诈或攻击场景的出现。Through the above technical solution, this application can centrally perform business-level authentication and authentication processes between APP instances and terminal devices in the same virtual service network through SAF, thereby ensuring mutual access between terminal devices and APP instances in 5G The security and trustworthiness in the network is conducive to the authorized access of APP instances and terminal devices, and avoids the occurrence of fraud or attack scenarios.
结合第三方面,在第三方面的某些实现方式中,会话管理功能网元向第一鉴权功能实体发送第二鉴权请求之前,该方法还包括:会话管理功能网元接收第二会话建立请求,第二会话建立消息用于请求建立终端设备与第一应用的第二会话,第二会话建立请求包括终端设备的标识信息和第三鉴权信息。With reference to the third aspect, in some implementations of the third aspect, before the session management function network element sends the second authentication request to the first authentication function entity, the method further includes: the session management function network element receives the second session The establishment request, the second session establishment message is used to request establishment of a second session between the terminal device and the first application, and the second session establishment request includes identification information of the terminal device and third authentication information.
通过5G网络中的终端设备在访问APP之前,由终端设备向会话管理功能网元提前发起会话建立请求的技术方案,本申请能够实现APP与5G网络中的终端设备之间的安全的互访行为,从而能够维护5G网络的安全性。Through the technical solution that the terminal device in the 5G network initiates a session establishment request to the session management function network element in advance before accessing the APP, this application can realize the safe mutual access behavior between the APP and the terminal device in the 5G network , so as to maintain the security of the 5G network.
结合第三方面,在第三方面的某些实现方式中,所述会话管理功能网元向所述第一鉴 权功能实体发送所述第二鉴权请求之前,所述方法还包括:所述会话管理功能网元接收第一会话修改请求,所述第一会话修改请求用于请求修改所述终端设备与所述APP的会话,所述第一会话修改请求包括所述终端设备的标识信息、所述APP的应用标识以及所述第三鉴权信息。With reference to the third aspect, in some implementation manners of the third aspect, before the session management function network element sends the second authentication request to the first authentication function entity, the method further includes: the The session management function network element receives a first session modification request, the first session modification request is used to request modification of the session between the terminal device and the APP, and the first session modification request includes identification information of the terminal device, The application identifier of the APP and the third authentication information.
通过对终端设备的二次鉴权,可以让运营商可以对终端设备访问特定APP实例进行认证,确保终端有对应的应用实例访问权限,增强APP实例的安全性,同时也防止了非法用户对APP实例的攻击和不合规的访问行为。同样的终端设备在完成二次鉴权之后允许访问的APP应用实例也在同一个安全领域,防止了不合规的APP实例为终端用户提供服务,提高了终端用户在APP访问行为中的安全性。Through the secondary authentication of the terminal device, the operator can authenticate the terminal device to access a specific APP instance, ensure that the terminal has the corresponding application instance access authority, enhance the security of the APP instance, and prevent illegal users from accessing the APP instance. Instance attacks and non-compliant access behaviors. The APP application instances allowed to be accessed by the same terminal device after completing the secondary authentication are also in the same security field, which prevents non-compliant APP instances from providing services to end users and improves the security of end users in APP access behaviors. .
结合第三方面,在第三方面的某些实现方式中,所述会话管理功能网元向所述第一鉴权功能实体发送所述第二鉴权请求之前,所述方法还包括:所述会话管理功能网元接收来自用户面功能网元的第三鉴权请求,所述第三鉴权请求用于请求对访问所述APP的终端设备进行鉴权,所述第三鉴权请求包括所述终端设备的标识信息、所述APP的应用标识以及所述第三鉴权信息。With reference to the third aspect, in some implementation manners of the third aspect, before the session management function network element sends the second authentication request to the first authentication function entity, the method further includes: the The session management functional network element receives a third authentication request from the user plane functional network element, the third authentication request is used to request authentication of the terminal device accessing the APP, and the third authentication request includes the The identification information of the terminal device, the application identification of the APP, and the third authentication information.
通过对终端设备的二次鉴权,可以让运营商可以对终端设备访问特定APP实例进行认证,确保终端有对应的应用实例访问权限,增强APP实例的安全性,同时也防止了非法用户对APP实例的攻击和不合规的访问行为。同样的终端设备在完成二次鉴权之后允许访问的APP应用实例也在同一个安全领域,防止了不合规的APP实例为终端用户提供服务,提高了终端用户在APP访问行为中的安全性。Through the secondary authentication of the terminal device, the operator can authenticate the terminal device to access a specific APP instance, ensure that the terminal has the corresponding application instance access authority, enhance the security of the APP instance, and prevent illegal users from accessing the APP instance. Instance attacks and non-compliant access behaviors. The APP application instances allowed to be accessed by the same terminal device after completing the secondary authentication are also in the same security field, which prevents non-compliant APP instances from providing services to end users and improves the security of end users in APP access behaviors. .
结合第三方面,在第三方面的某些实现方式中,终端设备的标识信息包括终端设备的设备标识和/或终端设备的业务标识。With reference to the third aspect, in some implementation manners of the third aspect, the identification information of the terminal device includes a device identification of the terminal device and/or a service identification of the terminal device.
通过上述技术方案,本申请通过核心网对终端设备进行鉴权,只有鉴权通过的终端设备才允许访问APP,从而能够保证5G网络的安全。Through the above technical solution, the application authenticates the terminal device through the core network, and only the terminal device that passes the authentication is allowed to access the APP, thereby ensuring the security of the 5G network.
结合第三方面,在第三方面的某些实现方式中,终端设备的鉴权结果包括指示终端设备鉴权成功的信息或指示终端设备鉴权失败的信息。With reference to the third aspect, in some implementation manners of the third aspect, the authentication result of the terminal device includes information indicating successful authentication of the terminal device or information indicating authentication failure of the terminal device.
通过上述技术方案,本申请能够指示会话管理功能网元该终端设备的鉴权结果,从而能够指示会话管理功能网元基于该鉴权结果做出相应的操作,例如,如果终端设备鉴权通过,则可以为终端设备建立会话,如果终端设备鉴权失败,则拒绝为终端设备建立会话。Through the above technical solution, the present application can instruct the session management function network element of the authentication result of the terminal device, thereby instructing the session management function network element to perform corresponding operations based on the authentication result, for example, if the terminal device passes the authentication, Then a session can be established for the terminal device, and if the authentication of the terminal device fails, the establishment of a session for the terminal device is refused.
结合第三方面,在第三方面的某些实现方式中,当终端设备鉴权失败时,会话管理功能网元拒绝该第二会话建立;或者,会话管理功能网元拒绝终端设备与APP实例之间的互访。With reference to the third aspect, in some implementations of the third aspect, when the authentication of the terminal device fails, the session management function network element rejects the establishment of the second session; or, the session management function network element rejects the connection between the terminal device and the APP instance exchange of visits.
可选地,如果终端设备鉴权失败,则会话管理功能网元拒绝该第二会话建立,或者,下发禁止该终端设备与该APP实例之间的互访策略,或者,所述会话管理功能网元不下发允许该终端设备与该APP实例之间的互访策略。Optionally, if the authentication of the terminal device fails, the session management function network element rejects the establishment of the second session, or issues a policy that prohibits mutual access between the terminal device and the APP instance, or, the session management function The network element does not issue a policy that allows mutual access between the terminal device and the APP instance.
通过上述技术方案,本申请能够实现当终端设备鉴权失败时,会话管理功能网元拒绝建立该第二会话,或者拒绝终端设备与APP实例之间的业务层面上的互访,从而保障5G网络的安全性。Through the above technical solution, this application can realize that when the authentication of the terminal device fails, the network element with the session management function refuses to establish the second session, or refuses the mutual access on the service level between the terminal device and the APP instance, so as to ensure the 5G network security.
结合第三方面,在第三方面的某些实现方式中,该方法还包括:会话管理功能网元向策略控制功能网元发送策略更新请求,策略更新请求用于请求策略控制功能网元允许终端 设备与APP之间的业务访问;会话管理功能网元接收来自策略控制功能网元的策略更新响应,该策略更新响应包括指示允许终端设备与APP之间的业务访问的信息。With reference to the third aspect, in some implementations of the third aspect, the method further includes: the session management function network element sends a policy update request to the policy control function network element, and the policy update request is used to request the policy control function network element to allow the terminal Service access between the device and the APP: the session management function network element receives a policy update response from the policy control function network element, and the policy update response includes information indicating that service access between the terminal device and the APP is allowed.
通过对终端设备的二次鉴权,可以让运营商可以对终端访问特定APP实例进行认证,确保终端有对应的应用实例访问权限,增强APP实例的安全性,同时也防止了非法用户对APP实例的攻击和不合规的访问行为。同样的终端在完成二次鉴权之后允许访问的APP应用实例也在同一个安全领域,防止了不合规的APP实例为终端用户提供服务,提高了终端用户在APP访问行为中的安全性。Through the secondary authentication of the terminal device, the operator can authenticate the terminal's access to a specific APP instance, ensure that the terminal has the corresponding application instance access authority, enhance the security of the APP instance, and prevent illegal users from accessing the APP instance. Attacks and non-compliant access behaviors. The APP application instance that the same terminal is allowed to access after completing the secondary authentication is also in the same security field, which prevents non-compliant APP instances from providing services to end users and improves the security of end users in APP access behavior.
第四方面,提供了一种鉴权方法,包括:会话管理功能网元向第一鉴权功能实体发送第二鉴权请求,该第二鉴权请求包括访问APP的终端设备的标识信息、APP的应用标识以及与该终端设备的标识信息和APP的应用标识对应的第三鉴权信息;会话管理功能网元接收来自第一鉴权功能实体的第二鉴权响应,第二鉴权响应包括对终端设备的鉴权结果。In a fourth aspect, an authentication method is provided, including: a session management function network element sends a second authentication request to a first authentication functional entity, and the second authentication request includes identification information of a terminal device accessing the APP, APP The application identification of the terminal device and the third authentication information corresponding to the identification information of the terminal device and the application identification of the APP; the session management function network element receives the second authentication response from the first authentication function entity, and the second authentication response includes The authentication result of the terminal device.
通过上述技术方案,本申请能够通过SAF集中对同一个虚拟业务网络中的APP实例和终端设备之间进行业务层面的认证和鉴权流程,从而保证终端设备和APP实例之间的相互访问在5G网络中的安全可信,有利于APP实例和终端设备的授权访问,避免欺诈或攻击场景的出现。Through the above technical solution, this application can centrally perform business-level authentication and authentication processes between APP instances and terminal devices in the same virtual service network through SAF, thereby ensuring mutual access between terminal devices and APP instances in 5G The security and trustworthiness in the network is conducive to the authorized access of APP instances and terminal devices, and avoids the occurrence of fraud or attack scenarios.
结合第四方面,在第四方面的某些实现方式中,会话管理功能网元向第一鉴权功能实体发送第二鉴权请求之前,该方法还包括:会话管理功能网元接收第二会话建立请求,第二会话建立消息用于请求建立终端设备与APP的第二会话,第二会话建立请求包括终端设备的标识信息和第三鉴权信息。With reference to the fourth aspect, in some implementation manners of the fourth aspect, before the session management function network element sends the second authentication request to the first authentication function entity, the method further includes: the session management function network element receives the second session The establishment request, the second session establishment message is used to request establishment of a second session between the terminal device and the APP, and the second session establishment request includes identification information of the terminal device and third authentication information.
通过5G网络中的终端设备在访问APP之前,由终端设备向会话管理功能网元提前发起会话建立请求的技术方案,本申请能够实现APP与5G网络中的终端设备之间的安全的互访行为,从而能够维护5G网络的安全性。Through the technical solution that the terminal device in the 5G network initiates a session establishment request to the session management function network element in advance before accessing the APP, this application can realize the safe mutual access behavior between the APP and the terminal device in the 5G network , so as to maintain the security of the 5G network.
结合第四方面,在第四方面的某些实现方式中,会话管理功能网元向第一鉴权功能实体发送第二鉴权请求之前,该方法还包括:会话管理功能网元接收第一会话修改请求,第一会话修改请求用于请求修改终端设备与APP的会话,第一会话修改请求包括终端设备的标识信息、APP的应用标识以及第三鉴权信息。With reference to the fourth aspect, in some implementation manners of the fourth aspect, before the session management function network element sends the second authentication request to the first authentication function entity, the method further includes: the session management function network element receives the first session The modification request, the first session modification request is used to request modification of the session between the terminal device and the APP, and the first session modification request includes the identification information of the terminal device, the application identification of the APP, and the third authentication information.
结合第四方面,在第四方面的某些实现方式中,会话管理功能网元向第一鉴权功能实体发送第二鉴权请求之前,该方法还包括:会话管理功能网元接收来自用户面功能网元的第三鉴权请求,第三鉴权请求用于请求对访问APP的终端设备进行鉴权,第三鉴权请求包括终端设备的标识信息、APP的应用标识以及第三鉴权信息。With reference to the fourth aspect, in some implementation manners of the fourth aspect, before the session management function network element sends the second authentication request to the first authentication function entity, the method further includes: the session management function network element receives the request from the user plane The third authentication request of the functional network element. The third authentication request is used to request the terminal device accessing the APP to be authenticated. The third authentication request includes the identification information of the terminal device, the application identification of the APP, and the third authentication information .
结合第四方面,在第四方面的某些实现方式中,终端设备的标识信息包括终端设备的设备标识和/或终端设备的业务标识。With reference to the fourth aspect, in some implementation manners of the fourth aspect, the identification information of the terminal device includes a device identification of the terminal device and/or a service identification of the terminal device.
通过上述技术方案,本申请通过核心网对终端设备进行鉴权,只有鉴权通过的终端设备才允许访问APP,从而能够保证5G网络的安全。Through the above technical solution, the application authenticates the terminal device through the core network, and only the terminal device that passes the authentication is allowed to access the APP, thereby ensuring the security of the 5G network.
结合第四方面,在第四方面的某些实现方式中,终端设备的鉴权结果包括指示终端设备鉴权成功的信息或指示终端设备鉴权失败的信息。With reference to the fourth aspect, in some implementation manners of the fourth aspect, the authentication result of the terminal device includes information indicating successful authentication of the terminal device or information indicating authentication failure of the terminal device.
通过上述技术方案,本申请能够指示会话管理功能网元该终端设备的鉴权结果,从而能够指示会话管理功能网元基于该鉴权结果做出相应的操作,例如,如果终端设备鉴权通过,则可以为终端设备建立会话,如果终端设备鉴权失败,则拒绝为终端设备建立会话。Through the above technical solution, the present application can instruct the session management function network element of the authentication result of the terminal device, thereby instructing the session management function network element to perform corresponding operations based on the authentication result, for example, if the terminal device passes the authentication, Then a session can be established for the terminal device, and if the authentication of the terminal device fails, the establishment of a session for the terminal device is refused.
结合第四方面,在第四方面的某些实现方式中,当终端设备鉴权失败时,会话管理功能网元拒绝该第二会话建立;或者,会话管理功能网元拒绝终端设备与APP实例之间的互访。With reference to the fourth aspect, in some implementations of the fourth aspect, when the authentication of the terminal device fails, the session management function network element rejects the establishment of the second session; or, the session management function network element rejects the connection between the terminal device and the APP instance exchange of visits.
可选地,如果终端设备鉴权失败,则会话管理功能网元拒绝该第二会话建立,或者,下发禁止该终端设备与该APP实例之间的互访策略,或者,所述会话管理功能网元不下发允许该终端设备与该APP实例之间的互访策略。Optionally, if the authentication of the terminal device fails, the session management function network element rejects the establishment of the second session, or issues a policy that prohibits mutual access between the terminal device and the APP instance, or, the session management function The network element does not issue a policy that allows mutual access between the terminal device and the APP instance.
通过上述技术方案,本申请能够实现当终端设备鉴权失败时,会话管理功能网元拒绝建立该第二会话,或者拒绝终端设备与APP实例之间的业务层面上的互访,从而保障5G网络的安全性。Through the above technical solution, this application can realize that when the authentication of the terminal device fails, the network element with the session management function refuses to establish the second session, or refuses the mutual access on the service level between the terminal device and the APP instance, so as to ensure the 5G network security.
结合第四方面,在第四方面的某些实现方式中,该方法还包括:会话管理功能网元向策略控制功能网元发送策略更新请求,策略更新请求用于请求策略控制功能网元允许终端设备与APP之间的业务访问;会话管理功能网元接收来自策略控制功能网元的策略更新响应,该策略更新响应包括指示允许终端设备与APP之间的业务访问的信息。With reference to the fourth aspect, in some implementations of the fourth aspect, the method further includes: the session management function network element sends a policy update request to the policy control function network element, and the policy update request is used to request the policy control function network element to allow the terminal Service access between the device and the APP: the session management function network element receives a policy update response from the policy control function network element, and the policy update response includes information indicating that service access between the terminal device and the APP is allowed.
第五方面,提供了一种通信装置,包括:收发单元,用于接收第一鉴权请求,该第一鉴权请求包括应用APP实例的标识信息和该标识信息对应的第一鉴权信息,该APP实例为运行应用APP的实例;处理单元,用于根据APP实例的标识信息和第一鉴权信息对APP实例进行鉴权;该收发单元还用于发送第一鉴权响应,第一鉴权响应包括对APP实例的鉴权结果。In a fifth aspect, a communication device is provided, including: a transceiver unit, configured to receive a first authentication request, where the first authentication request includes identification information of an application APP instance and first authentication information corresponding to the identification information, The APP instance is an instance of the running application APP; the processing unit is used to authenticate the APP instance according to the identification information of the APP instance and the first authentication information; the transceiver unit is also used to send the first authentication response, the first authentication The authorization response includes the authentication result of the APP instance.
结合第五方面,在第五方面的某些实现方式中,APP实例的标识信息包括APP实例的设备标识和/或APP实例的业务标识。With reference to the fifth aspect, in some implementation manners of the fifth aspect, the identification information of the APP instance includes a device identification of the APP instance and/or a service identification of the APP instance.
结合第五方面,在第五方面的某些实现方式中,该处理单元用于:确定本地与APP实例的标识信息对应的第二鉴权信息;对第一鉴权信息与第二鉴权信息进行比对。With reference to the fifth aspect, in some implementations of the fifth aspect, the processing unit is configured to: determine the second authentication information locally corresponding to the identification information of the APP instance; compare the first authentication information and the second authentication information Compare.
结合第五方面,在第五方面的某些实现方式中,当第一鉴权信息与第二鉴权信息比对一致时,则APP实例鉴权成功;或者,当第一鉴权信息与第二鉴权信息比对不一致时,则APP实例鉴权失败。With reference to the fifth aspect, in some implementations of the fifth aspect, when the first authentication information is consistent with the second authentication information, the APP instance authentication succeeds; or, when the first authentication information is consistent with the second authentication information If the two authentication information comparisons are inconsistent, the APP instance authentication fails.
结合第五方面,在第五方面的某些实现方式中,APP实例的鉴权结果包括指示APP实例鉴权成功的信息或指示APP实例鉴权失败的信息。With reference to the fifth aspect, in some implementation manners of the fifth aspect, the authentication result of the APP instance includes information indicating that the APP instance has authenticated successfully or information indicating that the APP instance has failed in authentication.
结合第五方面,在第五方面的某些实现方式中,第一鉴权功能实体接收第一鉴权请求包括:第一鉴权功能实体接收来自会话管理功能网元的第一鉴权请求,以及第一鉴权功能实体发送第一鉴权响应包括:第一鉴权功能实体向会话管理功能网元发送第一鉴权响应;或者,第一鉴权功能实体接收第一鉴权请求包括:第一鉴权功能实体接收来自安全锚点功能实体的第一鉴权请求,以及第一鉴权功能实体发送第一鉴权响应包括:第一鉴权功能实体向所述安全锚点功能实体发送第一鉴权响应。With reference to the fifth aspect, in some implementation manners of the fifth aspect, the first authentication functional entity receiving the first authentication request includes: the first authentication functional entity receiving the first authentication request from the session management function network element, And the first authentication function entity sending the first authentication response includes: the first authentication function entity sends the first authentication response to the session management function network element; or, the first authentication function entity receiving the first authentication request includes: The first authentication function entity receives the first authentication request from the security anchor function entity, and the first authentication function entity sends the first authentication response includes: the first authentication function entity sends the first authentication function entity to the security anchor function entity The first authentication response.
结合第五方面,在第五方面的某些实现方式中,该装置还用于:接收第二鉴权请求,该第二鉴权请求包括访问APP的终端设备的标识信息、APP的应用标识以及与该终端设备的标识信息和APP的应用标识对应的第三鉴权信息;根据终端设备的标识信息、APP的应用标识和该第三鉴权信息对终端设备进行二次鉴权;发送第二鉴权响应,该第二鉴权响应包括对终端设备的鉴权结果。With reference to the fifth aspect, in some implementations of the fifth aspect, the apparatus is further configured to: receive a second authentication request, where the second authentication request includes the identification information of the terminal device accessing the APP, the application identifier of the APP, and Third authentication information corresponding to the identification information of the terminal device and the application identification of the APP; perform secondary authentication on the terminal device according to the identification information of the terminal device, the application identification of the APP, and the third authentication information; send the second An authentication response, where the second authentication response includes an authentication result for the terminal device.
结合第五方面,在第五方面的某些实现方式中,终端设备的标识信息包括终端设备的 设备标识和/或终端设备的业务标识。With reference to the fifth aspect, in some implementation manners of the fifth aspect, the identification information of the terminal device includes a device identification of the terminal device and/or a service identification of the terminal device.
结合第五方面,在第五方面的某些实现方式中,该处理单元用于:确定本地与终端设备的标识信息对应的第四鉴权信息;对第三鉴权信息与第四鉴权信息进行比对。With reference to the fifth aspect, in some implementations of the fifth aspect, the processing unit is configured to: determine locally fourth authentication information corresponding to the identification information of the terminal device; Compare.
结合第五方面,在第五方面的某些实现方式中,当第三鉴权信息与第四鉴权信息比对一致时,则终端设备鉴权成功;或者,当第三鉴权信息与第四鉴权信息比对不一致时,则终端设备鉴权失败。With reference to the fifth aspect, in some implementations of the fifth aspect, when the third authentication information is consistent with the fourth authentication information, the authentication of the terminal device is successful; or, when the third authentication information is consistent with the fourth authentication information When the four authentication information comparisons are inconsistent, the terminal device authentication fails.
结合第五方面,在第五方面的某些实现方式中,该终端设备的鉴权结果包括指示终端设备鉴权成功的信息或指示终端设备鉴权失败的信息。With reference to the fifth aspect, in some implementation manners of the fifth aspect, the authentication result of the terminal device includes information indicating successful authentication of the terminal device or information indicating failed authentication of the terminal device.
结合第五方面,在第五方面的某些实现方式中,第一鉴权功能实体接收第二鉴权请求包括:第一鉴权功能实体接收来自会话管理功能网元的第二鉴权请求,以及第一鉴权功能实体发送第二鉴权响应包括:第一鉴权功能实体向会话管理功能网元发送第二鉴权响应;或者,第一鉴权功能实体接收第二鉴权请求包括:第一鉴权功能实体接收来自安全锚点功能实体的第二鉴权请求,以及第一鉴权功能实体发送第二鉴权响应包括:第一鉴权功能实体向所述安全锚点功能实体发送第二鉴权响应。With reference to the fifth aspect, in some implementation manners of the fifth aspect, the receiving the second authentication request by the first authentication functional entity includes: the first authentication functional entity receives the second authentication request from the session management function network element, And the first authentication function entity sending the second authentication response includes: the first authentication function entity sends the second authentication response to the session management function network element; or, the first authentication function entity receiving the second authentication request includes: The first authentication functional entity receives the second authentication request from the security anchor functional entity, and the first authentication functional entity sends the second authentication response includes: the first authentication functional entity sends the security anchor functional entity Second authentication response.
第六方面,提供了一种通信装置,包括:收发单元,用于接收第二鉴权请求,该第二鉴权请求包括访问APP的终端设备的标识信息、APP的应用标识以及与该终端设备的标识信息和APP的应用标识对应的第三鉴权信息;处理单元,用于根据终端设备的标识信息、APP的应用标识和该第三鉴权信息对终端设备进行二次鉴权;该收发单元还用于发送第二鉴权响应,该第二鉴权响应包括对终端设备的鉴权结果。According to a sixth aspect, a communication device is provided, including: a transceiver unit, configured to receive a second authentication request, the second authentication request including identification information of a terminal device accessing an APP, an application identifier of the APP, and a connection with the terminal device The third authentication information corresponding to the identification information of the APP and the application identification of the APP; the processing unit is used to perform secondary authentication on the terminal equipment according to the identification information of the terminal equipment, the application identification of the APP and the third authentication information; The unit is further configured to send a second authentication response, where the second authentication response includes an authentication result for the terminal device.
结合第六方面,在第六方面的某些实现方式中,终端设备的标识信息包括终端设备的设备标识和/或终端设备的业务标识。With reference to the sixth aspect, in some implementation manners of the sixth aspect, the identification information of the terminal device includes a device identification of the terminal device and/or a service identification of the terminal device.
结合第六方面,在第六方面的某些实现方式中,该处理单元用于:确定本地与终端设备的标识信息对应的第四鉴权信息;对第三鉴权信息与第四鉴权信息进行比对。With reference to the sixth aspect, in some implementation manners of the sixth aspect, the processing unit is configured to: determine locally fourth authentication information corresponding to the identification information of the terminal device; Compare.
结合第六方面,在第六方面的某些实现方式中,当第三鉴权信息与第四鉴权信息比对一致时,则终端设备鉴权成功;或者,当第三鉴权信息与第四鉴权信息比对不一致时,则终端设备鉴权失败。With reference to the sixth aspect, in some implementations of the sixth aspect, when the third authentication information is consistent with the fourth authentication information, the authentication of the terminal device is successful; or, when the third authentication information is consistent with the fourth authentication information When the four authentication information comparisons are inconsistent, the terminal device authentication fails.
结合第六方面,在第六方面的某些实现方式中,该终端设备的鉴权结果包括指示终端设备鉴权成功的信息或指示终端设备鉴权失败的信息。With reference to the sixth aspect, in some implementation manners of the sixth aspect, the authentication result of the terminal device includes information indicating successful authentication of the terminal device or information indicating failed authentication of the terminal device.
结合第六方面,在第六方面的某些实现方式中,第一鉴权功能实体接收第二鉴权请求包括:第一鉴权功能实体接收来自会话管理功能网元的第二鉴权请求,以及第一鉴权功能实体发送第二鉴权响应包括:第一鉴权功能实体向会话管理功能网元发送第二鉴权响应;或者,第一鉴权功能实体接收第二鉴权请求包括:第一鉴权功能实体接收来自安全锚点功能实体的第二鉴权请求,以及第一鉴权功能实体发送第二鉴权响应包括:第一鉴权功能实体向所述安全锚点功能实体发送第二鉴权响应。With reference to the sixth aspect, in some implementation manners of the sixth aspect, the receiving the second authentication request by the first authentication functional entity includes: the first authentication functional entity receives the second authentication request from the session management function network element, And the first authentication function entity sending the second authentication response includes: the first authentication function entity sends the second authentication response to the session management function network element; or, the first authentication function entity receiving the second authentication request includes: The first authentication functional entity receives the second authentication request from the security anchor functional entity, and the first authentication functional entity sends the second authentication response includes: the first authentication functional entity sends the security anchor functional entity Second authentication response.
第七方面,提供了一种通信装置,包括:收发单元,用于向第一鉴权功能实体发送第一鉴权请求,该第一鉴权请求包括应用APP实例的标识信息和该标识信息对应的第一鉴权信息,该APP实例为运行应用APP的实例;该收发单元还用于接收来自第一鉴权功能实体的第一鉴权响应,该第一鉴权响应包括对APP实例的鉴权结果。In a seventh aspect, a communication device is provided, including: a transceiver unit, configured to send a first authentication request to a first authentication functional entity, where the first authentication request includes identification information of an application APP instance and the identification information corresponds to The first authentication information, the APP instance is an instance of the running application APP; the transceiver unit is also used to receive the first authentication response from the first authentication functional entity, the first authentication response includes the authentication of the APP instance right result.
结合第七方面,在第七方面的某些实现方式中,该收发单元还用于:接收第一会话建 立请求,该第一会话建立请求用于请求建立APP实例与核心网的第一会话,该第一会话建立请求包括APP实例的标识信息和第一鉴权信息。With reference to the seventh aspect, in some implementations of the seventh aspect, the transceiving unit is further configured to: receive a first session establishment request, where the first session establishment request is used to request establishment of a first session between the APP instance and the core network, The first session establishment request includes identification information of the APP instance and first authentication information.
结合第七方面,在第七方面的某些实现方式中,APP实例的标识信息包括APP实例的设备标识和/或APP实例的业务标识。With reference to the seventh aspect, in some implementation manners of the seventh aspect, the identification information of the APP instance includes a device identification of the APP instance and/or a service identification of the APP instance.
结合第七方面,在第七方面的某些实现方式中,APP实例的鉴权结果包括指示APP实例鉴权成功的信息或指示APP实例鉴权失败的信息。With reference to the seventh aspect, in some implementation manners of the seventh aspect, the authentication result of the APP instance includes information indicating that the APP instance authentication is successful or information indicating that the APP instance authentication fails.
结合第七方面,在第七方面的某些实现方式中,当APP实例鉴权失败时,会话管理功能网元拒绝建立该第一会话;或者,会话管理功能网元拒绝终端设备与APP实例之间的互访。With reference to the seventh aspect, in some implementations of the seventh aspect, when the APP instance authentication fails, the session management function network element refuses to establish the first session; or, the session management function network element rejects the connection between the terminal device and the APP instance exchange of visits.
结合第七方面,在第七方面的某些实现方式中,该收发单元还用于:向第一鉴权功能实体发送第二鉴权请求,该第二鉴权请求包括访问APP的终端设备的标识信息、APP的应用标识以及与该终端设备的标识信息和APP的应用标识对应的第三鉴权信息;接收来自第一鉴权功能实体的第二鉴权响应,该第二鉴权响应包括对终端设备的鉴权结果。With reference to the seventh aspect, in some implementations of the seventh aspect, the transceiver unit is further configured to: send a second authentication request to the first authentication functional entity, where the second authentication request includes the ID of the terminal device accessing the APP. Identification information, the application identification of the APP, and third authentication information corresponding to the identification information of the terminal device and the application identification of the APP; receiving a second authentication response from the first authentication functional entity, the second authentication response includes The authentication result of the terminal device.
结合第七方面,在第七方面的某些实现方式中,该收发单元还用于:接收第二会话建立请求,该第二会话建立消息用于请求建立终端设备与第一应用的第二会话,该第二会话建立请求包括终端设备的标识信息、APP的应用标识以及与该终端设备的标识信息和APP的应用标识对应的第三鉴权信息。With reference to the seventh aspect, in some implementations of the seventh aspect, the transceiver unit is further configured to: receive a second session establishment request, where the second session establishment message is used to request establishment of a second session between the terminal device and the first application The second session establishment request includes the identification information of the terminal device, the application identification of the APP, and third authentication information corresponding to the identification information of the terminal device and the application identification of the APP.
结合第七方面,在第七方面的某些实现方式中,该收发单元还用于:接收第一会话修改请求,第一会话修改请求用于请求修改终端设备与APP的会话,第一会话修改请求包括终端设备的标识信息、APP的应用标识以及第三鉴权信息。With reference to the seventh aspect, in some implementations of the seventh aspect, the transceiver unit is further configured to: receive a first session modification request, the first session modification request is used to request modification of the session between the terminal device and the APP, the first session modification The request includes identification information of the terminal device, application identification of the APP, and third authentication information.
结合第七方面,在第七方面的某些实现方式中,该收发单元还用于:接收来自用户面功能网元的第三鉴权请求,第三鉴权请求用于请求对访问APP的终端设备进行鉴权,第三鉴权请求包括终端设备的标识信息、APP的应用标识以及第三鉴权信息。With reference to the seventh aspect, in some implementations of the seventh aspect, the transceiver unit is further configured to: receive a third authentication request from a functional network element of the user plane, and the third authentication request is used to request a terminal that accesses the APP The device performs authentication, and the third authentication request includes the identification information of the terminal device, the application identification of the APP, and the third authentication information.
结合第七方面,在第七方面的某些实现方式中,终端设备的标识信息包括终端设备的设备标识和/或终端设备的业务标识。With reference to the seventh aspect, in some implementation manners of the seventh aspect, the identification information of the terminal device includes a device identification of the terminal device and/or a service identification of the terminal device.
结合第七方面,在第七方面的某些实现方式中,该终端设备的鉴权结果包括指示终端设备鉴权成功的信息或指示终端设备鉴权失败的信息。With reference to the seventh aspect, in some implementation manners of the seventh aspect, the authentication result of the terminal device includes information indicating successful authentication of the terminal device or information indicating failed authentication of the terminal device.
结合第七方面,在第七方面的某些实现方式中,当终端设备鉴权失败时,会话管理功能网元拒绝建立该第二会话;或者,会话管理功能网元拒绝终端设备与APP实例之间的互访。With reference to the seventh aspect, in some implementations of the seventh aspect, when the authentication of the terminal device fails, the network element with the session management function refuses to establish the second session; or, the network element with the session management function rejects the connection between the terminal device and the APP instance exchange of visits.
可选地,如果终端设备鉴权失败,则会话管理功能网元拒绝该第二会话建立,或者,下发禁止该终端设备与该APP实例之间的互访策略,或者,所述会话管理功能网元不下发允许该终端设备与该APP实例之间的互访策略。Optionally, if the authentication of the terminal device fails, the session management function network element rejects the establishment of the second session, or issues a policy that prohibits mutual access between the terminal device and the APP instance, or, the session management function The network element does not issue a policy that allows mutual access between the terminal device and the APP instance.
结合第七方面,在第七方面的某些实现方式中,该收发单元还用于:向策略控制功能网元发送策略更新请求,该策略更新请求用于请求策略控制功能网元允许终端设备与APP之间的业务访问;接收来自策略控制功能网元的策略更新响应,该策略更新响应包括指示允许终端设备与APP之间的业务访问的信息。With reference to the seventh aspect, in some implementations of the seventh aspect, the transceiver unit is further configured to: send a policy update request to the policy control function network element, where the policy update request is used to request the policy control function network element to allow the terminal device to communicate with the Service access between APPs: receiving a policy update response from the policy control function network element, where the policy update response includes information indicating that service access between the terminal device and the APP is allowed.
第八方面,提供了一种通信装置,包括:收发单元,用于向第一鉴权功能实体发送第二鉴权请求,该第二鉴权请求包括访问APP的终端设备的标识信息、APP的应用标识以 及与该终端设备的标识信息和APP的应用标识对应的第三鉴权信息;该收发单元还用于接收来自第一鉴权功能实体的第二鉴权响应,该第二鉴权响应包括对终端设备的鉴权结果。In an eighth aspect, a communication device is provided, including: a transceiver unit, configured to send a second authentication request to a first authentication functional entity, where the second authentication request includes identification information of a terminal device accessing an APP, an APP's The application identification and the third authentication information corresponding to the identification information of the terminal device and the application identification of the APP; the transceiver unit is also used to receive a second authentication response from the first authentication functional entity, and the second authentication response Including the authentication result of the terminal device.
结合第八方面,在第八方面的某些实现方式中,该收发单元还用于:接收第二会话建立请求,该第二会话建立消息用于请求建立终端设备与第一应用的第二会话,该第二会话建立请求包括终端设备的标识信息、APP的应用标识以及与该终端设备的标识信息和APP的应用标识对应的第三鉴权信息。With reference to the eighth aspect, in some implementations of the eighth aspect, the transceiving unit is further configured to: receive a second session establishment request, where the second session establishment message is used to request establishment of a second session between the terminal device and the first application The second session establishment request includes the identification information of the terminal device, the application identification of the APP, and third authentication information corresponding to the identification information of the terminal device and the application identification of the APP.
结合第八方面,在第八方面的某些实现方式中,该收发单元还用于:接收第一会话修改请求,第一会话修改请求用于请求修改终端设备与APP的会话,第一会话修改请求包括终端设备的标识信息、APP的应用标识以及第三鉴权信息。With reference to the eighth aspect, in some implementations of the eighth aspect, the transceiver unit is further configured to: receive a first session modification request, the first session modification request is used to request modification of the session between the terminal device and the APP, the first session modification The request includes identification information of the terminal device, application identification of the APP, and third authentication information.
结合第八方面,在第八方面的某些实现方式中,该收发单元还用于:接收来自用户面功能网元的第三鉴权请求,第三鉴权请求用于请求对访问APP的终端设备进行鉴权,第三鉴权请求包括终端设备的标识信息、APP的应用标识以及第三鉴权信息。With reference to the eighth aspect, in some implementations of the eighth aspect, the transceiving unit is further configured to: receive a third authentication request from a functional network element of the user plane, and the third authentication request is used to request the terminal accessing the APP The device performs authentication, and the third authentication request includes the identification information of the terminal device, the application identification of the APP, and the third authentication information.
结合第八方面,在第八方面的某些实现方式中,终端设备的标识信息包括终端设备的设备标识和/或终端设备的业务标识。With reference to the eighth aspect, in some implementation manners of the eighth aspect, the identification information of the terminal device includes a device identification of the terminal device and/or a service identification of the terminal device.
结合第八方面,在第八方面的某些实现方式中,该终端设备的鉴权结果包括指示终端设备鉴权成功的信息或指示终端设备鉴权失败的信息。With reference to the eighth aspect, in some implementation manners of the eighth aspect, the authentication result of the terminal device includes information indicating successful authentication of the terminal device or information indicating authentication failure of the terminal device.
结合第八方面,在第八方面的某些实现方式中,当终端设备鉴权失败时,会话管理功能网元拒绝建立该第二会话;或者,会话管理功能网元拒绝终端设备与APP实例之间的互访。With reference to the eighth aspect, in some implementations of the eighth aspect, when the authentication of the terminal device fails, the network element with the session management function refuses to establish the second session; or, the network element with the session management function rejects the connection between the terminal device and the APP instance exchange of visits.
可选地,如果终端设备鉴权失败,则会话管理功能网元拒绝该第二会话建立,或者,下发禁止该终端设备与该APP实例之间的互访策略,或者,所述会话管理功能网元不下发允许该终端设备与该APP实例之间的互访策略。Optionally, if the authentication of the terminal device fails, the session management function network element rejects the establishment of the second session, or issues a policy that prohibits mutual access between the terminal device and the APP instance, or, the session management function The network element does not issue a policy that allows mutual access between the terminal device and the APP instance.
结合第八方面,在第八方面的某些实现方式中,该收发单元还用于:向策略控制功能网元发送策略更新请求,该策略更新请求用于请求策略控制功能网元允许终端设备与APP之间的业务访问;接收来自策略控制功能网元的策略更新响应,该策略更新响应包括指示允许终端设备与APP之间的业务访问的信息。With reference to the eighth aspect, in some implementation manners of the eighth aspect, the transceiver unit is further configured to: send a policy update request to the network element with the policy control function, where the policy update request is used to request the network element with the policy control function to allow the terminal device to communicate with the Service access between APPs: receiving a policy update response from the policy control function network element, where the policy update response includes information indicating that service access between the terminal device and the APP is allowed.
第九方面,提供了一种通信装置,包括至少一个处理器,该至少一个处理器用于执行存储器中存储的计算机程序,以使得所述装置实现如第一方面以及第一方面的任一种可能实现方式中任一项所述的方法。In a ninth aspect, a communication device is provided, including at least one processor, and the at least one processor is used to execute a computer program stored in a memory, so that the device realizes any possibility of the first aspect and the first aspect Implement the method described in any one of the manners.
第十方面,提供了一种通信装置,包括至少一个处理器,该至少一个处理器用于执行存储器中存储的计算机程序,以使得所述装置实现如第二方面以及第二方面的任一种可能实现方式中任一项所述的方法。In a tenth aspect, a communication device is provided, including at least one processor, and the at least one processor is used to execute a computer program stored in a memory, so that the device realizes any possibility of the second aspect and the second aspect Implement the method described in any one of the manners.
第十一方面,提供了一种通信装置,包括至少一个处理器,该至少一个处理器用于执行存储器中存储的计算机程序,以使得所述装置实现如第三方面以及第三方面的任一种可能实现方式中任一项所述的方法。In an eleventh aspect, a communication device is provided, including at least one processor, and the at least one processor is used to execute a computer program stored in a memory, so that the device implements any one of the third aspect and the third aspect. The method described in any one of the possible implementation modes.
第十二方面,提供了一种通信装置,包括至少一个处理器,该至少一个处理器用于执行存储器中存储的计算机程序,以使得所述装置实现如第四方面以及第四方面的任一种可能实现方式中任一项所述的方法。In a twelfth aspect, a communication device is provided, including at least one processor, and the at least one processor is used to execute a computer program stored in a memory, so that the device implements any one of the fourth aspect and the fourth aspect. The method described in any one of the possible implementation modes.
第十三方面,提供了一种通信系统,包括:第一鉴权功能实体和会话管理功能网元, 该第一鉴权功能实体执行如第一方面以及第一方面的任一种可能实现方式中任一项所述的方法,以及会话管理功能网元执行第三方面以及第三方面的任一种可能实现方式中任一项所述的方法。In a thirteenth aspect, a communication system is provided, including: a first authentication functional entity and a session management functional network element, where the first authentication functional entity performs the first aspect and any possible implementation manner of the first aspect The method described in any one of the above, and the session management function network element executes the method described in any one of the third aspect and any possible implementation manner of the third aspect.
第十四方面,提供了一种通信系统,包括:第一鉴权功能实体和会话管理功能网元,该第一鉴权功能实体执行如第二方面以及第二方面的任一种可能实现方式中任一项所述的方法,以及会话管理功能网元执行第四方面以及第四方面的任一种可能实现方式中任一项所述的方法。In a fourteenth aspect, a communication system is provided, including: a first authentication functional entity and a session management functional network element, where the first authentication functional entity performs the second aspect and any possible implementation manner of the second aspect The method described in any one of the above, and the session management function network element executes the method described in any one of the fourth aspect and any possible implementation manner of the fourth aspect.
第十五方面,提供了一种计算机可读存储介质,存储有计算机程序或指令,该计算机程序或指令用于实现第一方面以及第一方面的任一种可能实现方式中所述的方法。In a fifteenth aspect, a computer-readable storage medium is provided, storing a computer program or instruction, and the computer program or instruction is used to implement the method described in the first aspect and any possible implementation manner of the first aspect.
第十六方面,提供了一种计算机可读存储介质,存储有计算机程序或指令,该计算机程序或指令用于实现第二方面以及第二方面的任一种可能实现方式中所述的方法。In a sixteenth aspect, a computer-readable storage medium is provided, storing a computer program or instruction, and the computer program or instruction is used to implement the second aspect and the method described in any possible implementation manner of the second aspect.
第十七方面,提供了一种计算机可读存储介质,存储有计算机程序或指令,该计算机程序或指令用于实现第三方面以及第三方面的任一种可能实现方式中所述的方法。In a seventeenth aspect, a computer-readable storage medium is provided, storing a computer program or instruction, and the computer program or instruction is used to implement the method described in the third aspect and any possible implementation manner of the third aspect.
第十八方面,提供了一种计算机可读存储介质,存储有计算机程序或指令,该计算机程序或指令用于实现第四方面以及第四方面的任一种可能实现方式中所述的方法。In an eighteenth aspect, a computer-readable storage medium is provided, storing a computer program or instruction, and the computer program or instruction is used to implement the fourth aspect and the method described in any possible implementation manner of the fourth aspect.
第十九方面,提供了一种计算机程序产品,当所述计算机程序产品在计算机上运行时,使得所述计算机执行第一方面以及第一方面的任一种可能实现方式中所述的方法。In a nineteenth aspect, a computer program product is provided. When the computer program product is run on a computer, the computer is made to execute the method described in the first aspect and any possible implementation manner of the first aspect.
第二十方面,提供了一种计算机程序产品,当所述计算机程序产品在计算机上运行时,使得所述计算机执行第二方面以及第二方面的任一种可能实现方式中所述的方法。In a twentieth aspect, a computer program product is provided. When the computer program product runs on a computer, the computer executes the method described in the second aspect and any possible implementation manner of the second aspect.
第二十一方面,提供了一种计算机程序产品,当所述计算机程序产品在计算机上运行时,使得所述计算机执行第三方面以及第三方面的任一种可能实现方式中所述的方法。In a twenty-first aspect, a computer program product is provided, and when the computer program product is run on a computer, the computer is made to execute the third aspect and the method described in any possible implementation manner of the third aspect .
第二十二方面,提供了一种计算机程序产品,当所述计算机程序产品在计算机上运行时,使得所述计算机执行第四方面以及第四方面的任一种可能实现方式中所述的方法。In a twenty-second aspect, a computer program product is provided, and when the computer program product is run on a computer, the computer is made to execute the method described in the fourth aspect and any possible implementation manner of the fourth aspect .
附图说明Description of drawings
图1是一种通信系统的架构示意图。FIG. 1 is a schematic diagram of the architecture of a communication system.
图2是一种APP实例接入模块的部署示意图。Fig. 2 is a schematic diagram of deployment of an APP instance access module.
图3是一种通信系统在5G网络中的应用示意图。Fig. 3 is a schematic diagram of the application of a communication system in a 5G network.
图4是本申请提供的一种鉴权的方法的示意流程图。Fig. 4 is a schematic flowchart of an authentication method provided by the present application.
图5是本申请提供的又一种鉴权方法的示意流程图。Fig. 5 is a schematic flowchart of another authentication method provided by the present application.
图6示出了一种适用于本申请提供的一种鉴权方法的示意图。Fig. 6 shows a schematic diagram of an authentication method applicable to this application.
图7示出了又一种适用于本申请提供的一种鉴权方法的示意图。Fig. 7 shows a schematic diagram of another authentication method applicable to the present application.
图8示出了再一种适用于本申请提供的一种鉴权方法的示意图。Fig. 8 shows a schematic diagram of another authentication method applicable to the present application.
图9是本申请提供的一种通信装置的示意性框图。Fig. 9 is a schematic block diagram of a communication device provided by the present application.
图10是本申请提供的又一种通信装置的示意性框图。Fig. 10 is a schematic block diagram of another communication device provided by the present application.
具体实施方式Detailed ways
下面将结合附图,对本申请中的技术方案进行描述。The technical solution in this application will be described below with reference to the accompanying drawings.
本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通讯(global  system of mobile communication,GSM)系统、码分多址(code division multiple access,CDMA)系统、宽带码分多址(wideband code division multiple access,WCDMA)系统、通用分组无线业务(general packet radio service,GPRS)、长期演进(long term evolution,LTE)系统、LTE频分双工(frequency division duplex,FDD)系统、LTE时分双工(time division duplex,TDD)、通用移动通信系统(universal mobile telecommunication system,UMTS)、全球互联微波接入(worldwide interoperability for microwave access,WiMAX)通信系统、第五代(5th generation,5G)系统或新无线(new radio,NR)等。The technical solution of the embodiment of the present application can be applied to various communication systems, for example: global system of mobile communication (global system of mobile communication, GSM) system, code division multiple access (code division multiple access, CDMA) system, broadband code division multiple access (wideband code division multiple access, WCDMA) system, general packet radio service (general packet radio service, GPRS), long term evolution (long term evolution, LTE) system, LTE frequency division duplex (frequency division duplex, FDD) system, LTE Time Division Duplex (TDD), Universal Mobile Telecommunications System (UMTS), Worldwide Interoperability for Microwave Access (WiMAX) Communication System, Fifth Generation (5G) system or new radio (new radio, NR), etc.
本申请实施例中的终端设备可以指用户设备、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。终端设备还可以是蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字处理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备,5G网络中的终端设备或者公用陆地移动通信网络(public land mobile network,PLMN)中的终端设备等,本申请实施例对此并不限定。The terminal equipment in the embodiment of the present application may refer to user equipment, access terminal, subscriber unit, subscriber station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent, or user device. The terminal device may also be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a Functional handheld devices, computing devices or other processing devices connected to wireless modems, vehicle-mounted devices, wearable devices, terminal devices in 5G networks or terminal devices in public land mobile network (PLMN), etc., The embodiment of the present application does not limit this.
本申请实施例中的网络设备可以是用于与终端设备通信的设备,该网络设备可以是GSM系统或CDMA系统中的基站(base transceiver station,BTS),也可以是WCDMA系统中的基站(nodeB,NB),还可以是LTE系统中的演进型基站(evolutional nodeB,eNB或eNodeB),还可以是云无线接入网络(cloud radio access network,CRAN)场景下的无线控制器,或者该网络设备可以为中继站、接入点、车载设备、可穿戴设备以及5G网络中的网络设备或者PLMN网络中的网络设备等,本申请实施例并不限定。The network device in the embodiment of the present application may be a device for communicating with a terminal device, and the network device may be a base station (base transceiver station, BTS) in a GSM system or a CDMA system, or a base station (nodeB) in a WCDMA system. , NB), can also be an evolved base station (evolutional nodeB, eNB or eNodeB) in an LTE system, or a wireless controller in a cloud radio access network (cloud radio access network, CRAN) scenario, or the network device It may be a relay station, an access point, a vehicle-mounted device, a wearable device, a network device in a 5G network, or a network device in a PLMN network, etc., which is not limited in this embodiment of the present application.
为了便于理解本申请的技术方案,下文将对与本申请相关的概念或者相关技术做出简要描述。In order to facilitate the understanding of the technical solutions of the present application, the concepts or related technologies related to the present application will be briefly described below.
第一,应用(application,APP)与APP实例:First, application (APP) and APP instance:
本申请中的APP是指能够提供某一类应用服务,例如:提供互联网业务的某一类应用服务。例如,APP可以是淘宝,用于提供上网购物的互联网业务;或者,APP可以是腾讯视频,用于提供上网观看视频的互联网业务,等等。APP in this application refers to a certain type of application service that can provide a certain type of application service, for example, a certain type of application service that provides Internet services. For example, the APP may be Taobao, which is used to provide Internet services for online shopping; or, the APP may be Tencent Video, which is used to provide Internet services for watching videos online, and so on.
本申请中的APP实例是指运行APP的实例。例如,当APP为淘宝时,对应的APP实例是指运行淘宝的实例;或者,当APP为腾讯视频时,对应的APP实例是指运行腾讯视频的实例。The APP instance in this application refers to the instance running the APP. For example, when the APP is Taobao, the corresponding APP instance refers to the instance running Taobao; or, when the APP is Tencent Video, the corresponding APP instance refers to the instance running Tencent Video.
APP实例所对应的网元或者实体,例如可以是应用作为用户设备功能(APP as user equipment function,AUEF)。The network element or entity corresponding to the APP instance may be, for example, an application as user equipment function (APP as user equipment function, AUEF).
在本申请中,每个APP可以部署多个APP实例来共同提供服务,即一个APP可以对应多个APP实例。APP实例通常运行在应用服务器内,在此统一说明,以下不再赘述。In this application, each APP can deploy multiple APP instances to jointly provide services, that is, one APP can correspond to multiple APP instances. The APP instance usually runs in the application server, which is described in a unified manner here, and will not be described in detail below.
第二,锚点用户面功能(user plane function,UPF)与中间UPF(intermediate UPF,I-UPF):Second, anchor user plane function (user plane function, UPF) and intermediate UPF (intermediate UPF, I-UPF):
本申请中,锚点UPF可以是协议数据单元(protocol data unit,PDU)会话锚点(PDU session anchor,PSA)-UPF。其中,在终端设备的移动过程中,整个会话的锚点UPF是不会变化的,锚点UPF负责发布终端设备互联网协议(internet protocol,IP)的下行路由策略,发送给终端设备的报文都会基于该下行路由策略转发到锚点UPF进行处理。In this application, the anchor UPF may be a protocol data unit (protocol data unit, PDU) session anchor (PDU session anchor, PSA)-UPF. Among them, during the mobile process of the terminal device, the anchor point UPF of the entire session will not change, and the anchor point UPF is responsible for issuing the downlink routing policy of the terminal device Internet protocol (internet protocol, IP), and the message sent to the terminal device will be Based on the downlink routing policy, it is forwarded to the anchor UPF for processing.
在一种可能的实现方式中,I-UPF位于无线接入网(radio access network,RAN)设备与锚点UPF之间,会随着终端设备的移动不停的发生切换。In a possible implementation manner, the I-UPF is located between a radio access network (radio access network, RAN) device and an anchor UPF, and will switch continuously as the terminal device moves.
第三,二次鉴权:Third, the second authentication:
在网络安全方面,网络的首要任务包括:要对接入网络的终端设备进行认证鉴权。一个终端网络只有通过了认证鉴权后,才能接入移动通信网络,并进一步请求建立会话来访问数据网络上的业务。二次鉴权是指终端设备完成入网鉴权后,接入具体APP实例前所进行的鉴权,并在鉴权通过后才被允许访问该具体的APP实例,从而进一步提高系统的安全性。In terms of network security, the primary tasks of the network include: authentication and authentication of terminal devices accessing the network. Only after passing the authentication and authentication, a terminal network can access the mobile communication network, and further request to establish a session to access services on the data network. The secondary authentication refers to the authentication performed by the terminal device before accessing the specific APP instance after completing the network access authentication, and is allowed to access the specific APP instance after the authentication is passed, thereby further improving the security of the system.
第四,服务鉴权功能(service authentication function,SAF):Fourth, service authentication function (service authentication function, SAF):
在本申请中,SAF可以作为自组织网络中的授权功能实体,实现对APP实例接入网络、终端设备访问APP等流程的鉴权处理。In this application, the SAF can be used as an authorization functional entity in the self-organizing network to implement authentication processing of APP instances accessing the network, terminal devices accessing APPs, and other processes.
应理解,所述自组织网络是指运营商或者终端设备或者用户定义的一个由一个或多个终端设备用户以及一个或多个APP实例构成的可以相互访问的数据网络。It should be understood that the ad hoc network refers to a mutually accessible data network defined by an operator, a terminal device, or a user and composed of one or more terminal device users and one or more APP instances.
下面将结合附图,对本申请中的技术方案进行描述。The technical solution in this application will be described below with reference to the accompanying drawings.
图1是一种通信系统的架构示意图,本申请提供的一种鉴权方法可以用于该网络架构中,当然也可以用于未来的网络架构中,比如第六代(6th generation,6G)网络架构等,本申请对此不作具体限定。Figure 1 is a schematic diagram of a communication system architecture. An authentication method provided by this application can be used in this network architecture, and of course it can also be used in future network architectures, such as the sixth generation (6th generation, 6G) network Architecture, etc., which are not specifically limited in this application.
如图1所示,该通信系统100包括会话管理功能网元101和第一鉴权功能实体102。As shown in FIG. 1 , the communication system 100 includes a session management function network element 101 and a first authentication function entity 102 .
可选地,该通信系统100还包括APP实例接入模块103。其中,会话管理功能实体101、第一鉴权功能实体102或者APP实例接入模块103中的任意二者之间可以直接通信,也可以通过其他设备的转发进行通信,本申请对此不做具体限定。Optionally, the communication system 100 further includes an APP instance access module 103 . Among them, any two of the session management functional entity 101, the first authentication functional entity 102, or the APP instance access module 103 can communicate directly, or communicate through forwarding by other devices, and this application does not make specific details on this limited.
会话管理功能网元101,用于接收来自APP实例接入模块103的第一连接请求,第一连接请求包括APP实例的标识信息和该标识信息对应的第一鉴权信息(authentication information),或者是第一认证信息,本申请对此不做限定。The session management function network element 101 is configured to receive a first connection request from the APP instance access module 103, where the first connection request includes identification information of the APP instance and first authentication information (authentication information) corresponding to the identification information, or is the first authentication information, which is not limited in this application.
会话管理功能网元101,还用于向第一鉴权功能实体102发送第一鉴权请求,第一鉴权请求用于请求第一鉴权功能实体102对APP实例进行鉴权,第一鉴权请求包括APP实例的标识信息和该标识信息对应的第一鉴权信息。The session management function network element 101 is further configured to send a first authentication request to the first authentication function entity 102, the first authentication request is used to request the first authentication function entity 102 to authenticate the APP instance, and the first authentication function entity 102 The authorization request includes identification information of the APP instance and first authentication information corresponding to the identification information.
第一鉴权功能实体102,用于接收来自会话管理功能网元101的第一鉴权请求,并向会话管理功能网元101发送第一鉴权响应,第一鉴权响应包括对APP实例的鉴权结果。The first authentication function entity 102 is configured to receive the first authentication request from the session management function network element 101, and send a first authentication response to the session management function network element 101, the first authentication response includes the APP instance Authentication result.
上述方案的具体实现将在后续方法实施例中详细阐述,在此不予赘述。The specific implementation of the above solutions will be described in detail in subsequent method embodiments, and will not be repeated here.
在本申请中,由移动通信网络中的会话管理功能实体和第一鉴权功能实体为APP实例建立APP实例与移动通信网络之间的连接进行鉴权。也就是说,该方案可以将APP实例作为特殊的终端设备接入到移动通信网络中。In this application, the session management functional entity and the first authentication functional entity in the mobile communication network establish a connection between the APP instance and the mobile communication network for the APP instance for authentication. That is to say, this solution can use the APP instance as a special terminal device to access the mobile communication network.
由于APP实例为某个应用的具体运行实例,因此基于该方案,可以提升应用与移动通信网络之间数据交互的灵活性。Since an APP instance is a specific running instance of an application, based on this solution, the flexibility of data interaction between the application and the mobile communication network can be improved.
进一步地,基于该方案,可以将应用纳入移动通信网络规划中以实现应用在移动通信系统中的即插即用,从而实现对应用业务的动态编排和路径寻优。这样有利于实现运营商和应用服务提供商之间的一种新的商业部署和合作模式。Furthermore, based on this solution, applications can be incorporated into mobile communication network planning to implement plug-and-play applications in mobile communication systems, thereby realizing dynamic arrangement and path optimization of application services. This is conducive to realizing a new business deployment and cooperation mode between operators and application service providers.
在本申请中,APP实例接入模块103用于辅助APP实例接入到移动通信网络。In this application, the APP instance access module 103 is used to assist the APP instance to access the mobile communication network.
可选地,如图2所示,本申请中的APP实例接入模块103可以集成在APP实例中,该APP实例可以运行在应用服务器中。Optionally, as shown in FIG. 2 , the APP instance access module 103 in this application may be integrated in an APP instance, and the APP instance may run in an application server.
需要说明的是,图2所示的应用服务器中还可能包括其他APP实例,本申请仅以应用服务器上的APP实例为例进行说明,但是对于应用服务器是否还运行其他APP实例则不做具体限定。It should be noted that the application server shown in Figure 2 may also include other APP instances. This application only uses the APP instance on the application server as an example for illustration, but there is no specific limitation on whether the application server also runs other APP instances. .
图1所示的通信系统100可以应用于目前的4G网络、5G网络或者未来的其他网络,本申请对此不作具体限定。The communication system 100 shown in FIG. 1 may be applied to a current 4G network, a 5G network or other networks in the future, which is not specifically limited in this application.
示例性地,如图3所示,若图1所示的通信系统100应用于目前的5G网络,则图1所示的通信系统100中的会话管理功能实体101所对应的网元或者实体可以是5G网络架构中的会话管理功能网元(session management function,SMF),第一鉴权功能实体102所对应的网元或者实体可以是5G网络架构中的鉴权网络功能(authentication server function,AUSF)或SAF,也可以是完成第一鉴权功能实体功能的其他网元或者实体,其中,如果该第一鉴权功能实体是AUSF,则可以对AUSF的现有功能进行扩展以完成本申请中第一鉴权功能实体的作用。Exemplarily, as shown in FIG. 3 , if the communication system 100 shown in FIG. 1 is applied to a current 5G network, the network element or entity corresponding to the session management function entity 101 in the communication system 100 shown in FIG. 1 may be It is a session management function network element (session management function, SMF) in the 5G network architecture, and the network element or entity corresponding to the first authentication function entity 102 may be an authentication network function (authentication server function, AUSF) in the 5G network architecture. ) or SAF, or other network elements or entities that complete the function of the first authentication function entity, wherein, if the first authentication function entity is AUSF, the existing functions of AUSF can be extended to complete the The role of the first authentication functional entity.
此外,图1所示的APP实例接入模块103所对应的网元或者实体可以是应用作为用户设备功能(APP as user equipment function,AUEF)。如图2所示,AUEF可以部署在应用服务器内的APP实例中。In addition, the network element or entity corresponding to the APP instance access module 103 shown in FIG. 1 may be an application as user equipment function (APP as user equipment function, AUEF). As shown in Figure 2, the AUEF can be deployed in the APP instance in the application server.
当然,AUEF还可能有其他部署方式,比如部署在现有的其他功能或者设备或平台上,或者部署在其他新增的功能或设备或平台上等,本申请对此不做具体限定。Of course, AUEF may also have other deployment methods, such as deploying on other existing functions or devices or platforms, or deploying on other newly added functions or devices or platforms, etc., which is not specifically limited in this application.
如图3所示,目前的5G网络还可以包括接入和移动性管理网元(access and mobility management function,AMF)、能力开放功能(network exposure function,NEF)、网络功能存储功能(network exposure function repository function,NRF)、统一数据管理(unified data management,UDM)、无线接入网(radio access network,RAN)、策略控制功能(policy control function,PCF)、用户设备(user equipment,UE)、策略控制功能(policy control function,PCF)以及其他用户面功能(user plane function,UPF)(如图3中终端设备对应的第一锚点UPF以及I-UPF),本申请实施例对此不作具体限定。虽然没有示出,目前的5G网络还可以包括AUSF以及网络切片选择功能(network slice selection function,NSSF)等。As shown in Figure 3, the current 5G network can also include access and mobility management function (AMF), capability exposure function (network exposure function, NEF), network function storage function (network exposure function repository function, NRF), unified data management (unified data management, UDM), radio access network (radio access network, RAN), policy control function (policy control function, PCF), user equipment (user equipment, UE), policy Control function (policy control function, PCF) and other user plane functions (user plane function, UPF) (such as the first anchor UPF and I-UPF corresponding to the terminal device in Figure 3), the embodiment of the present application does not specifically limit this . Although not shown, the current 5G network may also include an AUSF and a network slice selection function (network slice selection function, NSSF) and the like.
其中,各网元主要功能描述如下:Among them, the main functions of each network element are described as follows:
UE:可以称终端设备、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。UE: can be called terminal equipment, access terminal, subscriber unit, subscriber station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent or user device.
终端设备可以是一种向用户提供语音/数据连通性的设备,例如,具有无线连接功能的手持式设备、车载设备等。目前,一些终端的举例可以为:手机(mobile phone)、平板电脑(pad)、带无线收发功能的电脑(如笔记本电脑、掌上电脑等)、移动互联网设备(mobile internet device,MID)、虚拟现实(virtual reality,VR)设备、增强现实(augmented reality,AR)设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程医疗(remote medical)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端、蜂窝电话、无绳电话、SIP电话、WLL 站、PDA、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备,5G网络中的终端设备或者PLMN中的终端设备等。A terminal device may be a device that provides voice/data connectivity to users, for example, a handheld device with a wireless connection function, a vehicle-mounted device, and the like. At present, examples of some terminals can be: mobile phone (mobile phone), tablet computer (pad), computer with wireless transceiver function (such as notebook computer, palmtop computer, etc.), mobile internet device (mobile internet device, MID), virtual reality (virtual reality, VR) equipment, augmented reality (augmented reality, AR) equipment, wireless terminals in industrial control (industrial control), wireless terminals in self driving (self driving), wireless in remote medical (remote medical) Terminals, wireless terminals in smart grid, wireless terminals in transportation safety, wireless terminals in smart city, wireless terminals in smart home, cellular phones, cordless Phone, SIP phone, WLL station, PDA, handheld device with wireless communication function, computing device or other processing device connected to a wireless modem, vehicle-mounted device, wearable device, terminal device in 5G network or terminal device in PLMN, etc. .
此外,终端设备还可以是物联网(internet of things,IoT)系统中的终端设备。IoT是未来信息技术发展的重要组成部分,其主要技术特点是将物品通过通信技术与网络连接,从而实现人机互连,物物互连的智能化网络。IoT技术可以通过例如窄带(narrow band)NB技术,做到海量连接,深度覆盖,终端省电。In addition, the terminal device may also be a terminal device in an Internet of Things (internet of things, IoT) system. IoT is an important part of the future development of information technology. Its main technical feature is to connect objects to the network through communication technology, so as to realize the intelligent network of human-machine interconnection and object interconnection. IoT technology can achieve massive connections, deep coverage, and terminal power saving through, for example, narrow band NB technology.
此外,终端设备还可以包括智能打印机、火车探测器、加油站等传感器,主要功能包括收集数据(部分终端设备)、接收网络设备的控制信息与下行数据,并发送电磁波,向网络设备传输上行数据。In addition, terminal equipment can also include sensors such as smart printers, train detectors, and gas stations. The main functions include collecting data (partial terminal equipment), receiving control information and downlink data from network equipment, and sending electromagnetic waves to transmit uplink data to network equipment. .
应理解,终端设备可以是任何可以接入网络的设备。终端设备与接入网设备之间可以采用某种空口技术相互通信。It should be understood that the terminal device may be any device that can access the network. A certain air interface technology may be used to communicate with each other between the terminal device and the access network device.
在本申请中,服务鉴权代理节点(service authentication agent,SAA),可作为UE上的一个软件功能模块,UE在进行访问每个APP实例前调用该模块实现UE的二次鉴权流程。In this application, the service authentication agent (service authentication agent, SAA) can be used as a software function module on the UE, and the UE calls this module to implement the UE's secondary authentication process before accessing each APP instance.
可选地,某些APP实例可以集成特定的SAA完成UE访问APP实例的二次鉴权流程。Optionally, some APP instances can integrate a specific SAA to complete the secondary authentication process for the UE to access the APP instance.
(R)AN:(无线)接入网,对应5G中的不同接入网,如有线接入、无线基站接入等多种方式。本申请中的RAN设备包括但不限于:5G中的下一代基站(gnodeB,gNB)、演进型节点B(evolved node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(例如,home evolved nodeB,或home node B,HNB)、基带单元(base band unit,BBU)、传输点(transmitting and receiving point,TRP)、发射点(transmitting point,TP)、移动交换中心等。(R)AN: (wireless) access network, corresponding to different access networks in 5G, such as wired access, wireless base station access and other methods. The RAN equipment in this application includes but is not limited to: next-generation base station (gnodeB, gNB), evolved node B (evolved node B, eNB), radio network controller (radio network controller, RNC), node B ( node B, NB), base station controller (base station controller, BSC), base transceiver station (base transceiver station, BTS), home base station (for example, home evolved nodeB, or home node B, HNB), base band unit (base band unit, BBU), transmission point (transmitting and receiving point, TRP), transmission point (transmitting point, TP), mobile switching center, etc.
UDM:可以理解为统一数据管理网元在5G架构中的命名。UDM: It can be understood as the naming of unified data management network elements in the 5G architecture.
其中,统一数据管理网元主要包括以下功能:统一数据管理,支持3GPP鉴权和密钥协商机制中的鉴权信任状处理,用户身份处理,接入授权,注册和移动性管理,签约管理,短消息管理等。Among them, the unified data management network element mainly includes the following functions: unified data management, support for authentication credential processing in the 3GPP authentication and key agreement mechanism, user identity processing, access authorization, registration and mobility management, subscription management, SMS management, etc.
UDR:可以理解为统一数据存储网元在5G架构中的命名。其中,统一数据存储网元主要包括以下功能:签约数据、策略数据、应用数据等类型数据的存取功能。UDR: It can be understood as the naming of unified data storage network elements in the 5G architecture. Among them, the unified data storage network element mainly includes the following functions: the access function of contract data, policy data, application data and other types of data.
PCF:可以理解为策略控制功能网元在5G架构中的命名。PCF: It can be understood as the naming of policy control function network elements in the 5G architecture.
其中,策略控制功能网元主要负责针对会话、业务流级别进行计费、服务质量(quality of service,QoS)带宽保障及移动性管理、UE策略决策等策略控制功能。Among them, the policy control function network element is mainly responsible for policy control functions such as charging for sessions and service flow levels, quality of service (quality of service, QoS) bandwidth guarantee, mobility management, and UE policy decision-making.
该系统中,AMF与SMF所连接的PCF分别是接入和移动控制PCF(PCF for access and mobility control,AM PCF)和SM PCF,在实际部署中AM PCF和SM PCF可能不是同一个PCF实体。In this system, the PCFs connected by AMF and SMF are access and mobility control PCF (PCF for access and mobility control, AM PCF) and SM PCF respectively. In actual deployment, AM PCF and SM PCF may not be the same PCF entity.
SMF:可以理解为会话管理功能网元在5G架构中的命名。SMF: It can be understood as the naming of session management function network elements in the 5G architecture.
其中,会话管理功能网元主要进行会话管理、PCF下发控制策略的执行、UPF的选择、UE IP地址分配等功能。Among them, the session management function network element mainly performs functions such as session management, execution of control policies issued by the PCF, selection of UPF, and allocation of UE IP addresses.
SMF还可以集成有安全锚点功能(security anchor function,SEAF)模块,该SEAF模块主要负责发起鉴权请求。若SMF上集成APP的SEAF(SEAF for APP)的功能,可实 现对APP作为一个特殊终端会话接入5G核心网的安全锚点。The SMF can also be integrated with a security anchor function (security anchor function, SEAF) module, and the SEAF module is mainly responsible for initiating an authentication request. If the SEAF (SEAF for APP) function of the APP is integrated on the SMF, it can realize the security anchor point for the APP to access the 5G core network as a special terminal session.
AMF:可以理解为移动性管理网元在5G架构中的命名。AMF: It can be understood as the naming of mobility management network elements in the 5G architecture.
其中,移动性管理网元主要包括以下功能:连接管理、移动性管理、注册管理、接入鉴权和授权、可达性管理、安全上下文管理等接入和移动性相关的功能。Among them, the mobility management network element mainly includes the following functions: connection management, mobility management, registration management, access authentication and authorization, reachability management, security context management and other functions related to access and mobility.
UPF:可以理解为用户面功能网元在5G架构中的命名。UPF: It can be understood as the naming of user plane functional network elements in the 5G architecture.
其中,用户面功能网元主要包括以下功能:数据包路由和传输、包检测、业务用量上报、QoS处理、合法监听、上行包检测、下行数据包存储等用户面相关的功能。Among them, the user plane function network element mainly includes the following functions: data packet routing and transmission, packet detection, service usage reporting, QoS processing, legal interception, uplink packet detection, downlink data packet storage and other user plane related functions.
AUSF:主要用于用户鉴权等。AUSF: mainly used for user authentication, etc.
NEF:主要用于支持能力和事件的开放,如用于安全地向外部开放由3GPP网络功能提供的业务和能力等。NEF: It is mainly used to support the opening of capabilities and events, such as safely opening services and capabilities provided by 3GPP network functions to the outside.
其中,如图3所示,终端设备通过RAN设备接入5G网络。Wherein, as shown in FIG. 3 , the terminal device accesses the 5G network through the RAN device.
终端设备通过N1接口(简称N1)与AMF通信。The terminal device communicates with the AMF through the N1 interface (N1 for short).
RAN设备通过N2接口(简称N2)与AMF通信。The RAN device communicates with the AMF through an N2 interface (N2 for short).
RAN设备通过N3接口(简称N3)与I-UPF通信。The RAN device communicates with the I-UPF through an N3 interface (N3 for short).
I-UPF通过N9接口(简称N9)与第二锚点UPF通信。The I-UPF communicates with the second anchor point UPF through the N9 interface (N9 for short).
第二锚点UPF通过N19接口(简称N19)与第一锚点UPF通信。The second anchor UPF communicates with the first anchor UPF through an N19 interface (N19 for short).
SMF网元通过N4接口(简称N4)分别与I-UPF、第二锚点UPF以及第一锚点UPF通信。The SMF network element communicates with the I-UPF, the second anchor UPF and the first anchor UPF respectively through the N4 interface (N4 for short).
SMF网元通过Nx接口(简称Nx)与AUEF通信。The SMF network element communicates with the AUEF through the Nx interface (Nx for short).
第一锚点UPF通过Nd接口(简称Nd)与AUEF通信。The first anchor UPF communicates with the AUEF through an Nd interface (Nd for short).
此外,图3所示的AMF、SMF、NEF、NRF、PCF或者UDM等控制面功能也可以采用服务化接口进行交互。In addition, control plane functions such as AMF, SMF, NEF, NRF, PCF, or UDM shown in FIG. 3 may also use service interfaces for interaction.
例如,AMF对外提供的服务化接口可以为Namf。For example, the service interface provided by AMF may be Namf.
SMF对外提供的服务化接口可以为Nsmf。The service interface provided by the SMF may be Nsmf.
NEF对外提供的服务化接口可以为Nnef。The service interface provided by NEF can be Nnef.
NRF对外提供的服务化接口可以为Nnrf。The service interface provided by the NRF may be Nnrf.
PCF对外提供的服务化接口可以为Npcf。The service interface provided by the PCF may be Npcf.
UDM对外提供的服务化接口可以为Nudm。The service interface provided by UDM can be Nudm.
相关描述可以参考23501标准中的5G系统架构(5G system architecture)图,在此不予赘述。本申请新增了一个控制面功能SAF,SAF对外提供的服务化接口可以为Nsaf。For related descriptions, please refer to the 5G system architecture (5G system architecture) diagram in the 23501 standard, which will not be repeated here. This application adds a control plane function SAF, and the service interface provided by the SAF may be Nsaf.
应理解,本申请中的接入网设备、会话管理功能网元、策略控制网元或者应用功能网元也可以称之为通信装置或通信设备,其可以是一个通用设备或者是一个专用设备,本申请对此不作具体限定。It should be understood that the access network device, session management function network element, policy control network element, or application function network element in this application may also be referred to as a communication device or a communication device, which may be a general-purpose device or a dedicated device. This application does not specifically limit it.
应理解,本申请中的会话管理功能实体、第一鉴权功能实体、或者APP实例接入模块的相关功能可以由一个设备实现,也可以由多个设备共同实现,还可以是由一个设备内的一个或多个功能模块实现,本申请对此不作具体限定。It should be understood that the relevant functions of the session management functional entity, the first authentication functional entity, or the APP instance access module in this application can be implemented by one device, or jointly implemented by multiple devices, or can be implemented by a device implemented by one or more functional modules, which is not specifically limited in the present application.
可以理解的是,上述功能既可以是硬件设备中的网络元件,也可以是在专用硬件上运行的软件功能,或者是硬件与软件的结合,或者是平台(例如,云平台)上实例化的虚拟化功能。It can be understood that the above functions can be network elements in hardware devices, software functions running on dedicated hardware, or a combination of hardware and software, or instantiated on a platform (for example, a cloud platform) virtualization capabilities.
需要说明的是,图3中包括的各个网元(比如PCF、AMF等)的命名仅是一个名字, 名字对网元本身的功能不构成限定。在5G网络以及未来其它的网络中,上述各个网元也可以是其他的名字,本申请对此不作具体限定。例如,在6G网络中,上述各个网元中的部分或全部可以沿用5G中的术语,也可能是其他命名,等等,在此进行统一说明,以下不再赘述。It should be noted that the naming of each network element (such as PCF, AMF, etc.) included in FIG. 3 is only a name, and the name does not limit the function of the network element itself. In the 5G network and other networks in the future, the above-mentioned network elements may also have other names, which are not specifically limited in this application. For example, in a 6G network, some or all of the above-mentioned network elements may use the terms in 5G, or may be named by other names, etc., which will be described in a unified manner here, and will not be described in detail below.
本领域技术人员可以理解,图3所示的网元之间的交互只是一种示例性描述,实际上5G系统还可以包括其他与图中示意的网元进行交互的网元,在此不予赘述。Those skilled in the art can understand that the interaction between the network elements shown in FIG. 3 is only an exemplary description. In fact, the 5G system may also include other network elements that interact with the network elements shown in the figure, which are not described here. repeat.
下文将对本申请的方案进行说明。The scheme of the present application will be described below.
已有方案中,第三方APP访问移动通信网络时,AF可以作为APP应用服务利用核心网中的NEF对AF进行认证从而使用一些网络功能,但是基于上述的NEF功能无法完全对AF开放关键的网络和用户敏感信息,从而会影响5G网络中终端设备与APP实例之间的访问控制、优化保障、安全交互等方面策略的实施,不利于APP利用5G网络更好的为用户提供服务。In existing solutions, when a third-party APP accesses the mobile communication network, AF can use NEF in the core network to authenticate AF as an APP application service to use some network functions. However, based on the above-mentioned NEF functions, the key network cannot be completely opened to AF. and user sensitive information, which will affect the implementation of access control, optimization guarantee, and security interaction strategies between terminal devices and APP instances in the 5G network, which is not conducive to APP's use of the 5G network to better serve users.
针对上述问题,本申请提出了一种鉴权方法,能够实现对APP实例接入到5G网络前的安全认证工作,确保APP实例符合接入5G网络中的安全要求,继而将其纳入到5G网络的安全信任域中。In view of the above problems, this application proposes an authentication method, which can realize the security authentication of the APP instance before accessing the 5G network, ensure that the APP instance meets the security requirements for accessing the 5G network, and then incorporate it into the 5G network in the security trust domain.
图4示出了本申请提供的一种鉴权方法,用于对APP实例接入网络时进行入网鉴权,亦即一次鉴权。该方法主要包括以下步骤S401-S403。FIG. 4 shows an authentication method provided by the present application, which is used for network access authentication when an APP instance accesses the network, that is, one-time authentication. The method mainly includes the following steps S401-S403.
S401,APP实例接入模块向会话管理功能网元发送第一会话建立请求,该第一会话建立请求包括APP实例的标识信息和该APP实例的标识信息对应的第一鉴权信息。S401. The APP instance access module sends a first session establishment request to a session management function network element, where the first session establishment request includes identification information of the APP instance and first authentication information corresponding to the identification information of the APP instance.
应理解,当APP实例接入网络或进行鉴权时,APP实例可以作为一种特殊的终端设备向会话管理功能网元发送会话建立请求,该会话建立请求包括该APP实例的标识信息和APP实例的标识信息对应的第一鉴权信息。It should be understood that when an APP instance accesses the network or performs authentication, the APP instance can be used as a special terminal device to send a session establishment request to the session management function network element, and the session establishment request includes the identification information of the APP instance and the APP instance The first authentication information corresponding to the identification information.
应理解,该第一鉴权信息可以是与该APP实例的标识信息对应的第一授权码,其具体用于第一鉴权功能实体对APP实例进行认证或者鉴权时,第一鉴权功能实体通过对该第一授权码和本地产生的与该标识信息对应的第二鉴权信息或者说是第二授权码进行比对,从而辅助第一鉴权功能实体对APP实例进行鉴权。It should be understood that the first authentication information may be a first authorization code corresponding to the identification information of the APP instance, which is specifically used when the first authentication functional entity authenticates or authenticates the APP instance. By comparing the first authorization code with the locally generated second authentication information corresponding to the identification information or the second authorization code, the first authentication function entity is assisted in authenticating the APP instance.
可选地,APP实例的标识信息可以包括该APP实例的设备标识和/或APP实例的业务标识。Optionally, the ID information of the APP instance may include a device ID of the APP instance and/or a service ID of the APP instance.
其中,该设备标识用于标识该APP实例的归属、位置和类型等信息,例如APP实例的设备标识能够用于唯一地确定一个APP实例,如APP实例的位置信息等。该业务标识用于标识该APP实例的业务对外提供服务的身份认证信息,例如APP名称、身份(identifier,ID)或者域名(domain)等。Wherein, the device identifier is used to identify information such as the ownership, location, and type of the APP instance. For example, the device identifier of the APP instance can be used to uniquely determine an APP instance, such as the location information of the APP instance. The service identifier is used to identify the identity authentication information of the service provided by the APP instance, such as APP name, identity (identifier, ID) or domain name (domain).
示例性地,APP实例的位置信息可以是该APP实例签约的归属公共陆地移动网(home public land mobile network,HPLMN);或者,APP实例的位置信息可以是该APP实例所服务的跟踪区的区域标识;或者,APP实例的位置信息可以是该APP实例所服务小区的小区标识等。Exemplarily, the location information of the APP instance may be the home public land mobile network (home public land mobile network, HPLMN) to which the APP instance subscribes; or, the location information of the APP instance may be the area of the tracking area served by the APP instance ID; or, the location information of the APP instance may be the cell ID of the cell served by the APP instance, etc.
示例性地,APP实例的业务标识用于标识该APP实例的业务对外提供服务的身份认证信息,可唯一确定一个APP,例如,APP实例的业务标识可以是应用名称或应用域名信息等。Exemplarily, the service identifier of an APP instance is used to identify the identity authentication information of the APP instance's business to provide external services, and can uniquely determine an APP. For example, the service identifier of an APP instance can be the application name or application domain name information.
该APP实例的设备标识可以是APP实例设备永久标识(APP instance equipment permanent identifier,AIEPI)或者APP实例设备隐藏标识(APP instance equipment concealed identifier,AIECI)。The device identifier of the APP instance may be an APP instance equipment permanent identifier (AIP instance equipment permanent identifier, AIEPI) or an APP instance equipment concealed identifier (APP instance equipment concealed identifier, AIECI).
该APP实例的业务标识可以是APP实例业务永久标识(APP instance service permanent identifier,AIEPI)或者APP实例业务隐藏标识(APP instance service concealed identifier,AIECI)。The service identifier of the APP instance may be an APP instance service permanent identifier (AIEPI) or an APP instance service concealed identifier (APP instance service concealed identifier, AIECI).
应理解,此处对于APP实例标识的定义需要考虑原始的实例标识,以及为了安全性考虑可以通过加密或Hash的方式生成一个永久标识对应的隐藏标识来进行传递。It should be understood that the definition of the APP instance ID here needs to consider the original instance ID, and for security reasons, a hidden ID corresponding to a permanent ID can be generated by means of encryption or Hash for transmission.
应理解,上述第一会话建立请求可以用于为APP实例与核心网建立第一会话,从而可以使得APP实例后续可以通过第一会话与其他设备进行数据通信。It should be understood that the above-mentioned first session establishment request may be used to establish a first session for the APP instance and the core network, so that the APP instance may subsequently perform data communication with other devices through the first session.
示例性地,这里的第一会话可以为4G中的分组数据网络(packet data network,PDN)连接或5G中的PDU会话,还可以为未来其他网络中的其他连接,在此统一说明,以下不再赘述。Exemplarily, the first session here may be a packet data network (packet data network, PDN) connection in 4G or a PDU session in 5G, and may also be other connections in other networks in the future, which will be uniformly described here, and will not be described below Let me repeat.
S402,会话管理功能网元向第一鉴权功能实体发送第一鉴权请求,用于请求第一鉴权功能实体对APP实例进行鉴权,第一鉴权请求包括APP实例的标识信息和该标识信息对应的第一鉴权信息。S402. The session management functional network element sends a first authentication request to the first authentication functional entity, for requesting the first authentication functional entity to authenticate the APP instance. The first authentication request includes the identification information of the APP instance and the APP instance. The first authentication information corresponding to the identification information.
应理解,会话管理功能网元可以是5G系统中的SMF网元。It should be understood that the session management function network element may be an SMF network element in the 5G system.
需要说明的是,如果该SMF上集成了SEAF模块,则该会话管理功能网元具体为包含SEAF功能的SMF。It should be noted that, if the SMF is integrated with the SEAF module, the session management function network element is specifically the SMF including the SEAF function.
如果SMF与SEAF为不同的模块或功能实体,即SEAF不在SMF上,则SMF将第一会话建立请求发送给SEAF,再由SEAF向第一鉴权功能实体发送该第一鉴权请求。If the SMF and the SEAF are different modules or functional entities, that is, the SEAF is not on the SMF, the SMF sends the first session establishment request to the SEAF, and then the SEAF sends the first authentication request to the first authentication functional entity.
第一鉴权功能实体可以为核心网新增的网元SAF,也可以为扩展的具备第一鉴权功能实体功能的AUSF网元,即第一鉴权功能实体可以为现有的网元,也可以为新增的网元,本申请对第一鉴权功能实体对应的网元不作限定。The first authentication functional entity may be a newly added network element SAF of the core network, or an extended AUSF network element having the function of the first authentication functional entity, that is, the first authentication functional entity may be an existing network element, It may also be a newly added network element, and this application does not limit the network element corresponding to the first authentication functional entity.
S403,第一鉴权功能实体根据APP实例的标识信息和APP实例的标识信息对应的第一鉴权信息对APP实例进行鉴权,并向会话管理功能网元发送第一鉴权响应,该第一鉴权响应包括对APP实例的鉴权结果。S403, the first authentication function entity authenticates the APP instance according to the identification information of the APP instance and the first authentication information corresponding to the identification information of the APP instance, and sends a first authentication response to the session management function network element, the first authentication response An authentication response includes the authentication result for the APP instance.
具体地,第一鉴权功能实体根据该APP实例的标识信息和该第一鉴权信息对该APP实例进行鉴权。Specifically, the first authentication function entity authenticates the APP instance according to the identification information of the APP instance and the first authentication information.
示例性地,第一鉴权功能实体确定本地与该标识信息对应的第二鉴权信息,例如,该第二鉴权信息也可以是一种授权码;第一鉴权功能实体对第一鉴权信息与第二鉴权信息进行比对,如果第一鉴权信息与第二鉴权信息比对一致,则APP实例鉴权成功,反之,如果第一鉴权信息与第二鉴权信息比对不一致,则APP实例鉴权失败。Exemplarily, the first authentication functional entity determines locally the second authentication information corresponding to the identification information, for example, the second authentication information may also be an authorization code; the first authentication functional entity The authentication information is compared with the second authentication information. If the first authentication information is consistent with the second authentication information, the APP instance authentication is successful. Conversely, if the first authentication information is compared with the second authentication information If they are inconsistent, the APP instance authentication fails.
更具体地,第一鉴权功能实体可以判断核心网的授权数据库中是否存在该APP实例的标识信息,如果存在,则验证APP实例的标识信息对应的第一鉴权信息是否正确,若正确,则APP实例鉴权通过,从而能够实现当APP实例鉴权失败时,则该APP实例不安全,则5G网络不允许其提供服务,从而可以保障5G网络的安全性。More specifically, the first authentication functional entity may determine whether the identification information of the APP instance exists in the authorization database of the core network, and if so, verify whether the first authentication information corresponding to the identification information of the APP instance is correct, and if it is correct, Then the APP instance authentication passes, so that when the APP instance authentication fails, the APP instance is not safe, and the 5G network does not allow it to provide services, thereby ensuring the security of the 5G network.
应理解,该APP实例的鉴权结果可以包括指示APP实例鉴权成功的信息或者指示APP实例鉴权失败的信息,从而能够指示会话管理功能网元该APP实例的鉴权结果,从而能 够指示会话管理功能网元基于该鉴权结果做出相应的操作,例如,如果APP鉴权通过,则可以为APP实例建立会话,如果APP实例鉴权失败,则可以不为APP实例建立会话。It should be understood that the authentication result of the APP instance may include information indicating the successful authentication of the APP instance or information indicating that the authentication of the APP instance failed, so as to indicate the authentication result of the APP instance to the session management function network element, thereby indicating the session The management network element performs corresponding operations based on the authentication result. For example, if the APP authentication passes, a session can be established for the APP instance; if the APP instance fails authentication, a session cannot be established for the APP instance.
可选地,当APP实例鉴权通过后,会话管理功能网元接收包括指示APP实例鉴权通过的第一鉴权响应,然后选择用户面功能实体为该APP实例建立第一会话。Optionally, after the APP instance is authenticated, the session management function network element receives the first authentication response indicating that the APP instance is authenticated, and then selects a user plane functional entity to establish the first session for the APP instance.
可选地,当APP实例鉴权失败后,会话管理功能网元接收包括指示APP实例鉴权结果为失败的第一鉴权响应,向APP实例接入模块发送第一会话建立失败消息。Optionally, when the APP instance authentication fails, the session management function network element receives the first authentication response indicating that the APP instance authentication result is failed, and sends a first session establishment failure message to the APP instance access module.
示例性地,当APP实例鉴权失败后,则会话管理功能网元拒绝为该APP实例建立第一会话,又或者,会话管理功能网元拒绝该APP实例与5G网络中的终端设备之间的业务层面上的互访,从而保障5G网络的安全性。Exemplarily, when the APP instance authentication fails, the session management function network element refuses to establish the first session for the APP instance, or, the session management function network element rejects the connection between the APP instance and the terminal device in the 5G network. Mutual visits at the business level to ensure the security of the 5G network.
如果UE要访问APP所提供的数据网络,例如APP,除了入网认证外,仍需要进行二次鉴权。If the UE wants to access the data network provided by the APP, such as the APP, in addition to the network access authentication, a second authentication is still required.
APP实例完成接入5G网络的鉴权流程后,UE访问APP时,在完成身份验证后,APP实例可能向该UE提供服务。After the APP instance completes the authentication process for accessing the 5G network, when the UE accesses the APP, the APP instance may provide services to the UE after identity verification is completed.
应理解,在前述方案中,第一鉴权功能实体可以接收来自会话管理功能网元的第一鉴权请求,也可以接收来自SEAF的第一鉴权请求,这具体取决于该会话管理功能网元是否集成了SEAF模块。如果该会话管理功能网元集成了该SEAF模块,则第一鉴权功能实体接收来自会话管理功能网元的第一鉴权请求,以及向会话管理功能网元发送第一鉴权响应;如果该会话管理功能网元没有集成该SEAF模块,则第一鉴权功能实体接收来自SEAF的第一鉴权请求,以及向该SEAF发送第一鉴权请求。具体内容可以参看前述描述,在此不再赘述。It should be understood that, in the foregoing solution, the first authentication function entity may receive the first authentication request from the session management function network element, or may receive the first authentication request from the SEAF, depending on the session management function network element. Whether the element integrates the SEAF module. If the session management function network element integrates the SEAF module, the first authentication function entity receives the first authentication request from the session management function network element, and sends a first authentication response to the session management function network element; if the If the session management functional network element does not integrate the SEAF module, the first authentication functional entity receives the first authentication request from the SEAF, and sends the first authentication request to the SEAF. For specific content, reference may be made to the foregoing description, and details are not repeated here.
可选地,在前述方案中,会话管理功能网元向第一鉴权功能实体发送的第一鉴权请求还可以携带虚拟业务网络标识,虚拟业务网络标识是运营商规划和分配的一个虚拟业务网络的唯一标识,该虚拟业务网络包括可以对外提供服务的APP实例、可以访问APP实例的终端用户,以及划分虚拟业务网络的用户参数,例如:签约信息、位置信息、切片、DNN、应用等。Optionally, in the foregoing solution, the first authentication request sent by the session management function network element to the first authentication function entity may also carry a virtual service network identifier, which is a virtual service network planned and allocated by the operator. The unique identifier of the network. The virtual service network includes APP instances that can provide services externally, end users who can access APP instances, and user parameters that divide the virtual service network, such as: subscription information, location information, slices, DNN, applications, etc.
通过上述技术方案,本申请通过第一鉴权功能实体对接入网络的APP实例进行鉴权,只有鉴权通过的合法实例才允许接入网络,对终端用户提供服务,并能够保证5G网络的安全,也可以经过鉴权之后的APP实例纳入到5G核心网的信任域中,允许对其进行访问控制、预留资源和保障体验等策略。Through the above technical solution, this application authenticates the APP instances that access the network through the first authentication functional entity, and only legal instances that pass the authentication are allowed to access the network, provide services to end users, and ensure the security of the 5G network. Security, the authenticated APP instance can also be included in the trust domain of the 5G core network, allowing policies such as access control, resource reservation, and experience guarantee.
如图5所示,本申请提供了又一种鉴权方法,用于对UE接入具体APP实例时进行二次鉴权。该方法主要包括以下步骤S501-S502。As shown in FIG. 5 , the present application provides another authentication method, which is used to perform secondary authentication when the UE accesses a specific APP instance. The method mainly includes the following steps S501-S502.
S501,会话管理功能网元向第一鉴权功能实体发送第二鉴权请求,第二鉴权请求用于请求第一鉴权功能实体对访问APP的终端设备进行二次鉴权,该第二鉴权请求包括终端设备的标识信息、APP的应用标识以及与终端设备的标识信息和APP的应用标识对应的第三鉴权信息。S501. The session management functional network element sends a second authentication request to the first authentication functional entity, where the second authentication request is used to request the first authentication functional entity to perform a second authentication on the terminal device accessing the APP. The authentication request includes the identification information of the terminal device, the application identification of the APP, and third authentication information corresponding to the identification information of the terminal device and the application identification of the APP.
应理解,该第三鉴权信息可以是与终端设备的标识信息和APP的应用标识对应的第三授权码,其具体用于第一鉴权功能实体对终端设备进行认证时,第一鉴权功能实体对该第三授权码和本地产生的与终端设备的标识信息和APP的应用标识对应的第四鉴权信息,或者说是第四授权码进行比对,从而辅助第一鉴权功能实体对终端设备进行鉴权。It should be understood that the third authentication information may be a third authorization code corresponding to the identification information of the terminal device and the application identification of the APP, which is specifically used when the first authentication functional entity authenticates the terminal device. The functional entity compares the third authorization code with the locally generated fourth authentication information corresponding to the identification information of the terminal device and the application identification of the APP, or the fourth authorization code, thereby assisting the first authentication functional entity Authenticate the terminal device.
应理解,该APP的应用标识可以是一种APP名称,也可以是一种APP身份标识,其具体用于识别APP的类型或者身份。It should be understood that the application identifier of the APP may be an APP name, or an APP identity identifier, which is specifically used to identify the type or identity of the APP.
示例性地,第一鉴权功能实体能够基于终端设备的标识信息确定该终端设备能够访问哪些APP,在确定该终端设备能够访问的APP里面,通过使用APP的应用标识确定该终端设备能够访问的APP里面是否包括该APP,如果能够查询到,则第一鉴权功能实体进行第三鉴权信息和第四鉴权信息的比对。比对一致,则该终端设备鉴权通过,如果比对不一致,则该终端设备鉴权失败,则不能访问该APP,但是本申请并不限定该终端设备能否访问除APP之外的其他APP。如果不能查询得到,则默认返回鉴权失败的指示信息。Exemplarily, the first authentication function entity can determine which APPs the terminal device can access based on the identification information of the terminal device, and determine which APPs the terminal device can access by using the application identifier of the APP. Whether the APP is included in the APP, if it can be found, the first authentication functional entity compares the third authentication information with the fourth authentication information. If the comparison is consistent, the authentication of the terminal device passes. If the comparison is inconsistent, the authentication of the terminal device fails, and the APP cannot be accessed. However, this application does not limit whether the terminal device can access other APPs except the APP. . If it cannot be queried, the authentication failure indication information will be returned by default.
又或者,第一鉴权功能实体通过先查询APP能够提供服务的签约的终端设备,并利用该终端设备的标识信息确定该终端设备是否属于能够访问该APP的终端设备,如果能够查询到,则第一鉴权功能实体进行第三鉴权信息和第四鉴权信息之间的比对。比对一致,则该终端设备鉴权通过,如果比对不一致,则该终端设备鉴权失败,则不能访问该APP,但是本申请并不限定该终端设备能否访问除APP之外的其他APP。如果查询不到,则默认返回鉴权失败的指示信息。Alternatively, the first authentication function entity first queries the subscribed terminal device that the APP can provide services, and uses the identification information of the terminal device to determine whether the terminal device belongs to the terminal device that can access the APP. If it can be found, then The first authentication function entity compares the third authentication information with the fourth authentication information. If the comparison is consistent, the authentication of the terminal device passes. If the comparison is inconsistent, the authentication of the terminal device fails, and the APP cannot be accessed. However, this application does not limit whether the terminal device can access other APPs except the APP. . If no query is found, the authentication failure indication information will be returned by default.
可选地,会话管理功能网元向第一鉴权功能实体发送第二鉴权请求之前,该会话管理功能网元接收第一会话修改请求,第一会话修改请求用于请求修改终端设备与APP的会话,第一会话修改请求包括终端设备的标识信息、APP的应用标识以及第三鉴权信息。Optionally, before the session management function network element sends the second authentication request to the first authentication function entity, the session management function network element receives the first session modification request, and the first session modification request is used to request modification of the terminal device and APP session, the first session modification request includes the identification information of the terminal device, the application identification of the APP, and the third authentication information.
通过对终端设备的二次鉴权,可以让运营商可以对终端访问特定APP实例进行认证,确保终端有对应的应用实例访问权限,增强APP实例的安全性,同时也防止了非法用户对APP实例的攻击和不合规的访问行为。同样的终端在完成二次鉴权之后允许访问的APP应用实例也在同一个安全领域,防止了不合规的APP实例为终端用户提供服务,提高了终端用户在APP访问行为中的安全性。Through the secondary authentication of the terminal device, the operator can authenticate the terminal's access to a specific APP instance, ensure that the terminal has the corresponding application instance access authority, enhance the security of the APP instance, and prevent illegal users from accessing the APP instance. Attacks and non-compliant access behaviors. The APP application instance that the same terminal is allowed to access after completing the secondary authentication is also in the same security field, which prevents non-compliant APP instances from providing services to end users and improves the security of end users in APP access behavior.
可选地,会话管理功能网元向第一鉴权功能实体发送第二鉴权请求之前,该会话管理功能网元接收来自用户面功能网元的第三鉴权请求,第三鉴权请求用于请求对访问APP的终端设备进行鉴权,该第三鉴权请求包括终端设备的标识信息、APP的应用标识以及第三鉴权信息。Optionally, before the session management functional network element sends the second authentication request to the first authentication functional entity, the session management functional network element receives a third authentication request from the user plane functional network element, and the third authentication request uses In order to request authentication of the terminal device accessing the APP, the third authentication request includes identification information of the terminal device, an application identification of the APP, and third authentication information.
通过对终端设备的二次鉴权,可以让运营商可以对终端访问特定APP实例进行认证,确保终端有对应的应用实例访问权限,增强APP实例的安全性,同时也防止了非法用户对APP实例的攻击和不合规的访问行为。同样的终端在完成二次鉴权之后允许访问的APP应用实例也在同一个安全领域,防止了不合规的APP实例为终端用户提供服务,提高了终端用户在APP访问行为中的安全性。Through the secondary authentication of the terminal device, the operator can authenticate the terminal's access to a specific APP instance, ensure that the terminal has the corresponding application instance access authority, enhance the security of the APP instance, and prevent illegal users from accessing the APP instance. Attacks and non-compliant access behaviors. The APP application instance that the same terminal is allowed to access after completing the secondary authentication is also in the same security field, which prevents non-compliant APP instances from providing services to end users and improves the security of end users in APP access behavior.
应理解,如果终端设备在访问APP需要进行二次验证之前,该终端设备能够通过数据面,即能够向用户面功能网元发送该终端设备的标识信息、APP的应用标识以及与该终端设备的标识信息和APP的应用标识对应的第三鉴权信息,并由该用户面功能网元转给会话管理功能网元。It should be understood that if the terminal device needs to perform secondary verification before accessing the APP, the terminal device can pass through the data plane, that is, it can send the identification information of the terminal device, the application identifier of the APP, and the connection with the terminal device to the functional network element of the user plane. The identification information and the third authentication information corresponding to the application identification of the APP are transferred from the user plane functional network element to the session management functional network element.
进一步可选地,如果终端设备通过扩展会话修改请求或者二次鉴权请求发起对终端设备的二次鉴权流程,则可以直接将二次鉴权请求发送给会话管理功能网元,能够不进行前述先发给用户面功能网元并由该用户面功能网元转发给会话管理功能网元。Further optionally, if the terminal device initiates a secondary authentication process for the terminal device through an extended session modification request or a secondary authentication request, it may directly send the secondary authentication request to the session management function network element, and may not The foregoing is first sent to the user plane functional network element and then forwarded to the session management functional network element by the user plane functional network element.
应理解,终端设备通过控制面发起的二次鉴权请求,可以通过已有的会话修改请求消 息扩展新信元来承载,也可以是由新消息来承载。It should be understood that the secondary authentication request initiated by the terminal device through the control plane can be borne by extending a new information element from an existing session modification request message, or it can be borne by a new message.
可选地,该终端设备的标识信息包括终端设备设备标识和/或业务标识。其中,终端设备的设备标识可以唯一确定一个终端设备,终端设备的标识可以是终端用户在特定应用下的注册标识,比如用户名,但同一个终端设备标识针对不同的应用访问行为可能会有多个业务标识。Optionally, the identification information of the terminal device includes a device identification and/or a service identification of the terminal device. Among them, the device identifier of the terminal device can uniquely determine a terminal device, and the identifier of the terminal device can be the registration identifier of the terminal user under a specific application, such as a user name, but the same terminal device identifier may have different access behaviors for different applications. business ID.
可选地,如果UE在新建会话时访问该APP,则会话管理功能网元向第一鉴权功能实体发送第二鉴权请求前,接收来自UE的第二会话建立请求,用于请求建立与APP实例的第二会话,以达到与APP实例间的数据互访。其中,该第二会话建立请求包括UE的标识信息和该标识信息对应的第三鉴权信息。Optionally, if the UE accesses the APP when creating a new session, before the session management function network element sends the second authentication request to the first authentication functional entity, it receives a second session establishment request from the UE for requesting establishment and The second session of the APP instance to achieve data exchange with the APP instance. Wherein, the second session establishment request includes identification information of the UE and third authentication information corresponding to the identification information.
可选地,如果UE在已有会话中访问该APP,则会话管理功能网元向第一鉴权功能实体发送第二鉴权请求前,接收来自UE的会话修改请求,用于请求修改与APP实例的会话,以达到与APP实例间的数据互访。其中,该会话修改请求包括UE的标识信息和该标识信息对应的第三鉴权信息。Optionally, if the UE accesses the APP in an existing session, before the session management functional network element sends the second authentication request to the first authentication functional entity, it receives a session modification request from the UE, which is used to request modification of the APP Instance sessions to achieve data exchange with APP instances. Wherein, the session modification request includes identification information of the UE and third authentication information corresponding to the identification information.
可选地,如果UE在已有会话中访问该APP,则会话管理功能网元向第一鉴权功能实体发送第二鉴权请求前,接收来自为UE提供服务的锚点UPF通过数据面发起的二次鉴权请求,该二次鉴权请求包括UE的标识信息和该标识信息对应的第三鉴权信息。Optionally, if the UE accesses the APP in an existing session, before the session management function network element sends the second authentication request to the first authentication function entity, it receives an authentication request from the anchor UPF that provides services for the UE through the data plane. A secondary authentication request, where the secondary authentication request includes identification information of the UE and third authentication information corresponding to the identification information.
S502,第一鉴权功能实体基于终端设备的标识信息、APP的应用标识以及与该终端设备的标识信息和APP的应用标识对应的第三鉴权信息对该终端设备进行鉴权,并向会话管理功能网元发送第二鉴权响应,第二鉴权响应包括对终端设备的鉴权结果。S502. The first authentication functional entity authenticates the terminal device based on the identification information of the terminal device, the application identifier of the APP, and the third authentication information corresponding to the identification information of the terminal device and the application identifier of the APP, and sends an authentication report to the session The management function network element sends a second authentication response, where the second authentication response includes an authentication result for the terminal device.
具体地,第一鉴权功能实体确定本地与该终端设备的标识信息和APP的应用标识对应的第四鉴权信息,例如,该第四鉴权信息也可以是一种授权码;第一鉴权功能实体对第三鉴权信息与第四鉴权信息进行比对,如果第三鉴权信息与第四鉴权信息比对一致,则终端设备鉴权成功,反之,如果第三鉴权信息与第四鉴权信息比对不一致,则终端设备鉴权失败。Specifically, the first authentication functional entity determines locally the fourth authentication information corresponding to the identification information of the terminal device and the application identifier of the APP, for example, the fourth authentication information may also be an authorization code; the first authentication The authorization functional entity compares the third authentication information with the fourth authentication information. If the third authentication information is consistent with the fourth authentication information, the terminal device authentication succeeds. Otherwise, if the third authentication information If the comparison with the fourth authentication information is inconsistent, the authentication of the terminal device fails.
更具体地,第一鉴权功能实体能够首先通过该APP的应用标识确定该APP的类型或者身份,继而判断该APP的授权数据库中是否存在该终端设备的标识信息,如果存在,则进一步地验证第三鉴权信息是否正确,如果正确,则终端设备鉴权通过,反之,则终端设备鉴权失败。More specifically, the first authentication functional entity can first determine the type or identity of the APP through the application identifier of the APP, and then determine whether the identification information of the terminal device exists in the authorization database of the APP, and if so, further verify Whether the third authentication information is correct, if correct, the terminal device authentication passes, otherwise, the terminal device authentication fails.
关于APP的应用标识与该终端设备的标识信息之间的关系,可以参见前述描述,在此不再赘述。Regarding the relationship between the application identifier of the APP and the identifier information of the terminal device, reference may be made to the foregoing description, and details are not repeated here.
可选地,该终端设备的鉴权结果可以包括指示终端设备鉴权通过的信息或指示终端设备鉴权失败的信息,从而能够指示会话管理功能网元该终端设备的鉴权结果,从而能够指示会话管理功能网元基于该鉴权结果做出相应的操作,例如,如果终端设备鉴权通过,则可以为该终端设备建立会话,如果该终端设备鉴权失败,则可以不为该终端设备建立会话。Optionally, the authentication result of the terminal device may include information indicating that the terminal device has passed authentication or information indicating that the terminal device has failed authentication, so as to indicate the session management function network element the authentication result of the terminal device, thereby indicating The session management function network element performs corresponding operations based on the authentication result. For example, if the terminal device passes the authentication, it can establish a session for the terminal device; if the terminal device fails the authentication, it does not need to establish a session for the terminal device. session.
可选地,当UE二次鉴权通过,若UE在新建会话时访问该APP,会话管理功能网元为该UE和APP的APP实例建立会话,具体过程可参照现有技术,此处不再赘述。Optionally, when the UE passes the second authentication, if the UE accesses the APP when creating a new session, the session management function network element establishes a session for the UE and the APP instance of the APP. The specific process can refer to the existing technology, which will not be repeated here repeat.
可选地,当UE二次鉴权通过,若UE在已有会话时访问该APP,则会话管理功能网元向策略控制功能网元发送策略更新请求,用于请求策略控制功能网元更改规则允许UE与APP实例进行数据的互相访问,从而能够基于鉴权结果请求下发允许或禁止互访的策 略,提高终端用户和APP实例的安全性,避免不合规的访问行为或攻击。Optionally, when the UE passes the second authentication, if the UE accesses the APP when there is an existing session, the session management function network element sends a policy update request to the policy control function network element to request the policy control function network element to change the rules Allow UE and APP instance to access each other's data, so that based on the authentication result, it can request to issue a policy that allows or prohibits mutual access, improving the security of end users and APP instances, and avoiding non-compliant access behaviors or attacks.
可选地,当UE二次鉴权失败时,则会话管理功能网元拒绝建立第二会话;或者,会话管理功能网元拒绝该终端设备与APP实例之间的互访,从而能够保障5G网络的安全性。Optionally, when the second authentication of the UE fails, the session management function network element refuses to establish the second session; or, the session management function network element rejects the mutual access between the terminal device and the APP instance, so that the 5G network can be guaranteed security.
示例性地,如果终端设备鉴权失败,会话管理功能网元能够下发禁止该终端设备与该APP实例之间的互访策略到用户面功能网元,或者,不下发允许该终端设备与该APP实例之间的互访策略给用户面功能网元,并由该用户面功能网元来执行相应的允许或者禁止访问的策略。Exemplarily, if the authentication of the terminal device fails, the session management function network element can issue a policy that prohibits the mutual access between the terminal device and the APP instance to the user plane function network element, or does not issue a policy that allows the terminal device to communicate with the APP instance. The inter-access policy between APP instances is given to the user plane functional network element, and the user plane functional network element implements the corresponding policy of allowing or prohibiting access.
应理解,在前述方案中,第一鉴权功能实体可以接收来自会话管理功能网元的第二鉴权请求,也可以接收来自SEAF的第二鉴权请求,这具体取决于该会话管理功能网元是否集成了SEAF模块。如果该会话管理功能网元集成了该SEAF模块,则第一鉴权功能实体接收来自会话管理功能网元的第二鉴权请求,以及向会话管理功能网元发送第二鉴权响应;如果该会话管理功能网元没有集成该SEAF模块,则第一鉴权功能实体接收来自SEAF的第二鉴权请求,以及向该SEAF发送第二鉴权请求。具体内容可以参看前述描述,在此不再赘述。It should be understood that, in the foregoing solution, the first authentication function entity may receive the second authentication request from the session management function network element, or may receive the second authentication request from the SEAF, depending on the session management function network element. Whether the element integrates the SEAF module. If the session management function network element integrates the SEAF module, the first authentication function entity receives the second authentication request from the session management function network element, and sends a second authentication response to the session management function network element; if the If the session management function network element does not integrate the SEAF module, the first authentication function entity receives the second authentication request from the SEAF, and sends the second authentication request to the SEAF. For specific content, reference may be made to the foregoing description, and details are not repeated here.
可选地,在前述方案中,会话管理功能网元向第一鉴权功能实体发送的第一鉴权请求还可以携带虚拟业务网络标识,虚拟业务网络标识是运营商规划和分配的一个虚拟业务网络的唯一标识,该虚拟业务网络包括可以对外提供服务的APP实例、可以访问APP实例的终端用户,以及划分虚拟业务网络的用户参数,例如:签约信息、位置信息、切片、DNN、应用等。Optionally, in the foregoing solution, the first authentication request sent by the session management function network element to the first authentication function entity may also carry a virtual service network identifier, which is a virtual service network planned and allocated by the operator. The unique identifier of the network. The virtual service network includes APP instances that can provide services externally, end users who can access APP instances, and user parameters that divide the virtual service network, such as: subscription information, location information, slices, DNN, applications, etc.
通过上述技术方案,本申请能够通过第一鉴权功能实体集中对同一个虚拟业务网络中的APP实例和终端设备之间进行业务层面的认证和鉴权流程,从而保证终端设备和APP实例之间的相互访问在5G网络中的安全可信,有利于APP实例和终端设备的授权访问,避免欺诈或攻击场景的出现。Through the above technical solution, the present application can centrally perform business-level authentication and authentication procedures between the APP instance and the terminal device in the same virtual service network through the first authentication functional entity, thereby ensuring the communication between the terminal device and the APP instance. The security and trustworthiness of mutual access in the 5G network is conducive to the authorized access of APP instances and terminal devices, and avoids the occurrence of fraud or attack scenarios.
应理解,图5所述的一种鉴权方法可以是一种独立的技术方案,也能够与前述图4所述的一种鉴权方法结合起来,本申请对此不做限定。It should be understood that the authentication method described in FIG. 5 may be an independent technical solution, and may also be combined with the authentication method described in FIG. 4 , which is not limited in this application.
下面将结合具体示例对本申请提供的鉴权方法做进一步的阐述。The authentication method provided in this application will be further described below in combination with specific examples.
需要说明的是,本申请中各个实体或者模块之间的消息名字或消息中各参数的名字等只是一个示例,具体实现中也可以是其他的名字,本申请对此不作具体限定。It should be noted that the names of messages between entities or modules in this application or the names of parameters in messages are just examples, and may be other names in specific implementations, which are not specifically limited in this application.
首先,在上述图4实施例的基础上,图6所示为本申请提供的一种对APP实例进行鉴权的方法。First, on the basis of the embodiment in FIG. 4 above, FIG. 6 shows a method for authenticating an APP instance provided by this application.
在该鉴权方法中,当APP实例上线后,APP实例通过AUEF接入网络。In this authentication method, when the APP instance goes online, the APP instance accesses the network through the AUEF.
其中,AUEF可以是APP实例中集成的一个模块,也可能是应用服务平台为APP实例提供的公共能力。Among them, AUEF may be a module integrated in the APP instance, or may be a public capability provided by the application service platform for the APP instance.
具体地,将包含SEAF的SMF作为会话管理功能网元,SAF作为第一鉴权功能实体为APP实例接入网络进行鉴权。Specifically, the SMF including the SEAF is used as the session management function network element, and the SAF is used as the first authentication function entity to perform authentication for the APP instance to access the network.
该鉴权方法的一种可能的实现方式包括如下步骤。A possible implementation of the authentication method includes the following steps.
S601,AUEF向SMF发送Nsmf_PDU会话创建(PDU session create)请求。S601. The AUEF sends an Nsmf_PDU session creation (PDU session create) request to the SMF.
相应地,SMF接收来自AUEF的Nsmf_PDU会话创建请求。该Nsmf_PDU会话创建请求包括APP实例的标识信息和该标识信息对应的第一鉴权信息,用于请求为该APP实 例创建PDU会话。Correspondingly, the SMF receives the Nsmf_PDU session creation request from the AUEF. The Nsmf_PDU session creation request includes the identification information of the APP instance and the first authentication information corresponding to the identification information, and is used to request to create a PDU session for the APP instance.
其中,APP实例的标识信息的相关描述可参考图4实施例的描述,在此不再赘述。Wherein, for the relevant description of the identification information of the APP instance, reference may be made to the description of the embodiment in FIG. 4 , which will not be repeated here.
需要说明的是,本申请中的Nsmf_PDU会话创建请求仅是图4中第一会话建立请求的一种示例,第一会话建立请求还可以为其他名称,本申请对此不作限定。It should be noted that the Nsmf_PDU session creation request in this application is only an example of the first session establishment request in FIG. 4 , and the first session establishment request can also have other names, which are not limited in this application.
还需要说明的是,本申请中SMF为选定的支持为APP实例建立PDU会话的SMF为例进行说明,在此统一说明,以下不再赘述。It should also be noted that in this application, the SMF is the selected SMF that supports the establishment of a PDU session for an APP instance as an example.
可替换的是,除了S601中的PDU会话创建流程外,在APP实例上线之后,可以启动接入5G Core网络初始建立会话或者在会话建立前增加独立的注册鉴权流程,携带该APP实例的标识信息,该标识信息可以包括APP实例的设备标识和/或业务标识,该设备标识用于标识该APP实例的归属、位置、类型等,该业务标识用于标识该APP实例的业务对外提供服务的身份认证信息,例如,APP名称、ID或域名,以及与该标识信息对应的第一鉴权信息,从而进行认证和鉴权流程。Alternatively, in addition to the PDU session creation process in S601, after the APP instance goes online, it can start to access the 5G Core network to initially establish a session or add an independent registration and authentication process before the session is established, carrying the ID of the APP instance Information, the identification information may include the device identification and/or service identification of the APP instance, the device identification is used to identify the ownership, location, type, etc. of the APP instance, and the service identification is used to identify the business of the APP instance that provides services Identity authentication information, for example, APP name, ID or domain name, and first authentication information corresponding to the identification information, so as to perform authentication and authorization procedures.
应理解,AUEF向SMF发起会话建立流程时,AUEF会向SMF发送标识信息以及与该标识信息对应的第一鉴权信息,例如,APP实例的设备标识、业务标识、授权码等,或者能够增加独立的鉴权消息或流程,例如,Nsmf_PDU Session_Create SM Context Request或Nsmf_PDU Session_App Authentication Request消息,向SMF或其他支持鉴权的设备发起鉴权流程。It should be understood that when the AUEF initiates a session establishment process to the SMF, the AUEF will send the identification information and the first authentication information corresponding to the identification information to the SMF, for example, the device identification, service identification, authorization code, etc. of the APP instance, or can add An independent authentication message or process, for example, Nsmf_PDU Session_Create SM Context Request or Nsmf_PDU Session_App Authentication Request message, initiates an authentication process to SMF or other devices that support authentication.
S602,SMF向SAF发送Nsaf_APP鉴权请求(authentication request)。S602. The SMF sends an Nsaf_APP authentication request (authentication request) to the SAF.
相应地,SAF接收来自SMF的Nsaf_APP鉴权请求。该Nsaf_APP鉴权请求包括APP实例的标识信息和该标识信息对应的第一鉴权信息,用于请求为该APP实例进行鉴权。Correspondingly, the SAF receives the Nsaf_APP authentication request from the SMF. The Nsaf_APP authentication request includes identification information of the APP instance and first authentication information corresponding to the identification information, and is used to request authentication for the APP instance.
需要说明的是,本申请中的Nsaf_APP鉴权请求仅是图4中第一鉴权请求的一种示例,第一鉴权请求还可以为其他名称,本申请对此不作限定。It should be noted that the Nsaf_APP authentication request in this application is only an example of the first authentication request in FIG. 4 , and the first authentication request can also have other names, which are not limited in this application.
应理解,当SMF集成了SEAF功能,则SMF能够将APP实例的标识信息和该APP实例的标识信息对应的第一鉴权信息通过SEAF发送至SAF。It should be understood that when the SMF integrates the SEAF function, the SMF can send the identification information of the APP instance and the first authentication information corresponding to the identification information of the APP instance to the SAF through the SEAF.
应理解,如果SMF与SEAF是作为两种不同的模块或功能实体,那么SMF会先将APP实例的标识信息和该APP实例的标识信息对应的第一鉴权信息发送至SEAF,然后由SEAF再将该标识信息和第一鉴权信息发送至SAF。It should be understood that if SMF and SEAF are two different modules or functional entities, then SMF will first send the identification information of the APP instance and the first authentication information corresponding to the identification information of the APP instance to SEAF, and then SEAF will Send the identification information and the first authentication information to the SAF.
具体地,APP的SEAF安全锚点功能实体能够根据APP实例的标识信息可以查询到该APP实例归属的虚拟业务网络信息,并向SAF发起APP实例的认证和鉴权流程的时候还可以携带APP实例的标识信息。Specifically, the SEAF security anchor function entity of the APP can query the virtual service network information to which the APP instance belongs according to the identification information of the APP instance, and can also carry the APP instance when initiating the authentication and authentication process of the APP instance to the SAF identification information.
S603,SAF对APP实例进行鉴权处理。S603, the SAF performs authentication processing on the APP instance.
在本申请中,SAF根据APP实例的标识信息和该APP实例的标识信息对应的第一鉴权信息对APP实例进行鉴权处理。In this application, the SAF performs authentication processing on the APP instance according to the identification information of the APP instance and the first authentication information corresponding to the identification information of the APP instance.
具体地,SAF获取APP实例的标识信息和第一鉴权信息,SAF确定本地与该标识信息对应的第二鉴权信息,例如,该第二鉴权信息也可以是一种授权码;SAF对第一鉴权信息与第二鉴权信息进行比对,如果第一鉴权信息与第二鉴权信息比对一致,则APP实例鉴权成功,反之,如果第一鉴权信息与第二鉴权信息比对不一致,则APP实例鉴权失败,则表示该APP不安全,则不允许该APP实例提供服务,从而能够保障5G网络的安全性。Specifically, the SAF obtains the identification information and the first authentication information of the APP instance, and the SAF determines the local second authentication information corresponding to the identification information. For example, the second authentication information may also be an authorization code; The first authentication information is compared with the second authentication information. If the first authentication information is consistent with the second authentication information, the APP instance authentication is successful. On the contrary, if the first authentication information is consistent with the second authentication information If the authorization information is inconsistent, the APP instance authentication fails, indicating that the APP is not safe, and the APP instance is not allowed to provide services, thereby ensuring the security of the 5G network.
示例性地,SAF判断该APP实例的标识信息是否存在于核心网的授权数据库中,若 存在,则验证该APP实例的标识信息对应的第一鉴权信息是否正确,若正确,则APP实例鉴权成功。Exemplarily, the SAF judges whether the identification information of the APP instance exists in the authorization database of the core network. If it exists, it verifies whether the first authentication information corresponding to the identification information of the APP instance is correct. right to success.
更具体地,SAF根据APP实例的标识信息确定该标识为设备标识还是业务标识或两者兼备,然后在核心网中相应标识的授权数据库中寻找,查询到授权信息后,对该标识对应的第一授权码,或者是第一鉴权信息,进行验证。More specifically, SAF determines whether the identifier is a device identifier or a service identifier or both according to the identifier information of the APP instance, and then searches the authorization database for the corresponding identifier in the core network. An authorization code, or the first authentication information, is verified.
示例性地,SAF获取APP实例的设备标识信息和该设备标识信息对应的第一鉴权信息,然后查找设备标识的授权库,判断该APP实例的设备标识是否在该授权数据库内,若存在,对APP实例的设备标识对应的第一鉴权信息进行验证,验证通过则APP实例鉴权成功,验证不通过则APP实例鉴权失败;若APP实例的设备标识不存在于该授权数据库,则APP实例鉴权失败。Exemplarily, the SAF obtains the device identification information of the APP instance and the first authentication information corresponding to the device identification information, and then searches the authorization database of the device identification to determine whether the device identification of the APP instance is in the authorization database, and if so, Verify the first authentication information corresponding to the device ID of the APP instance. If the verification passes, the APP instance authentication succeeds. If the verification fails, the APP instance authentication fails; if the APP instance device ID does not exist in the authorization database, the APP instance Instance authentication failed.
应理解,验证方式可以为固定授权码字符串对比,也可以通过一些动态秘钥算法和参数一起计算出授权码字符串进行对比,对比一致则鉴权通过。It should be understood that the verification method can be a fixed authorization code string comparison, or the authorization code strings can be calculated through some dynamic secret key algorithms and parameters for comparison, and if the comparison is consistent, the authentication is passed.
示例性地,SAF获取APP实例的业务标识信息和该业务标识信息对应的第一鉴权信息,然后查找业务标识的授权数据库,判断该APP实例的业务标识是否在该授权数据库内,若存在,将APP实例的业务标识信息对应的第一鉴权信息进行验证,验证通过则APP实例鉴权成功;若不存在于授权数据库,则APP实例鉴权失败。Exemplarily, the SAF obtains the service identification information of the APP instance and the first authentication information corresponding to the service identification information, then searches the authorization database of the service identification, and determines whether the service identification of the APP instance is in the authorization database, and if it exists, The first authentication information corresponding to the service identification information of the APP instance is verified. If the verification passes, the APP instance authentication succeeds; if it does not exist in the authorization database, the APP instance authentication fails.
上述APP实例的设备标识对应的鉴权信息和APP实例的业务标识对应的鉴权信息可以相同,也可以不同,本申请对此不作限定。The above authentication information corresponding to the device identifier of the APP instance and the authentication information corresponding to the service identifier of the APP instance may be the same or different, which is not limited in this application.
可选地,上述授权数据库存储于UDM中。Optionally, the above authorization database is stored in UDM.
S604,SAF向SMF发送Nsaf_APP鉴权响应(authentication response)。S604. The SAF sends an Nsaf_APP authentication response (authentication response) to the SMF.
相应地,SMF接收来自SAF的Nsaf_APP鉴权响应。其中,该Nsaf_APP鉴权响应包括对APP实例的鉴权结果,鉴权结果可以为APP实例鉴权通过或APP实例鉴权失败。Correspondingly, the SMF receives the Nsaf_APP authentication response from the SAF. Wherein, the Nsaf_APP authentication response includes an authentication result for the APP instance, and the authentication result may be that the APP instance authentication passes or the APP instance authentication fails.
需要说明的是,本申请中的Nsaf_APP鉴权响应仅是图4中第一鉴权响应的一种示例,第一鉴权响应还可以为其他名称,本申请对此不做具体限定。It should be noted that the Nsaf_APP authentication response in this application is only an example of the first authentication response in FIG. 4 , and the first authentication response can also have other names, which are not specifically limited in this application.
当APP实例鉴权失败后,例如,SMF可以向AUEF发送PDU会话建立拒绝,以拒绝该PDU会话的接入。When the APP instance authentication fails, for example, the SMF may send a PDU session establishment rejection to the AUEF to refuse access to the PDU session.
又例如,当APP实例鉴权未通过时,还可以通过规则禁止APP实例向外提供虚拟业务网络服务,同时反馈AUEF该APP实例鉴权失败,可以重新发起新的鉴权过程。For another example, when the APP instance authentication fails, the APP instance can also be prohibited from providing virtual service network services through rules, and the AUEF can be fed back that the APP instance authentication fails, and a new authentication process can be re-initiated.
S605,当APP实例的鉴权通过后,SMF选择锚点UPF为APP实例建立PDU会话。S605, after the authentication of the APP instance is passed, the SMF selects the anchor point UPF to establish a PDU session for the APP instance.
示例性地,SMF向第二锚点UPF发送N4会话建立请求(N4session establishment request)。Exemplarily, the SMF sends an N4 session establishment request (N4 session establishment request) to the second anchor point UPF.
相应地,第二锚点UPF接收来自SMF的N4会话建立请求。该N4会话建立请求包括APP实例的标识信息,用于请求为APP实例建立PDU会话。Correspondingly, the second anchor UPF receives the N4 session establishment request from the SMF. The N4 session establishment request includes identification information of the APP instance, and is used for requesting establishment of a PDU session for the APP instance.
需要说明的是,本申请中的N4会话建立请求为建立会话请求消息的一种示例,还可以为其他消息,本申请对此不做具体限定。It should be noted that the N4 session establishment request in this application is an example of a session establishment request message, and may also be other messages, which are not specifically limited in this application.
具体地,SMF在APP实例鉴权通过之后,选择第二锚点UPF为该APP实例建立会话,第二锚点UPF可为APP实例分配IP地址或MAC地址。Specifically, after the APP instance is authenticated, the SMF selects the second anchor UPF to establish a session for the APP instance, and the second anchor UPF can assign an IP address or a MAC address to the APP instance.
S606,第二锚点UPF向SMF发送N4会话建立响应(N4session establishment response)。S606. The second anchor point UPF sends an N4 session establishment response (N4 session establishment response) to the SMF.
相应地,SMF接收来自第二锚点UPF的N4会话建立响应。其中,该N4会话建立响应 包括会话建立结果,会话建立结果例如可以为成功或失败。Correspondingly, the SMF receives the N4 session setup response from the second anchor UPF. Wherein, the N4 session establishment response includes a session establishment result, and the session establishment result may be success or failure, for example.
其中,第二锚点UPF向SMF发送N4会话建立响应之前,建立与APP实例之间的会话隧道,该N4会话建立响应还包括第二锚点UPF为APP实例建立会话的隧道标识信息。Wherein, the second anchor UPF establishes a session tunnel with the APP instance before sending the N4 session establishment response to the SMF, and the N4 session establishment response also includes tunnel identification information for the second anchor UPF to establish a session for the APP instance.
S607,当SMF确定会话建立成功之后,SMF向AUEF发送Nsmf_PDU会话创建(PDU session create)响应。S607. After the SMF determines that the session is established successfully, the SMF sends an Nsmf_PDU session create (PDU session create) response to the AUEF.
相应的,AUEF接收来自SMF的Nsmf_PDU会话创建响应。其中,该Nsmf_PDU会话创建响应包括第二锚点UPF为APP实例建立会话分配的第一地址。Correspondingly, the AUEF receives the Nsmf_PDU session establishment response from the SMF. Wherein, the Nsmf_PDU session creation response includes the first address allocated by the second anchor point UPF for establishing the session of the APP instance.
示例性地,第一地址可以为第二锚点UPF为APP实例建立会话分配的隧道标识信息,例如:全量隧道端点标识(full qualified tunnel endpoint ID),又例如,第一地址为二锚点UPF为APP实例建立会话分配的IP地址。Exemplarily, the first address may be the tunnel identification information assigned by the second anchor point UPF to establish a session for the APP instance, for example: full qualified tunnel endpoint ID, and for example, the first address is the second anchor point UPF The IP address allocated for the APP instance to establish a session.
可选地,该Nsmf_PDU会话创建响应还包括第一实例APP与AUEF认证相关的密钥交互信息。Optionally, the Nsmf_PDU session creation response further includes key exchange information related to the AUEF authentication of the first instance APP.
在本申请中,AUEF完成鉴权流程之后,基于移动通信网络分配的IP地址对外发布路由提供服务,同时也与第二锚点UPF建立隧道连接,实现移动通信网络内的会话建立。In this application, after the AUEF completes the authentication process, based on the IP address assigned by the mobile communication network, the AUEF publishes routes to provide services, and also establishes a tunnel connection with the second anchor point UPF to realize session establishment in the mobile communication network.
需要说明的是,本申请中的“隧道”还可以称之为路径或者其他名字,本申请对此不做具体限定。例如,上述隧道标识信息可以替换为路径标识信息,第一隧道可以替换为第一地址,等等,在此不再赘述。It should be noted that the "tunnel" in this application may also be called a path or other names, which is not specifically limited in this application. For example, the above tunnel identification information may be replaced with path identification information, the first tunnel may be replaced with the first address, etc., which will not be repeated here.
通过上述技术方案,本申请可以实现对APP实例接入到5G网络时,通过对APP实例所属的设备标识和业务标识、授权码等信息进行鉴权处理,实现对APP实例接入到5G网络前的安全认证工作,确保APP实例符合接入5G网络中的安全要求,将APP实例纳入到5G网络的安全信任域中,后续可以基于其认证后授权的安全等级,实现与5G网络中的终端设备和其他网元之间的安全交互。Through the above technical solution, this application can implement authentication processing on the device ID, service ID, authorization code and other information to which the APP instance belongs when the APP instance is connected to the 5G network, so as to realize the authentication of the APP instance before connecting to the 5G network. Security certification work to ensure that the APP instance meets the security requirements for accessing the 5G network, and the APP instance is included in the security trust domain of the 5G network. Based on the security level authorized after the authentication, the APP instance can be connected with the terminal equipment in the 5G network. secure interaction with other network elements.
在上述图5实施例的基础上,图7所示为本申请实施例提供的一种鉴权方法。On the basis of the above-mentioned embodiment in FIG. 5 , FIG. 7 shows an authentication method provided by the embodiment of the present application.
该鉴权方法中,当APP实例完成入网鉴权后,由SMF或SMF+SEAF作为会话管理功能网元,SAF作为第一鉴权功能实体为UE在新建会话时接入第一实例APP进行鉴权。In this authentication method, after the APP instance completes the network access authentication, SMF or SMF+SEAF is used as the session management function network element, and SAF is used as the first authentication function entity to perform authentication for the UE to access the first instance APP when creating a new session. right.
该鉴权方法一种可能的实现方式包括如下步骤。A possible implementation manner of the authentication method includes the following steps.
S701,PCF向UE发送用户设备路由选择策略(user equipment routing selection policy,URSP)规则内容。S701. The PCF sends user equipment routing selection policy (user equipment routing selection policy, URSP) rule content to the UE.
相应地,UE接收PCF发送的URSP规则内容。Correspondingly, the UE receives the URSP rule content sent by the PCF.
在本申请实施例中,对于原URSP规则内容,该URSP规则内容增加了APP二次鉴权标识(APP Authenticate Flag),该二次鉴权标识要求UE在访问该APP服务的虚拟业务网络时携带该UE在该虚拟业务网络的标识信息进行鉴权流程(也可以由UE自行配置访问某些APP时需要携带的认证信息)。原URSP规则内容参见现有技术,本申请不再赘述。In this embodiment of the application, for the original URSP rule content, the URSP rule content adds an APP secondary authentication flag (APP Authenticate Flag), and the secondary authentication flag requires the UE to carry it when accessing the virtual service network served by the APP. The UE performs an authentication process on the identification information of the virtual service network (the authentication information that needs to be carried when accessing some APPs can also be configured by the UE itself). For the content of the original URSP rules, please refer to the prior art, which will not be repeated in this application.
S702,UE向SMF发送PDU会话建立请求(PDU session establishment request)。S702. The UE sends a PDU session establishment request (PDU session establishment request) to the SMF.
相应地,SMF接收来自UE发送的PDU会话建立请求。该PDU会话建立请求包括UE的标识信息、APP的应用标识以及与该UE的标识信息和APP的应用标识对应的第三鉴权信息。Correspondingly, the SMF receives the PDU session establishment request sent from the UE. The PDU session establishment request includes the identification information of the UE, the application identification of the APP, and third authentication information corresponding to the identification information of the UE and the application identification of the APP.
需要说明的是,本申请实施例中的PDU会话建立请求仅是图5中第二会话建立请求 的一种示例,第二会话建立请求还可以为其他名称,本申请实施例对此不作限定。It should be noted that the PDU session establishment request in the embodiment of the present application is only an example of the second session establishment request in Figure 5, and the second session establishment request can also have other names, which are not limited in the embodiment of the present application.
可选地,UE的标识信息包括UE的设备标识和/或UE访问APP的业务标识。Optionally, the identification information of the UE includes a device identification of the UE and/or a service identification of an APP accessed by the UE.
应理解,UE如果匹配到URSP规则,即执行步骤501,并确认需要进行业务访问对于携带该标识的场景下,则向SMF发送包括UE的标识信息、APP的应用标识和第三鉴权信息的PDU会话建立请求。It should be understood that if the UE matches the URSP rule, it executes step 501, and confirms that it needs to perform service access. For the scenario that carries the identifier, it sends to the SMF a message that includes the UE's identity information, the APP's application identity, and the third authentication information. PDU session establishment request.
应理解,UE不需要执行步骤501。UE自行配置访问APP需要携带的终端设备的标识信息和该标识信息对应的第三鉴权信息,然后向SMF发送包括该标识信息和第三鉴权信息的PDU会话建立请求。It should be understood that the UE does not need to perform step 501 . The UE configures the identification information of the terminal equipment that needs to be carried to access the APP and the third authentication information corresponding to the identification information, and then sends a PDU session establishment request including the identification information and the third authentication information to the SMF.
S703,SMF向SAF发送Nsaf_Vsn_UE鉴权请求(authenticate request)。S703. The SMF sends an Nsaf_Vsn_UE authentication request (authenticate request) to the SAF.
相应地,SAF接收来自SMF的Nsaf_Vsn_UE鉴权请求。该Nsaf_Vsn_UE鉴权请求包括UE的标识信息、APP的应用标识以及与该标识信息和APP的应用标识对应的第三鉴权信息。Correspondingly, the SAF receives the Nsaf_Vsn_UE authentication request from the SMF. The Nsaf_Vsn_UE authentication request includes the identification information of the UE, the application identification of the APP, and third authentication information corresponding to the identification information and the application identification of the APP.
需要说明的是,本申请中的Nsaf_Vsn_UE鉴权请求仅是图5中第二鉴权请求的一种示例,第二鉴权请求还可以为其他名称,本申请对此不作限定。It should be noted that the Nsaf_Vsn_UE authentication request in this application is only an example of the second authentication request in FIG. 5 , and the second authentication request may have other names, which are not limited in this application.
应理解,SEAF功能实体可以查询到该UE归属的虚拟业务网络信息,并且向SAF发起UE的鉴权或者认证流程的时候还可以携带UE的标识信息。It should be understood that the SEAF functional entity may query the information of the virtual service network to which the UE belongs, and may also carry the identification information of the UE when initiating the authentication or authentication process of the UE to the SAF.
应理解,如果SMF集成了SEAF功能或者模块,则SMF会将UE的标识信息、APP的应用标识以及对应的第三鉴权信息发送至SEAF,然后再由SEAF将上述信息发送至SAF。It should be understood that if the SMF integrates the SEAF function or module, the SMF will send the UE identification information, the APP application identification and the corresponding third authentication information to the SEAF, and then the SEAF will send the above information to the SAF.
应理解,如果SMF与SEAF是作为两种不同的模块或功能实体,那么SMF会先将UE的标识信息、APP的应用标识以及对应的第三鉴权信息发送至SEAF,然后再由SEAF将上述信息发送至SAF。It should be understood that if SMF and SEAF are two different modules or functional entities, then SMF will first send the identification information of UE, the application identification of APP and the corresponding third authentication information to SEAF, and then SEAF will send the above The information is sent to SAF.
S704,SAF对UE进行鉴权处理。S704, the SAF performs authentication processing on the UE.
具体地,SAF基于Nsaf_Vsn_UE鉴权请求包括的UE的标识信息、APP的应用标识以及对应的第三鉴权信息对该UE是否可以访问该APP的业务进行二次鉴权。Specifically, the SAF performs secondary authentication on whether the UE can access the service of the APP based on the identification information of the UE included in the Nsaf_Vsn_UE authentication request, the application identification of the APP, and the corresponding third authentication information.
示例性地,SAF能够基于终端设备的标识信息确定该终端设备能够访问哪些APP,在确定该终端设备能够访问的APP里面,通过使用APP的应用标识确定该终端设备能够访问的APP里面是否包括该APP,如果能够查询到,则SAF进行第三鉴权信息和第四鉴权信息的比对。比对一致,则该终端设备鉴权通过,如果比对不一致,则该终端设备鉴权失败,则不能访问该APP,但是本申请并不限定该终端设备能否访问除APP之外的其他APP。如果不能查询得到,则默认返回鉴权失败的指示信息。Exemplarily, the SAF can determine which APPs the terminal device can access based on the identification information of the terminal device, and determine whether the APPs that the terminal device can access include the APP by using the application identifier of the APP. If the APP can be found, the SAF compares the third authentication information with the fourth authentication information. If the comparison is consistent, the authentication of the terminal device passes. If the comparison is inconsistent, the authentication of the terminal device fails, and the APP cannot be accessed. However, this application does not limit whether the terminal device can access other APPs except the APP. . If it cannot be queried, the authentication failure indication information will be returned by default.
又或者,SAF通过先查询APP能够提供服务的签约的终端设备,并利用该终端设备的标识信息确定该终端设备是否属于能够访问该APP的终端设备,如果能够查询到,则SAF进行第三鉴权信息和第四鉴权信息之间的比对。比对一致,则该终端设备鉴权通过,如果比对不一致,则该终端设备鉴权失败,则不能访问该APP,但是本申请并不限定该终端设备能否访问除APP之外的其他APP。如果查询不到,则默认返回鉴权失败的指示信息。Alternatively, the SAF first inquires about the contracted terminal equipment that the APP can provide services, and uses the identification information of the terminal equipment to determine whether the terminal equipment belongs to the terminal equipment that can access the APP. If it can be found, the SAF performs the third authentication comparison between the authorization information and the fourth authentication information. If the comparison is consistent, the authentication of the terminal device passes. If the comparison is inconsistent, the authentication of the terminal device fails, and the APP cannot be accessed. However, this application does not limit whether the terminal device can access other APPs except the APP. . If no query is found, the authentication failure indication information will be returned by default.
又具体地,SAF获取UE的标识信息,确定该标识为设备标识还是业务标识或两者兼备,然后在相应标识的授权数据库中寻找,查询到授权信息后,对该第三鉴权信息进行认证。More specifically, the SAF obtains the identification information of the UE, determines whether the identification is a device identification or a service identification or both, and then searches in the authorization database of the corresponding identification, and after querying the authorization information, authenticates the third authentication information .
示例性地,SAF获取UE的设备标识和第三鉴权信息,然后查找APP的关于设备标识的授权数据库,判断该UE的设备标识是否在该授权数据库内,若存在,则对UE的第三鉴权信息进行验证,验证通过,则表示终端设备鉴权成功,验证未通过,则表示终端设备鉴权失败;若UE的设备标识不存在于该授权数据库内,则终端设备鉴权失败。Exemplarily, the SAF acquires the UE's device ID and third authentication information, and then searches the APP's authorization database on the device ID to determine whether the UE's device ID is in the authorization database. If it exists, the UE's third The authentication information is verified. If the verification is passed, it means that the terminal device has successfully authenticated. If the verification fails, it means that the terminal device has failed to authenticate. If the UE's device identifier does not exist in the authorization database, the terminal device has failed to authenticate.
示例性地,例如,该验证方式可以为固定授权码字符串对比,也可以通过一些动态秘钥算法和参数一起计算出授权码字符串进行对比,对比一致则鉴权通过。Exemplarily, for example, the verification method can be fixed authorization code string comparison, or the authorization code string can be calculated by some dynamic secret key algorithm and parameters for comparison, and if the comparison is consistent, the authentication is passed.
示例性地,SAF获取UE的业务标识和第三鉴权信息,然后查找APP的关于业务标识的授权数据库,判断该UE的业务标识是否在该授权数据库内,若存在,则对终端设备的第三鉴权信息进行验证,验证通过,则表示终端设备鉴权成功,验证未通过,则表示终端设备鉴权失败;若UE的业务标识不存在于该授权数据库内,则终端设备授权失败。Exemplarily, the SAF obtains the UE's service ID and the third authentication information, and then searches the APP's authorization database about the service ID to determine whether the UE's service ID is in the authorization database. Three authentication information is verified, if the verification is passed, it means that the terminal device is authenticated successfully; if the verification is not passed, it means that the terminal device fails to authenticate; if the UE's service identifier does not exist in the authorization database, the terminal device fails to be authorized.
上述UE的设备标识和UE的业务标识可以相同,也可以不同,本申请对此不作限定。上述UE的设备标识对应的鉴权信息和UE的业务标识对应的鉴权信息可以相同,也可以不同,本申请对此不作限定。The UE's device ID and the UE's service ID may be the same or different, which is not limited in this application. The above authentication information corresponding to the device identifier of the UE and the authentication information corresponding to the service identifier of the UE may be the same or different, which is not limited in this application.
S705,SAF向SMF发送Nsaf_Vsn_UE鉴权响应。S705, the SAF sends an Nsaf_Vsn_UE authentication response to the SMF.
相应地,SMF接收来自SAF的Nsaf_Vsn_UE鉴权响应。其中,该Nsaf_Vsn_UE鉴权响应包括鉴权结果,鉴权结果例如可以为终端设备鉴权通过或者终端设备鉴权失败。Correspondingly, the SMF receives the Nsaf_Vsn_UE authentication response from the SAF. Wherein, the Nsaf_Vsn_UE authentication response includes an authentication result, and the authentication result may be, for example, that the terminal device has passed the authentication or that the terminal device has failed the authentication.
需要说明的是,本申请实施例中的Nsaf_Vsn_UE鉴权响应仅是图5中第二鉴权请求的一种示例,第二鉴权响应还可以为其他名称,本申请对此不作限定。It should be noted that the Nsaf_Vsn_UE authentication response in the embodiment of the present application is only an example of the second authentication request in FIG. 5 , and the second authentication response can also have other names, which are not limited in the present application.
S706,当UE鉴权通过后,SMF向UE发送PDU会话建立响应。S706. After the UE is authenticated, the SMF sends a PDU session establishment response to the UE.
相应地,UE接收来自SMF的会话建立响应。Accordingly, the UE receives a session establishment response from the SMF.
在本申请中,SMF在UE访问APP的二次鉴权通过之后,选择适合UE的APP实例,例如APP实例,向UE提供数据服务,然后继续后续会话建立流程,相关实现可参考现有技术,在此不再赘述。In this application, after the UE passes the second authentication for accessing the APP, the SMF selects an APP instance suitable for the UE, such as an APP instance, provides data services to the UE, and then continues the subsequent session establishment process. Related implementations can refer to existing technologies. I won't repeat them here.
当UE鉴权失败后,例如,SMF向UE发送PDU会话建立拒绝,以拒绝该PDU会话的接入。When the authentication of the UE fails, for example, the SMF sends a PDU session establishment rejection to the UE to deny access to the PDU session.
又例如,当UE鉴权失败后,SEAF能够拒绝该会话的建立,或者不下发APP实例的地址信息,或者不向SMF或者UPF下发业务访问策略。For another example, when UE authentication fails, SEAF can refuse the establishment of the session, or not deliver the address information of the APP instance, or not deliver the service access policy to the SMF or UPF.
又例如,当UE二次鉴权未通过时,SMF还可以去激活已激活的会话。For another example, when the UE fails the second authentication, the SMF may also deactivate the activated session.
再例如,通过规则禁止该UE访问对应的APP的同时反馈UE该UE访问APP鉴权失败,可以重新发起新的鉴权过程。For another example, when the UE is prohibited from accessing the corresponding APP by a rule and at the same time the UE is fed back that the UE fails to access the APP, a new authentication process may be reinitiated.
当UE在已有会话中需要接入该APP提供的虚拟业务网络时,也需要执行二次鉴权流程,才能与APP的实例建立会话,该二次鉴权流程可以通过两种方式。具体流程如下。When the UE needs to access the virtual service network provided by the APP in an existing session, it also needs to perform a second authentication process to establish a session with the APP instance. The second authentication process can be performed in two ways. The specific process is as follows.
方式一:method one:
与图7所示的方法大致类似,不同的是,UE可以通过向SMF发送PDU会话修改请求在已有会话中进行接入APP的实例的二次鉴权。Similar to the method shown in FIG. 7 , the difference is that the UE can perform secondary authentication for accessing the APP instance in the existing session by sending a PDU session modification request to the SMF.
具体地,在步骤701中,UE向SMF发送PDU会话修改请求。Specifically, in step 701, the UE sends a PDU session modification request to the SMF.
步骤707中,SMF向UE发送PDU会话修改响应。In step 707, the SMF sends a PDU session modification response to the UE.
方式二:Method 2:
图8所示为本申请提供的另一种二次鉴权的方法。Fig. 8 shows another second authentication method provided by this application.
为UE提供服务的第一锚点UPF预置规则默认不允许对该APP的实例的业务访问,但在本申请实施例中,第一锚点UPF开放对UE二次鉴权的服务,允许UE通过用户面发起二次鉴权流程,也就是提供一个UE可以进行二次鉴权的服务地址,UE设备通过访问该服务地址建立连接进行鉴权流程。The preset rules of the first anchor point UPF that provides services for the UE do not allow business access to the instance of the APP by default, but in the embodiment of this application, the first anchor point UPF opens the service for the second authentication of the UE, allowing the UE Initiate the secondary authentication process through the user plane, that is, provide a service address for the UE to perform secondary authentication, and the UE device establishes a connection by accessing the service address to perform the authentication process.
该鉴权方法的一种可能的实现方式包括如下步骤。A possible implementation of the authentication method includes the following steps.
S801,UE向第一锚点UPF发送二次鉴权消息。S801. The UE sends a second authentication message to the first anchor UPF.
相应地,第一锚点UPF接收来自UE的二次鉴权消息。该二次鉴权消息包括UE的标识信息、APP的应用标识以及与该UE的标识信息和APP的应用标识对应的第三鉴权信息。Correspondingly, the first anchor UPF receives the second authentication message from the UE. The secondary authentication message includes the identification information of the UE, the application identification of the APP, and third authentication information corresponding to the identification information of the UE and the application identification of the APP.
在本申请中,UE通过接入APP访问APP的实例提供的虚拟业务网络,具体实现中,UE通过数据面向第一锚点UPF分配的和APP的应用标识,第一锚点UPF能够监控该服务地址,并解析UE发送的二次鉴权消息。In this application, the UE accesses the virtual service network provided by the instance of the APP by accessing the APP. In the specific implementation, the UE uses the data to face the application identifier assigned by the first anchor point UPF and the APP, and the first anchor point UPF can monitor the service address, and parse the second authentication message sent by the UE.
应理解,终端设备能够通过数据面,即能够向用户面功能网元发送该终端设备的标识信息、APP的应用标识以及与该终端设备的标识信息、APP的应用标识对应的第三鉴权信息,并由该用户面功能网元转给会话管理功能网元。It should be understood that the terminal device can send the identification information of the terminal device, the application identification of the APP, and the third authentication information corresponding to the identification information of the terminal device and the application identification of the APP to the functional network element of the user plane through the data plane. , and transferred by the user plane functional network element to the session management functional network element.
进一步可选地,如果终端设备通过扩展会话修改请求或者二次鉴权请求发起对终端设备的二次鉴权流程,则可以直接将二次鉴权请求发送给会话管理功能网元,能够不进行前述先发给用户面功能网元并由该用户面功能网元转发给会话管理功能网元。Further optionally, if the terminal device initiates a secondary authentication process for the terminal device through an extended session modification request or a secondary authentication request, it may directly send the secondary authentication request to the session management function network element, and may not The foregoing is first sent to the user plane functional network element and then forwarded to the session management functional network element by the user plane functional network element.
应理解,终端设备通过控制面发起的二次鉴权请求,可以通过已有的会话修改请求消息扩展新信元来承载,也可以是由新消息来承载。It should be understood that the secondary authentication request initiated by the terminal device through the control plane may be borne by extending a new cell from an existing session modification request message, or may be borne by a new message.
应理解,终端通过控制面发起的二次鉴权请求,可以通过已有的会话修改请求消息扩展新信元来承载,也可以是新消息来承载。It should be understood that the secondary authentication request initiated by the terminal through the control plane may be borne by extending a new cell from an existing session modification request message, or may be borne by a new message.
应理解,UE的二次鉴权信息只是UE向第一锚点UPF发起鉴权流程的一种方式,也可以是其他信息,本申请对此不作限定。It should be understood that the UE's secondary authentication information is only a way for the UE to initiate an authentication process to the first anchor point UPF, and may also be other information, which is not limited in this application.
S802,第一锚点UPF向SMF发送报文转发控制协议(packet forwarding control protocol,PFCP)会话报告请求(session report request)。S802. The first anchor point UPF sends a packet forwarding control protocol (packet forwarding control protocol, PFCP) session report request (session report request) to the SMF.
在本申请中,第一锚点UPF能够通过监控鉴权服务地址,来解析UE发送的二次鉴权消息,并通过向SMF发送PFCP会话报告请求,上报UE的二次鉴权信息。In this application, the first anchor UPF can analyze the secondary authentication message sent by the UE by monitoring the authentication service address, and report the secondary authentication information of the UE by sending a PFCP session report request to the SMF.
需要说明的是,PFCP会话报告请求只是UE通过第一锚点UPF转发发起二次鉴权流程的一种方式,也可以是其他请求名称,比如,PFCP_UE鉴权请求(authentication request),本申请对此不作限定。It should be noted that the PFCP session report request is only a way for the UE to forward the second authentication process through the first anchor point UPF, and it can also be other request names, such as PFCP_UE authentication request (authentication request). This is not limited.
S803,SMF向SAF发送Nsaf_Vsn_UE鉴权请求。S803, the SMF sends an Nsaf_Vsn_UE authentication request to the SAF.
相应地,SAF接收来自SMF的Nsaf_Vsn_UE鉴权请求。该Nsaf_Vsn_UE鉴权请求包括UE的鉴权信息。Correspondingly, the SAF receives the Nsaf_Vsn_UE authentication request from the SMF. The Nsaf_Vsn_UE authentication request includes UE authentication information.
需要说明的是,本申请中的Nsaf_Vsn_UE鉴权请求仅是图5中第二鉴权请求的一种示例,第二鉴权响应还可以为其他名称,本申请对此不作限定。It should be noted that the Nsaf_Vsn_UE authentication request in this application is only an example of the second authentication request in FIG. 5 , and the second authentication response can also have other names, which are not limited in this application.
可选地,如果SMF集成了SEAF模块或者功能实体,那么SMF将UE的UE的标识信息、APP的应用标识以及与该UE的标识信息和APP的应用标识对应的第三鉴权信息发送至SEAF,然后由SEAF将UE的标识信息、APP的应用标识以及与该UE的标识信 息和APP的应用标识对应的第三鉴权信息发送至SAF。Optionally, if the SMF integrates the SEAF module or functional entity, then the SMF sends the UE identification information of the UE, the application identification of the APP, and the third authentication information corresponding to the identification information of the UE and the application identification of the APP to the SEAF , and then the SEAF sends the identification information of the UE, the application identification of the APP, and the third authentication information corresponding to the identification information of the UE and the application identification of the APP to the SAF.
可选地,SMF与SEAF为不同的模块或功能实体,SMF将UE的鉴权信息发送至SEAF,SEAF再将该鉴权信息发送至SAF。Optionally, the SMF and the SEAF are different modules or functional entities, the SMF sends the authentication information of the UE to the SEAF, and the SEAF sends the authentication information to the SAF.
S804,SAF对UE进行鉴权处理。S804, the SAF performs authentication processing on the UE.
具体处理方式可参考前述步骤S504。For a specific processing manner, reference may be made to the aforementioned step S504.
S805,SAF向SMF发送Nsaf_Vsn_UE鉴权响应。S805, the SAF sends an Nsaf_Vsn_UE authentication response to the SMF.
相应地,SMF接收来自SAF的Nsaf_Vsn_UE鉴权响应。其中,该Nsaf_Vsn_UE鉴权响应包括鉴权结果,鉴权结果例如可以为通过和失败。Correspondingly, the SMF receives the Nsaf_Vsn_UE authentication response from the SAF. Wherein, the Nsaf_Vsn_UE authentication response includes an authentication result, for example, the authentication result may be pass or fail.
S806,SMF向第一锚点UPF发送PFCP会话报告响应(session report response)。S806. The SMF sends a PFCP session report response (session report response) to the first anchor UPF.
可选地,SMF向第一锚点UPF发送PFCP_UE鉴权响应。Optionally, the SMF sends a PFCP_UE authentication response to the first anchor UPF.
可选地,在UE鉴权通过后,SMF可以向PCF发送策略更新请求,允许UE和该APP实例之间的业务访问,该实现方式包括如下步骤S807和S808。Optionally, after the UE is authenticated, the SMF may send a policy update request to the PCF to allow service access between the UE and the APP instance. This implementation includes the following steps S807 and S808.
S807,SMF向PCF发送Npcf_会话管理策略控制更新请求(session manage policy control update request)。S807. The SMF sends an Npcf_session management policy control update request (session manage policy control update request) to the PCF.
相应地,PCF接收来自SMF的Npcf_会话管理策略控制更新请求。Correspondingly, the PCF receives the Npcf_session management policy control update request from the SMF.
在本申请中,该Npcf_会话管理策略控制更新请求包括UE的二次鉴权通过的鉴权结果,以使PCF更新UE与APP实例的会话管理策略,允许UE和该APP实例之间的业务访问。In this application, the Npcf_session management policy control update request includes the authentication result of the UE's second authentication, so that the PCF can update the session management policy between the UE and the APP instance, allowing the service between the UE and the APP instance access.
S808,PCF向SMF发送Npcf_会话管理策略控制更新响应(session manage policy control update response)。S808. The PCF sends an Npcf_session management policy control update response (session manage policy control update response) to the SMF.
具体地,PCF基于SMF上报的UE鉴权通过的鉴权结果触发规则更新,允许UE和该APP实例之间的业务访问。Specifically, the PCF triggers a rule update based on the authentication result reported by the SMF that the UE passes the authentication, allowing service access between the UE and the APP instance.
S809,第一锚点UPF向UE发送二次鉴权结果。S809, the first anchor point UPF sends the second authentication result to the UE.
在本申请中,鉴权通过则允许UE和APP实例之间的业务访问。In this application, service access between the UE and the APP instance is allowed if the authentication passes.
可选地,鉴权通过后可以通过上述步骤S807和S808,即通过PCF下发更新的规则实现UE和APP实例之间的业务访问。Optionally, after the authentication is passed, the above steps S807 and S808 can be performed, that is, service access between the UE and the APP instance can be implemented through the PCF issuing updated rules.
通过上述技术方案,本申请可以通过SAF集中对同一个虚拟业务网络中的APP实例和UE终端设备之间进行业务层面的认证和鉴权流程,从而保证UE和APP之间的相互访问在5G网络中的安全可信,有利于APP实例和UE设备的授权访问,避免欺诈或攻击场景的出现。Through the above technical solution, this application can centrally perform service-level authentication and authentication processes between APP instances and UE terminal equipment in the same virtual service network through SAF, thereby ensuring mutual access between UE and APP in the 5G network The security and trustworthiness in it is conducive to the authorized access of APP instances and UE devices, and avoids the occurrence of fraud or attack scenarios.
可以理解的是,图4至图8所示的实施例中,由第一鉴权功能实体实现的方法和/或步骤,也可以由可用于第一鉴权功能实体的部件实现;由APP实例接入模块实现的方法和/或步骤,也可以由可用于APP实例接入模块的部件(例如芯片或者电路)实现;由会话管理功能实体实现的方法和/或步骤,也可以由可用于会话管理功能实体的部件(例如芯片或者电路)实现。It can be understood that, in the embodiments shown in FIG. 4 to FIG. 8, the method and/or steps implemented by the first authentication functional entity may also be implemented by components that can be used for the first authentication functional entity; The methods and/or steps implemented by the access module can also be implemented by components (such as chips or circuits) that can be used for the APP instance access module; the methods and/or steps implemented by the session management function entity can also be implemented by the A component (such as a chip or a circuit) implementation that manages a functional entity.
图9是本申请提供的通信装置900的示意性框图。如图所示,该通信装置900可以包括:收发单元910和处理单元920。Fig. 9 is a schematic block diagram of a communication device 900 provided in this application. As shown in the figure, the communication device 900 may include: a transceiver unit 910 and a processing unit 920 .
在一种可能的设计中,该通信装置900可以是上文方法实施例中的会话管理功能网元,也可以是用于实现上文方法实施例中会话管理功能网元的功能的芯片。In a possible design, the communication device 900 may be the session management function network element in the above method embodiment, or may be a chip for realizing the function of the session management function network element in the above method embodiment.
应理解,该通信装置900可对应于根据本申请实施例中的会话管理功能网元,该通信装置900可以包括用于执行图4至图8中的会话管理功能网元执行的方法的单元。并且,该通信装置900中的各单元和上述其他操作和/或功能分别为了实现图4至图8中的相应流程。It should be understood that the communication device 900 may correspond to the session management function network element according to the embodiment of the present application, and the communication device 900 may include a unit for performing the methods performed by the session management function network element in FIGS. 4 to 8 . In addition, each unit in the communication device 900 and the above-mentioned other operations and/or functions are to implement the corresponding processes in FIG. 4 to FIG. 8 .
作为一种示例性描述,该通信装置900能够实现前述方法实施例中的S401、S402和S404中涉及会话管理功能网元有关的动作、步骤或者方法,也能够实现前述方法实施例中的S501和S502中涉及会话管理功能网元有关的动作、步骤或者方法。As an exemplary description, the communication device 900 can implement the actions, steps or methods related to the session management function network element in S401, S402, and S404 in the foregoing method embodiments, and can also implement S501 and S404 in the foregoing method embodiments. S502 involves actions, steps or methods related to the session management function network element.
应理解,上述内容仅作为示例性理解,该通信装置900还能够实现上述方法实施例中的其他与会话管理功能网元相关的步骤、动作或者方法,在此不再赘述。It should be understood that the above content is only understood as an example, and the communication device 900 can also implement other steps, actions or methods related to the session management function network element in the above method embodiment, which will not be repeated here.
应理解,各单元执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。It should be understood that the specific process for each unit to perform the above corresponding steps has been described in detail in the above method embodiments, and for the sake of brevity, details are not repeated here.
在另一种可能的设计中,该通信装置900可以是上文方法实施例中的第一鉴权功能网元,也可以是用于实现上文方法实施例中第一鉴权功能网元的功能的芯片。In another possible design, the communication device 900 may be the first authentication function network element in the above method embodiment, or a network element used to implement the first authentication function in the above method embodiment function chip.
应理解,该通信装置900可对应于根据本申请实施例中的接入和移动性管理功能网元,该通信装置900可以包括用于执行图4至图8中第一鉴权功能实体执行的方法的单元。并且,该通信装置900中的各单元和上述其他操作和/或功能分别为了实现图4至图8中的相应流程。应理解,各单元执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。It should be understood that the communication device 900 may correspond to the access and mobility management function network element according to the embodiment of the present application, and the communication device 900 may include a device for executing the first authentication function entity in FIGS. 4 to 8 . The unit of the method. In addition, each unit in the communication device 900 and the above-mentioned other operations and/or functions are to implement the corresponding processes in FIG. 4 to FIG. 8 . It should be understood that the specific process for each unit to perform the above corresponding steps has been described in detail in the above method embodiments, and for the sake of brevity, details are not repeated here.
作为又一种示例性描述,该通信装置900能够实现前述方法实施例中的S403中涉及接入和移动性管理功能网元有关的动作、步骤或者方法,也能够实现前述方法实施例中的S502中涉及接入和移动性管理功能网元有关的动作、步骤或者方法。As yet another exemplary description, the communication device 900 can implement the actions, steps or methods related to access and mobility management functional network elements in S403 in the foregoing method embodiments, and can also implement S502 in the foregoing method embodiments Involves actions, steps or methods related to network elements with access and mobility management functions.
应理解,上述内容仅作为示例性理解,该通信装置900还能够实现上述方法实施例中的其他与接入和移动性管理功能网元相关的步骤、动作或者方法,在此不再赘述。It should be understood that the above content is only understood as an example, and the communication device 900 can also implement other steps, actions or methods related to the access and mobility management function network element in the above method embodiment, which will not be repeated here.
应理解,各单元执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。It should be understood that the specific process for each unit to perform the above corresponding steps has been described in detail in the above method embodiments, and for the sake of brevity, details are not repeated here.
在另一种可能的设计中,该通信装置900可以是上文方法实施例中的APP实例接入模块,也可以是用于实现上文方法实施例中APP实例接入模块的功能的芯片。In another possible design, the communication device 900 may be the APP instance access module in the above method embodiment, or a chip for realizing the functions of the APP instance access module in the above method embodiment.
应理解,该通信装置900可对应于根据本申请实施例中的APP实例接入模块,该通信装置900可以包括用于执行图4和图6中的APP实例接入模块执行的方法的单元。并且,该通信装置900中的各单元和上述其他操作和/或功能分别为了实现图4和图6中的相应流程。应理解,各单元执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。It should be understood that the communication device 900 may correspond to the APP instance access module according to the embodiment of the present application, and the communication device 900 may include units for performing the methods performed by the APP instance access module in FIG. 4 and FIG. 6 . Moreover, each unit in the communication device 900 and the above-mentioned other operations and/or functions are for realizing the corresponding processes in FIG. 4 and FIG. 6 respectively. It should be understood that the specific process for each unit to perform the above corresponding steps has been described in detail in the above method embodiments, and for the sake of brevity, details are not repeated here.
作为另一种示例性描述,该通信装置900能够实现前述方法实施例中的S401中涉及APP实例接入模块有关的动作、步骤或者方法。As another exemplary description, the communication device 900 can implement the actions, steps or methods related to the APP instance access module in S401 in the foregoing method embodiments.
应理解,上述内容仅作为示例性理解,该通信装置900还能够实现上述方法实施例中的其他与APP实例接入模块相关的步骤、动作或者方法,在此不再赘述。It should be understood that the above content is only understood as an example, and the communication device 900 can also implement other steps, actions or methods related to the APP instance access module in the above method embodiments, which will not be repeated here.
应理解,各单元执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。It should be understood that the specific process for each unit to perform the above corresponding steps has been described in detail in the above method embodiments, and for the sake of brevity, details are not repeated here.
在另一种可能的设计中,该通信装置900可以是上文方法实施例中的终端设备,也可 以是用于实现上文方法实施例中终端设备的功能的芯片。In another possible design, the communication device 900 may be the terminal device in the above method embodiment, or a chip for realizing the functions of the terminal device in the above method embodiment.
应理解,该通信装置900可对应于根据本申请实施例中的终端设备,该通信装置900可以包括用于执行图5、图7和图8中的终端设备执行的方法的单元。并且,该通信装置900中的各单元和上述其他操作和/或功能分别为了实现图5、图7和图8中的相应流程。应理解,各单元执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。It should be understood that the communication apparatus 900 may correspond to a terminal device according to the embodiment of the present application, and the communication apparatus 900 may include a unit for executing the methods performed by the terminal device in FIG. 5 , FIG. 7 , and FIG. 8 . Moreover, each unit in the communication device 900 and the above-mentioned other operations and/or functions are for realizing the corresponding processes in FIG. 5 , FIG. 7 and FIG. 8 respectively. It should be understood that the specific process for each unit to perform the above corresponding steps has been described in detail in the above method embodiments, and for the sake of brevity, details are not repeated here.
还应理解,该通信装置900中的收发单元910可对应于图10中示出的通信设备1000中的收发器1020,该通信装置900中的处理单元920可对应于图10中示出的通信设备1000中的处理器1010。It should also be understood that the transceiver unit 910 in the communication device 900 may correspond to the transceiver 1020 in the communication device 1000 shown in FIG. 10, and the processing unit 920 in the communication device 900 may correspond to the communication device shown in FIG. Processor 1010 in device 1000 .
还应理解,当该通信装置900为芯片时,该芯片包括收发单元和处理单元。其中,收发单元可以是输入输出电路或通信接口;处理单元可以为该芯片上集成的处理器或者微处理器或者集成电路。It should also be understood that when the communication device 900 is a chip, the chip includes a transceiver unit and a processing unit. Wherein, the transceiver unit may be an input-output circuit or a communication interface; the processing unit may be a processor or a microprocessor or an integrated circuit integrated on the chip.
收发单元910用于实现通信装置900的信号的收发操作,处理单元920用于实现通信装置900的信号的处理操作。The transceiving unit 910 is used to realize the signal sending and receiving operation of the communication device 900 , and the processing unit 920 is used to realize the signal processing operation of the communication device 900 .
可选地,该通信装置900还包括存储单元930,该存储单元930用于存储指令。Optionally, the communication device 900 further includes a storage unit 930, and the storage unit 930 is configured to store instructions.
图10是本申请实施例提供的通信设备1000的示意性框图。如图所示,该通信设备1000包括:至少一个处理器1010和收发器1020。该处理器1010与存储器耦合,用于执行存储器中存储的指令,以控制收发器1020发送信号和/或接收信号。可选地,该通信设备1000还包括存储器1030,用于存储指令。Fig. 10 is a schematic block diagram of a communication device 1000 provided by an embodiment of the present application. As shown in the figure, the communication device 1000 includes: at least one processor 1010 and a transceiver 1020 . The processor 1010 is coupled with the memory for executing instructions stored in the memory to control the transceiver 1020 to send signals and/or receive signals. Optionally, the communications device 1000 further includes a memory 1030 for storing instructions.
应理解,上述处理器1010和存储器1030可以合成一个处理装置,处理器1010用于执行存储器1030中存储的程序代码来实现上述功能。具体实现时,该存储器1030也可以集成在处理器1010中,或者独立于处理器1010。It should be understood that the processor 1010 and the memory 1030 may be combined into one processing device, and the processor 1010 is configured to execute program codes stored in the memory 1030 to implement the above functions. During specific implementation, the memory 1030 may also be integrated in the processor 1010 , or be independent of the processor 1010 .
还应理解,收发器1020可以包括接收器(或者称,接收机)和发射器(或者称,发射机)。收发器1020还可以进一步包括天线,天线的数量可以为一个或多个。收发器1020有可以是通信接口或者接口电路。It should also be understood that the transceiver 1020 may include a receiver (or called a receiver) and a transmitter (or called a transmitter). The transceiver 1020 may further include antennas, and the number of antennas may be one or more. The transceiver 1020 may be a communication interface or an interface circuit.
当该通信设备1000为芯片时,该芯片包括收发单元和处理单元。其中,收发单元可以是输入输出电路或通信接口;处理单元可以为该芯片上集成的处理器或者微处理器或者集成电路。本申请实施例还提供了一种处理装置,包括处理器和接口。所述处理器可用于执行上述方法实施例中的方法。When the communication device 1000 is a chip, the chip includes a transceiver unit and a processing unit. Wherein, the transceiver unit may be an input-output circuit or a communication interface; the processing unit may be a processor or a microprocessor or an integrated circuit integrated on the chip. The embodiment of the present application also provides a processing device, including a processor and an interface. The processor may be used to execute the methods in the foregoing method embodiments.
应理解,上述处理装置可以是一个芯片。例如,该处理装置可以是现场可编程门阵列(field programmable gate array,FPGA),可以是专用集成芯片(application specific integrated circuit,ASIC),还可以是系统芯片(system on chip,SoC),还可以是中央处理器(central processor unit,CPU),还可以是网络处理器(network processor,NP),还可以是数字信号处理电路(digital signal processor,DSP),还可以是微控制器(micro controller unit,MCU),还可以是可编程控制器(programmable logic device,PLD)或其他集成芯片。It should be understood that the above processing device may be a chip. For example, the processing device may be a field programmable gate array (field programmable gate array, FPGA), an application specific integrated circuit (ASIC), or a system chip (system on chip, SoC). It can be a central processor unit (CPU), a network processor (network processor, NP), a digital signal processing circuit (digital signal processor, DSP), or a microcontroller (micro controller unit) , MCU), can also be a programmable controller (programmable logic device, PLD) or other integrated chips.
在实现过程中,上述方法的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。结合本申请实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟 的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。为避免重复,这里不再详细描述。In the implementation process, each step of the above method can be completed by an integrated logic circuit of hardware in a processor or an instruction in the form of software. The steps of the methods disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or implemented by a combination of hardware and software modules in the processor. The software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register. The storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware. To avoid repetition, no detailed description is given here.
本申请实施例还提供一种计算机可读存储介质,其上存储有用于实现上述方法实施例中由第一鉴权功能网元执行的方法的计算机指令。The embodiment of the present application further provides a computer-readable storage medium, on which computer instructions for implementing the method performed by the first authentication function network element in the above method embodiment are stored.
例如,该计算机程序被计算机执行时,使得该计算机可以实现上述方法实施例中由第一鉴权功能网元执行的方法。For example, when the computer program is executed by a computer, the computer can implement the method performed by the first authentication function network element in the above method embodiment.
本申请实施例还提供一种计算机可读存储介质,其上存储有用于实现上述方法实施例中由会话管理功能网元执行的方法的计算机指令。The embodiment of the present application further provides a computer-readable storage medium, on which computer instructions for implementing the method performed by the session management function network element in the above method embodiment are stored.
例如,该计算机程序被计算机执行时,使得该计算机可以实现上述方法实施例中由会话管理功能网元执行的方法。For example, when the computer program is executed by a computer, the computer can implement the method performed by the session management function network element in the foregoing method embodiments.
本申请实施例还提供一种计算机可读存储介质,其上存储有用于实现上述方法实施例中由APP实例接入模块执行的方法的计算机指令。The embodiment of the present application also provides a computer-readable storage medium, on which computer instructions for implementing the method executed by the APP instance access module in the above method embodiment are stored.
例如,该计算机程序被计算机执行时,使得该计算机可以实现上述方法实施例中由APP实例接入模块执行的方法。For example, when the computer program is executed by a computer, the computer can implement the methods performed by the APP instance access module in the above method embodiments.
本申请实施例还提供一种包含指令的计算机程序产品,该指令被计算机执行时使得该计算机实现上述方法实施例中由第一鉴权功能网元执行的方法,或由会话管理功能网元执行的方法,或由APP实例接入模块执行的方法。The embodiment of the present application also provides a computer program product including instructions, when the instructions are executed by a computer, the computer can implement the method executed by the first authentication function network element in the above method embodiment, or executed by the session management function network element method, or a method executed by the APP instance access module.
本申请实施例还提供一种通信系统,该通信系统由会话管理功能网元和第一鉴权功能实体组成,其中该会话管理功能网元用于执行前述方法实施例中由会话管理功能网元执行的方法的步骤,以及该第一鉴权功能实体用于执行前述方法实施例中由第一鉴权功能实体执行的方法的步骤。The embodiment of the present application also provides a communication system, the communication system is composed of a session management function network element and a first authentication function entity, wherein the session management function network element is used to execute the session management function network element in the foregoing method embodiment The steps of the method to be executed, and the first authentication functional entity is used to execute the steps of the method executed by the first authentication functional entity in the foregoing method embodiments.
可选地,该通信系统还可以包括策略控制功能网元,其用于执行前述方法实施例中由该策略控制功能网元执行的方法的步骤。Optionally, the communication system may further include a network element with a policy control function, which is configured to execute the steps of the method performed by the network element with the policy control function in the foregoing method embodiments.
可选地,该通信系统还可以包括终端设备,其用于执行前述方法实施例中由该终端设备执行的方法的步骤。Optionally, the communication system may further include a terminal device configured to perform the steps of the method performed by the terminal device in the foregoing method embodiments.
可选地,该通信系统还可以包括用户面功能网元,其用于执行前述方法实施例中由该用户面功能网元执行的方法的步骤。Optionally, the communication system may further include a user plane functional network element configured to execute the steps of the method performed by the user plane functional network element in the foregoing method embodiments.
所属领域的技术人员可以清楚地了解到,为描述方便和简洁,上述提供的任一种通信装置中相关内容的解释及有益效果均可参考上文提供的对应的方法实施例,此处不再赘述。Those skilled in the art can clearly understand that for the convenience and brevity of description, the explanations and beneficial effects of the relevant content in any communication device provided above can refer to the corresponding method embodiments provided above, and are not repeated here. repeat.
本申请实施例并未对本申请实施例提供的方法的执行主体的具体结构进行特别限定,只要能够通过运行记录有本申请实施例提供的方法的代码的程序,以根据本申请实施例提供的方法进行通信即可。例如,本申请实施例提供的方法的执行主体可以是终端设备或网络设备,或者,是终端设备或网络设备中能够调用程序并执行程序的功能模块。The embodiment of the present application does not specifically limit the specific structure of the execution subject of the method provided in the embodiment of the present application, as long as the program that records the code of the method provided in the embodiment of the present application can be executed according to the method provided in the embodiment of the present application Just communicate. For example, the subject of execution of the method provided by the embodiment of the present application may be a terminal device or a network device, or a functional module in the terminal device or network device that can call a program and execute the program.
本申请的各个方面或特征可以实现成方法、装置或使用标准编程和/或工程技术的制品。本文中使用的术语“制品”可以涵盖可从任何计算机可读器件、载体或介质访问的计算机程序。Various aspects or features of the present application can be implemented as a method, apparatus, or article of manufacture using standard programming and/or engineering techniques. The term "article of manufacture" as used herein may encompass a computer program accessible from any computer readable device, carrier or media.
其中,计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。可用介质(或者说计算机可读介质)例如可以包括但不限于:磁性介质或磁存储器件(例如,软盘、硬盘(如移动硬盘)、 磁带)、光介质(例如,光盘、压缩盘(compact disc,CD)、数字通用盘(digital versatile disc,DVD)等)、智能卡和闪存器件(例如,可擦写可编程只读存储器(erasable programmable read-only memory,EPROM)、卡、棒或钥匙驱动器等)、或者半导体介质(例如固态硬盘(solid state disk,SSD)等、U盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)等各种可以存储程序代码的介质。Wherein, the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media. Usable media (or computer-readable media) may include, but are not limited to, magnetic media or magnetic storage devices (for example, floppy disks, hard disks (such as removable hard disks), tapes), optical media (for example, optical disks, compact discs, etc.) , CD), digital versatile disc (digital versatile disc, DVD, etc.), smart cards and flash memory devices (such as erasable programmable read-only memory (EPROM), card, stick or key drive, etc. ), or semiconductor media (such as solid state disk (SSD), U disk, read-only memory (ROM), random access memory (RAM), etc. can store programs The medium of the code.
本文描述的各种存储介质可代表用于存储信息的一个或多个设备和/或其它机器可读介质。术语“机器可读介质”可以包括但不限于:无线信道和能够存储、包含和/或承载指令和/或数据的各种其它介质。Various storage media described herein can represent one or more devices and/or other machine-readable media for storing information. The term "machine-readable medium" may include, but is not limited to, wireless channels and various other media capable of storing, containing and/or carrying instructions and/or data.
应理解,本申请实施例中提及的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM)。例如,RAM可以用作外部高速缓存。作为示例而非限定,RAM可以包括如下多种形式:静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。It should be understood that the memory mentioned in the embodiments of the present application may be a volatile memory or a nonvolatile memory, or may include both volatile memory and nonvolatile memory. Among them, the non-volatile memory can be read-only memory (read-only memory, ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically programmable Erases programmable read-only memory (electrically EPROM, EEPROM) or flash memory. The volatile memory may be random access memory (RAM). For example, RAM can be used as an external cache. As an example and not limitation, RAM may include the following forms: static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), synchronous dynamic random access memory (synchronous DRAM, SDRAM) , double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection dynamic random access memory (synchlink DRAM, SLDRAM) and Direct memory bus random access memory (direct rambus RAM, DR RAM).
需要说明的是,当处理器为通用处理器、DSP、ASIC、FPGA或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件时,存储器(存储模块)可以集成在处理器中。It should be noted that when the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic devices, discrete gate or transistor logic devices, or discrete hardware components, the memory (storage module) may be integrated in the processor.
还需要说明的是,本文描述的存储器旨在包括但不限于这些和任意其它适合类型的存储器。It should also be noted that the memories described herein are intended to include, but are not limited to, these and any other suitable types of memories.
在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅是示意性的,例如,上述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。此外,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed devices and methods may be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of the above units is only a logical function division. In actual implementation, there may be other division methods. For example, multiple units or components can be combined or can be Integrate into another system, or some features may be ignored, or not implemented. In addition, the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
上述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元实现本申请提供的方案。The units described above as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to implement the solutions provided in this application.
另外,在本申请各个实施例中的各功能单元可以集成在一个单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the present application may be integrated into one unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。In the above embodiments, all or part of them may be implemented by software, hardware, firmware or any combination thereof.
当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。该计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。计算机可以是通用计算机、专用计算机、计 算机网络、或者其他可编程装置。例如,计算机可以是个人计算机,服务器,或者网络设备等。计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线)或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。关于计算机可读存储介质,可以参考上文描述。When implemented using software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part. A computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. For example, the computer can be a personal computer, a server, or a network device, etc. Computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, computer instructions may be transmitted from a website site, computer, server or data center by wire (such as Coaxial cable, optical fiber, digital subscriber line) or wireless (such as infrared, wireless, microwave, etc.) to another website site, computer, server or data center. Regarding the computer-readable storage medium, reference may be made to the above description.
应理解,在本申请实施例中,编号“第一”、“第二”…仅仅为了区分不同的对象,比如为了区分不同的网络设备,并不对本申请实施例的范围构成限制,本申请实施例并不限于此。It should be understood that in this embodiment of the application, the numbers "first", "second"... are only used to distinguish different objects, such as different network devices, and do not limit the scope of the embodiment of this application. Examples are not limited to this.
还应理解,在本申请中,“当…时”、“若”以及“如果”均指在某种客观情况下网元会做出相应的处理,并非是限定时间,且也不要求网元实现时一定要有判断的动作,也不意味着存在其它限定。It should also be understood that in this application, "when", "if" and "if" all mean that the network element will make corresponding processing under certain objective circumstances, and it is not a limited time, and it does not require the network element to There must be an action of judgment during implementation, and it does not mean that there are other restrictions.
还应理解,在本申请各实施例中,“A对应的B”表示B与A相关联,根据A可以确定B。但还应理解,根据A确定B并不意味着仅仅根据A确定B,还可以根据A和/或其它信息确定B。It should also be understood that in each embodiment of the present application, "A corresponds to B" means that B is associated with A, and B can be determined according to A. However, it should also be understood that determining B according to A does not mean determining B only according to A, and B may also be determined according to A and/or other information.
还应理解,本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。It should also be understood that the term "and/or" in this article is only an association relationship describing associated objects, indicating that there may be three relationships, for example, A and/or B may indicate: A exists alone, and A and B exist simultaneously. B, there are three situations of B alone. In addition, the character "/" in this article generally indicates that the contextual objects are an "or" relationship.
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。The above is only a specific implementation of the application, but the scope of protection of the application is not limited thereto. Anyone familiar with the technical field can easily think of changes or substitutions within the technical scope disclosed in the application. Should be covered within the protection scope of this application. Therefore, the protection scope of the present application should be determined by the protection scope of the claims.

Claims (35)

  1. 一种鉴权方法,其特征在于,包括:An authentication method, characterized in that it includes:
    第一鉴权功能实体接收第一鉴权请求,所述第一鉴权请求包括应用APP实例的标识信息和所述标识信息对应的第一鉴权信息,所述APP实例为运行应用APP的实例;The first authentication function entity receives a first authentication request, the first authentication request includes the identification information of the application APP instance and the first authentication information corresponding to the identification information, and the APP instance is an instance of the running application APP ;
    所述第一鉴权功能实体根据所述APP实例的标识信息和所述第一鉴权信息对所述APP实例进行鉴权;The first authentication functional entity authenticates the APP instance according to the identification information of the APP instance and the first authentication information;
    所述第一鉴权功能实体发送第一鉴权响应,所述第一鉴权响应包括对所述APP实例的鉴权结果。The first authentication function entity sends a first authentication response, where the first authentication response includes an authentication result for the APP instance.
  2. 根据权利要求1所述的方法,其特征在于,The method according to claim 1, characterized in that,
    所述APP实例的标识信息包括所述APP实例的设备标识和/或所述APP实例的业务标识。The identification information of the APP instance includes the device identification of the APP instance and/or the service identification of the APP instance.
  3. 根据权利要求1或2所述的方法,其特征在于,所述第一鉴权功能实体根据所述APP实例的标识信息和所述第一鉴权信息对所述APP实例进行鉴权,包括:The method according to claim 1 or 2, wherein the first authentication functional entity authenticates the APP instance according to the identification information of the APP instance and the first authentication information, including:
    确定本地与所述APP实例的标识信息对应的第二鉴权信息;Determine local second authentication information corresponding to the identification information of the APP instance;
    将所述第一鉴权信息与所述第二鉴权信息进行比对。comparing the first authentication information with the second authentication information.
  4. 根据权利要求3所述的方法,其特征在于,The method according to claim 3, characterized in that,
    当所述第一鉴权信息与所述第二鉴权信息比对一致时,则所述APP实例鉴权成功;或者,When the first authentication information is consistent with the second authentication information, the APP instance authentication succeeds; or,
    当所述第一鉴权信息与所述第二鉴权信息比对不一致时,则所述APP实例鉴权失败。When the comparison between the first authentication information and the second authentication information is inconsistent, the APP instance authentication fails.
  5. 根据权利要求1至4中任一项所述的方法,其特征在于,The method according to any one of claims 1 to 4, characterized in that,
    所述APP实例的鉴权结果包括指示所述APP实例鉴权成功的信息或指示所述APP实例鉴权失败的信息。The authentication result of the APP instance includes information indicating successful authentication of the APP instance or information indicating authentication failure of the APP instance.
  6. 根据权利要求1至5中任一项所述的方法,其特征在于,The method according to any one of claims 1 to 5, characterized in that,
    所述第一鉴权功能实体接收所述第一鉴权请求包括:所述第一鉴权功能实体接收来自会话管理功能网元的所述第一鉴权请求,以及The first authentication function entity receiving the first authentication request includes: the first authentication function entity receiving the first authentication request from a session management function network element, and
    所述第一鉴权功能实体发送所述第一鉴权响应包括:所述第一鉴权功能实体向所述会话管理功能网元发送所述第一鉴权响应;或者,The first authentication function entity sending the first authentication response includes: the first authentication function entity sending the first authentication response to the session management function network element; or,
    所述第一鉴权功能实体接收所述第一鉴权请求包括:所述第一鉴权功能实体接收来自安全锚点功能实体的所述第一鉴权请求,以及The first authentication functional entity receiving the first authentication request includes: the first authentication functional entity receiving the first authentication request from a security anchor functional entity, and
    所述第一鉴权功能实体发送所述第一鉴权响应包括:所述第一鉴权功能实体向所述安全锚点功能实体发送所述第一鉴权响应。Sending the first authentication response by the first authentication functional entity includes: sending the first authentication response to the security anchor functional entity by the first authentication functional entity.
  7. 根据权利要求1至6中任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1 to 6, further comprising:
    所述第一鉴权功能实体接收第二鉴权请求,所述第二鉴权请求包括访问所述APP的终端设备的标识信息、所述APP的应用标识以及与所述终端设备的标识信息和所述APP的应用标识对应的第三鉴权信息;The first authentication functional entity receives a second authentication request, where the second authentication request includes identification information of a terminal device accessing the APP, an application identification of the APP, and identification information of the terminal device and The third authentication information corresponding to the application identifier of the APP;
    所述第一鉴权功能实体根据所述终端设备的标识信息、所述APP的应用标识和所述第三鉴权信息对所述终端设备进行二次鉴权;The first authentication function entity performs secondary authentication on the terminal device according to the identification information of the terminal device, the application identification of the APP and the third authentication information;
    所述第一鉴权功能实体发送第二鉴权响应,所述第二鉴权响应包括对所述终端设备的鉴权结果。The first authentication function entity sends a second authentication response, where the second authentication response includes an authentication result for the terminal device.
  8. 根据权利要求7所述的方法,其特征在于,The method according to claim 7, characterized in that,
    所述终端设备的标识信息包括所述终端设备的设备标识和/或所述终端设备的业务标识。The identification information of the terminal device includes a device identification of the terminal device and/or a service identification of the terminal device.
  9. 根据权利要求7或8所述的方法,其特征在于,所述第一鉴权功能实体根据所述终端设备的标识信息和所述第三鉴权信息对所述终端设备进行二次鉴权,包括:The method according to claim 7 or 8, wherein the first authentication functional entity performs secondary authentication on the terminal device according to the identification information of the terminal device and the third authentication information, include:
    确定本地与所述终端设备的标识信息和所述APP的应用标识对应的第四鉴权信息;Determine local fourth authentication information corresponding to the identification information of the terminal device and the application identification of the APP;
    将所述第三鉴权信息与所述第四鉴权信息进行比对。comparing the third authentication information with the fourth authentication information.
  10. 根据权利要求9所述的方法,其特征在于,The method according to claim 9, characterized in that,
    当所述第三鉴权信息与所述第四鉴权信息比对一致时,则所述终端设备鉴权成功;或者,When the third authentication information is consistent with the fourth authentication information, the authentication of the terminal device is successful; or,
    当所述第三鉴权信息与所述第四鉴权信息比对不一致时,则所述终端设备鉴权失败。When the comparison between the third authentication information and the fourth authentication information is inconsistent, the authentication of the terminal device fails.
  11. 根据权利要求7至10中任一项所述的方法,其特征在于,A method according to any one of claims 7 to 10, wherein
    所述终端设备的鉴权结果包括指示所述终端设备鉴权成功的信息或指示所述终端设备鉴权失败的信息。The authentication result of the terminal device includes information indicating that the terminal device has successfully authenticated or information indicating that the terminal device has failed in authentication.
  12. 根据权利要求7至11中任一项所述的方法,其特征在于,A method according to any one of claims 7 to 11, wherein
    所述第一鉴权功能实体接收所述第二鉴权请求包括:所述第一鉴权功能实体接收来自会话管理功能网元的所述第二鉴权请求,以及The first authentication function entity receiving the second authentication request includes: the first authentication function entity receiving the second authentication request from a session management function network element, and
    所述第一鉴权功能实体发送所述第一鉴权响应包括:所述第一鉴权功能实体向所述会话管理功能网元发送所述第二鉴权响应;或者,The first authentication function entity sending the first authentication response includes: the first authentication function entity sending the second authentication response to the session management function network element; or,
    所述第一鉴权功能实体接收所述第二鉴权请求包括:所述第一鉴权功能实体接收来自安全锚点功能实体的所述第二鉴权请求,以及The first authentication functional entity receiving the second authentication request includes: the first authentication functional entity receiving the second authentication request from a security anchor functional entity, and
    所述第一鉴权功能实体发送所述第一鉴权响应包括:所述第一鉴权功能实体向所述安全锚点功能实体发送所述第二鉴权响应。The first authentication functional entity sending the first authentication response includes: the first authentication functional entity sending the second authentication response to the security anchor functional entity.
  13. 一种鉴权方法,其特征在于,包括:An authentication method, characterized in that it includes:
    会话管理功能网元向第一鉴权功能实体发送第一鉴权请求,所述第一鉴权请求包括应用APP实例的标识信息和所述标识信息对应的第一鉴权信息,所述APP实例为运行应用APP的实例;The session management function network element sends a first authentication request to the first authentication function entity, the first authentication request includes the identification information of the application APP instance and the first authentication information corresponding to the identification information, and the APP instance An instance of the running application APP;
    所述会话管理功能网元接收来自所述第一鉴权功能实体的第一鉴权响应,所述第一鉴权响应包括对所述APP实例的鉴权结果。The session management function network element receives a first authentication response from the first authentication function entity, where the first authentication response includes an authentication result for the APP instance.
  14. 根据权利要求13所述的方法,其特征在于,所述会话管理功能网元向所述第一鉴权功能实体发送所述第一鉴权请求前,所述方法还包括:The method according to claim 13, wherein before the session management function network element sends the first authentication request to the first authentication function entity, the method further comprises:
    所述会话管理功能网元接收第一会话建立请求,所述第一会话建立请求用于请求建立所述APP实例与核心网的第一会话,所述第一会话建立请求包括所述APP实例的标识信息和所述第一鉴权信息。The session management function network element receives a first session establishment request, the first session establishment request is used to request establishment of a first session between the APP instance and the core network, and the first session establishment request includes the APP instance Identification information and the first authentication information.
  15. 根据权利要求13或14所述的方法,其特征在于,The method according to claim 13 or 14, characterized in that,
    所述APP实例的标识信息包括所述APP实例的设备标识和/或所述APP实例的业务标识。The identification information of the APP instance includes the device identification of the APP instance and/or the service identification of the APP instance.
  16. 根据权利要求15所述的方法,其特征在于,The method according to claim 15, characterized in that,
    所述APP实例的鉴权结果包括指示所述APP实例鉴权成功的信息或指示所述APP实例鉴权失败的信息。The authentication result of the APP instance includes information indicating successful authentication of the APP instance or information indicating authentication failure of the APP instance.
  17. 根据权利要求16所述的方法,其特征在于,The method according to claim 16, characterized in that,
    当所述APP实例鉴权失败时,所述会话管理功能网元拒绝所述第一会话建立;或者,所述会话管理功能网元拒绝终端设备与所述APP实例之间的互访。When the APP instance authentication fails, the session management function network element rejects establishment of the first session; or, the session management function network element rejects mutual access between the terminal device and the APP instance.
  18. 根据权利要求13至17中任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 13 to 17, further comprising:
    所述会话管理功能网元向所述第一鉴权功能实体发送第二鉴权请求,所述第二鉴权请求包括访问所述APP的终端设备的标识信息、所述APP的应用标识以及与所述终端设备的标识信息和所述APP的应用标识对应的第三鉴权信息;The session management functional network element sends a second authentication request to the first authentication functional entity, where the second authentication request includes identification information of a terminal device accessing the APP, an application identification of the APP, and third authentication information corresponding to the identification information of the terminal device and the application identification of the APP;
    所述会话管理功能网元接收来自所述第一鉴权功能实体的第二鉴权响应,所述第二鉴权响应包括对所述终端设备的鉴权结果。The session management function network element receives a second authentication response from the first authentication function entity, where the second authentication response includes an authentication result for the terminal device.
  19. 根据权利要求18所述的方法,其特征在于,所述会话管理功能网元向所述第一鉴权功能实体发送所述第二鉴权请求之前,所述方法还包括:The method according to claim 18, wherein before the session management function network element sends the second authentication request to the first authentication function entity, the method further comprises:
    所述会话管理功能网元接收第二会话建立请求,所述第二会话建立消息用于请求建立所述终端设备与所述APP的第二会话,所述第二会话建立请求包括所述终端设备的标识信息、所述APP的应用标识以及所述第三鉴权信息。The session management function network element receives a second session establishment request, the second session establishment message is used to request establishment of a second session between the terminal device and the APP, and the second session establishment request includes the terminal device The identification information of the APP, the application identification of the APP, and the third authentication information.
  20. 根据权利要求18所述的方法,其特征在于,所述会话管理功能网元向所述第一鉴权功能实体发送所述第二鉴权请求之前,所述方法还包括:The method according to claim 18, wherein before the session management function network element sends the second authentication request to the first authentication function entity, the method further comprises:
    所述会话管理功能网元接收第一会话修改请求,所述第一会话修改请求用于请求修改所述终端设备与所述APP的会话,所述第一会话修改请求包括所述终端设备的标识信息、所述APP的应用标识以及所述第三鉴权信息。The session management function network element receives a first session modification request, the first session modification request is used to request modification of the session between the terminal device and the APP, and the first session modification request includes the identifier of the terminal device information, the application identifier of the APP, and the third authentication information.
  21. 根据权利要求18所述的方法,其特征在于,所述会话管理功能网元向所述第一鉴权功能实体发送所述第二鉴权请求之前,所述方法还包括:The method according to claim 18, wherein before the session management function network element sends the second authentication request to the first authentication function entity, the method further comprises:
    所述会话管理功能网元接收来自用户面功能网元的第三鉴权请求,所述第三鉴权请求用于请求对访问所述APP的终端设备进行鉴权,所述第三鉴权请求包括所述终端设备的标识信息、所述APP的应用标识以及所述第三鉴权信息。The session management functional network element receives a third authentication request from a user plane functional network element, the third authentication request is used to request authentication of a terminal device accessing the APP, and the third authentication request It includes the identification information of the terminal device, the application identification of the APP, and the third authentication information.
  22. 根据权利要求18至21中任一项所述的方法,其特征在于,A method according to any one of claims 18 to 21, wherein,
    所述终端设备的标识信息包括所述终端设备的设备标识和/或所述终端设备的业务标识。The identification information of the terminal device includes a device identification of the terminal device and/or a service identification of the terminal device.
  23. 根据权利要求18至22中任一项所述的方法,其特征在于,A method according to any one of claims 18 to 22, wherein
    所述终端设备的鉴权结果包括指示所述终端设备鉴权成功的信息或指示所述终端设备鉴权失败的信息。The authentication result of the terminal device includes information indicating that the terminal device has successfully authenticated or information indicating that the terminal device has failed in authentication.
  24. 根据权利要求23所述的方法,其特征在于,The method of claim 23, wherein,
    当所述终端设备鉴权失败时,所述会话管理功能网元拒绝所述第二会话建立;或者,所述会话管理功能网元拒绝所述终端设备与所述APP实例之间的互访。When the authentication of the terminal device fails, the session management function network element rejects establishment of the second session; or, the session management function network element rejects the mutual access between the terminal device and the APP instance.
  25. 根据权利要求24所述的方法,其特征在于,所述方法还包括:The method according to claim 24, further comprising:
    所述会话管理功能网元向策略控制功能网元发送策略更新请求,所述策略更新请求用于请求所述策略控制功能网元允许所述终端设备与所述APP之间的业务访问;The session management function network element sends a policy update request to the policy control function network element, and the policy update request is used to request the policy control function network element to allow service access between the terminal device and the APP;
    所述会话管理功能网元接收来自所述策略控制功能网元的策略更新响应,所述策略更新响应包括指示允许所述终端设备与所述APP之间的业务访问的信息。The session management function network element receives a policy update response from the policy control function network element, where the policy update response includes information indicating that service access between the terminal device and the APP is allowed.
  26. 一种鉴权方法,其特征在于,包括:An authentication method, characterized in that it includes:
    会话管理功能网元向第一鉴权功能实体发送第一鉴权请求,所述第一鉴权请求包括应用APP实例的标识信息和所述标识信息对应的第一鉴权信息,所述APP实例为运行应用APP的实例;The session management function network element sends a first authentication request to the first authentication function entity, the first authentication request includes the identification information of the application APP instance and the first authentication information corresponding to the identification information, and the APP instance An instance of the running application APP;
    所述第一鉴权功能实体接收所述第一鉴权请求;The first authentication functional entity receives the first authentication request;
    所述第一鉴权功能实体根据所述APP实例的标识信息和所述第一鉴权信息对所述APP实例进行鉴权;The first authentication functional entity authenticates the APP instance according to the identification information of the APP instance and the first authentication information;
    所述第一鉴权功能实体发送第一鉴权响应,所述第一鉴权响应包括对所述APP实例的鉴权结果The first authentication function entity sends a first authentication response, and the first authentication response includes an authentication result for the APP instance
    所述会话管理功能网元接收所述第一鉴权响应。The session management function network element receives the first authentication response.
  27. 一种通信装置,其特征在于,包括至少一个处理器,所述至少一个处理器用于执行存储器中存储的计算机程序,以使得所述装置实现如权利要求1至12中任一项所述的方法。A communication device, characterized in that it includes at least one processor, and the at least one processor is used to execute a computer program stored in a memory, so that the device implements the method according to any one of claims 1 to 12 .
  28. 一种通信装置,其特征在于,包括至少一个处理器,所述至少一个处理器用于执行存储器中存储的计算机程序,以使得所述装置实现如权利要求13至25中任一项所述的方法。A communication device, characterized in that it includes at least one processor, and the at least one processor is used to execute a computer program stored in a memory, so that the device implements the method according to any one of claims 13 to 25 .
  29. 一种通信系统,其特征在于,包括:A communication system, characterized in that it includes:
    第一鉴权功能实体和会话管理功能网元;a first authentication functional entity and a session management functional network element;
    所述第一鉴权功能实体执行权利要求1至12中任一项所述的方法,以及,said first authentication functional entity performs the method of any one of claims 1 to 12, and,
    所述会话管理功能网元执行权利要求13至25中任一项所述的方法。The session management function network element executes the method described in any one of claims 13-25.
  30. 一种计算机可读存储介质,其特征在于,存储有计算机程序或指令,所述计算机程序或指令用于实现权利要求1至12中任一项所述的方法。A computer-readable storage medium, characterized in that it stores computer programs or instructions, and the computer programs or instructions are used to implement the method according to any one of claims 1 to 12.
  31. 一种计算机可读存储介质,其特征在于,存储有计算机程序或指令,所述计算机程序或指令用于实现权利要求13至25中任一项所述的方法。A computer-readable storage medium, characterized in that it stores computer programs or instructions, and the computer programs or instructions are used to implement the method according to any one of claims 13 to 25.
  32. 一种计算机可读存储介质,其特征在于,存储有计算机程序或指令,所述计算机程序或指令用于实现权利要求26所述的方法。A computer-readable storage medium, characterized in that it stores computer programs or instructions, and the computer programs or instructions are used to implement the method according to claim 26.
  33. 一种计算机程序产品,其特征在于,当所述计算机程序产品在计算机上运行时,使得所述计算机执行如权利要求1至12中任一项所述的方法。A computer program product, characterized in that, when the computer program product is run on a computer, the computer is made to execute the method according to any one of claims 1 to 12.
  34. 一种计算机程序产品,其特征在于,当所述计算机程序产品在计算机上运行时,使得所述计算机执行如权利要求13至25中任一项所述的方法。A computer program product, characterized in that, when the computer program product is run on a computer, the computer is made to execute the method according to any one of claims 13 to 25.
  35. 一种计算机程序产品,其特征在于,当所述计算机程序产品在计算机上运行时,使得所述计算机执行如权利要求26所述的方法。A computer program product, characterized in that, when the computer program product is run on a computer, it causes the computer to execute the method as claimed in claim 26 .
PCT/CN2022/094595 2021-05-28 2022-05-24 Authentication method, communication device, and system WO2022247812A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110589801.6A CN115412911A (en) 2021-05-28 2021-05-28 Authentication method, communication device and system
CN202110589801.6 2021-05-28

Publications (1)

Publication Number Publication Date
WO2022247812A1 true WO2022247812A1 (en) 2022-12-01

Family

ID=84156204

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/094595 WO2022247812A1 (en) 2021-05-28 2022-05-24 Authentication method, communication device, and system

Country Status (2)

Country Link
CN (1) CN115412911A (en)
WO (1) WO2022247812A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116806023A (en) * 2023-06-25 2023-09-26 之江实验室 Method and device for verifying service validity under heterogeneous network architecture

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117041969B (en) * 2023-09-28 2024-01-02 新华三技术有限公司 Access method, system and device of 5G dual-domain private network and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120227095A1 (en) * 2011-03-04 2012-09-06 Thomas Alexander Wood Systems and methods for generating modular security delegates for applications
CN103179176A (en) * 2011-12-26 2013-06-26 中国移动通信集团公司 Call method, device and system for web application in cloud/cluster environment
CN109511115A (en) * 2017-09-14 2019-03-22 华为技术有限公司 A kind of authorization method and network element
CN110800331A (en) * 2017-07-20 2020-02-14 华为国际有限公司 Network verification method, related equipment and system
CN111669750A (en) * 2019-03-07 2020-09-15 华为技术有限公司 PDU session secondary verification method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120227095A1 (en) * 2011-03-04 2012-09-06 Thomas Alexander Wood Systems and methods for generating modular security delegates for applications
CN103179176A (en) * 2011-12-26 2013-06-26 中国移动通信集团公司 Call method, device and system for web application in cloud/cluster environment
CN110800331A (en) * 2017-07-20 2020-02-14 华为国际有限公司 Network verification method, related equipment and system
CN109511115A (en) * 2017-09-14 2019-03-22 华为技术有限公司 A kind of authorization method and network element
CN111669750A (en) * 2019-03-07 2020-09-15 华为技术有限公司 PDU session secondary verification method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116806023A (en) * 2023-06-25 2023-09-26 之江实验室 Method and device for verifying service validity under heterogeneous network architecture
CN116806023B (en) * 2023-06-25 2024-02-09 之江实验室 Method and device for verifying service validity under heterogeneous network architecture

Also Published As

Publication number Publication date
CN115412911A (en) 2022-11-29

Similar Documents

Publication Publication Date Title
EP3627793B1 (en) Session processing method and device
AU2017413023A1 (en) Communication method and related apparatus
US20200099697A1 (en) Secure group creation in proximity based service communication
US20160381543A1 (en) Secure discovery for proximity based service communication
WO2022247812A1 (en) Authentication method, communication device, and system
EP4007326A1 (en) Method and device for activating 5g user
JP2016526805A (en) Secure system and method for secure communication
US20230319556A1 (en) Key obtaining method and communication apparatus
US20210377054A1 (en) Systems and methods for managing public key infrastructure certificates for components of a network
US11140545B2 (en) Method, apparatus, and system for protecting data
EP3648488B1 (en) Methods, devices, system and computer-readable storage medium for acquiring identifier of terminal device
US20230354013A1 (en) Secure communication method and device
US20230087407A1 (en) Authentication and authorization method and apparatus
CN116723507B (en) Terminal security method and device for edge network
US20230396602A1 (en) Service authorization method and system, and communication apparatus
WO2023011630A1 (en) Authorization verification method and apparatus
WO2023016160A1 (en) Session establishment method and related apparatus
WO2021073382A1 (en) Registration method and apparatus
CN115996378A (en) Authentication method and device
WO2024067619A1 (en) Communication method and communication apparatus
WO2024032218A1 (en) Communication method and communication apparatus
CN116528234B (en) Virtual machine security and credibility verification method and device
WO2022027529A1 (en) Method and apparatus for slice authentication
US11968530B2 (en) Network authentication for user equipment access to an edge data network
WO2022237898A1 (en) Onboarding method, communication apparatus, medium and chip

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22810537

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE