WO2023051189A1 - Procédé et appareil de communication pour service de gestion - Google Patents

Procédé et appareil de communication pour service de gestion Download PDF

Info

Publication number
WO2023051189A1
WO2023051189A1 PCT/CN2022/117240 CN2022117240W WO2023051189A1 WO 2023051189 A1 WO2023051189 A1 WO 2023051189A1 CN 2022117240 W CN2022117240 W CN 2022117240W WO 2023051189 A1 WO2023051189 A1 WO 2023051189A1
Authority
WO
WIPO (PCT)
Prior art keywords
management
management function
domain
information
tenant
Prior art date
Application number
PCT/CN2022/117240
Other languages
English (en)
Chinese (zh)
Inventor
曹龙雨
王耀光
于益俊
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023051189A1 publication Critical patent/WO2023051189A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/28Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • the present application relates to the technical field of wireless communication, and in particular to a communication method and device for managing services.
  • the third generation mobile communication technology (3 rd generation partnership project) proposed a service based management architecture (service based management architecture, SBMA).
  • a management function (management function, MnF) is a basic unit that constitutes the SBMA architecture.
  • the MnF is a logical functional unit that provides specific management functions, and the management functions provided by the MnF are called management services (management service, MnS).
  • the MnF can serve as a management service producer (MnS producer) to provide the MnS provided by the MnF to other MnFs.
  • MnS consumer management service consumer
  • Tenants such as customers in vertical industries and customers using slices have the requirement to jointly manage the network with operators.
  • operators need to open the network management capability to tenants.
  • the tenant currently there is no relevant method for the tenant to obtain the open management service, so the tenant cannot manage the network based on the open management service.
  • the present application provides a communication method and device for management services, which are used to obtain management services opened by operators under the condition of satisfying information security.
  • a communication method for management services is provided.
  • the method can be executed by a cross domain management function, or by a chip similar to the cross domain management function.
  • the cross-domain management function receives a first message for querying authorized management services from the first management function.
  • the first message includes the tenant identifier of the tenant.
  • the cross-domain management function determines the management capability information open to the tenant according to the tenant ID, and sends the tenant ID, authentication information, and authorized management service information to the first management function.
  • the management capability information is used to indicate one or more management services
  • the authorized management service information indicates all or part of the one or more management services
  • the authentication information is used to indicate the authorization of the management capability information.
  • a communication method for management services may be executed by the first management function, or by a chip similar to the first management function.
  • the first management function may send a first message to the cross-domain management function to query authorized management services.
  • the first management function receives the tenant identifier, authentication information and authorized management service information from the cross-domain management function.
  • the cross-domain management function can determine the management capability information open to the tenant based on the tenant identifier, and authorize the management capability information.
  • the first management function of the tenant can obtain the management service opened by the operator, so as to manage the network of the tenant.
  • a communication method for management services may be executed by a domain opening capability control management function, or by a chip similar to the domain opening capability control management function.
  • the domain opening capability control management function receives the identification of the third management function and the first management service information from the cross-domain management function, and receives the identification from the first management function.
  • the domain opening capability control management function authenticates the first management function according to the identifier of the third management function and the identifier of the first management function. When the authentication is passed, the domain opening capability control management function provides the first management service to the first management function.
  • the first management service information is information about all or part of management services open to tenants.
  • the domain opening capability control management function when the domain opening capability control management function receives the first management service request from the first management function, it authenticates the first management function through the information from the cross-domain management function, that is, the cross-domain management function can be realized Two authentications with domain open management function to improve the security of data information.
  • a communication method for management services is provided.
  • the method may be executed by the cross-domain management function shown in the first aspect and the first management function shown in the above two aspects.
  • the first management function sends a first message to the cross-domain management function to query authorized management services.
  • the cross-domain management function determines the management capability information open to the tenant according to the tenant ID, and sends the tenant ID, authentication information and authorized management service information to the first management function.
  • a communication method for management services is provided.
  • the method can be executed by the cross-domain management function shown in the first aspect and the domain openability control management function shown in the second aspect.
  • the cross-domain management function sends the identifier of the third management function and the first management service information to the domain opening capability control management function.
  • the first management function sends the identifier of the first management function to the domain opening capability control management function.
  • the domain opening capability control management function authenticates the first management function according to the identifier of the third management function and the identifier of the first management function. Wherein, when the authentication is passed, the domain open capability control management function provides the first management function with the first management service indicated by the first management service information.
  • a communication device including a processing unit and a transceiver unit.
  • the transceiver unit is used for receiving a first message from a first management function to query authorized management services.
  • the processing unit is configured to determine the management capability information open to the tenant according to the tenant identifier.
  • the transceiver unit is further configured to send the tenant identifier, authentication information and authorized management service information to the first management function.
  • a communication device including: a processing unit and a transceiver unit.
  • the processing unit is configured to generate the first message.
  • the first message is used to query authorized management services.
  • the transceiver unit is configured to receive the tenant ID, authentication information and authorized management service information from the cross-domain management function.
  • a communication device including a processing unit and a transceiver unit.
  • the transceiving unit is configured to receive the identification of the third management function and the first management service information from the cross-domain management function.
  • the first management service information is information about all or part of management services open to tenants.
  • the transceiver unit is also used for receiving the identification from the first management function.
  • the processing unit is configured to authenticate the first management function according to the identifier of the third management function and the identifier of the first management function, and provide the first management function indicated by the first management service information to the first management function when the authentication is passed. management services.
  • the first message further includes an identifier of the first management function.
  • the identifier of the first management function here can be used for message routing between the first management function and the cross-domain management function, and the cross-domain management function can pass the tenant identifier, authentication information and authorized management services to The information is sent to the first management function corresponding to the identifier of the first management function.
  • the authorized management service information includes the type of management service open to tenants and the management service open to tenants. Version.
  • the management service types include fault monitoring management services, performance assurance management services, network configuration management services, and heartbeat One or more of the management services.
  • the authorized management service information further includes the component type of the management service type; the component type includes the operation type, At least one of network resource object and data information.
  • the cross-domain management function can determine the management service type, management service version, and management service type component type open to authorized tenants through the tenant ID, so that the first management function can provide information on the tenant's network based on the above-mentioned management capability information. to manage.
  • the cross-domain management function instructs the domain opening capability control management function to open the first management service.
  • the first management service is part or all of the management service information in the management services indicated by the management capability information.
  • the cross-domain management function may send the first management service information to the domain opening capability control management function.
  • the first management service information here indicates the above-mentioned first management service.
  • the cross-domain management function sends the identification and authentication information of the first management function to the domain opening capability control management function.
  • the cross-domain management function can send the identification and authentication information of the first management function to the domain openness capability control management function that provides the management service indicated by the above management capability information, so that the network element of the domain openness capability control management function can The above-mentioned management service is provided for the first management function.
  • the cross-domain management function requests authorized management services from the second management function.
  • the cross-domain management function receives the tenant identifier, authentication information and management capability information from the second management function.
  • the cross-domain management function can obtain the management capability information open to the tenant and the tenant's authentication information through the second management function, and the second management function determines the tenant's management capability information and performs authentication on the tenant.
  • the cross-domain management function sends the identifier of the domain opening capability control management function to the first management function.
  • the domain opening capability control management function is used to provide the first management capability opening control function of domain network management.
  • the cross-domain management function may send the identifier of the domain openness control management function that provides the first management service to the first management function, so that the first management function may request the first management service from the domain openness control management function, Let the first management function manage the tenant's network.
  • the first management function may receive the identifier of the domain opening capability control management function from the cross-domain management function.
  • the first management function sends the identifier of the first management function to the domain openness control management function, so that the domain openness control management function authenticates the first management function.
  • the domain opening capability control management function is used to provide the first management service.
  • the first management service is part or all of the management services indicated by the authorized management service information.
  • the first management function sends the authentication information to the domain opening capability control management function.
  • the authentication information is used to authenticate the first management function.
  • the first management function may receive the identifier of the domain opening capability control management function from the cross-domain management function.
  • the first management function sends the identification and authentication information of the first management function to the domain opening capability control management function.
  • the domain opening capability control management function is used to provide the first management service.
  • the first management capability is part or all of the management services indicated by the authorized management service information.
  • the authentication information is used to authenticate the first management function.
  • the identifier of the first management function is used for message routing between the first management function and the domain opening capability control management function.
  • the domain opening capability control management function may receive the first authentication information from the cross-domain management function, and receive the second authentication information from the first management function information.
  • the second authentication information is used to indicate the authorization of the second management service information.
  • the domain opening capability control management function authenticates the first management function based on the second authentication information and the first authentication information.
  • the first authentication information is used to indicate the authorization of the first management service information
  • the first management service is part or all of the management service information in the management service indicated by the management capability information.
  • the second management service information is information about all or part of management services open to tenants.
  • the first management service is the same as the second management service, or the first management service is a subset of the second management service.
  • the domain opening capability control management function can authenticate the authentication information from the first management function based on the authentication information from the cross-domain management function, which can further improve the security of data information.
  • the domain opening capability control management function may receive the identification of the third management function, the first management service information, and the first authentication information from the cross-domain management function, and receive the identification and the second authentication information from the first management function. rights information.
  • the domain opening capability control management function may authenticate the first authentication information through the second authentication information. When the authentication is passed, the domain opening capability control management function may provide the first management service to the first management function.
  • the identifier from the first management function is used for message routing between the first management function and the domain opening capability control management function.
  • the cross-domain management function may further send the identifier of the domain opening capability control management function used to provide the first management service to the first management function.
  • the cross-domain management function sends a second message to the domain openness capability control management function to instruct the domain openness capability control management function to release the first management service.
  • the cross-domain management function sends the identifier of the first management function to the domain openness control management function, and the domain openness control management function is based on the identifier of the first management function.
  • Management functions are authenticated.
  • the first management function also sends the identifier of the first management function to the domain opening capability control management function.
  • the cross-domain management function sends authentication information to the domain openness capability control management function, so that the domain openness capability control management function authenticates the first management function based on the authentication information.
  • the first management function also sends authentication information to the domain opening capability control management function.
  • the cross-domain management function sends the first authentication information to the domain opening capability control management function.
  • the first management function sends the second authentication information to the domain opening capability control management function.
  • the domain opening management function authenticates the first management function based on the second authentication information and the first authentication information.
  • the first authentication information is used to indicate the authorization of the first management service information
  • the second authentication information is used to indicate the authorization of the second management service information.
  • the first management service information is the same as the second management service information, or the first management service information is a subset of the second management service information.
  • the transceiver unit is further configured to send the second message to the domain openness capability control management function.
  • the transceiver unit is further configured to send the identification and authentication information of the first management function to the domain openness capability control management function.
  • the transceiver unit is further configured to send a third message to the second management function.
  • the transceiver unit is also used to receive the tenant ID, authentication information and management capability information from the second management function.
  • the transceiving unit is further configured to send the identifier of the domain openness capability control management function to the first management function.
  • the transceiver unit is further configured to receive the identifier of the domain opening capability control management function from the cross-domain management function.
  • the transceiver unit is further configured to send the identifier of the first management function to the domain opening capability control management function.
  • the transceiver unit is further configured to send authentication information to a domain openness capability control management function.
  • the transceiver unit is further configured to receive the first authentication information from the cross-domain management function.
  • the transceiver unit is also used for receiving second authentication information from the first management function.
  • the processing unit is specifically configured to authenticate the first management function based on the second authentication information and the first authentication information.
  • a communication device including a processor, the processor is coupled to a memory, the memory is used to store computer programs or instructions, and the processor is used to execute the computer programs or instructions to implement various possible implementations of the above-mentioned aspects method in .
  • the memory may be located within the device or external to the device.
  • the number of the processors is one or more.
  • the present application provides a communication device, including: a processor and an interface circuit, the interface circuit is used to communicate with other devices, and the processor is used to implement the methods in various possible implementation manners of the foregoing aspects.
  • a communication device in an eleventh aspect, includes a logic circuit and an input and output interface.
  • the input-output interface is used to input the first message from the first management function.
  • the logic circuit is used to determine the management capability information open to the tenant according to the tenant identifier.
  • the input and output interface is also used to output the tenant identifier, authentication information and authorized management service information to the first management function.
  • the input-output interface is used to input the identification of the third management function and the first management service information from the cross-domain management function, and input the identification from the first management function.
  • a logic circuit configured to authenticate the first management function according to the identification of the third management function and the identification of the first management function, and provide the first management function indicated by the first management service information to the first management function when the authentication is passed; Serve.
  • logic circuitry is used to generate the first message.
  • the input and output interface is used to output the first message to the cross-domain management function.
  • the input and output interface is also used to input the tenant identification, authentication information and authorized management service information from the domain opening capability control management function.
  • the present application further provides a chip system, including: a processor, configured to execute the methods in various possible implementation manners of the foregoing aspects.
  • the present application also provides a communication system, including: the communication device shown in the fifth aspect and the communication device shown in the sixth aspect; or the communication system shown in the fifth aspect and the communication device shown in the seventh aspect A communication device; or the communication device shown in the fifth aspect, the communication device shown in the sixth aspect, and the communication device shown in the seventh aspect.
  • the present application further provides a computer program product, including computer execution instructions, and when the communication device executes the instructions on the computer, the methods in various possible implementation manners of the above-mentioned aspects are executed.
  • the present application also provides a computer-readable storage medium, in which computer programs or instructions are stored, and when the instructions are run on the communication device, various possible implementations of the above-mentioned aspects can be realized method in .
  • Figure 1 is a schematic diagram of the logical structure of MnF
  • Figure 2 is a schematic diagram of the network management architecture
  • Figure 3 is a schematic diagram of a management capability opening scenario
  • FIG. 4 is one of exemplary flow charts of a communication method for management services provided by an embodiment of the present application.
  • FIG. 5 is a schematic diagram of the tenant registration process provided by the embodiment of the present application.
  • FIG. 6 is one of exemplary flow charts of a communication method for management services provided by an embodiment of the present application.
  • FIG. 7 is one of the exemplary flow charts of the communication method for management services provided by the embodiment of the present application.
  • FIG. 8 is a schematic diagram of a communication device provided by an embodiment of the present application.
  • FIG. 9 is a schematic diagram of an electronic device provided by an embodiment of the present application.
  • Management Function is a logical functional unit that implements specific management tasks or functions (such as configuring network parameters or collecting network performance data, etc.).
  • a service-based SBMA architecture Service based Management Architecture, service-based management architecture
  • the basic component of the SBMA architecture is the management function.
  • the MnF can serve as a management service producer (MnS producer) to provide the management service (Management Service, MnS) provided by the MnF to other MnFs.
  • MnS consumer management service consumer
  • the MnFs call MnS mutually based on the service interface.
  • a tenant which represents a group of management service consumers. This set of consumers is associated with the administrative capabilities that are allowed to be accessed and used. Wherein, a group of management service consumers may include one or more management service consumers.
  • Management capabilities refer to the management services that authorized management service consumers can use.
  • Management service the interface service provided by the management function is called management service.
  • the management service may include one or more of an alarm management service, a performance assurance management service, a network configuration management service, and a heartbeat management service.
  • Alarm management services can include services such as querying alarm information, alarm notification, or querying the number of times alarms are sent.
  • the performance assurance management service may include creation of performance data measurement tasks, notification of completion of data file preparation, or flow data reporting.
  • Network configuration management services may include services such as network parameter configuration, network parameter modification, or network configuration parameter query.
  • the heartbeat management service may include services such as heartbeat cycle notification, and its main function is to realize the health detection of both communication parties.
  • Management services include component types, such as component type A (management service component type A), component type B (management service component type B), and component type C (management service component type C). in:
  • the management service component type A is network management operations and notifications.
  • Management operations may include configuration management operations (such as modifying network configuration parameters or querying network configuration parameters, etc.), performance management operations (such as creating performance measurement tasks or reporting performance data), and alarm management operations (such as alarm query or clearing alarms, etc.).
  • Notifications may include data file notifications, managed object creation notifications, and the like. Wherein, the data file notification is used to notify that the data file has been prepared.
  • the management object creation notification is used to notify the completion of the creation of the management object instance.
  • the management object refers to the object managed by the management function in the service-oriented management architecture.
  • the management object includes base station equipment, wireless cells or frequency points, etc.
  • the management service component type B refers to network resource model information.
  • the network resources refer to network equipment (such as base station equipment, etc.), network functions (such as wireless network control plane functions, wireless network user plane functions, etc.), wireless network resources (such as wireless network cells, spectrum, physical resource blocks, etc.).
  • the network resource model is a model obtained by modeling the above-mentioned network resources based on a network resource model modeling method.
  • the management service component type C refers to the corresponding performance data and alarm information.
  • the performance data includes data such as service delay, jitter, bit error rate, cell physical resource block (physical resource block, PRB) utilization rate or bandwidth.
  • Alarm information may include communication failures, processing errors, environmental failures, equipment failures, or invalid operations.
  • FIG. 2 is a schematic diagram of a network management architecture. The following briefly introduces and explains the functions of some of the network elements.
  • MnF#1...MnF#n, MnF#a...MnF#z refer to a plurality of different management functions responsible for specific management tasks or functions.
  • the exposure governance management function (EGMF) in Figure 2 is the MnF that implements the management capability exposure control function.
  • other specific MnFs that implement specific functions can also be defined, such as management data analysis function (management data analysis function, MDAF) or data coordination and collection function (data coordination and collection function, DCCF), etc. This application does not make specific limited.
  • the management function in the cross domain management function is a management function for implementing cross-domain and cross-vendor network management, such as an operator's network management system (NMS, network management system).
  • NMS network management system
  • the Domain Management Function may include one or more MnFs, and a Domain Open Capability Control Management Function (Domain EGMF).
  • the domain opening capability control management function is a management function to realize single-domain single-vendor network element management, such as wireless domain (RAN domain) network element management system (RAN element management system, EMS) or 5G core network (5G core) network element Management system (5G CORE EMS).
  • RAN domain wireless domain
  • EMS RAN element management system
  • 5G core network 5G core network element Management system
  • 5G CORE EMS 5G core network element Management system
  • Shared operators refer to other operators that share the network with the main operator in the network sharing scenario.
  • the operation administration and maintenance (OAM) of the shared operator can operate, maintain and manage the resources of the shared network.
  • the third party is the management function assigned by the operator to the tenant. Third-party operation, management and maintenance can operate, maintain and manage the tenant's network.
  • the various management functions in Figure 2 can communicate based on service interface protocols such as hypertext transfer protocol (hypertext transfer protocol, HTTP), or based on management communication interface protocols such as simple object access protocol (simple object access protocol, SOAP). communication.
  • service interface protocols such as hypertext transfer protocol (hypertext transfer protocol, HTTP)
  • management communication interface protocols such as simple object access protocol (simple object access protocol, SOAP). communication.
  • the management capability open to tenants in the management capability exposure technology is one or more of the above-mentioned management services, or one or more operations of a certain management service (that is, one or more component types A), or One or more network management resource information (that is, one or more component types B) of a certain management service, or component type C describes all or part of performance data, etc. That is to say, through the opening of management capabilities, tenants can realize the ability to manage the network through open management services. For example, the management operation of the network resource information described by the management service component type B can be realized through the open management service component type A (such as network configuration management). The performance data and alarm information described by the management service component type component type C can also be obtained through the open management service component type A.
  • EGMF provides the opening control function of management capabilities, that is, EGMF can provide the function of controlling open management capabilities, that is, EGMF can control which management capabilities are open, and can also decide whether to open management capabilities; EGMF It can also provide external management capability opening (such as directly opening network management data through EGMF).
  • the cooperative relationship between EGMF and MnF is shown in Figure 3.
  • MnF 1 refers to the logical management function that provides specific management function services in the management system of the first operator.
  • MnF 2 refers to the logical management function in the second operator management system.
  • Third-party operation maintenance and management refers to the third-party operation and maintenance management system or the logical management function in the third-party management system.
  • Scenario 1 The management function 2 (MnF 2 ) obtains the management service (MnS) provided by the management function 1 (MnF 1 ) through the open capability control management function (EGMF) capability opening.
  • MnS management service
  • EGMF open capability control management function
  • the management function 2 (MnF 2 ) can obtain the management service (MnS) provided by the management function 1 (MnF 1 ) by controlling the opening of the management function 2 (EGMF2) capability.
  • Scenario 2 The third-party operation management and maintenance (OAM) obtains the management service (MnS) provided by the management function 1 (MnF 1) through the open capability control management function (EGMF) capability opening.
  • MnS management service
  • MnF 1 management function 1
  • EGMF open capability control management function
  • the third-party operation management and maintenance can obtain the management service (MnS) provided by the management function 1 (MnF 1) through the open capability control management function 1 (EGMF1) capability opening.
  • MnS management service
  • MnF 1 management function 1
  • EGMF1 open capability control management function 1
  • the EGMF provides the open management capability, but it does not propose how the tenant obtains the open management capability through the EGMF.
  • the above-mentioned EGMF is a core control function of management capability exposure.
  • the above-mentioned EGMF provides the control of the open management capability and the unified export of the open management capability.
  • some tenants have high requirements for data security. Therefore, based on data security considerations, tenants do not want to expose network operation data to operators.
  • the EGMF of the network management system (that is, the cross-domain management system) realizes the management of the network, so the network management system of the operator can perceive the data information of the tenants, which will cause data leakage of the tenants, thereby bringing about data security. question.
  • an embodiment of the present application provides a communication method for managing services.
  • FIG. 4 it is an exemplary flow chart of a communication method for management services provided by an embodiment of the present application, including the following operations.
  • the first management function in the embodiment of the present application can be understood as an authorized network management function in the OAM system representing the tenant, and the first management function is a consumer of the management service.
  • the first management function may be a network configuration management service consumer, or a performance assurance management service consumer, and so on.
  • the first management function sends a first message to the cross-domain management function, and the corresponding cross-domain management function receives the first message.
  • the first message may be a management service discovery request, including the tenant identifier of the tenant.
  • the tenant ID is used to identify the tenant.
  • a tenant ID is an ID assigned to a tenant by the cross-domain management function.
  • the first message is used to query the management services available to the tenant, or in other words, the first message is used to request the management services available to the tenant.
  • the tenant ID is used to identify the identity information of the tenant.
  • the first message may further include an identifier of the first management function.
  • the identifier of the first management function may be used for message routing between the first management function and the cross-domain management function.
  • the cross-domain management function may send the tenant ID, authentication information, and authorized management service information to the first management function corresponding to the ID of the first management function through the ID of the first management function.
  • the cross-domain management function can determine the message routing address of the first management function through the identification of the first management function (such as determining the IP (Internet Protocol, Internet Protocol) address of the first management function based on the identification of the first management function), and Information is sent to the first management function according to the message routing address of the first management function.
  • the identifier of the first management function may also be sent to the cross-domain management function through a message different from the first message, which is not specifically limited in this application.
  • the above cross-domain management function may be a cross-domain open capability control management function (cross domain EGMF).
  • the foregoing first message may further include first indication information.
  • the first indication information may be used to indicate the first message, that is, the first indication information may indicate that the first message is used to query the management services available to the tenant.
  • the first indication information may be a message name or a service application programming interface (application programming interface, API) of the first management function.
  • the cross-domain management function determines the management capability information open to the tenant according to the tenant identifier.
  • the cross-domain management function can determine the management capability information open to the tenant from the tenant's contract information.
  • the management capability information may refer to information describing management services, and is used to indicate one or more management services, such as identifiers or names of management services, which are not specifically limited in this application.
  • the operator's network management system may be configured with the tenant's subscription information.
  • the subscription information can be used to limit the management services that the tenant can use, and can also be used to authenticate the identity of the tenant.
  • the subscription information may be configured in the cross-domain management function, and maintained and managed by the cross-domain management function.
  • the subscription information can also be configured in the MnF, maintained and managed by the MnF, and the cross-domain management function can request the tenant's subscription information from the MnF, which is not specifically limited in this application.
  • the cross-domain management function may authenticate the tenant based on the tenant ID, which is the first authentication.
  • the cross-domain management function can query and obtain the management capability information authorized to be released to the tenant in the tenant's subscription information according to the tenant ID, and generate corresponding authentication information.
  • the authentication information here may be used to indicate the authorization of the management capability information.
  • the authentication information may be used to indicate that the authorization of the management capability information fails.
  • the signing information may directly include the management capability information that is authorized to be released to the tenant, that is, the signing information specifies the management capability information that is authorized to be released to the tenant.
  • the signing information may not directly include the management capability information authorized to be released to the tenant, and the cross-domain management function may process the signing information to determine the management capability information authorized to be released to the tenant.
  • the authentication information may further include an authorization validity period, which may be used to indicate the validity period of the above-mentioned authorized open management capability information. If the authentication information exceeds the validity period, the first management function can no longer use the open management service, and needs to request authorization from the cross-domain management function again.
  • the authentication information may also include the identifier of the cross-domain management function.
  • the authentication information may also include the scope of use of the authorized management capability information, and the scope of use is used to indicate that the open management capability is used in a specific area indicated by the scope of use. If the first management function is not within the scope of use, then the first management function cannot use the aforementioned open management capabilities.
  • the cross-domain management function may be a cross-domain exposure governance management function (exposure governance management function, EGMF) or other devices with a function similar to the cross-domain EGMF, such as a chip or a network element.
  • the tenant identification from the first management function is received by the cross-domain EGMF.
  • the cross-domain EGMF may send a third message to the second management function.
  • the third message may be an authorization authentication request message, the third message may carry a tenant identifier, and the second management function authenticates the tenant.
  • the aforementioned third message may be used to request authorized management services.
  • the tenant's subscription information may be configured in the second management function, and the second management function determines authorized management service information open to the tenant based on the subscription information, and generates authentication information.
  • the authentication information here is as described above, and will not be repeated here.
  • the second management function may send the authentication information, the authorized management service information and the tenant identifier to the cross-domain EGMF.
  • the above-mentioned second management function may be an access control management function (access control management function, ACMF) or other devices similar to the ACMF function, such as a chip or a network element.
  • the ACMF may be responsible for tenant information management, such as tenant information registration, de-registration, or tenant information modification.
  • the ACMF can also be responsible for managing the permissions of the tenants, such as the permission control of the authorized management services open to the tenants.
  • the authority control may be to control the management service type or component type open to the tenant.
  • the ACMF may also perform authentication on the tenant or perform authorization and authentication on the first management function of the tenant.
  • the cross-domain management function sends the tenant ID, authentication information, and authorized management service information to the first management function, and the corresponding first management function receives the tenant ID, authentication information, and authorized management service information.
  • the authorized management service information is the information of some management services or the information of all management services in the management services indicated by the management capability information determined by the cross-domain management function based on the tenant's subscription information.
  • the authorized management service information may include management service types, such as one or more of alarm management service, performance assurance management service, network configuration management service, and heartbeat management service.
  • the authorized management information may also include at least one of management service version and component type.
  • the authorized management information includes component type A, component type B, and component type C, and reference may be made to the above-mentioned related descriptions about the management service.
  • the authentication information may be used to indicate the authorization of the management capability information.
  • the tenant identifier, authentication information and authorized management service information may be carried in the same message and sent to the first management function, such as in the management service discovery response.
  • the tenant ID, authentication information, and authorized management service information may also be carried in different messages and sent to the first management function, which is not specifically limited in this application.
  • Table 1 introduces the above-mentioned authorized management service information.
  • Table 1 Parameters included in authorized management service information
  • the authorized management service information in the above Table 1 may be in the format of Information Object Class, and the IOC of the authorized management service information in Table 1 is passed through the object instance management message (such as creating a management object instance message/CreateMOI) Perform management (such as realizing the transmission of the authorized management service information described in Table 1 by creating a management object instance message/CreateMOI; modifying the authorized management service information by modifying the management object instance message/ModifyMOIAttributes, etc.).
  • the object instance management message such as creating a management object instance message/CreateMOI
  • Perform management such as realizing the transmission of the authorized management service information described in Table 1 by creating a management object instance message/CreateMOI; modifying the authorized management service information by modifying the management object instance message/ModifyMOIAttributes, etc.
  • the authorized management service information includes management service type - network configuration management service, management service version - 3GPP R16, component type A - creation of network configuration management service, component type B - wireless cell A, Component type C—cell PRB utilization rate.
  • the above-mentioned authorized management service information may refer to the network configuration management service for creating the cell PRB utilization ratio of the wireless cell A, and the network configuration management service is a version that complies with the 3GPP R16 standard.
  • the authorized management service information includes management service type - performance assurance management service, management service version - 3GPP R17, component type A - create performance data measurement task, component type B - base station equipment 1, component type C - business delay. Then the above-mentioned authorized management service information may refer to creating a performance data measurement task of the service delay of the base station device 1 .
  • the first management function can obtain open management services through the domain EGMF, and manage the tenant's network.
  • the cross-domain management function can convert the authorized management service information open to tenants, that is, the cross-domain management function does not directly send the authorized management service information to the first management functions.
  • the cross-domain management function can encrypt the authorized management service (MnS data) information open to the tenant, or the cross-domain management function can convert the authorized management service information (MnS data) open to the tenant into,
  • the converted management service information open to tenants is called open management service exposure MnS sends the first management function.
  • the exposure MnS is the open management service information after converting the authorized management service information open to tenants, for example, performing aggregation processing or binary encoding on the performance data of the authorized management service information component type C.
  • the cross-domain management function may send a second message to the domain EGMF or MnF, and the second message may be used to instruct the domain EGMF or MnF to open the first management service, for example, the second message may be a capability opening authorization notification.
  • the first management service here may be all or part of the management services indicated by the management capability information.
  • the cross-domain management function can also send the first management service information to the domain EGMF or MnF.
  • the first management service information here is information about all management services or information about some management services among management services open to tenants.
  • the first management service information may be information about some management services or information about all management services in the authorized management service information.
  • the domain EGMF or MnF may provide the first management function with the first management service indicated by the first management service information.
  • the cross-domain management function sends the identification of the third management function to the domain EGMF or MnF.
  • the identifier of the third management function may be consistent with the identifier of the first management function.
  • the cross-domain management function may also provide the aforementioned authentication information (referred to as first authentication information) to the domain EGMF or MnF for the domain EGMF or MnF to authenticate the first management function.
  • the first authentication information is used to indicate that the authorization of the first management service information is passed.
  • the cross-domain management function may also send the identifier of the domain EGMF to the first management function.
  • the identifier of the EGMF in this field may also be carried in the management service discovery response.
  • the domain EGMF may be the EGMF in the wireless domain network element management system, or may also be the EGMF in the core network domain network element management system.
  • the identifier of the domain EGMF may be an IP address of the EGMF, or a global resource locator (uniform resource locator, URL) address, etc.
  • the cross-domain management function may send the MnF identifier to the first management function.
  • the domain EGMF or MnF may provide the tenant with all or part of the management services indicated by the management capability information.
  • the first management function may receive the identifier of the domain EGMF from the cross-domain management function, and the domain EGMF indicated by the identifier of the domain EGMF may provide the first management function with the first management service indicated by the first management service information.
  • the first management function may request all or part of the management services in the first management service from the domain EGMF according to the authentication information from the cross-domain management function, the tenant identifier and the first management service information.
  • the first management function may send the identifier of the first management function to the domain EMGF indicated by the identifier of the domain EGMF.
  • the identifier of the first management function may be used by the domain EGMF to authenticate the first management function.
  • the first management function may send a management service invocation request to the domain EGMF, so as to request all or part of the management services in the first management service.
  • the management service invocation request may carry the identifier of the first management function.
  • the first management function may select a corresponding management service according to requirements from the authorized management service information from the cross-domain management function. For example, assuming that the first management function needs to monitor the performance of the network, and the types of management services open to tenants in the authorized management service information include performance assurance management services, then the first management function can request to invoke the performance assurance management services, and the network The performance of the network is measured to achieve the purpose of monitoring network performance.
  • the domain EGMF receives the identification from the first management function.
  • the domain EGMF receives the third management function identification from the cross-domain management function.
  • the domain EGMF performs authentication on the first management function according to the identifier of the first management function and the identifier of the third management function, that is, the second authentication. Specifically, if the identifier of the first management function is consistent with the identifier of the third management function, the domain EGMF may consider that the first management function has passed the authentication, and provide the first management function with all or part of the management services in the first management service. Serve.
  • the domain EGMF when the domain EGMF receives the request from the first management function for all or part of the management services in the first management service, it will authenticate the first management function through the information from the cross-domain management function, that is, cross-domain management can be realized. Two authentications of function and domain EGMF improve the security of data information.
  • the first management function may also send authentication information (referred to as second authentication information) to the domain EGMF.
  • second authentication information may be the same as the first authentication information.
  • the second authentication information is used to authenticate the first management function.
  • the second authentication information may also be carried in the management service invocation request, or sent through a message different from the management service invocation request, which is not specifically limited in this application.
  • the second authentication information is used to indicate that the authorization of the second management service information is passed.
  • the second management service information here may be the same as the authorized management service information, or may also be a subset of the authorized management service information.
  • the first management service that the domain EGMF may provide for the first management function may be part or all of the management services indicated by the second management service information. If the domain EGMF can provide the first management function with all the management services indicated by the authorized management service information, then the first management service is the same as the management service indicated by the second management service information. If the domain EGMF can provide the first management function with If the authorized management service information indicates a part of the management services, then the first management service is the same as the part of the services.
  • the domain EGMF receives the first authentication information from the cross-domain management function.
  • the first authentication information is used to indicate that the authorization of the first management service information passes.
  • the first management service information here is the same as the second management service information, or the first management service information is a subset of the second management service information.
  • the domain EGMF receives the second authentication information from the first management function.
  • the second authentication information is used to indicate the authorization of the second management service information.
  • the domain EGMF may authenticate the first management function based on the second authentication information and the first authentication information. For example, if the second authentication information is consistent with the first authentication information, the domain EGMF may consider that the first management function is authenticated, and provide the first management function with the first management service.
  • the domain EGMF authenticates the first management function based on the first authentication information and the second authentication information, which can be regarded as that the domain EGMF can judge whether the first management function is the first management function authorized by the cross-domain management function.
  • the second authentication information is consistent with the first authentication information, which means that the authorized second management service indicated by the second authentication information is the same as the authorized first management service indicated by the first authentication information, or the authorized second management service indicated by the first authentication information
  • the second management service is a subset of the first management service.
  • the authorized first management function indicated by the second authentication information is the same as the authorized first management function indicated by the first authentication information.
  • the domain EGMF may also determine whether the management service requested by the first management function is an authenticated management service type, that is, whether it is the management service type included in the first management service information.
  • the above-mentioned second authentication information, the identifier of the first management function sent by the first management function to the domain EGMF, and the first management service information may be carried in the management service invocation request, or sent through a message different from the management service invocation request, This application does not make specific limitations.
  • the first management function may send the identifier of the first management function and the second authentication information to the domain EGMF.
  • the domain EGMF may authenticate the first management function based on the second authentication information and the first authentication information.
  • the identifier of the above-mentioned first management function can be used for message routing between the domain EGMF and the first management function, and the domain EGMF can determine the first management function corresponding to the identifier through the identifier of the first management function, and the first management function corresponding to the identifier Management functions communicate.
  • the domain EGMF performs two authentications on the first management function requesting the management service again, which can improve the security of the tenant's data information.
  • the first management function may receive the identifier of the MnF from the cross-domain management function, and the MnF may be used to provide the first management service for the first management function.
  • the first management function may request all or part of the management services in the first management service from the MnF, and the MnF performs a second authentication on the first management function.
  • the manner of performing the second authentication on the first management function by the MnF may refer to the manner of performing the second authentication on the first management function by the domain EGMF, and will not be repeated here.
  • the first management function may also perform tenant registration.
  • the first function may send a request for tenant registration to the cross-domain management function to implement tenant registration.
  • FIG. 5 Fig. 5 is a schematic diagram of a tenant registration process provided by the embodiment of the present application, including the following operations.
  • S501 The operator's network management system sends a tenant registration request to the cross-domain management function, and the corresponding cross-domain management function receives the tenant registration request.
  • the client ID may be carried in the above tenant registration request.
  • the customer ID can be used to identify the identity information of the tenant, which can be the name of the tenant, or a digital ID representing the tenant.
  • the tenant registration request may also carry tenant profile information.
  • the tenant description information is used to describe the basic information of the tenant, which may include the business requirements of the tenant, such as delay, reliability, and resource isolation.
  • the tenant registration process initiated by the operator's network management system may be triggered by a request from the tenant's business support system (business support system, BSS), such as the request message sent by the BSS of the vertical industry to the operator's network management system. It may also be triggered by a manual operation initiated by an operation and maintenance manager of an operator to the BSS based on a portal (portal) interface.
  • BSS business support system
  • the operator's network management system may send a tenant registration request to the cross-domain management function through an API provided by the cross-domain management function.
  • the API may be a newly added tenant management service API, or a defined API for creating and managing network resource management objects, or other interface APIs, which are not specifically limited in this application.
  • S502 The cross-domain management function acquires configured subscription information.
  • operators and tenants can sign business agreements offline, such as signing commercial agreements such as network service guarantees provided by operators to tenants, management services open to tenants, and network resource information that tenants can obtain or operate.
  • the tenant's subscription information configuration is completed in the operator's network management system.
  • the cross-domain management function may obtain the tenant's subscription information from the configured subscription information based on the customer identifier in the tenant's registration request.
  • the cross-domain management function can assign a corresponding tenant ID to the tenant.
  • the tenant ID is assigned by the cross-domain management function.
  • the tenant ID can be used by the first management function to obtain the tenant's management capability information and manage the tenant's network. .
  • the cross-domain control opening function needs to obtain the tenant's contract information from the MnF through the interface API provided by the MnF after receiving the tenant registration request from the operator's network management system. information.
  • the cross-domain management function can obtain the tenant's signing information, it can be considered that the tenant's registration is successful; if the cross-domain management function cannot obtain the tenant's signing information, it can be considered that the tenant's identity is illegal and the tenant's registration fails .
  • S503 The cross-domain management function sends a tenant registration response message to the operator's network management system.
  • the response message may include a tenant registration result, that is, the response message may indicate that the operator's network management system has successfully registered the tenant or failed to register the tenant. If the response message indicates that the registration of the tenant is successful, the response message may also include a tenant identifier assigned to the tenant by the cross-domain control opening function.
  • the operator's network management system may send the tenant registration result to the customer's network management system.
  • the operator's network management system may also send the tenant ID to the customer's network management system.
  • FIG. 6 it is an exemplary flow chart of a communication method for management services provided by an embodiment of the present application, which may include the following operations.
  • an exposure governance management function (exposure governance management function, EGMF) is deployed in the domain management function network element.
  • EGMF exposure governance management function
  • a business support system (business support system, BSS) in an operator's network management system sends a tenant registration request to an access control management function (ACMF), and the corresponding ACMF receives the tenant registration request.
  • BSS business support system
  • ACMF access control management function
  • the ACMF here may be the second management function (ACMF) in the method embodiment shown in FIG. 4 , and the ACMF is responsible for authenticating the tenant and authorizing the first management function of the tenant.
  • ACMF the second management function
  • the above tenant registration request may be used to request registration for a tenant, and reference may be made to related descriptions in the method embodiment shown in FIG. 5 , which will not be repeated here.
  • S602 ACMF acquires configured subscription information.
  • the ACMF acquires the configured subscription information and authenticates the tenant, which may refer to the relevant description in the method embodiment shown in FIG. 5 , and will not be repeated here.
  • S603 The ACMF sends a tenant registration response message to the BSS in the operator's network management system.
  • the response message may include a tenant registration result, that is, the response message may indicate that the BSS tenant registration in the operator's network management system succeeds or the tenant registration fails. If the response message indicates that the tenant has registered successfully, the response message may also include a tenant identifier assigned to the tenant by the ACMF.
  • An operation management and maintenance (operation administration and maintenance, OAM) sends a management service discovery request to a first exposure governance management function (exposure governance management function, EGMF).
  • OAM operation administration and maintenance
  • EGMF exposure governance management function
  • the management service discovery request may carry the tenant identifier of the tenant and the identifier of the OAM.
  • the above-mentioned first EGMF may be an EGMF in the cross-domain management function.
  • first EGMF here may be the cross-domain management function or the cross-domain EGMF in the method embodiment shown in FIG. 4 .
  • OAM may be the first management function in the method embodiment shown in FIG. 4 .
  • S605 The first EGMF sends the tenant identifier to an access control management function (ACMF).
  • ACMF access control management function
  • the first EGMF may send an authorization authentication request to the ACMF to request the ACMF to authenticate the tenant based on the tenant ID and determine the management services open to the tenant, and the authorization authentication request may carry the tenant ID.
  • S606 The ACMF authenticates the tenant ID based on the tenant ID, and determines management capability information open to the tenant.
  • the ACMF sends the tenant identifier, authorized management service information and authentication information to the first EGMF.
  • the tenant ID, authorized management service information and authentication information may be sent to the first EGMF through the same message, for example, through an authorization authentication request response message to the first EGMF.
  • the tenant identifier, authorized management service information and authentication information may be sent to the first EGMF through different messages.
  • the first EGMF may perform S608: the first EGMF converts the authorized management service information.
  • the first EGMF converts the authorized management service information.
  • S609 The first EGMF sends a management service discovery response to the OAM.
  • the management service discovery response may include the tenant identifier, the OAM identifier, authorized management service information and authentication information.
  • the management service discovery response may also include the identifier of the second EGMF in the domain management function.
  • the first EGMF sends a capability opening authorization notification to the second EGMF in the domain management function.
  • the capability opening authorization notification may include an OAM identifier, authentication information, and first management service information.
  • the second EGMF here may be the domain EGMF in the aforementioned method embodiment shown in FIG. 4 .
  • the OAM sends a management service invocation request to the second EGMF according to the second EGMF identifier.
  • the management service invocation request may include the identification and authentication information of the OAM.
  • the management service invocation request is used to request invocation of the second management service.
  • the second management service here may be part or all of the management services indicated by the authorized management service information, and the second management service is all or part of the management services in the first management service.
  • the second EGMF may authenticate the OAM based on the authentication information in S611 and the authentication information in S610.
  • the second EGMF may perform S613: the second EGMF requests the MnF capable of providing the second management service to invoke the second management service.
  • S614 The second EGMF sends the management service invocation result to the OAM.
  • the second EGMF may send a management service invocation result to the OAM, and the management service invocation result may include network resource model data, network performance management data, or network alarm information. If the authentication fails in S612, the management service invocation result may indicate authentication failure.
  • FIG. 7 it is an exemplary flow chart of a communication method for management services provided by an embodiment of the present application, which may include the following operations.
  • the domain management function does not deploy an exposure governance management function (exposure governance management function, EGMF).
  • exposure governance management function exposure governance management function
  • S701-S708 are similar to S601-S608, see S601-S608.
  • S709 The first EGMF sends a management service discovery response to operation administration and maintenance (OAM).
  • OAM operation administration and maintenance
  • first EGMF here may be the cross-domain management function or the cross-domain EGMF in the method embodiment shown in FIG. 4 .
  • OAM may be the first management function in the method embodiment shown in FIG. 4 .
  • the management service discovery response may include the tenant identifier, the OAM identifier, authorized management service information and authentication information.
  • the management service discovery response may also include the identifier of the MnF in the domain management function.
  • the MnF here may be the MnF used to provide the management service indicated by the authorized management service information.
  • the management service discovery response may include an identifier of one MnF, or may include identifiers of multiple MnFs.
  • the management service discovery response may include the corresponding relationship between each authorized management service information and the MnF identifier, that is, the management service discovery response may be used to determine the management service indicated by each authorized management service information. Provided by MnF.
  • management services indicated by the above-mentioned authorized management service information are respectively provided by the management function 1 (MnF1) and the management function 2 (MnF2).
  • S710 The first EGMF sends a capability opening authorization notification to MnF1 and MnF2 in the domain management function.
  • the capability opening authorization notification sent to MnF1 may include OAM identification, authentication information and first management service information; the capability opening authorization notification sent to MnF2 may include OAM identification, authentication information and second management service information.
  • first management service information may be part of the above authorized management service information
  • second management service information may be part of the above authorized management service information
  • first management service information and the second management service information may be different, that is, the management services indicated by the management service information authorized by MnF1 and MnF2 for OAM respectively.
  • S711 The OAM sends a management service invocation request to the MnF1 according to the identifier of the MnF1.
  • the management service invocation request may include the identification and authentication information of the OAM.
  • the management service invocation request is used to request invoking the first management service indicated by the first management service information.
  • the first management service is a management service provided by MnF1.
  • the MnF1 may authenticate the OAM based on the authentication information and the OAM identifier in S711, and the authentication information and the OAM identifier in S710.
  • the MnF1 can determine whether the OAM identifier is the OAM authorized by the ACMF. For example, MnF1 may judge whether the OAM identifier in S711 is consistent with the OAM identifier in S710. If they are consistent, the authentication may be considered as passed, and if they are inconsistent, the authentication may be considered as failed.
  • the MnF1 may also determine whether the management service requested by the OAM is a management service type certified by the ACMF. For example, MnF1 may determine whether the first management service requested by the OAM is a management service among the management services indicated by the first management service information in S710, and if yes, it may be considered that the authentication is passed; if not, it may be considered that the authentication is not passed.
  • the method for the MnF1 to authenticate the OAM can refer to the related description in the method embodiment shown in FIG. 4 , and will not be repeated here.
  • the MnF1 may execute S713: the MnF1 sends the management service invocation result to the OAM.
  • the MnF1 may send a management service invocation result to the OAM, and the management service invocation result may include network resource model data, network performance data, or network alarm information. If the authentication fails in S712, the management service invocation result may indicate authentication failure.
  • the OAM may send a management service invocation request to the MnF2 to request invoking the second management service. Then in S712, the OAM is authenticated by MnF2. In the same S713, the MnF2 also sends the management service invocation result to the OAM.
  • FIGS 8 to 9 are schematic structural diagrams of possible communication devices provided by the embodiments of the present application. These communication devices can be used to implement the operations of the cross-domain management function, the first management function, or the domain opening capability control management function in the above method embodiments, so the beneficial effects of the above method embodiments can also be realized.
  • a communication device 800 includes a processing unit 810 and a transceiver unit 820 .
  • the communication device 800 is configured to implement operations of the first management function and the cross-domain management function in the method embodiment shown in FIG. 4 above.
  • the processing unit 810 is used to generate the first message.
  • the first message includes the tenant identifier.
  • the transceiver unit 820 is configured to send the first message and receive the tenant ID, authentication information and authorized management service information from the cross-domain management function.
  • the transceiving unit 820 is further configured to: receive the identification of the domain opening capability control management function from the cross-domain management function; and send the identification of the first management function to the domain opening capability control management function.
  • the transceiving unit 820 is further configured to: send authentication information to the domain opening capability control management function; the authentication information is used to authenticate the first management function.
  • the transceiver unit 820 is configured to receive the first message from the first management function.
  • the first message includes the tenant identifier.
  • the processing unit 810 is configured to determine management capability information open to the tenant according to the tenant identifier.
  • the transceiver unit 820 is further configured to send the tenant identifier, authentication information, and authorized management service information to the first management function.
  • the transceiving unit 820 is further configured to: send the second message to the domain opening capability control management function.
  • the transceiving unit 820 is further configured to: send the identification and authentication information of the first management function to the domain openness capability control management function.
  • the transceiver unit 820 is further configured to: send a third message to the second management function; and receive the tenant ID, authentication information, and management capability information from the second management function.
  • the transceiving unit 820 is further configured to: send the identifier of the domain openness capability control management function to the first management function.
  • the transceiver unit 820 is used to receive the identification of the third management function and the first management service information from the cross-domain management function; the transceiver unit 820 is also used to Receive the identification from the first management function; the processing unit 810 is configured to authenticate the first management function according to the identification of the third management function and the identification of the first management function; the processing unit 810 is also configured to, when the authentication is passed, The first management service indicated by the first management service information is provided to the first management function.
  • the transceiver unit 820 is further configured to: receive first authentication information from the cross-domain management function; receive second authentication information from the first management function; the processing unit 810 is specifically configured to: The authorization information and the first authentication information are used to authenticate the first management function.
  • processing unit 810 and the transceiver unit 820 can be directly obtained by referring to related descriptions in the method embodiments shown in FIGS. 4 to 7 .
  • an electronic device 900 includes a processor 910 and an interface circuit 920 .
  • the processor 910 and the interface circuit 920 are coupled to each other.
  • the interface circuit 920 may be a transceiver or an input-output interface.
  • the electronic device 900 may further include a memory 930 for storing instructions executed by the processor 910 or storing input data required by the processor 910 to execute the instructions or storing data generated after the processor 910 executes the instructions.
  • the processor 910 is used to implement the functions of the processing unit 810
  • the interface circuit 920 is used to implement the functions of the transceiver unit 820.
  • the module realizes the operation of the first management function in the above-mentioned method embodiment.
  • the module receives information from other modules in the first management function (such as radio frequency modules or antennas), and the information is sent to the first management function by the cross-domain management function; or, the module sends information to other modules in the first management function (for example, a radio frequency module or an antenna) sends information, and the information is sent by the first management function to the cross-domain management function.
  • the module realizes the operation of the cross-domain management function in the above method embodiment.
  • This module receives information from other modules in the cross-domain management function (such as radio frequency modules or antennas), and the information is sent to the cross-domain management function by the first management function; or, this module sends information to other modules in the cross-domain management function ( For example, a radio frequency module or an antenna) sends information, and the information is sent by the cross-domain management function to the first management function.
  • the processor in the embodiments of the present application can be a central processing unit (Central Processing Unit, CPU), and can also be other general-purpose processors, digital signal processors (Digital Signal Processor, DSP), application-specific integrated circuits (Application Specific Integrated Circuit, ASIC), Field Programmable Gate Array (Field Programmable Gate Array, FPGA) or other programmable logic devices, transistor logic devices, hardware components or any combination thereof.
  • a general-purpose processor can be a microprocessor, or any conventional processor.
  • the method steps in the embodiments of the present application may be implemented by means of hardware, or may be implemented by means of a processor executing software instructions.
  • Software instructions can be composed of corresponding software modules, and software modules can be stored in random access memory, flash memory, read-only memory, programmable read-only memory, erasable programmable read-only memory, electrically erasable programmable read-only Memory, registers, hard disk, removable hard disk, CD-ROM or any other form of storage medium known in the art.
  • An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium.
  • the storage medium may also be a component of the processor.
  • the processor and storage medium can be located in the ASIC.
  • the ASIC can be located in the base station or the terminal.
  • the processor and the storage medium may also exist in the base station or the terminal as discrete components.
  • all or part of them may be implemented by software, hardware, firmware or any combination thereof.
  • software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product comprises one or more computer programs or instructions. When the computer program or instructions are loaded and executed on the computer, the processes or functions described in the embodiments of the present application are executed in whole or in part.
  • the computer may be a general purpose computer, a special purpose computer, a computer network, network equipment, user equipment, or other programmable devices.
  • the computer program or instructions can be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer program or instructions can be downloaded from a website, computer, A server or data center transmits to another website site, computer, server or data center by wired or wireless means.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrating one or more available media.
  • the available medium may be a magnetic medium, such as a floppy disk, a hard disk, or a magnetic tape; it may also be an optical medium, such as a digital video disk; or it may be a semiconductor medium, such as a solid-state hard disk.
  • the computer readable storage medium may be a volatile or a nonvolatile storage medium, or may include both volatile and nonvolatile types of storage media.
  • “at least one” means one or more, and “multiple” means two or more.
  • “And/or” describes the association relationship of associated objects, indicating that there can be three types of relationships, for example, A and/or B, which can mean: A exists alone, A and B exist at the same time, and B exists alone, where A, B can be singular or plural.
  • the character “/” generally indicates that the contextual objects are an “or” relationship; in the formulas of this application, the character “/” indicates that the contextual objects are a “division” Relationship.
  • “Including at least one of A, B and C” may mean: including A; including B; including C; including A and B; including A and C; including B and C; including A, B and C.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

La présente demande concerne un procédé et un appareil de communication pour un service de gestion (PLMN), pour obtenir un MnS ouvert par un opérateur. Dans le procédé, une fonction de gestion inter-domaine peut recevoir un premier message contenant l'identifiant d'un locataire à partir d'un OAM, détermine, en fonction de l'identifiant de locataire, des informations de capacité de gestion ouvertes relatives au locataire, et authentifie une première fonction de gestion (MnF) ; après authentification de la première MnF, la MnF inter-domaine peut envoyer l'identifiant de locataire, des informations d'authentification et des informations MnS sous licence à la première MnF ; et sur la base de la solution précédente, la MnF inter-domaine détermine, sur la base de l'identifiant de locataire, les informations de capacité de gestion ouvertes pour le locataire, et réussit à autoriser les informations de capacité de gestion. Ainsi, la première MnF du locataire peut obtenir les MnS ouverts par l'opérateur tout en satisfaisant la sécurité des informations, de sorte que les réseaux du locataire peuvent être gérés.
PCT/CN2022/117240 2021-09-30 2022-09-06 Procédé et appareil de communication pour service de gestion WO2023051189A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111158256.1 2021-09-30
CN202111158256.1A CN115883394A (zh) 2021-09-30 2021-09-30 一种管理服务的通信方法和装置

Publications (1)

Publication Number Publication Date
WO2023051189A1 true WO2023051189A1 (fr) 2023-04-06

Family

ID=85756603

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/117240 WO2023051189A1 (fr) 2021-09-30 2022-09-06 Procédé et appareil de communication pour service de gestion

Country Status (2)

Country Link
CN (1) CN115883394A (fr)
WO (1) WO2023051189A1 (fr)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130007891A1 (en) * 2011-06-29 2013-01-03 Canon Kabushiki Kaisha Server system, control method, and storage medium for securely executing access to data of a tenant
CN103780580A (zh) * 2012-10-23 2014-05-07 中国电信股份有限公司 提供能力访问策略的方法、服务器和系统
US20160359849A1 (en) * 2015-06-08 2016-12-08 Ricoh Company, Ltd. Service provision system, information processing system, information processing apparatus, and service provision method
CN106878084A (zh) * 2017-02-28 2017-06-20 新华三技术有限公司 一种权限控制方法和装置
CN107872345A (zh) * 2016-09-28 2018-04-03 中兴通讯股份有限公司 一种能力开放实现方法及装置
CN108924125A (zh) * 2018-06-29 2018-11-30 招银云创(深圳)信息技术有限公司 接口调用权限的控制方法、装置、计算机设备和存储介质
CN109845360A (zh) * 2017-01-03 2019-06-04 华为技术有限公司 一种通信方法及设备
CN111400676A (zh) * 2020-02-28 2020-07-10 平安国际智慧城市科技股份有限公司 基于共享权限的业务数据处理方法、装置、设备和介质
CN112468338A (zh) * 2017-04-27 2021-03-09 华为技术有限公司 通信方法、装置和系统

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130007891A1 (en) * 2011-06-29 2013-01-03 Canon Kabushiki Kaisha Server system, control method, and storage medium for securely executing access to data of a tenant
CN103780580A (zh) * 2012-10-23 2014-05-07 中国电信股份有限公司 提供能力访问策略的方法、服务器和系统
US20160359849A1 (en) * 2015-06-08 2016-12-08 Ricoh Company, Ltd. Service provision system, information processing system, information processing apparatus, and service provision method
CN107872345A (zh) * 2016-09-28 2018-04-03 中兴通讯股份有限公司 一种能力开放实现方法及装置
CN109845360A (zh) * 2017-01-03 2019-06-04 华为技术有限公司 一种通信方法及设备
CN106878084A (zh) * 2017-02-28 2017-06-20 新华三技术有限公司 一种权限控制方法和装置
CN112468338A (zh) * 2017-04-27 2021-03-09 华为技术有限公司 通信方法、装置和系统
CN108924125A (zh) * 2018-06-29 2018-11-30 招银云创(深圳)信息技术有限公司 接口调用权限的控制方法、装置、计算机设备和存储介质
CN111400676A (zh) * 2020-02-28 2020-07-10 平安国际智慧城市科技股份有限公司 基于共享权限的业务数据处理方法、装置、设备和介质

Also Published As

Publication number Publication date
CN115883394A (zh) 2023-03-31

Similar Documents

Publication Publication Date Title
US11750702B2 (en) Subscription and notification service
US11212335B2 (en) Network management interface
Swetina et al. Toward a standardized common M2M service layer platform: Introduction to oneM2M
WO2020057163A1 (fr) Procédé et dispositif de déploiement d'une plate-forme mec
US9955348B2 (en) Method and device for requesting for specific right acquisition on specific resource in wireless communication system
WO2019196699A1 (fr) Procédé et dispositif permettant d'acquérir une politique de sécurité
US11714830B2 (en) Mechanisms for multi-dimension data operations
WO2015127603A1 (fr) Entité de service de gestion d'interfaces, entité fonctionnelle de services et procédé de gestion d'éléments de réseau
US20230262141A1 (en) Service layer message templates in a communications network
CN114760197A (zh) 算力节点管理方法、装置、设备及可读存储介质
WO2020253343A1 (fr) Procédé et dispositif de découverte de service de gestion
WO2023202399A1 (fr) Procédés, dispositif et système de communication et support de données
WO2023051189A1 (fr) Procédé et appareil de communication pour service de gestion
US11283788B2 (en) Method and system for an internet of things platform
WO2023169122A1 (fr) Procédé et appareil de communication
WO2015127646A1 (fr) Appareil et dispositif de communication pour un regroupement sémantique hybride, et procédé de regroupement sémantique hybride
WO2023231631A1 (fr) Procédé de certification et appareil de communication
WO2024065503A1 (fr) Négociation de procédures d'authentification dans un calcul périphérique
WO2023011158A1 (fr) Procédé et appareil de gestion de certificat
WO2023169127A1 (fr) Procédé de communication, dispositif terminal et appareil d'informations
CN113169965B (zh) 一种资源配置方法、设备及存储介质
US20230412466A1 (en) Managing cloud-native virtual network functions
US20240224214A1 (en) User equipment clusters for network registration and authentication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22874579

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE