WO2023169122A1 - 通信方法和装置 - Google Patents
通信方法和装置 Download PDFInfo
- Publication number
- WO2023169122A1 WO2023169122A1 PCT/CN2023/074964 CN2023074964W WO2023169122A1 WO 2023169122 A1 WO2023169122 A1 WO 2023169122A1 CN 2023074964 W CN2023074964 W CN 2023074964W WO 2023169122 A1 WO2023169122 A1 WO 2023169122A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network element
- blockchain
- request
- information
- data
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 329
- 238000004891 communication Methods 0.000 title claims abstract description 181
- 230000004044 response Effects 0.000 claims abstract description 70
- 230000007246 mechanism Effects 0.000 claims description 21
- 238000004590 computer program Methods 0.000 claims description 14
- 238000013475 authorization Methods 0.000 claims description 7
- 230000006870 function Effects 0.000 description 113
- 238000012545 processing Methods 0.000 description 86
- 230000000875 corresponding effect Effects 0.000 description 43
- 238000007726 management method Methods 0.000 description 34
- 230000008569 process Effects 0.000 description 30
- 230000015654 memory Effects 0.000 description 29
- 238000005516 engineering process Methods 0.000 description 25
- 238000013461 design Methods 0.000 description 16
- 230000009286 beneficial effect Effects 0.000 description 11
- 230000005540 biological transmission Effects 0.000 description 10
- 238000013500 data storage Methods 0.000 description 10
- 238000012795 verification Methods 0.000 description 10
- 230000010354 integration Effects 0.000 description 8
- 230000009471 action Effects 0.000 description 7
- 238000013523 data management Methods 0.000 description 6
- 238000004873 anchoring Methods 0.000 description 5
- 238000004422 calculation algorithm Methods 0.000 description 5
- 238000012217 deletion Methods 0.000 description 5
- 230000037430 deletion Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 230000003993 interaction Effects 0.000 description 5
- 230000001360 synchronised effect Effects 0.000 description 5
- 238000012790 confirmation Methods 0.000 description 4
- 238000013507 mapping Methods 0.000 description 4
- 230000001413 cellular effect Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000012423 maintenance Methods 0.000 description 3
- 238000010295 mobile communication Methods 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 3
- 230000011664 signaling Effects 0.000 description 3
- 238000012550 audit Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000007613 environmental effect Effects 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 101150119040 Nsmf gene Proteins 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 230000003190 augmentative effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 230000001276 controlling effect Effects 0.000 description 1
- 238000013524 data verification Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 230000008014 freezing Effects 0.000 description 1
- 238000007710 freezing Methods 0.000 description 1
- 239000003999 initiator Substances 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000010257 thawing Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000012384 transportation and delivery Methods 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/106—Packet or message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Definitions
- the embodiments of the present application relate to the field of communication, and more specifically, to a communication method and device.
- Blockchain technology is a distributed ledger that combines cryptography, peer-to-peer (P2P) networks, distributed databases and other technologies.
- P2P peer-to-peer
- blockchain technology transforms the traditional authority center and centralized trust into group consensus and decentralized trust, and builds an untamperable distributed ledger guaranteed by cryptography technology. , and further provide smart contract automation to execute digital transactions.
- Blockchain technology has essentially changed the trust logic of human society. Applying blockchain to the sixth generation (6th generation, 6G) mobile communication system can enhance the security and trustworthiness of 6G.
- 6G sixth generation
- Blockchain can be used as a unified trusted platform to realize the tracing of historical events and automated network management. For example, in a scenario where blockchain and 6G systems are integrated, if the core network equipment can access the blockchain, the blockchain can provide information related to the core network equipment to the core network equipment.
- Embodiments of this application provide a communication method that supports core network equipment in the communication system to access the blockchain, so that operators can create a secure and tamper-resistant data sharing platform for core network equipment through the blockchain.
- a communication method is provided.
- the method can be executed by the first network element, or can also be executed by a component (such as a chip or circuit) of the first network element. This is not limited.
- the following description takes execution by the first network element as an example.
- the method is applied to a communication system including at least one blockchain.
- the method includes: a first network element receives an access request from a second network element, the access request is used to request access to the first blockchain, and the access request includes The identification of the first blockchain; the first network element sends an access response to the second network element, the access response includes information used to verify whether the second network element can access the first blockchain, where , the first network element has the function of authorizing and managing the second network element to access the blockchain, and the second network element is a core network element in the communication system other than the first network element.
- the second network element when the second network element needs to access the first blockchain, it can request access to the first network element by sending an access request to the first network element.
- Blockchain to facilitate implementation Now in the scenario where the communication system including the second network element and the first network element is integrated with the blockchain, the second network element accesses the blockchain, so the operator can create a secure and tamper-proof solution for the second network element through the blockchain. Data sharing platform.
- the method further includes: the first network element generating the information for verifying whether the second network element can access the first blockchain.
- the method further includes: the first network element determining whether the second network element has the authority to access the information of the first blockchain.
- the first network element can determine whether the second network element can access the first blockchain to improve security.
- the method further includes: the first network element receives from The read request of the second network element, the read request is used to request to obtain the first data on the first blockchain, the read request includes the identification of the first blockchain; the first network The first network element sends the read request to the first blockchain; the first network element receives the first data from the first blockchain; the first network element sends the first data to the second network element.
- the second network element when the second network element can access the first blockchain, the second network element can request to read the first block on the first blockchain by sending a read request to the first network element. Data so that the first blockchain provides data to the second network element.
- the read request further includes at least one of the following information: a transaction identifier, a block identifier, or an account identifier.
- the above-mentioned read request may also include more information to more accurately determine the object that needs to be accessed, for example, by carrying the identifier of the transaction in the read request to facilitate the first network element to determine the second network element. Yuan is required to access this transaction.
- the method further includes: the first network element receives from The second data of the second network element; the first network element sends the second data to the first blockchain.
- the second network element when the second network element can access the first blockchain, the second network element can send the second data to the first blockchain to facilitate the data uploading of the second network element. .
- the method before the first network element sends the second data to the first blockchain, the method further includes: the first network element determines the second The network element has the authority to send the second data to the first blockchain.
- the first network element can determine whether the second network element can send data to the first blockchain to improve security.
- the method further includes: the first network element receiving a first request from the first device, the first request being used to request that the first network element Register the first blockchain, the first request includes information of the first blockchain; the first network element sends a first response to the first device, the first response is used to indicate the first block Chain registration is successful or failed, where the information of the first blockchain includes at least one of the following: the identity of the first blockchain, the address of the first blockchain, the authentication mechanism of the first blockchain, The members of the first blockchain, the type of the first blockchain, the type of data stored on the first blockchain, the status of the first blockchain, the corresponding policies and configurations of core network elements, and terminal equipment Corresponding policies and configurations, or corresponding policies and configurations of third-party devices.
- the first device can request It is required to register the information of the first blockchain on the first network element so that the first network element can manage the first blockchain.
- the method further includes: the first network element receiving a second request from the first device, the second request being used to request updating of the first block chain information or delete the information of the first blockchain.
- the second request includes the updated information of the first blockchain.
- the information of the first block connection registered in the first network element can be updated or deleted, which improves the flexibility of the solution.
- the method further includes: the first network element sending a first query message to the first device, the first query message being used to query the first block The state of the chain.
- the registration of the information of the first blockchain in the first network element can be initiated by the first network element through the first query message, which improves the efficiency of the first network element. Yuan’s initiative.
- the method further includes: the first network element receiving a second query message from a third network element, the second query message being used to query the first area
- the second query message includes the identity of the first blockchain; the first network element sends the information of the first blockchain to the third network element, or information indicating that the query failed.
- the third network element can query the information of the first blockchain stored in the first network element by sending a second query message to the first network element.
- the method further includes: the first network element determines whether the third network element has the authority to query the information of the first blockchain .
- the first network element can determine whether the third network element can query the information of the first blockchain to improve security.
- the method further includes: the first network element receiving a subscription message from a third network element, the subscription message being used to subscribe to the information of the first blockchain , the subscription message includes the identification of the first blockchain; the first network element sends a notification message to the third network element, the notification message includes the updated information of the first blockchain, or includes an instruction Subscription failure information.
- the third network element can subscribe to the information of the first blockchain stored in the first network element by sending a subscription message to the first network element, so that when the information of the first blockchain is updated , the third network element can learn in time.
- the method further includes: the first network element determining whether the third network element has the authority to subscribe to the information of the first blockchain.
- the first network element can determine whether the third network element can subscribe to the information of the first blockchain to improve security.
- the method further includes: the first network element sending a first configuration message to the third network element, the first configuration message including at least one of the following information: One item: the identifier corresponding to the first configuration, the identifier of the first blockchain, the identifier of the third network element, the address of the first blockchain, the format of the first data, or the format of the first data type.
- the third network element can be configured through the first configuration message to facilitate data transmission between the third network element and the first blockchain.
- the information of the first blockchain includes the first configuration message, or the method further includes: the first network element configures the first network element according to the first blockchain The information generates the first configuration message.
- the first network element may learn the first configuration message because the information of the first blockchain includes the first configuration message, or the first network element may learn the first configuration message based on the information included in the first blockchain. If other information determines the first configuration message, the method by which the first network element obtains the first configuration message is not limited, thereby increasing the flexibility of the solution.
- the method further includes: the first network element receiving first indication information from the third network element, the first indication information being used to indicate the first configuration Success or failure; if the first indication information indicates that the first configuration is successful, the method also includes: the first network element sends a third response to the first blockchain, the third response includes the third Information of three network elements; or, in the case where the first indication information indicates that the first configuration fails, the method further includes: the first network element sends a third response to the first blockchain, the third response Used to indicate configuration failure.
- the method further includes: the first network element sending second indication information to the third network element; or, the first network element receiving information from the third network element.
- the second instruction information of the network element wherein the second instruction information is used to indicate any one of the following: an instruction to update the first configuration, an instruction to cancel the first configuration, an instruction to suspend the first configuration, or an instruction to indicate the first configuration. Configuration recovery.
- the above-mentioned first configuration can be updated, paused, and other operations can be performed through the second instruction information to improve the flexibility of the configuration.
- a communication method is provided.
- the method can be executed by the second network element, or can also be executed by a component (such as a chip or circuit) of the second network element. This is not limited.
- a component such as a chip or circuit
- the following description takes execution by the second network element as an example.
- the method is applied to a communication system including at least one blockchain.
- the method includes: a second network element sends an access request to the first network element.
- the access request is used to request access to the first blockchain.
- the second network element receives an access response from the first network element, and the access response includes information for verifying whether the second network element can access the Information of the first blockchain, wherein the first network element has the function of being responsible for the access authorization and management of the blockchain by the second network element, and the second network element is in the communication system except the first network element. external core network elements.
- the method further includes: the second network element sending a read request to the first network element, the read request being used to request acquisition of the first block
- the first data on the chain, the read request includes the identification of the first blockchain; the second network element receives the first data from the first network element.
- the read request also includes at least one of the following information: a transaction identifier, a block identifier, or an account identifier.
- the method further includes: the second network element sending second data to the first network element.
- the method further includes: the second network element sending a third request to the first blockchain, the third request being used to request acquisition of the first area The first data on the blockchain, or used to request to send second data to the first blockchain; the second network element receives a third response from the first blockchain, the third response is used to indicate the The third request succeeds or fails, wherein the third request includes at least one of the following information: the identifier of the second network element, the identifier of the first blockchain, the type of the third request, the third request ask expiration time, or the signature information of the third request.
- the method further includes: the second network element sending second data to the first network element.
- beneficial effects of the method shown in the above second aspect and its possible designs may be referred to the beneficial effects of the first aspect and its possible designs.
- a communication method is provided.
- the method can be executed by the first blockchain, or it can also be executed by a component of the first blockchain (such as a chip or circuit).
- a component of the first blockchain such as a chip or circuit.
- the method is applied to a communication system including at least one blockchain.
- the method includes: the first blockchain receives a third request from the second network element, the third request is used to request to obtain the data on the first blockchain. first data, or used to request to send second data to the first blockchain; the first blockchain verifies the third request to determine whether the second network element has the ability to obtain the first data on the first blockchain data permission, or determine whether the second network element has the permission to send second data to the first blockchain; the first blockchain sends a third response to the second network element, and the third response is used to Indicates the success or failure of the third request, wherein the third request includes at least one of the following information: the identifier of the second network element, the identifier of the first blockchain, the type of the third request, the The expiration time of the third request, or the signature information of the third request.
- the second network element when the second network element needs to access the first blockchain, it can request access by sending a third request to the first blockchain.
- the first blockchain enables the second network element to access the blockchain, and the first blockchain can verify whether the second network element has the authority to access the first blockchain to ensure security.
- a communication method is provided.
- the method can be executed by the first device, or can also be executed by a component (such as a chip or circuit) of the first device.
- a component such as a chip or circuit
- the method is applied to a communication system including at least one blockchain.
- the method includes: a first device sending a first request to a first network element, the first request being used to request registration of a first block in the first network element. chain, the first request includes information of the first blockchain; the first device receives a first response from the first network element, the first response is used to indicate whether the first blockchain registration is successful or failed.
- the information of the first blockchain includes at least one of the following: the identifier of the first blockchain, the address of the first blockchain, the authentication mechanism of the first blockchain, the first block The members of the chain, the type of the first blockchain, the type of data saved on the first blockchain, the status of the first blockchain, the corresponding policies and configurations of core network elements, and the corresponding policies and configurations of terminal devices , or the corresponding policies and configurations of third-party devices.
- the method further includes: the first device sending a second request to the first network element, the second request being used to request to update the first blockchain information or delete the information of the first blockchain.
- the second request includes the updated third Information of a blockchain; or, in the case where the second request is used to request the first network element to delete the information of the first blockchain, the second request includes the identification of the first blockchain.
- the method further includes: the first device receiving a first query message from the first network element, the first query message being used to query the first area The state of the blockchain.
- beneficial effects of the method shown in the above fourth aspect and its possible designs can be referred to the first aspect and its possible designs. beneficial effects.
- a communication method is provided.
- the method can be executed by a third network element, or can also be executed by a component (such as a chip or circuit) of the third network element. This is not limited.
- the following description takes execution by the third network element as an example.
- the method is applied to a communication system including at least one blockchain.
- the method includes: a third network element sends a second query message to the first network element, the second query message is used to query the information of the first blockchain, the The second query message includes the identification of the first blockchain; the third network element receives the information of the first blockchain from the first network element, or information indicating that the query failed.
- a communication method is provided.
- the method can be executed by a third network element, or can also be executed by a component (such as a chip or circuit) of the third network element. This is not limited.
- the following description takes execution by the third network element as an example.
- the method is applied to a communication system including at least one blockchain.
- the method includes: a third network element sends a subscription message to the first network element.
- the subscription message is used to subscribe to the information of the first blockchain.
- the subscription message includes The identification of the first blockchain; the third network element receives a notification message from the first network element, the notification message includes updated information of the first blockchain, or includes information indicating a subscription failure.
- a communication method is provided.
- the method can be executed by the second network element, or can also be executed by a component (such as a chip or circuit) of the second network element. This is not limited.
- the following description takes execution by the second network element as an example.
- the method is applied to a communication system including at least one blockchain.
- the method includes: the second network element receives a first configuration message from the first network element, the first configuration message includes at least one of the following information: the The identifier corresponding to the first configuration, the identifier of the first blockchain, the identifier of the second network element, the address of the first blockchain, the format of the first data, or the type of the first data.
- the method further includes: the second network element sending first indication information to the first network element, the first indication information being used to indicate that the first configuration is successful. Or fail.
- the method further includes: the second network element receiving second indication information from the first network element; or the second network element sending a request to the first network element.
- the second instruction information is sent by the unit, wherein the second instruction information is used to indicate any one of the following: an instruction to update the first configuration, an instruction to cancel the first configuration, an instruction to suspend the first configuration, or an instruction to indicate the first configuration. recover.
- a communication device which is used to execute the method provided in the first aspect.
- the communication device may include units and/or modules for executing the method provided by any of the above implementations of the first aspect, such as a processing unit and an acquisition unit.
- the transceiver unit may be a transceiver, or an input/output interface; the processing unit may be at least one processor.
- the transceiver may be a transceiver circuit.
- the input/output interface may be an input/output circuit.
- the transceiver unit may be an input/output interface on the chip, chip system or circuit. port, interface circuit, output circuit, input circuit, pin or related circuit, etc.; the processing unit can be at least one processor, processing circuit or logic circuit, etc.
- a communication device which is used to perform the method provided in the second aspect.
- the communication device may include units and/or modules for executing the method provided in the second aspect, such as a processing unit and an acquisition unit.
- the transceiver unit may be a transceiver, or an input/output interface; the processing unit may be at least one processor.
- the transceiver may be a transceiver circuit.
- the input/output interface may be an input/output circuit.
- the transceiver unit may be an input/output interface, interface circuit, output circuit, input circuit, pin or related circuit on the chip, chip system or circuit, etc.; the processing unit may be at least one processor , processing circuits or logic circuits, etc.
- a communication device which is used to perform the method provided in the third aspect.
- the communication device may include units and/or modules for executing the method provided in the third aspect, such as a processing unit and an acquisition unit.
- the transceiver unit may be a transceiver, or an input/output interface; the processing unit may be at least one processor.
- the transceiver may be a transceiver circuit.
- the input/output interface may be an input/output circuit.
- a communication device which is used to perform the method provided in the fourth aspect.
- the communication device may include units and/or modules for performing the method provided in the fourth aspect, such as a processing unit and an acquisition unit.
- the transceiver unit may be a transceiver, or an input/output interface; the processing unit may be at least one processor.
- the transceiver may be a transceiver circuit.
- the input/output interface may be an input/output circuit.
- the transceiver unit may be an input/output interface, interface circuit, output circuit, input circuit, pin or related circuit on the chip, chip system or circuit, etc.; the processing unit may be at least one processor , processing circuits or logic circuits, etc.
- the transceiver unit may be an input/output interface, interface circuit, output circuit, input circuit, pin or related circuit on the chip, chip system or circuit, etc.; the processing unit may be at least one processor , processing circuits or logic circuits, etc.
- a twelfth aspect provides a communication device, which is used to perform the methods provided in the fifth to seventh aspects.
- the communication device may include units and/or modules for performing the methods provided in the fifth to seventh aspects, such as a processing unit and an acquisition unit.
- the transceiver unit may be a transceiver, or an input/output interface; the processing unit may be at least one processor.
- the transceiver may be a transceiver circuit.
- the input/output interface may be an input/output circuit.
- the transceiver unit may be an input/output interface, interface circuit, output circuit, input circuit, pin or related circuit on the chip, chip system or circuit, etc.; the processing unit may be at least one processor , processing circuits or logic circuits, etc.
- the transceiver unit may be an input/output interface on the chip, chip system or circuit. port, interface circuit, output circuit, input circuit, pin or related circuit, etc.; the processing unit can be at least one processor, processing circuit or logic circuit, etc.
- this application provides a processor for executing the methods provided in the above aspects.
- processor output, reception, input and other operations can be understood as processor output, reception, input and other operations.
- transmitting and receiving operations performed by the radio frequency circuit and the antenna, which is not limited in this application.
- a fourteenth aspect provides a computer-readable storage medium that stores program code for device execution, where the program code includes execution of the methods provided in the above aspects.
- a computer program product containing instructions is provided.
- the computer program product When the computer program product is run on a computer, it causes the computer to execute the methods provided in the above aspects.
- a sixteenth aspect provides a chip.
- the chip includes a processor and a communication interface.
- the processor reads instructions stored in the memory through the communication interface and executes the methods provided in the above aspects.
- the chip also includes a memory, in which computer programs or instructions are stored.
- the processor is used to execute the computer programs or instructions stored in the memory.
- the processor is used to execute methods provided by the above aspects.
- a seventeenth aspect provides a communication system, including the communication device according to the eighth aspect, the communication device according to the ninth aspect, the communication device according to the tenth aspect, the communication device according to the eleventh aspect and the communication device according to the eleventh aspect.
- Figure 1 is a schematic diagram of a communication system applicable to embodiments of the present application.
- Figure 2 is a schematic flow chart of a communication method provided by an embodiment of the present application.
- Figure 3 is a schematic flow chart of another communication method provided by an embodiment of the present application.
- Figure 4 is a schematic flow chart of yet another communication method provided by an embodiment of the present application.
- Figure 5 is a schematic flow chart of yet another communication method provided by an embodiment of the present application.
- Figure 6 is a schematic flow chart of yet another communication method provided by an embodiment of the present application.
- Figure 7 is a schematic flow chart of yet another communication method provided by an embodiment of the present application.
- Figure 8 is a schematic flow chart of yet another communication method provided by an embodiment of the present application.
- Figure 9 is a schematic flow chart of yet another communication method provided by an embodiment of the present application.
- Figure 10 is a schematic block diagram of a communication device provided by an embodiment of the present application.
- Figure 11 is a schematic block diagram of another communication device provided by an embodiment of the present application.
- the technical solutions of the embodiments of this application can be applied to communication systems that integrate blockchain with existing communication networks or future communication networks, where the existing communication networks or future communication networks include but are not limited to: fifth generation ( 5th generation, 5G) system or new radio (NR), long term evolution (LTE) system, LTE frequency division duplex (FDD) system, LTE time division duplex (time division) duplex (TDD), device to device (D2D) communication system, vehicle-to-everything (V2X) communication system, machine to machine (M2M) communication system, machine type communication ( machine type communication (MTC) system, Internet of things (IoT) communication system or sixth generation (6th generation, 6G) mobile communication system, etc.
- 5th generation, 5G new radio
- LTE long term evolution
- FDD frequency division duplex
- TDD LTE time division duplex
- D2D device to device
- V2X vehicle-to-everything
- M2M machine to machine
- MTC machine type communication
- IoT Internet of things
- FIG. 1 shows a schematic architectural diagram of a communication system 100 that integrates blockchain and 6G communication network to which embodiments of the present application are applicable.
- the network architecture may include but is not limited to the following network elements (also known as functional network elements, functional entities, nodes, devices, etc.):
- UE User equipment
- R radio access network
- 6G core 6G core
- DN data network
- BC blockchain
- 6GC 6G core network
- DN data network
- BC blockchain
- Access and mobility management function network element
- SMF session management function
- UPF user plane function
- policy control function policy control function
- PCF policy control function
- UDM unified data management
- AF application function
- AUSF authentication server function
- unified data management unified data management
- NEF capability exposure function
- NEF network exposure function
- UDR ledger anchor function
- LAF ledger anchor function
- UE A terminal that communicates with (R)AN. It can also be called terminal equipment, access terminal, user unit, user station, mobile station, mobile station (MS), mobile terminal (mobile). terminal, MT), remote station, remote terminal, mobile device, user terminal, terminal, wireless communications equipment, user agent or user device.
- the terminal device may be a device that provides voice/data connectivity to the user, such as a handheld device, a vehicle-mounted device, etc. with wireless connectivity capabilities.
- terminals include: mobile phones, tablets, computers with wireless transceiver functions (such as laptops, handheld computers, etc.), mobile internet devices (MID), virtual reality (virtual reality, VR) equipment, augmented reality (AR) equipment, wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in remote medical Terminals, wireless terminals in smart grids, wireless terminals in transportation safety, wireless terminals in smart cities, wireless terminals in smart homes, cellular phones, cordless Telephones, session initiation protocol (SIP) telephones, wireless local loop (WLL) stations, personal digital assistants (personal digital assistant, PDA), handheld devices with wireless communication capabilities, computing devices or other processing devices connected to wireless modems, vehicle-mounted devices, wearable devices, drones, terminal devices in 6G networks or future evolutions Terminal equipment in the public land mobile communication network (public land mobile network, PLMN), etc.
- MID virtual reality
- VR virtual reality
- AR augmented reality
- wireless terminals in industrial control wireless terminals in self-driving
- the terminal device can also be a terminal device in an Internet of things (IoT) system.
- IoT Internet of things
- Its main technical feature is to connect objects to the network through communication technology, thereby realizing an intelligent network of human-computer interconnection and object interconnection.
- IoT technology can achieve massive connections, deep coverage, and terminal power saving through narrowband (NB) technology, for example.
- NB narrowband
- the terminal device can be any device that can access the network. Terminal equipment and access network equipment can communicate with each other using some air interface technology.
- the user equipment can be used to act as a base station.
- user equipment may act as a scheduling entity that provides sidelink signals between user equipments in V2X or D2D, etc.
- V2X or D2D a scheduling entity that provides sidelink signals between user equipments in V2X or D2D, etc.
- cell phones and cars use sidelink signals to communicate with each other.
- Cell phones and smart home devices communicate between each other without having to relay communication signals through base stations.
- (R)AN It is used to provide network access functions for authorized user equipment in a specific area, and can use transmission tunnels with different service qualities according to the level of user equipment, business needs, etc.
- (R)AN can manage wireless resources, provide access services to user equipment, and then complete the forwarding of control signals and user equipment data between user equipment and the core network.
- (R)AN can also be understood as a base station in a traditional network.
- the access network device in the embodiment of the present application may be any communication device with wireless transceiver functions used to communicate with user equipment.
- the access network equipment includes but is not limited to: evolved Node B (evolved Node B, eNB), wireless network controller (radio network controller, RNC), Node B (Node B, NB), base station controller (base station controller) , BSC), base transceiver station (base transceiver station, BTS), home base station (home evolved Node B, HeNB, or home Node B, HNB), baseband unit (baseBand unit, BBU), wireless fidelity (wireless fidelity, WIFI ) access point (AP), wireless relay node, wireless backhaul node, transmission point (TP) or transmission and reception point (TRP), satellite, and D2D communication in the system Terminal equipment that undertakes base station functions, etc.
- evolved Node B evolved Node B
- RNC radio network controller
- Node B Node B
- NB base station controller
- BSC base transceiver station
- gNB may include centralized units (CUs) and DUs.
- the gNB may also include an active antenna unit (AAU).
- CU implements some functions of gNB
- DU implements some functions of gNB.
- CU is responsible for processing non-real-time protocols and services, implementing radio resource control (RRC), and packet data convergence protocol (PDCP) layer functions.
- RRC radio resource control
- PDCP packet data convergence protocol
- DU is responsible for processing physical layer protocols and real-time services, and implementing the functions of the radio link control (RLC) layer, media access control (MAC) layer and physical (physical, PHY) layer.
- RLC radio link control
- MAC media access control
- PHY physical layer
- the access network device may be a device including one or more of a CU node, a DU node, and an AAU node.
- the CU can be divided into access network equipment in the access network (radio access network, RAN), or the CU can be divided into access network equipment in the core network (core network, CN). This application does not Make limitations.
- User plane network element used for packet routing and forwarding and quality of service (QoS) processing of user plane data.
- QoS quality of service
- the user plane network element can be a UPF network element, which can include an intermediate user plane function (I-UPF) network element, an anchor user plane function (PDU Session anchor user plane function, PSA-UPF) network element.
- I-UPF intermediate user plane function
- PSA-UPF anchor user plane function
- user plane network elements can still be UPF network elements, or they can have other names, which are not limited in this application.
- Data network used to provide a network for transmitting data.
- the data network may still be a DN, or may have other names, which are not limited in this application.
- the terminal device can establish a protocol data unit (PDU) session after accessing the network, and access the DN through the PDU session. It can communicate with the application function network elements (application function network elements such as application function network elements) deployed in the DN. for application server) interaction. As shown in Figure 1, depending on the DN that the user accesses, the network can select the UPF of the access DN as the PDU Session Anchor (PSA) according to the network policy, and access the application function network element through the N6 interface of the PSA.
- PDU protocol data unit
- Access and mobility management network element Mainly used for mobility management and access management, etc., and can be used to implement other functions in the mobility management entity (MME) function except session management. For example, functions such as lawful interception and access authorization/authentication.
- MME mobility management entity
- the access management network element may be an AMF network element.
- the access management network element can still be an AMF network element, or it can also have other names, which is not limited in this application.
- Session management network element Mainly used for session management, network interconnection protocol (IP) address allocation and management of terminal equipment, selection of endpoints for manageable terminal equipment plane functions, policy control and charging function interfaces, and downlink Data notifications, etc.
- IP network interconnection protocol
- the session management network element can be an SMF network element, which can include an intermediate session management function (I-SMF) network element and an anchor session management function (anchor session). management function, A-SMF) network element.
- I-SMF intermediate session management function
- A-SMF anchor session management function
- the session management network element can still be an SMF network element, or it can also have other names, which is not limited in this application.
- Policy control network element A unified policy framework used to guide network behavior and provide policy rule information for control plane functional network elements (such as AMF, SMF network elements, etc.).
- the policy control network element may be a policy and charging rules function (PCRF) network element.
- PCF policy and charging rules function
- the policy control network element may be a PCF network element.
- the policy control network element can still be a PCF network element, or it can also have other names, which is not limited in this application.
- Data management network element used to process terminal device identification, access authentication, registration and mobility management, etc.
- the data management network element can be a UDM network element or a UDR network element.
- unified data management can still be UDM or UDR network elements, or it can also have other names, which are not limited in this application.
- the UDM or UDR network element in the embodiment of this application may refer to the user database. Can exist as a single logical repository for storing user data.
- Application function network element can interact with the 6G system through the application function network element, and is used to access network open function network elements or interact with the policy framework for policy control, etc.
- the application function network element can be an application function, AF network Yuan.
- the application function network element can still be an AF network element, or it can also have other names, which is not limited in this application.
- Authentication service network element used for authentication services, generating keys to implement two-way authentication of terminal devices, and supporting a unified authentication framework.
- the authentication service network element may be the AUSF network element.
- the authentication service function network element can still be an AUSF network element, or it can also have other names, which is not limited in this application.
- Network opening function network element used to provide customized functions for network opening.
- the network exposure function network element can be a network exposure function (NEF) network element.
- NEF network exposure function
- the network exposure function network element can still be an NEF network element. , or it can also have other names, which are not limited in this application.
- the 6G communication system can also open the capabilities supported by 6GC to external application function network elements through NEF network elements, such as providing small data transmission capabilities.
- Ledger anchoring function network element As the interface between the communication network and the blockchain, it is responsible for the authorization and management of terminal devices' access to and writing to the blockchain. Operators can mount different blockchain nodes on the bus. As the overall management anchor, the ledger anchoring function network element is responsible for three functions: secondary authentication and authorization for terminal devices to access the blockchain, terminal device on-chain configuration, and terminal device information on-chain processing.
- Blockchain Transactions in the network are generated and stored in blocks, and are connected into a chain structure in chronological order. Confirmed and proven transactions in the network are linked from the beginning block of the blockchain to the latest block. The ledger formed by multiple blocks linked together is called a blockchain.
- Blockchain technology implements a chained data structure that connects data and information blocks in chronological order, and cryptographically ensures distributed storage that cannot be tampered with or forged.
- the data and information in the blockchain are called "transactions”.
- Blockchain technology is not a single technology, but a system that integrates point-to-point transmission, consensus mechanism, distributed data storage and cryptography principles. This system has the technical characteristics of being fully open and tamper-proof.
- Point-to-point transmission The nodes participating in the blockchain are independent and peer-to-peer. Data and information synchronization is achieved between nodes through point-to-point transmission technology. Nodes can be different physical machines or different instances in the cloud.
- Consensus mechanism The consensus mechanism of the blockchain refers to the process in which nodes participating in the blockchain achieve consensus on specific data and information through interaction between nodes under preset logical rules. Consensus mechanisms need to rely on well-designed algorithms, so different consensus mechanism performances (such as transaction throughput per second (TPS), delay in reaching consensus, consumed computing resources, consumed transmission resources, etc. ) there are certain differences.
- TPS transaction throughput per second
- Distributed storage in the blockchain means that each node participating in the blockchain stores independent and complete data, ensuring that the data stored among the nodes is fully open. Different from traditional distributed data storage, which divides data into multiple copies for backup or synchronization storage according to certain rules, blockchain distributed data storage relies on equal and equal positions in the blockchain. Consensus among independent nodes to achieve high consistency data storage.
- Blockchain is usually based on asymmetric encryption technology to achieve trusted information dissemination, verification, etc.
- each "block” contains a "block header” and There are two parts: “block body”.
- the “block body” contains the transaction records packaged into the "block”; the “block header” contains the root HASH of all transactions in the "block” and the HASH of the previous “block”. .
- the data structure of the blockchain ensures that the data stored on the blockchain cannot be tampered with.
- Blockchain can currently be divided into three categories: public chain, alliance chain and private chain.
- the public chain means that any accounting node (peer) participating in it can serve as a consensus node (also called a consensus computing node) of the blockchain, and then participate in the consensus calculation of blockchain data storage and maintain the blockchain anonymously. Nodes do not trust each other.
- the alliance chain adds access rights on the basis of the public chain, so that only nodes with certain qualifications can serve as consensus computing nodes of the blockchain, and then participate in the consensus calculation of the blockchain data storage and maintain the blockchain, node There is a certain level of trust with the nodes.
- the access mechanism of a private chain is more stringent than that of a consortium chain, making the blockchain and the consensus computing nodes of the blockchain exclusive to private individuals.
- the blockchain can be mounted on the bus and communicate with the 6GC based on service-oriented interfaces, such as BC#1, BC#2 and BC#1 shown in Figure 1. BC#3.
- the blockchain may not be mounted on the bus and communicate with the LAF based on the communication interface, such as BC#4 shown in Figure 1.
- the blockchain is mounted on the bus, which can be understood as at least one node on the blockchain using the service interface to communicate with 6GC; the blockchain is not mounted on the bus, and the communication with LAF based on the communication interface can be understood as : Communication between at least one node on the blockchain and LAF is based on the communication interface.
- the ledger anchoring function network element can be a LAF.
- the ledger anchoring function network element can still be a LAF network element, or, There can also be other names, which are not limited in this application.
- the LAF can be an independent functional network element, or it can be a functional network element co-located with other functional network elements.
- the functions of the AMF network element are enhanced so that the AMF network element has the functions of the LAF network element. .
- the interfaces between various control plane network elements in Figure 1 are service-oriented interfaces.
- Nudr, Nausf, Nnef, Namf, Npcf, Nsmf, Nudm, Naf, and Nlaf in Figure 1 are examples of service interfaces provided by the above-mentioned UDR, AUSF, NEF, AMF, PCF, SMF, UDM, AF, and LAF respectively. , used to call the corresponding service-based operations.
- N1, N2, N3, N4, N9, and N6 are interface serial numbers.
- N1 The interface between AMF and the terminal, which can be used to transmit QoS control rules to the terminal.
- N2 The interface between AMF and RAN, which can be used to transmit wireless bearer control information from the core network side to the RAN.
- N3 The interface between RAN and UPF, mainly used to transmit uplink and downlink user plane data between RAN and UPF.
- N4 The interface between SMF and UPF can be used to transfer information between the control plane and the user plane, including controlling the delivery of user-oriented forwarding rules, QoS control rules, traffic statistics rules, etc., as well as the user plane Report information.
- N9 The user plane interface between UPF and UPF, used to transmit uplink and downlink user data flows between UPF.
- N6 The interface between UPF and DN, used to transmit uplink and downlink user data flows between UPF and DN.
- the above network elements or functions may be network elements in hardware devices or in dedicated Software functions running on hardware, or virtualized functions instantiated on a platform (e.g., cloud platform).
- the above network elements or functions can be divided into one or more services.
- instances of the above functions, or instances of services included in the above functions, or service instances that exist independently of network functions can be called service instances.
- the AF network element may be abbreviated as AF
- the LAF network element may be abbreviated as LAF
- the AMF network element may be abbreviated as AMF. That is, the AF described later in this application can be replaced by the application function network element, the LAF can be replaced by the ledger anchoring function network element, and the AMF can be replaced by the access and mobility management network element.
- the above network element or functional network element can be a network element in a hardware device, a software function running on dedicated hardware, or a virtualization function instantiated on a platform (for example, a cloud platform).
- the above network elements or functions can be divided into one or more services.
- instances of the above functions, or instances of services included in the above functions, or service instances that exist independently of network functions can be called service instances.
- network architecture to which the embodiments of the present application can be applied are only illustrative.
- the network architecture applicable to the embodiments of the present application is not limited to this. Any network architecture that can realize the functions of each of the above network elements is applicable to this application. Application examples.
- the AMF, SMF, UPF, PCF, NEF, etc. shown in Figure 1 can be understood as network elements used to implement different functions, and can, for example, be combined into network slices as needed.
- These network elements can be independent devices, or they can be integrated into the same device to implement different functions, or they can be network elements in hardware devices, software functions running on dedicated hardware, or platforms (for example, cloud The virtualization function instantiated on the platform), this application does not limit the specific form of the above network elements.
- the interface names between the various network elements in Figure 1 are just an example. In specific implementations, the names of the interfaces may be other names, and this application does not specifically limit this. In addition, the names of the messages (or signaling) transmitted between the various network elements are only examples and do not constitute any limitation on the function of the messages themselves.
- On-chain configuration refers to configuring the data that needs to be sent to the blockchain through configuration messages, such as data types, etc.
- Data uploading to the chain refers to the data being packaged in a block through the consensus mechanism to become a new block, and linked to the previous block, becoming non-tamperable data on the chain.
- the membership service provider (MSP) module in the blockchain node is responsible for identity management and mainly completes functions such as digital certificate verification, signature and verification, and private key management. Smart contracts can implement multiple levels of access control based on the caller's digital certificate, MSP ID and its attribute fields.
- Extensible Authentication Protocol A collection of a series of authentication methods. The design concept is to meet the authentication needs of any link layer and support multiple link layer authentication methods.
- the EAP protocol is the core of the IEEE 802.1x authentication mechanism.
- a user requests access to an access point, and the access point forces the user into an unauthorized state, in which the user can only send an EAP start message. Then the access point An EAP message is returned to the user requesting the user to authenticate. The user sends their authentication to the access point, which then forwards it to the authentication server, which uses an algorithm to verify that the user is legitimate and returns an acceptance or rejection message to the access point. When the verification is passed, that is, the acceptance message is received, the access point will change the user's status to authorized, and normal communication can be carried out at this time.
- 6G communication network The 6G network space can be composed of air, sky, earth and sea, and the equipment structure can be composed of multiple devices.
- the actual network carrier can include satellite networks, drones and other medium and low-altitude platforms, cellular networks, Internet of Vehicles, IoT networks, and water surfaces. and underwater network composition.
- 6G network terminals are an important part of supporting 6G business applications.
- 6G networks expand the form and functions of 5G communication terminals.
- 6G network terminals include but are not limited to cars, cellular network terminals (integrated satellite terminal functions), drones, and IoT.
- the capabilities of 6G network terminals have been enhanced compared to 5G network terminals.
- the computing power and communication capabilities of cars have been greatly improved, which can meet the basic needs of blockchain operation.
- the blockchain carefully designed according to the 6G network can also support more types of terminals.
- the 6G network has the characteristics of cross-industry and deep participation of multiple devices. Different devices in the network can provide a variety of different businesses and services. Among them, different devices may belong to different operators and are not limited to a single operator. Therefore, the 6G network needs A multi-party mutual trust mechanism and platform.
- Blockchain technology essentially changes the trust logic of human society and can well meet the above needs of 6G networks.
- Blockchain is a distributed ledger that integrates cryptography technology, P2P network, distributed database and other technologies. Since the blockchain is a type of data that is generated and stored in blocks (blocks) and connected into a chain (chain) data structure in chronological order, in which all nodes jointly participate in the data verification, storage and processing of the blockchain system. Maintenance, the creation of new blocks needs to be confirmed by consensus and broadcast to each node to achieve network-wide synchronization. It is difficult to change or delete after that. Therefore, by utilizing the natural trustworthy attributes of the blockchain, it can effectively fill the trustworthy capacity in the communication network. missing. The following will briefly introduce the integration of blockchain and 6G communication network.
- the integration of blockchain and 6G communication network can provide the following two requirements:
- the blockchain can provide personal information related to core network elements to the core network elements for use.
- the blockchain will also collect various sensing and mapping data that can be provided to core network elements as services. For example, road condition information, traffic information, environmental information, etc. in the Internet of Vehicles. Operators can use blockchain to create a secure and tamper-proof data sharing platform for core network elements.
- Blockchain requires core network elements to report environment, key performance indicator (Key Performance Indicator, KPI), surveying and mapping and other information.
- KPI Key Performance Indicator
- the KPI indicator data information generated by various actual operations of traditional networks is mainly collected and collected locally by the base station, and then reported directly to the local sub-network management and database system through private interfaces, and then summarized and reported to higher-level network management and data in hierarchical levels. center.
- core network elements can report in real time (for example, to the blockchain or network) Various network KPI data.
- mapping data from a large number of users. For example, sensors testing cars often capture images and information of other cars, pedestrians, bicycles, traffic signs, traffic lights, curbs, lanes, other infrastructure, and roadscapes.
- the IoT network will measure and map the humidity, temperature, environmental conditions, etc. of the environment.
- the network can record and store surveying and mapping data.
- Smart contract It is a computer protocol designed to disseminate, verify or execute contracts in an information-based manner. Smart contracts allow trusted transactions to be made without third parties, which are traceable and irreversible. The permission to call intelligence involved in the embodiment of this application is similar to the "write” operation, that is, data uploading can be directly “written” into the blockchain or by calling a smart contract.
- Token is a string of strings generated by the server, used as a token for client requests.
- the server When logging in for the first time, the server generates a Token information and returns the Token information to the client. The client only needs to bring this Token information to request data, and does not need to bring the user name and password again.
- the integration of blockchain and 6G communication network blockchain can provide resource services, information reporting and other functions.
- the relevant technologies for the integration of blockchain and 6G communication network only involve the uploading of terminal equipment contract data, and Core network elements (such as AMF, SMF, UPF, or NEF, etc.) are not involved in accessing the blockchain.
- This application provides a communication method that supports core network elements in the communication system to access the blockchain, so that operators can create a secure and tamper-proof data sharing platform for core network elements through the blockchain.
- the embodiments shown below do not specifically limit the specific structure of the execution body of the method provided by the embodiment of the present application, as long as it can be provided according to the embodiment of the present application by running a program that records the code of the method provided by the embodiment of the present application. It suffices to communicate by a method.
- the execution subject of the method provided by the embodiment of the present application may be the core network device, or a functional module in the core network device that can call the program and execute the program.
- for indicating can be understood as “enabling”, and “enabling” can include direct enabling and indirect enabling.
- enabling can include direct enabling and indirect enabling.
- the information enabled by the information is called to-be-enabled information.
- the to-be-enabled information can be directly enabled, such as to-be-enabled information.
- the enabling information itself or the index of the information to be enabled, etc.
- the information to be enabled can also be indirectly enabled by enabling other information, where there is an association relationship between the other information and the information to be enabled. It is also possible to enable only a part of the information to be enabled, while other parts of the information to be enabled are known or agreed in advance.
- the enabling of specific information can also be achieved by means of a pre-agreed (for example, protocol stipulated) arrangement order of each piece of information, thereby reducing the enabling overhead to a certain extent.
- the common parts of each information can also be identified and enabled uniformly to reduce the enabling overhead caused by enabling the same information individually.
- preconfigured may include predefined, for example, protocol definitions.
- predetermined "Definition” can be realized by pre-saving corresponding codes, tables or other methods that can be used to indicate relevant information in the device (for example, including each network element). This application does not limit its specific implementation method.
- the “save” involved in the embodiments of this application may refer to saving in one or more memories.
- the one or more memories may be provided separately, or may be integrated in an encoder or decoder, a processor, or a communication device.
- the one or more memories may also be partially provided separately and partially integrated in the decoder, processor, or communication device.
- the type of memory can be any form of storage medium, and this application is not limited thereto.
- the "protocol” involved in the embodiments of this application may refer to standard protocols in the communication field, which may include, for example, 6G protocols, new radio (NR) protocols, and related protocols applied in future communication systems. This protocol There are no restrictions on this application.
- one piece of information for example, information #1 "includes" another piece of information (for example, information #2), which can be understood as indicating that information #1 explicitly carries or implicitly carries the information # 2.
- information #1 directly carries the information #2; also for example, information #1 carries indication information indicating the information #2, and the receiving end device that receives the information #1 can obtain the information # based on the indication information.
- the indication information used to indicate information #2 may be predefined or specified by the protocol, or may be an explicit or implicit indication.
- FIG. 1 is a schematic flow chart of a communication method provided by an embodiment of the present application, including the following steps:
- the second network element sends an access request to the first network element, or the first network element receives the access request from the second network element.
- the first network element is a functional network element with access authorization and management of the blockchain. Including but not limited to: network elements such as LAF, AMF, AUSF or SEAF. It should be understood that the name of the first network element is not subject to any limitation in the embodiment of this application.
- One possible implementation method is that when LAF and AMF (or SEAF/AUSF) are co-located, that is, the function of LAF is integrated into AMF (or SEAF/AUSF), then the first network element can be AMF (or SEAF/AUSF). AUSF).
- the first network element may be the LAF.
- the second network element may be a core network element in the communication system other than the first network element, including but not limited to: AMF, SMF, UPF, or NEF, etc.
- the LAF is set up independently and the first network element is the LAF as an example for description.
- the second network elements are collectively referred to as network function (NFs) network elements and will be explained as an example.
- NFs network function
- the access request includes the identification of the first blockchain, which is used to request access to the first blockchain.
- the access to the first blockchain may be that the second network element needs to send two data to the first blockchain. , it can also be that the second network element needs to obtain the first data from the first blockchain, or it can be that the second network element calls the smart contract on the first blockchain.
- the second network element determines that it needs to access the first blockchain, it generates the access request.
- the second network element may determine that it needs to access the first blockchain based on local configuration information. For example, the configuration information instructs the second network element to store specific data on the first blockchain.
- the second network element may determine that it needs to access the first blockchain based on instructions from other devices. For example, the second network element receives instructions from other devices to obtain information from the first blockchain. instructions.
- the second network element determines to access the first blockchain. It can be that when any need to access the first blockchain occurs, the second network element determines to access the first blockchain. A blockchain.
- first blockchain may be one or multiple blockchains, which means that the second network element may determine to initiate access to multiple blockchains.
- the blockchain that the second network element needs to access is collectively called the first blockchain.
- the identification of the first blockchain may be the ID of the first blockchain, or the ID of the blockchain group to which the first blockchain belongs.
- the terminal device determines that the blockchains that need to be accessed include blockchain #1, blockchain #2, and blockchain #3.
- the ID of blockchain #1 is ID#1
- the ID of blockchain #2 is If the ID of blockchain #3 is ID#2 and the ID of blockchain #3 is ID#3, then the identifiers of the first blockchain can be ID#1, ID#2, and ID#3.
- table 1 is used to illustrate the possible forms of identification of the first blockchain when the first blockchain accessed by the terminal device is based on a single blockchain as the granularity:
- a certain blockchain may correspond to multiple addresses (for example, Ledger#1 corresponds to IP#1-1 and IP#1-2). It can be understood that the blockchain includes multiple nodes, and each The IP addresses of the nodes are different. For example, there are node #1 and node #2 on Ledger #1. Among them, the address of node #1 is IP #1-1 and the address of node #2 is IP #1-2.
- the terminal device determines that the blockchains that need to be accessed include blockchain #1, blockchain #2, and blockchain #3, where blockchain #1, blockchain #2, and blockchain #3 Belongs to blockchain group #1, and the identifier of blockchain group #1 is group ID#1, then the identifier of the first blockchain can be group ID#1.
- table 2 is used to illustrate the possible forms of identification of the first blockchain when the first blockchain accessed by the terminal device is based on the blockchain group as the granularity:
- the access request may also include an identifier of the second network element and/or information indicating the access type, where the identifier of the second network element is used to identify the second network element, including but not limited to: the second network element.
- the ID of the second network element and the type indication of the second network element Information, etc.; the access types include reading (for example, obtaining the first data from the first blockchain), writing (for example, sending the second data to the first blockchain), or calling a smart contract.
- the access request can be called a Token request, which is used to implement Token verification.
- the access request may be a request message based on other verification methods to implement authentication of the second network element.
- the access request is a Token request.
- the first network element can verify the above access request to determine whether the second network element has the authority to access the first blockchain.
- the method flow shown in Figure 2 also includes:
- S220 The first network element verifies the access request.
- the access request carries integrity protection and signature.
- the first network element After receiving the access request, the first network element will verify the signature and integrity of the access request; and/or, the access request can be encrypted with a symmetric or asymmetric key, and the first network element After receiving the access request, Yuan will decrypt the access request.
- the interactive messages involved in this application can carry integrity protection and signatures.
- the peer receiving the message will verify the signature and integrity of the message and then perform corresponding actions; and/or, the interaction messages involved in this application can carry integrity protection and signatures.
- the interactive messages can be encrypted with symmetric or asymmetric keys, and the peer can decrypt and then perform response actions. The encryption or decryption of the following messages will not be described again.
- S230 The first network element sends an access response to the second network element, or the second network element receives the access response from the first network element.
- the access response includes information used to verify whether the second network element can access the first blockchain.
- the first network element verifies that the access request passes and determines that the second network element has the authority to access the first blockchain.
- the first network element generates Token information after passing the verification of the second network element.
- the access response includes Token information, where Token information includes but is not limited to: the identifier of the second network element, the identifier of the first blockchain, access type, expiration time, signature, etc.
- the method flow shown in Figure 2 also includes:
- the second network element sends a third request to the first blockchain, or the first blockchain receives the third request from the second network element.
- the third request is used to request to obtain the first data on the first blockchain, or to request to send the second data to the first blockchain.
- the third request includes the above-mentioned Token information.
- the third request In the case where the third request is used to request to send second data to the first blockchain, the third request carries the second data.
- S250 The first blockchain determines whether the second network element has the request authority.
- the first blockchain verifies the Token information carried in the third request to determine whether the second network element has the authority to obtain the first data on the first blockchain, or determines whether the second network element has the authority to obtain the first data on the first blockchain. Whether the network element has the authority to send the second data to the first blockchain.
- the first blockchain sends a third response to the second network element, or the second network element receives the third response from the first blockchain.
- the third response is used to indicate success or failure of the third request.
- the third request is used to request to obtain the first data on the first blockchain
- the third response is used to indicate that the acquisition of the first data on the first blockchain is successful
- the third response carry the first data
- the third request is used to request to send the second data to the first blockchain, the third request includes the second data, and the third response is used to indicate whether the second data is successfully uploaded to the chain or fails. .
- the method flow shown in Figure 2 mainly introduces the first network element to generate and issue Token information, and the first blockchain to verify the Token information.
- This application also provides another method for authenticating core network elements, as shown in The first network element authenticates whether the core network element can obtain the first data on the first blockchain.
- the method for authenticating the core network element will be described below with reference to Figure 3.
- the core network element is used as the second network element as an example for explanation. It should be understood that the second network element shown in Figure 3 is only an example and does not mean that it must be the same core as the one shown in Figure 2 network element.
- Figure 3 is a schematic flow chart of another communication method provided by an embodiment of the present application, including the following steps:
- the second network element sends a read request to the first network element, or the first network element receives the read request from the second network element.
- the read request is used to request to obtain the first data on a blockchain (eg, a first blockchain), and the read request includes an identifier of the first blockchain.
- a blockchain eg, a first blockchain
- the read request includes an identifier of the first blockchain.
- the first blockchain is just an example, and the second network element can request to obtain data on any blockchain.
- the read request also includes at least one of the following information:
- Transaction ID block ID
- world state or index
- the transaction identifier is used to indicate a certain (or a certain type of) transaction, including but not limited to: transaction format, transaction type, etc. It should be understood that the transaction indicated by the transaction identifier can be a transaction with certain characteristics, and is not limited to for a specific transaction.
- the identifier of a block is used to indicate a certain (or a certain type of) block, including but not limited to: a certain (or a certain type of) block on the blockchain. It should be understood that the area indicated by the identifier of the block A block can be a block with certain characteristics and is not limited to a specific block.
- the world state is used to indicate the overall state of the blockchain, such as account information, account status, etc., where the account information can be the identity of the account.
- An index may be used to indicate an index of certain information, such as a keyword.
- the identity of the first blockchain can be used as the key of the read request.
- the first network element can verify the above read request to determine whether the second network element has the authority to obtain the first data on the first blockchain.
- the method flow shown in Figure 3 also includes:
- S320 The first network element verifies the read request.
- the method flow shown in Figure 3 also includes:
- the first network element sends a read request to the first blockchain, or the first blockchain receives the read request from the first network element.
- the first blockchain sends the first data to the first network element, or the first network element receives the first data from the first blockchain.
- S350 The first network element sends the first data to the second network element, or the second network element receives the first data from the first network element.
- Figure 3 shows the core network element reading the data on the blockchain.
- the core network element can also upload the data to the blockchain.
- the following explains the core network element data uploading process in conjunction with Figure 4. method.
- the network element is the second network element as an example for explanation. It should be understood that the second network element shown in Figure 4 is only an example and does not necessarily mean that it is the same core network as the one shown in Figure 2 (or Figure 3). Yuan.
- Figure 4 is a schematic flow chart of yet another communication method provided by an embodiment of the present application, including the following steps:
- the second network element sends the second data to the first network element, or the first network element receives the second data from the second network element.
- the second network element when it sends the second data to the first network element, it may also send the identifier of the blockchain (such as the identifier of the first blockchain) and at least one of the following information to the first network element. :
- the identifier of the second network element the identifier of the transaction, the identifier of the block, the world state, or the index.
- first blockchain is just an example, and the second network element can send data to any blockchain.
- the above-mentioned first blockchain identifier, transaction identifier, block identifier, world state, or index, etc. can be used as the key for the read request.
- the first network element can determine whether the second network element has the authority to send the second data to the first blockchain.
- the method flow shown in Figure 4 also includes:
- the first network element verifies the second network element.
- the method flow shown in Figure 4 also includes:
- S430 The first network element sends the second data to the first blockchain, or the first blockchain receives the second data from the first network element.
- the first blockchain sends a confirmation message to the first network element, or the first network element receives the confirmation message from the first blockchain.
- S450 The first network element sends a confirmation message to the second network element, or the second network element receives the confirmation message from the first network element.
- the above-mentioned second network element directly (for example, the above-mentioned step S260: the third response carries the first data) or indirectly (for example, the above-mentioned step S350: the first network element sends the first data to the second network element) data) to obtain the first data on the first blockchain, which may be that the second network element determines that it needs to obtain the first data on the first blockchain according to the configuration message; and/or,
- the second network element sends the second data to the first blockchain directly (for example, the above step S240: the third request carries the second data) or indirectly (for example, the above step S430: the first network element sends the second data to the first blockchain).
- the second network element may determine according to the configuration message that it needs to send the second data to the first blockchain.
- the following describes the configuration process of core network elements in detail with reference to Figure 5.
- the core network element is used as the second network element as an example for explanation. It should be understood that the second network element shown in Figure 5 is only an example and does not mean that it must be the same core as the one shown in Figure 2 network element.
- Figure 5 is a schematic flow chart of yet another communication method provided by an embodiment of the present application, including the following steps:
- S510 The first network element sends the first configuration message to the second network element, or the second network element receives the first configuration message from the first network element.
- the first configuration message includes at least one of the following information:
- the first configuration message includes: the ID of the first configuration, identifying this configuration; it also includes the message type: activation configuration; it also includes the configured blockchain: BC ID; and it also includes the device that accepts the configuration: the second network element's Identification, such as the identification of the second network element on the blockchain; it also includes the address of the blockchain: Chain IP; it also includes the transaction format; it also includes cryptography Related information, such as encryption, hashing, signature algorithms, etc.; also includes reporting types, such as timer or counter-based reporting, period-based reporting, trigger-based reporting, etc.; reporting methods: such as directly publishing transactions (writing), calling smart contracts .
- business-related data network element logs
- equipment information network element hardware information, security capabilities
- security information trusted computing remote certification information, remote certification results
- network KPI information cell load, spectrum usage, key behaviors of the second network element, etc.
- network element certificate information also includes the transmitted data content.
- the first network element learns the above-mentioned first configuration message in the following two ways:
- Method 1 The first network element generates the first configuration message.
- the method flow shown in Figure 5 also includes:
- the first network element generates the first configuration message.
- the first network element After the blockchain registers the blockchain information with the first network element, the first network element identifies the corresponding network element (eg, the second network element) based on the blockchain information and generates the first configuration message.
- the information of the first blockchain includes the data type stored on the first blockchain, and the first network element can determine which network elements can obtain the corresponding data from the first blockchain based on this information;
- the information of the first blockchain includes the data type required by the first blockchain, and the first network element can determine based on this information that the data required by the first blockchain can be obtained from the network element.
- Method 2 The first network element receives the first configuration message from the blockchain.
- the method flow shown in Figure 5 also includes:
- the first network element receives the first configuration message from the first blockchain, or the first blockchain sends the first configuration message to the first network element.
- the first configuration message is carried in the information of the first blockchain and is sent to the first network element during the registration process.
- the first blockchain uses the information of the first blockchain to publish to the first network element the information that needs to be collected, the network elements involved, the reporting strategy, etc.
- the second network element may notify the first network element whether the configuration is successful through the first indication information.
- the method flow shown in Figure 5 also includes:
- S520 The second network element sends the first indication information to the first network element, or the first network element receives the first indication information from the second network element.
- the first indication information is used to indicate whether the first configuration is successful or failed.
- the first network element sends a third response to the first blockchain, or the first blockchain receives the third response from the first network element.
- the third response includes the information of the third network element.
- the third response is used to indicate that the configuration fails.
- the second indication information may be used to indicate that the first configuration changes.
- the first network element or the second network element may indicate any of the following through the second indication information: indicating to update the first configuration, indicating to suspend the first configuration, indicating to cancel the first configuration, or indicating to indicate the first configuration. recover.
- the method flow shown in Figure 5 may also include:
- S540 The first network element sends the second indication information to the second network element, or the second network element sends the second indication information to the first network element.
- the second indication information indicates updating the first configuration
- the second indication information includes at least one of the following information:
- the ID of the first configuration indicates the updated configuration; it also includes the information type: updated configuration; it also includes the configured blockchain: BC ID; it also includes the device that accepts the configuration: the identification of the second network element, such as the second network element in The identifier on the blockchain; also includes the address of the blockchain: Chain IP; also includes the transaction format; also includes cryptography-related information, such as encryption, hashing, signature algorithms, etc.; also includes the reporting type, such as timer-based or Counter reporting, period-based reporting, trigger-based reporting, etc.; reporting methods: such as directly publishing transactions (writing), calling smart contracts. Also includes the data content transmitted, etc.
- updating the first configuration is similar to configuring the first configuration described above, except that the update involves reconfiguring the existing configuration.
- the second indication information indicates to suspend the first configuration, and the second indication information includes at least one of the following information:
- the ID of the first configuration indicates the updated configuration; it also includes the information type: suspended configuration; it also includes the configured blockchain: BC ID; it also includes the device that accepts the configuration: the identification of the second network element, such as the second network element in Identity on the blockchain.
- the second indication information indicates canceling the first configuration
- the second indication information includes at least one of the following information:
- the ID of the first configuration indicates the updated configuration; it also includes the information type: deconfiguration; it also includes the configured blockchain: BC ID; it also includes the device that accepts the configuration: the identification of the second network element, such as the second network element in Identity on the blockchain.
- the second instruction information indicates restoring the first configuration
- the second instruction information includes at least one of the following information:
- the ID of the first configuration indicates the updated configuration; it also includes the information type: recovery configuration; it also includes the configured blockchain: BC ID; it also includes the device that accepts the configuration: the identification of the second network element, such as the second network element in Identity on the blockchain.
- FIG. 6 is a schematic flow chart of yet another communication method provided by an embodiment of the present application, including the following steps:
- S610 The first device sends a first request to the first network element, or the first network element receives the first request from the first device.
- the first request is used to request to register a blockchain (eg, a first blockchain) in the first network element, and the first request includes information about the first blockchain.
- a blockchain eg, a first blockchain
- the first request includes information about the first blockchain. It should be understood that the first blockchain is just an example, and the information of any blockchain can be registered on the first network element.
- the information of the first blockchain includes at least one of the following:
- the identification of the first blockchain The identification of the first blockchain, the address of the first blockchain, the authentication mechanism of the first blockchain, the members of the first blockchain, and the type of the first blockchain , the data type saved on the first blockchain, the status of the first blockchain, the policy and configuration corresponding to the core network element, the policy and configuration corresponding to the terminal device, or the policy and configuration corresponding to the third-party device.
- the blockchain information in this application can be understood as the registration file of the blockchain, which includes at least one of the following information:
- Basic blockchain information blockchain on-chain strategy information, or blockchain status management view information.
- the basic information of the blockchain includes but is not limited to: ledger ID (Ledger ID), channel ID (Channel ID), ledger type (Ledger type), ledger state (Ledger state) (such as Transactions per second). , TPS status, active account status, etc.), ledger members (Members of the Committee), IP addresses (IP addresses), full nodes or full/archive nodes (Fully Qualified Domain Name), FQDN), consensus mechanism (Consensus mechanism), ledger application related information (Ledger application related information), ledger structure (Ledger architecture), authentication mechanism (Authentication mechanism), etc.;
- Blockchain on-chain strategy information includes but is not limited to: required information type, on-chain strategy that triggers terminal equipment or access network equipment data (for example, on-chain strategy based on time interval, on-chain strategy based on pre-configuration, on-chain strategy based on Location information uplink strategy, terminal device selection strategy, etc.), network element data uplink strategy (e.g., based on time interval, based on preconfigured strategy, based on business trigger, based on network KPI, etc.), whether open to third parties , open strategy, etc.
- required information type for example, on-chain strategy based on time interval, on-chain strategy based on pre-configuration, on-chain strategy based on Location information uplink strategy, terminal device selection strategy, etc.
- network element data uplink strategy e.g., based on time interval, based on preconfigured strategy, based on business trigger, based on network KPI, etc.
- Chain status management view information includes but is not limited to: trusted execution environment, trusted hardware platform execution, Linux system performance monitoring data (such as monitoring the CPU usage and memory usage of the Linux system, etc.), log data (such as docker Operation logs, fabric operation logs, error logs, etc.), monitoring operation and maintenance (such as blockchain network status, block height, chain code and on-chain data, etc.), business data (such as channel data, transaction data, blocks, etc.) data stored on the chain itself, etc.), compliance audit (for example, for the compliance audit function of the alliance chain network, set up a sensitive vocabulary to prevent illegal information from being uploaded to the chain, establish a complaint and reporting mechanism, and the initiator and participants jointly supervise and maintain the alliance Chain data security), blockchain governance (such as freezing, thawing, account cancellation, updates, or maintenance of each chain, etc.).
- Linux system performance monitoring data such as monitoring the CPU usage and memory usage of the Linux system, etc.
- log data such as docker Operation logs, fabric operation logs, error logs, etc.
- the above-mentioned first device may be a network manager or a management node on the first blockchain.
- the method flow shown in Figure 6 also includes:
- S620 The first network element saves the information of the first blockchain.
- the first network element sends a first response to the first device, or the first device receives the first response from the first network element.
- the first response is used to indicate whether the first blockchain registration is successful or failed.
- the information of the first blockchain can be updated or deleted through a second request.
- the method flow shown in Figure 6 can also include:
- S640 The first device sends a second request to the first network element, or the first network element receives the second request from the first device.
- the second request is used to request to update the information of the first blockchain or delete the information of the first blockchain,
- the second request includes the updated information of the first blockchain; or ,
- the second request When the second request is used to request the first network element to delete (or log out) the information of the first blockchain, the second request includes the identifier of the first blockchain. .
- the first network element sends a second response to the first device, or the first device receives the second response from the first network element.
- the second response is used to indicate that the information update or deletion of the first blockchain is successful; or is used to indicate that the information update or deletion of the first blockchain fails.
- Figure 6 introduces the first device to actively register, update or delete the information of the first blockchain.
- This application Please also provide a communication method so that the first network element can actively obtain the status of the first blockchain. This is explained below with reference to Figure 7.
- Figure 7 is a schematic flow chart of yet another communication method provided by an embodiment of the present application, including the following steps:
- the first network element sends a first query message to the first device, or the first device receives the first query message from the first network element.
- the first query message is used to query the status of the blockchain (eg, the first blockchain).
- the status of the first blockchain includes that the information of the first blockchain needs to be registered, the information of the first blockchain needs to be updated, or the information of the first blockchain needs to be deleted. It should be understood that the first blockchain is just an example, and the first network element can query the status of any blockchain.
- S720 The first device sends the first notification message to the first network element, or the first network element receives the first notification message from the first device.
- the first notification message includes the information of the first blockchain, and the first network element saves the information of the first blockchain.
- the first notification message includes the information of the first blockchain, and the first network element overwrites the information of the first blockchain.
- the deletion instruction information is included in the first notification message, and the first network element deletes the locally saved information of the first blockchain.
- the first network element locally stores blockchain information
- the core network element can query the blockchain information stored locally by the first network element.
- the process of querying blockchain information is a schematic flow chart of another communication method provided by an embodiment of the present application, including the following steps:
- the third network element sends a second query message to the first network element, or the first network element receives the second query message from the third network element.
- the third network element retrieves the registration information and policy information of the node on the first blockchain based on the name or ID information of the blockchain (eg, the first blockchain). Such as routing policy, IP address, whether the third network element needs to report information and reporting strategy, etc. It should be understood that the first blockchain is just an example, and the third network element can query the information of any blockchain.
- the second query message is used to query the information of the first blockchain, and the second query message includes the identifier of the first blockchain.
- the second query message includes the data to be queried, such as the IP address of the full node, etc.
- the first network element verifies the third network element.
- the first network element determines whether the third network element has the authority to query the information of the first blockchain.
- S830 The first network element sends a second notification message to the third network element, or the third network element receives the second notification message from the first network element.
- the second notification message includes information about the first blockchain, or information indicating that the query failed.
- the second notification message may also include information indicating the cause of the query failure, such as verification failure.
- the core network element can also subscribe to the blockchain information stored locally by the first network element.
- the process of the core network element subscribing to the blockchain information from the first network element is described in detail below in conjunction with Figure 8.
- Figure 9 is The embodiment of the present application provides a schematic flow chart of yet another communication method, including the following steps:
- the third network element sends a subscription message to the first network element, or the first network element receives the subscription message from the third network element.
- the subscription message is used to subscribe to information of a blockchain (eg, a first blockchain), and the subscription message includes an identifier of the first blockchain.
- a blockchain e.g, a first blockchain
- the subscription message includes an identifier of the first blockchain.
- the first blockchain is just an example, and the third network element can subscribe to the information of any blockchain.
- the first network element verifies the third network element.
- the first network element determines whether the third network element has the authority to subscribe to the information of the first blockchain.
- S930 The first network element sends a notification message to the third network element, or the third network element receives the notification message from the first network element.
- the notification message includes information indicating whether the subscription is successful or failed.
- the notification message may also include information indicating the cause of the failure, such as indicating that the third network element does not have subscription rights.
- the first blockchain when the information of a certain (or some) blockchain (such as the first blockchain shown in Figure 9) stored locally by the first network element is updated, the first blockchain The first network element sends the updated blockchain information.
- the method flow shown in Figure 9 also includes:
- the first blockchain sends the updated information of the first blockchain to the first network element, or the first network element receives the updated information of the first blockchain from the first blockchain.
- the first blockchain when the first network element locally stores the information #1 of the first blockchain, and the information #1 of the first blockchain is updated to the information #2 of the first blockchain, the first blockchain sends the information to the first blockchain.
- a network element sends the information #2 of the first blockchain.
- the information #2 of the first blockchain overwrites the information #1 of the first blockchain stored locally by the first network element as the latest information of the first blockchain. status information.
- the first network element determines that the third network element has subscribed to the information of the first blockchain.
- the first network element can identify the network element (eg, the third network element) that subscribes to the information of the first blockchain.
- S960 The first network element sends the updated first blockchain information to the third network element, or the third network element receives the updated first blockchain information from the first network element.
- the configuration process shown in Figure 5 and the authentication process shown in Figure 2 can be combined, so that the blockchain can be accessed according to the configuration after authentication, which can improve security.
- devices in the existing network architecture are mainly used as examples for illustrative description (such as core network devices). It should be understood that the embodiments of the present application are not limited to the specific form of the devices. For example, devices that can achieve the same functions in the future are applicable to the embodiments of this application.
- the methods and operations implemented by equipment can also be implemented by components of the equipment (such as chips or circuits).
- each network element includes a corresponding hardware structure and/or software module to perform each function.
- Embodiments of the present application can divide the transmitting end device or the receiving end device into functional modules according to the above method examples.
- each functional module can be divided corresponding to each function, or two or more functions can be integrated into one processing module. middle.
- the above integrated modules can be implemented in the form of hardware or software function modules. It should be noted that the division of modules in the embodiment of the present application is schematic and is only a logical function division. In actual implementation, there may be other division methods. The following is an example of dividing each functional module according to each function.
- FIG 10 is a schematic block diagram of a communication device 1000 provided by an embodiment of the present application.
- the device 1000 includes a transceiver unit 1010 and a processing unit 1020.
- the transceiver unit 1010 can implement corresponding communication functions, and the processing unit 1020 is used for data processing.
- the transceiver unit 1010 may also be called a communication interface or a communication unit.
- the transceiver unit 1010 implements the function of obtaining information, it may also be called an acquisition unit.
- the device 1000 may also include a storage unit, which may be used to store instructions and/or data, and the processing unit 1020 may read the instructions and/or data in the storage unit, so that the device implements the foregoing method embodiments. .
- the device 1000 can be used to perform the actions performed by the equipment (such as the above-mentioned core network equipment, blockchain, etc.) in the above method embodiment.
- the device 1000 can be a device or a component that can be configured in the device (such as a chip or circuit)
- the transceiving unit 1010 is configured to perform operations related to transmitting and receiving of the device in the above method embodiment
- the processing unit 1020 is configured to perform operations related to device processing in the above method embodiment.
- the device 1000 is configured to perform the actions performed by the first network element (eg, LAF) in the above method embodiment.
- the first network element eg, LAF
- the transceiver unit 1010 is configured to receive an access request from the second network element, the access request is used to request access to the first blockchain, and the access request includes the identification of the first blockchain;
- the transceiver unit 1010 is also configured to send an access response to the second network element, where the access response includes information used to verify whether the second network element can access the first blockchain,
- the first network element has the function of authorizing and managing the second network element's access to the blockchain, and the second network element is a core network element in the communication system other than the first network element.
- the processing unit 1020 is configured to generate information used to verify whether the second network element can access the first blockchain.
- the processing unit 1020 is configured to determine whether the second network element has the authority to access the first blockchain.
- Transceiver unit 1010 configured to receive a read request from the second network element.
- the read request is used to request acquisition of the first data on the first blockchain.
- the read request includes the first block.
- the first data of a blockchain; the transceiver unit 1010 is also used to send the first data to the second network element.
- the processing unit 1020 is configured to determine whether the second network element has the authority to obtain the first data on the first blockchain.
- the read request also includes at least one of the following information: transaction identification, block identification, or account identification.
- the transceiver unit 1010 is configured to receive the second data from the second network element; the transceiver unit 1010 is also configured to send the second data to the first blockchain.
- the processing unit 1020 is configured to determine that the second network element has the authority to send the second data to the first blockchain.
- Transceiver unit 1010 configured to receive a first request from a first device.
- the first request is used to request to register the first blockchain in the first network element.
- the first request includes the first blockchain. Information;
- the transceiver unit 1010 is also configured to send a first response to the first device.
- the first response is used to indicate whether the registration of the first blockchain is successful or failed, wherein the information of the first blockchain includes at least one of the following: Items: the identification of the first blockchain, the address of the first blockchain, the authentication mechanism of the first blockchain, the members of the first blockchain, the type of the first blockchain, the third The type of data saved on a blockchain, the status of the first blockchain, the policies and configurations corresponding to core network elements, the policies and configurations corresponding to terminal devices, or the policies and configurations corresponding to third-party devices.
- the transceiver unit 1010 is also configured to receive a second request from the first device, the second request is used to request to update the information of the first blockchain or delete the information of the first blockchain, In the case where the second request is used to request the first network element to update the information of the first blockchain, the second request includes the updated information of the first blockchain; or, in the second When the request is used to request the first network element to delete the information of the first blockchain, the second request includes the identifier of the first blockchain.
- the transceiver unit 1010 is configured to send a first query message to the first device.
- the first query message is used to query the status of the first blockchain.
- the transceiver unit 1010 is also configured to receive a third query message from the first device.
- a notification message, the first notification message includes information of the first blockchain or deletion instruction information.
- the transceiver unit 1010 is configured to receive a second query message from the third network element.
- the second query message is used to query the information of the first blockchain.
- the second query message includes the identifier of the first blockchain. ;
- the transceiver unit 1010 is also used to send the information of the first blockchain to the third network element, or information indicating that the query failed.
- the processing unit 1020 is configured to determine whether the third network element has the authority to query the information of the first blockchain.
- the transceiver unit 1010 is configured to receive a subscription message from the third network element.
- the subscription message is used to subscribe to the information of the first blockchain.
- the subscription message includes the identification of the first blockchain; the transceiver unit 1010, It is also used to send a notification message to the third network element, where the notification message includes updated information of the first blockchain, or information indicating a subscription failure.
- the processing unit 1020 is configured to determine whether the third network element has the information to subscribe to the first blockchain. permissions.
- the transceiver unit 1010 is configured to send a first configuration message to the second network element.
- the first configuration message includes at least one of the following information: an identifier corresponding to the first configuration, an identifier of the first blockchain, The identifier of the second network element, the address of the first blockchain, the format of the first data, or the type of the first data.
- the information of the first blockchain includes the first configuration message, or the processing unit 1020 is configured to generate the first configuration message according to the information of the first blockchain.
- the transceiver unit 1010 is also configured to receive first indication information from the second network element, where the first indication information is used to indicate success or failure of the first configuration; when the first indication information indicates that the first If the configuration is successful, the transceiver unit 1010 is also configured to send a third response to the first blockchain, where the third response includes the information of the third network element; or, when the first indication information indicates that the If the first configuration fails, the transceiver unit 1010 is also configured to send a third response to the first blockchain, where the third response is used to indicate the configuration failure.
- the transceiver unit 1010 is also configured to send second indication information to the second network element; or, the transceiver unit 1010 is also configured to receive the second indication information from the second network element, wherein,
- the second instruction information is used to indicate any of the following: an instruction to update the first configuration, an instruction to cancel the first configuration, an instruction to suspend the first configuration, or an instruction to restore the first configuration.
- the device 1000 can implement steps or processes corresponding to the steps or processes executed by the first network element in the method embodiments according to the embodiments of the present application, and the device 1000 can include a unit for executing the method executed by the first network element in the method embodiments. . Moreover, each unit in the device 1000 and the above-mentioned other operations and/or functions are respectively intended to implement the corresponding processes of the first network element in the method embodiment.
- the transceiving unit 1010 can be used to perform the transceiving steps in the method, such as steps S210, S230, S240, S260; the processing unit 1020 can be used to perform the processing steps in the method, Such as step S220.
- the transceiver unit 1010 can be used to perform the transceiver steps in the method, such as steps S310, S330, S340, S350; the processing unit 1020 can be used to perform the processing steps in the method, such as steps S320.
- the transceiving unit 1010 can be used to perform the transceiving steps in the method, such as steps S410, S430, S440, and S450; the processing unit 1020 can be used to perform the processing steps in the method, such as steps S420.
- the transceiving unit 1010 can be used to perform the transceiving steps in the method, such as steps S510, S512, S520, S530, S540; the processing unit 1020 can be used to perform the processing steps in the method, Such as step S511.
- the transceiving unit 1010 can be used to perform the transceiving steps in the method, such as steps S610, S630, S640, and S650; the processing unit 1020 can be used to perform the processing steps in the method, such as steps S620.
- the transceiving unit 1010 can be used to perform the transceiving steps in the method, such as steps S710 and S720; the processing unit 1020 can be used to perform the processing steps in the method.
- the transceiving unit 1010 can be used to perform the transceiving steps in the method, such as steps S810 and S830; the processing unit 1020 can be used to perform the processing steps in the method, such as step S820.
- the transceiver unit 1010 can be used to perform the transceiver steps in the method, such as steps S910, S930, S940, and S960; the processing unit 1020 can be used to perform the processing steps in the method, such as steps S920, S950.
- the device 1000 is configured to perform the actions performed by the second network element (eg, LAF) in the above method embodiment.
- the second network element eg, LAF
- the transceiver unit 1010 is configured to send an access request to the first network element.
- the access request is used to request access to the first blockchain.
- the access request includes the identification of the third network element and the identity of the first blockchain. Identification; the transceiver unit 1010 is also used to receive an access response from the first network element.
- the access response includes information used to verify whether the second network element can access the first blockchain, wherein the third network element
- One network element has the function of being responsible for the access authorization and management of the blockchain by the second network element, and the second network element is a core network element in the communication system other than the first network element.
- the transceiver unit 1010 is used to send a third request to the first blockchain, where the third request is used to request to obtain the first data on the first blockchain, or to request to obtain the first data on the first blockchain.
- the blockchain sends the second data; the transceiver unit 1010 is also used to receive a third response from the first blockchain, the third response is used to indicate the success or failure of the third request, wherein the third request includes at least one of the following information: the identifier of the second network element, the identifier of the first blockchain, the type of the third request, the expiration time of the third request, or the signature information of the third request .
- the transceiver unit 1010 is configured to send a read request to the first network element.
- the read request is used to request to obtain the first data on the first blockchain.
- the read request includes the first blockchain. identification; the second network element receives the first data from the first network element.
- the read request also includes at least one of the following information: transaction identification, block identification, or account identification.
- the transceiver unit 1010 is configured to send second data to the first network element.
- the transceiver unit 1010 is configured to receive a first configuration message from the first network element.
- the first configuration message includes at least one of the following information: an identifier corresponding to the first configuration, an identifier of the first blockchain, The identifier of the second network element, the address of the first blockchain, the format of the first data, or the type of the first data.
- the transceiver unit 1010 is configured to send first indication information to the first network element, where the first indication information is used to indicate success or failure of the first configuration.
- the transceiver unit 1010 is also configured to receive second indication information from the first network element; or, the transceiver unit 1010 is also configured to send the second indication information to the first network element, wherein the The second instruction information is used to indicate any of the following: an instruction to update the first configuration, an instruction to cancel the first configuration, an instruction to suspend the first configuration, or an instruction to restore the first configuration.
- the device 1000 can implement steps or processes corresponding to the steps or processes executed by the second network element in the method embodiments according to the embodiments of the present application, and the device 1000 can include a unit for executing the method executed by the second network element in the method embodiments. . Moreover, each unit in the device 1000 and the above-mentioned other operations and/or functions are respectively intended to implement the corresponding processes of the second network element in the method embodiment.
- the transceiving unit 1010 can be used to perform the transceiving steps in the method, such as steps S210, S230, S240, and S260; the processing unit 1020 can be used to perform the processing steps in the method.
- the transceiving unit 1010 can be used to perform the transceiving steps in the method, such as steps S310 and S350; the processing unit 1020 can be used to perform the processing steps in the method.
- the transceiving unit 1010 can be used to perform the transceiving steps in the method, such as steps S410 and S450; the processing unit 1020 can be used to perform the processing steps in the method.
- the transceiving unit 1010 can be used to perform the transceiving steps in the method, such as steps S510, S520, and S540; the processing unit 1020 can be used to perform the processing steps in the method.
- the device 1000 is configured to perform the actions performed by the third network element in the above method embodiment.
- the transceiver unit 1010 is configured to send a second query message to the first network element.
- the second query message is used to query the information of the first blockchain.
- the second query message includes the identifier of the first blockchain; transceiver.
- Unit 1010 is configured to receive information about the first blockchain from the first network element, or information indicating that the query failed.
- the transceiver unit 1010 is used to send a subscription message to the first network element.
- the subscription message is used to subscribe to the information of the first blockchain.
- the subscription message includes the identification of the first blockchain; the transceiver unit 1010 is used to receive A notification message from the first network element, the notification message includes updated information of the first blockchain, or includes information indicating a subscription failure.
- the device 1000 can implement steps or processes corresponding to the third network element executed in the method embodiment according to the embodiment of the present application, and the device 1000 can include a unit for executing the method executed by the third network element in the method embodiment. . Moreover, each unit in the device 1000 and the above-mentioned other operations and/or functions are respectively intended to implement the corresponding processes of the third network element in the method embodiment.
- the transceiving unit 1010 can be used to perform the transceiving steps in the method, such as steps S810 and S830; the processing unit 1020 can be used to perform the processing steps in the method.
- the transceiving unit 1010 can be used to perform the transceiving steps in the method, such as steps S910, S930, and S960; the processing unit 1020 can be used to perform the processing steps in the method.
- the device 1000 is configured to perform the actions performed by the first device in the above method embodiment.
- the transceiver unit 1010 is configured to send a first request to the first network element.
- the first request is used to request to register the first blockchain in the first network element.
- the first request includes the first blockchain Information;
- the transceiver unit 1010 is configured to receive a first response from the first network element, the first response is used to indicate whether the registration of the first blockchain is successful or failed, where the information of the first blockchain includes the following At least one item: the identifier of the first blockchain, the address of the first blockchain, the authentication mechanism of the first blockchain, the members of the first blockchain, the type of the first blockchain, The data type saved on the first blockchain, the status of the first blockchain, the corresponding policies and configurations of core network elements, and terminal equipment Corresponding policies and configurations, or corresponding policies and configurations of third-party devices.
- the transceiver unit 1010 is also configured to send a second request to the first network element.
- the second request is used to request to update the information of the first blockchain or delete the information of the first blockchain,
- the second request includes the updated information of the first blockchain; or, in the second
- the second request includes the identifier of the first blockchain.
- the transceiver unit 1010 is configured to receive a first query message from the first network element.
- the first query message is used to query the status of the first blockchain.
- the transceiver unit 1010 is also configured to send a query message to the first network element.
- the first notification message includes the information of the first blockchain or the deletion instruction information.
- the apparatus 1000 may implement steps or processes corresponding to those executed by the first device in the method embodiments of the embodiments of the present application, and the apparatus 1000 may include a unit for executing the method executed by the first device in the method embodiments. Moreover, each unit in the device 1000 and the above-mentioned other operations and/or functions are respectively intended to implement the corresponding processes of the first device in the method embodiment.
- the transceiving unit 1010 can be used to perform the transceiving steps in the method, such as steps S610, S630, S640, and S650; the processing unit 1020 can be used to perform the processing steps in the method.
- the transceiving unit 1010 can be used to perform the transceiving steps in the method, such as steps S710 and S720; the processing unit 1020 can be used to perform the processing steps in the method.
- the device 1000 is used to perform the actions performed by the blockchain in the above method embodiment.
- the transceiver unit 1010 is configured to receive a third request from the second network element.
- the third request is used to request to obtain the first data on the first blockchain, or to request to send the first data to the first blockchain.
- the permission of the blockchain to send the second data; the transceiver unit 1010 is used to send a third response to the second network element, the third response is used to indicate the success or failure of the third request, wherein the third request includes At least one of the following information: the identifier of the second network element, the identifier of the first blockchain, the type of the third request, the expiration time of the third request, or the signature information of the third request.
- the device 1000 can implement steps or processes corresponding to the blockchain execution in the method embodiments according to the embodiments of the present application, and the device 1000 can include a unit for executing the blockchain execution method in the method embodiment. Moreover, each unit in the device 1000 and the above-mentioned other operations and/or functions are respectively intended to implement the corresponding processes of the blockchain in the method embodiment.
- the transceiving unit 1010 can be used to perform the transceiving steps in the method, such as steps S240 and S260; the processing unit 1020 can be used to perform the processing steps in the method, such as step S250.
- the transceiving unit 1010 can be used to perform the transceiving steps in the method, such as steps S330 and S340; the processing unit 1020 can be used to perform the processing steps in the method.
- the transceiving unit 1010 can be used to perform the transceiving steps in the method, such as steps S430 and S440; the processing unit 1020 can be used to perform the processing steps in the method.
- the transceiving unit 1010 can be used to perform the transceiving steps in the method, such as steps S512 and S530; the processing unit 1020 can be used to perform the processing steps in the method.
- the processing unit 1020 in the above embodiments may be implemented by at least one processor or processor-related circuit.
- the transceiver unit 1010 may be implemented by a transceiver or a transceiver related circuit.
- the storage unit may be implemented by at least one memory.
- this embodiment of the present application also provides a device 1100.
- the apparatus 1100 includes a processor 1110 and may also include one or more memories 1120.
- the processor 1110 is coupled to the memory 1120.
- the memory 1120 is used to store computer programs or instructions and/or data.
- the processor 1110 is used to execute the computer programs or instructions and/or data stored in the memory 1120, so that the method in the above method embodiment be executed.
- the device 1100 includes one or more processors 1110 .
- the memory 1120 can be integrated with the processor 1110 or provided separately.
- the device 1100 may also include a transceiver 1130, which is used for receiving and/or transmitting signals.
- the processor 1110 is used to control the transceiver 1130 to receive and/or transmit signals.
- the device 1100 is used to implement the operations performed by the equipment (such as the above-mentioned core network equipment, blockchain, etc.) in the above method embodiment.
- the equipment such as the above-mentioned core network equipment, blockchain, etc.
- Embodiments of the present application also provide a computer-readable storage medium on which are stored computer instructions for implementing the method executed by the device (such as the above-mentioned core network device, blockchain, etc.) in the above method embodiment.
- the device such as the above-mentioned core network device, blockchain, etc.
- the computer when the computer program is executed by a computer, the computer can implement the method executed by the network device in the above method embodiment.
- Embodiments of the present application also provide a computer program product containing instructions.
- the instructions When the instructions are executed by a computer, the computer implements the method executed by the device (such as the above-mentioned core network device, blockchain, etc.) in the above method embodiment.
- the device such as the above-mentioned core network device, blockchain, etc.
- An embodiment of the present application also provides a communication system, which includes the equipment in the above embodiment (such as the above-mentioned core network equipment, blockchain, etc.).
- processors mentioned in the embodiments of this application may be a central processing unit (CPU), or other general-purpose processor, digital signal processor (DSP), or application-specific integrated circuit (ASIC).
- ASIC application specific integrated circuit
- FPGA field programmable gate array
- a general-purpose processor may be a microprocessor or the processor may be any conventional processor, etc.
- the memory mentioned in the embodiments of the present application may be a volatile memory and/or a non-volatile memory.
- the non-volatile memory can be read-only memory (ROM), programmable ROM (PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically removable memory.
- ROM read-only memory
- PROM programmable ROM
- EPROM erasable programmable read-only memory
- EPROM erasable PROM
- EPROM erasable programmable read-only memory
- Erase programmable read-only memory electrically EPROM, EEPROM
- Volatile memory may be random access memory (RAM).
- RAM can be used as an external cache.
- RAM may include the following forms: static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), synchronous dynamic random access memory (synchronous DRAM, SDRAM) , double data rate synchronous dynamic random access memory (double data rate rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (synchlink DRAM, SLDRAM) and direct memory bus random access memory (direct rambus RAM, DR RAM ).
- the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic device, discrete gate or transistor logic device, or discrete hardware component
- the memory storage module
- memories described herein are intended to include, but are not limited to, these and any other suitable types of memories.
- the disclosed devices and methods can be implemented in other ways.
- the device embodiments described above are only illustrative.
- the division of the units is only a logical function division. In actual implementation, there may be other division methods.
- multiple units or components may be combined or can be integrated into another system, or some features can be ignored, or not implemented.
- the coupling or direct coupling or communication connection between each other shown or discussed may be through some interfaces, and the indirect coupling or communication connection of the devices or units may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or they may be distributed to multiple network units. Some or all of the units can be selected according to actual needs to implement the solution provided by this application.
- each functional unit in each embodiment of the present application can be integrated into one unit, or each unit can exist physically alone, or two or more units can be integrated into one unit.
- the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device.
- the computer may be a personal computer, a server, or a network device.
- the computer instructions may be stored in or transmitted from one computer-readable storage medium to another, e.g., the computer instructions may be transferred from a website, computer, server, or data center Transmission to another website, computer, server or data center by wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.) means.
- the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more available media integrated therein.
- the available media may be magnetic media (such as floppy disks, hard disks, magnetic tapes), optical media (such as DVDs), or semiconductor media (such as solid state disks (SSD)).
- the aforementioned available media may include But it is not limited to: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk and other media that can store program code.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本申请实施例提供了一种通信方法和装置,该方法应用于包括至少一个区块链的通信系统,该方法包括:第一网元接收来自第二网元的访问请求,该访问请求用于请求访问第一区块链,该访问请求中包括该第一区块链的标识;该第一网元向该第二网元发送访问响应,该访问响应用于指示所述第二网元是否可以访问该第一区块链,其中,该第一网元具有授权和管理该第二网元访问区块链的功能,该第二网元为该通信系统中除该第一网元之外的核心网网元。通过访问请求以请求访问第一区块链,以便于实现包括第二网元和第一网元的通信系统和区块链融合的场景下,第二网元访问区块链,从而运营商可以通过区块链为第二网元开创安全防篡改的数据共享平台。
Description
本申请要求于2022年03月07日提交中国专利局、申请号为202210216217.0、申请名称为“通信方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请实施例涉及通信领域,并且更具体地,涉及一种通信方法和装置。
区块链技术是一种综合了密码学技术、点对点(peer to peer,P2P)网络、分布式数据库等多种技术的分布式账本。作为一种公开透明的去中心化技术,区块链技术将传统的权威中心、中心式信任转化为群体共识、去中心化信任,构建了以密码学技术为保障的,不可篡改的分布式账本,并进一步提供智能合约自动化的执行数字化交易。
区块链技术本质上改变了人类社会的信任逻辑,将区块链应用于第六代(6th generation,6G)移动通信系统,可以增强6G的安全可信,依赖于区块链技术的特性,区块链可以作为统一的可信平台实现历史事件的追溯和自动化的网络管理等。示例性地,区块链和6G系统融合的场景下,在核心网设备能够访问区块链的情况下,区块链可以将与核心网设备相关的信息提供给核心网设备。
由上述可知区块链和6G系统融合能够带来增强通信的好处,在区块链技术和通信系统(如,6G系统)融合的场景下,如何实现核心网设备对区块链的访问成为亟待解决的问题。
发明内容
本申请实施例提供一种通信方法,通过支持通信系统中的核心网设备访问区块链,以助于运营商可以通过区块链为核心网设备开创安全防篡改的数据共享平台。
第一方面,提供了一种通信方法,该方法可以由第一网元执行,或者,也可以由第一网元的组成部件(例如芯片或者电路)执行,对此不作限定,为了便于描述,下面以由第一网元执行为例进行说明。
该方法应用于包括至少一个区块链的通信系统,该方法包括:第一网元接收来自第二网元的访问请求,该访问请求用于请求访问第一区块链,该访问请求中包括该第一区块链的标识;该第一网元向该第二网元发送访问响应,该访问响应中包括用于验证该第二网元是否可以访问该第一区块链的信息,其中,该第一网元具有授权和管理该第二网元访问区块链的功能,该第二网元为该通信系统中除该第一网元之外的核心网网元。
基于上述技术方案,在区块链和通信系统融合的系统中,第二网元在有访问第一区块链的需求的情况下,可以通过向第一网元发送访问请求以请求访问第一区块链,以便于实
现包括第二网元和第一网元的通信系统和区块链融合的场景下,第二网元访问区块链,从而运营商可以通过区块链为第二网元开创安全防篡改的数据共享平台。
结合第一方面,在第一方面的某些实现方式中,该方法还包括:该第一网元生成该用于验证该第二网元是否可以访问该第一区块链的信息。
结合第一方面,在第一方面的某些实现方式中,该方法还包括:该第一网元确定该第二网元是否具有访问该第一区块链的信息的权限。
示例性地,第一网元可以确定第二网元是否可以访问第一区块链,提高安全保障。
结合第一方面,在第一方面的某些实现方式中,在该第二网元具有访问该第一区块链的信息的权限的情况下,该方法还包括:该第一网元接收来自该第二网元的读取请求,该读取请求用于请求获取该第一区块链上的该第一数据,该读取请求中包括该第一区块链的标识;该第一网元向该第一区块链发送该读取请求;该第一网元接收来自该第一区块链的该第一数据;该第一网元向该第二网元发送该第一数据。
基于上述技术方案,在第二网元可以访问该第一区块链的情况下,第二网元可以通过向第一网元发送读取请求以请求读取第一区块链上的第一数据,以便于第一区块链为第二网元提供数据。
结合第一方面,在第一方面的某些实现方式中,该读取请求中还包括以下信息中的至少一项:交易的标识、区块的标识、或账户的标识。
进一步地,上述读取请求中还可以包括更多的信息,以便于更精确确定需要访问的对象,例如,通过在读取请求中携带交易的标识,以便于第一网元确定该第二网元需要访问该交易。
结合第一方面,在第一方面的某些实现方式中,在该第二网元具有访问该第一区块链的信息的权限的情况下,该方法还包括:该第一网元接收来自该第二网元的第二数据;该第一网元向该第一区块链发送该第二数据。
基于上述技术方案,在第二网元可以访问该第一区块链的情况下,第二网元可以向第一区块链发送上第二数据,以便于实现第二网元的数据上链。
结合第一方面,在第一方面的某些实现方式中,在该第一网元向该第一区块链发送该第二数据之前,该方法还包括:该第一网元确定该第二网元具有向该第一区块链发送该第二数据的权限。
示例性地,第一网元可以确定第二网元是否可以向第一区块链发送数据,提高安全保障。
结合第一方面,在第一方面的某些实现方式中,该方法还包括:该第一网元接收来自第一设备的第一请求,该第一请求用于请求在该第一网元中注册该第一区块链,该第一请求中包括该第一区块链的信息;该第一网元向该第一设备发送第一响应,该第一响应用于指示该第一区块链注册成功或者失败,其中,该第一区块链的信息包括以下至少一项:该第一区块链的标识、该第一区块链的地址、该第一区块链的认证机制、该第一区块链的成员、该第一区块链的类型、该第一区块链上保存的数据类型、第一区块链的状态、核心网网元对应的策略和配置、终端设备对应的策略和配置、或第三方设备对应的策略和配置。
基于上述技术方案,在区块链和通信系统融合的系统中,第一设备可以通过第一请
求将第一区块链的信息注册在第一网元上,以便于第一网元对第一区块链进行管理。
结合第一方面,在第一方面的某些实现方式中,该方法还包括:该第一网元接收来自该第一设备的第二请求,该第二请求用于请求更新该第一区块链的信息或删除该第一区块链的信息,在该第二请求用于请求该第一网元更新该第一区块链的信息的情况下,该第二请求中包括更新后的该第一区块链的信息;或者,在该第二请求用于请求该第一网元删除该第一区块链的信息的情况下,该第二请求中包括该第一区块链的标识。
基于上述技术方案,注册在第一网元中的第一区块连的信息可以更新或者删除,提高方案的灵活性。
结合第一方面,在第一方面的某些实现方式中,该方法还包括:该第一网元向该第一设备发送第一查询消息,该第一查询消息用于查询该第一区块链的状态。
基于上述技术方案,在区块链和通信系统融合的系统中,第一区块链的信息注册在第一网元中可以是第一网元通过第一查询消息主动发起的,提高第一网元的能动性。
结合第一方面,在第一方面的某些实现方式中,该方法还包括:该第一网元接收来自第三网元的第二查询消息,该第二查询消息用于查询该第一区块链的信息,该第二查询消息中包括该第一区块链的标识;该第一网元向该第三网元发送该第一区块链的信息,或者指示查询失败的信息。
基于上述技术方案,第三网元可以通过向第一网元发送第二查询消息以查询第一网元中保存的第一区块链的信息。
结合第一方面,在第一方面的某些实现方式中,该方法还包括:该方法还包括:该第一网元确定该第三网元是否具有查询该第一区块链的信息的权限。
示例性地,第一网元可以确定第三网元是否可以查询第一区块链的信息,提高安全保障。
结合第一方面,在第一方面的某些实现方式中,该方法还包括:该第一网元接收来自第三网元的订阅消息,该订阅消息用于订阅该第一区块链的信息,该订阅消息中包括该第一区块链的标识;该第一网元向该第三网元发送通知消息,该通知消息中包括更新后的该第一区块链的信息,或者包括指示订阅失败的信息。
基于上述技术方案,第三网元可以通过向第一网元发送订阅消息以订阅第一网元中保存的第一区块链的信息,以便于第一区块链的信息发生更新的情况下,第三网元能够及时获知。
结合第一方面,在第一方面的某些实现方式中,该方法还包括:该第一网元确定该第三网元是否具有订阅该第一区块链的信息的权限。
示例性地,第一网元可以确定第三网元是否可以订阅第一区块链的信息,提高安全保障。
结合第一方面,在第一方面的某些实现方式中,该方法还包括:该第一网元向该第三网元发送第一配置消息,该第一配置消息中包括以下信息中的至少一项:该第一配置对应的标识、该第一区块链的标识、该第三网元的标识、该第一区块链的地址、该第一数据的格式、或该第一数据的类型。
基于上述技术方案,可以通过第一配置消息为第三网元进行配置,以便于第三网元和第一区块链之间传输数据。
结合第一方面,在第一方面的某些实现方式中,该第一区块链的信息中包括该第一配置消息,或者该方法还包括:该第一网元根据该第一区块链的信息生成该第一配置消息。
基于上述技术方案,第一网元获知第一配置消息可以是由于第一区块链的信息中包括该第一配置消息,也可以是第一网元根据第一区块链的信息中包括的其他信息确定第一配置消息的,不限定第一网元获知第一配置消息的方式,增加方案的灵活性。
结合第一方面,在第一方面的某些实现方式中,该方法还包括:该第一网元接收来自该第三网元第一指示信息,该第一指示信息用于指示该第一配置成功或者失败;在该第一指示信息指示该第一配置成功的情况下,该方法还包括:该第一网元向该第一区块链发送第三响应,该第三响应中包括该第三网元的信息;或者,在该第一指示信息指示该第一配置失败的情况下,该方法还包括:该第一网元向该第一区块链发送第三响应,该第三响应用于指示配置失败。
结合第一方面,在第一方面的某些实现方式中,该方法还包括:该第一网元向该第三网元发送第二指示信息;或者,该第一网元接收来自该第三网元的该第二指示信息,其中,该第二指示信息用于指示以下任意一项:指示更新该第一配置、指示该第一配置取消、指示该第一配置暂停、或指示该第一配置恢复。
示例性地,可以通过第二指示信息对上述的第一配置进行更新、暂停等操作,提高配置的灵活性。
第二方面,提供了一种通信方法,该方法可以由第二网元执行,或者,也可以由第二网元的组成部件(例如芯片或者电路)执行,对此不作限定,为了便于描述,下面以由第二网元执行为例进行说明。
该方法应用于包括至少一个区块链的通信系统,该方法包括:第二网元向该第一网元发送访问请求,该访问请求用于请求访问该第一区块链,该访问请求中包括该第三网元的标识和该第一区块链的标识;第二网元接收来自该第一网元的访问响应,该访问响应中包括用于验证该第二网元是否可以访问该第一区块链的信息,其中,该第一网元具有负责该第二网元对区块链的访问授权和管理功能,该第二网元为该通信系统中除该第一网元之外的核心网网元。
结合第二方面,在第二方面的某些实现方式中,该方法还包括:该第二网元向该第一网元发送读取请求,该读取请求用于请求获取该第一区块链上的该第一数据,该读取请求中包括该第一区块链的标识;该第二网元接收来自该第一网元的该第一数据。
结合第二方面,在第二方面的某些实现方式中,该读取请求中还包括以下信息中的至少一项:交易的标识、区块的标识、或账户的标识。
结合第二方面,在第二方面的某些实现方式中,该方法还包括:该第二网元向该第一网元发送第二数据。
结合第二方面,在第二方面的某些实现方式中,该方法还包括:该第二网元向该第一区块链发送第三请求,该第三请求用于请求获取该第一区块链上的第一数据,或者用于请求向该第一区块链发送第二数据;该第二网元接收来自该第一区块链的第三响应,该第三响应用于指示该第三请求成功或者失败,其中,该第三请求中包括一下信息中的至少一项:该第二网元的标识、该第一区块链的标识、该第三请求的类型、该第三请求
的过期时间、或该第三请求的签名信息。
结合第二方面,在第二方面的某些实现方式中,该方法还包括:该第二网元向第一网元发送第二数据。
以上第二方面及其可能的设计所示方法的有益效果可参照第一方面及其可能的设计中的有益效果。
第三方面,提供了一种通信方法,该方法可以由第一区块链执行,或者,也可以由第一区块链的组成部件(例如芯片或者电路)执行,对此不作限定,为了便于描述,下面以由第一区块链执行为例进行说明。
该方法应用于包括至少一个区块链的通信系统,该方法包括:第一区块链接收来自第二网元的第三请求,该第三请求用于请求获取该第一区块链上的第一数据,或者用于请求向该第一区块链发送第二数据;该第一区块链验证该第三请求确定该第二网元是否具有获取该第一区块链上的第一数据的权限,或者确定该第二网元是否具有向该第一区块链发送第二数据的权限;该第一区块链向该第二网元发送第三响应,该第三响应用于指示该第三请求成功或者失败,其中,该第三请求中包括一下信息中的至少一项:该第二网元的标识、该第一区块链的标识、该第三请求的类型、该第三请求的过期时间、或该第三请求的签名信息。
基于上述技术方案,在区块链和通信系统融合的系统中,第二网元在有访问第一区块链的需求的情况下,可以通过向第一区块链发送第三请求以请求访问第一区块链,以便于实现第二网元访问区块链,并且第一区块链可以验证该第二网元是否具有访问第一区块链的权限,保障安全性。
第四方面,提供了一种通信方法,该方法可以由第一设备执行,或者,也可以由第一设备的组成部件(例如芯片或者电路)执行,对此不作限定,为了便于描述,下面以由第一设备执行为例进行说明。
该方法应用于包括至少一个区块链的通信系统,该方法包括:第一设备向第一网元发送第一请求,该第一请求用于请求在该第一网元中注册第一区块链,该第一请求中包括该第一区块链的信息;该第一设备接收来自该第一网元的第一响应,该第一响应用于指示该第一区块链注册成功或者失败,其中,该第一区块链的信息包括以下至少一项:该第一区块链的标识、该第一区块链的地址、该第一区块链的认证机制、该第一区块链的成员、该第一区块链的类型、该第一区块链上保存的数据类型、第一区块链的状态、核心网网元对应的策略和配置、终端设备对应的策略和配置、或第三方设备对应的策略和配置。
结合第四方面,在第四方面的某些实现方式中,该方法还包括:该第一设备向该第一网元发送第二请求,该第二请求用于请求更新该第一区块链的信息或删除该第一区块链的信息,在该第二请求用于请求该第一网元更新该第一区块链的信息的情况下,该第二请求中包括更新后的该第一区块链的信息;或者,在该第二请求用于请求该第一网元删除该第一区块链的信息的情况下,该第二请求中包括该第一区块链的标识。
结合第四方面,在第四方面的某些实现方式中,该方法还包括:该第一设备接收来自该第一网元的第一查询消息,该第一查询消息用于查询该第一区块链的状态。
以上第四方面及其可能的设计所示方法的有益效果可参照第一方面及其可能的设计
中的有益效果。
第五方面,提供了一种通信方法,该方法可以由第三网元执行,或者,也可以由第三网元的组成部件(例如芯片或者电路)执行,对此不作限定,为了便于描述,下面以由第三网元执行为例进行说明。
该方法应用于包括至少一个区块链的通信系统,该方法包括:第三网元向第一网元发送第二查询消息,该第二查询消息用于查询第一区块链的信息,该第二查询消息中包括该第一区块链的标识;该第三网元接收来自该第一网元的该第一区块链的信息,或者指示查询失败的信息。
以上第五方面所示方法的有益效果可参照第一方面及其可能的设计中的有益效果。
第六方面,提供了一种通信方法,该方法可以由第三网元执行,或者,也可以由第三网元的组成部件(例如芯片或者电路)执行,对此不作限定,为了便于描述,下面以由第三网元执行为例进行说明。
该方法应用于包括至少一个区块链的通信系统,该方法包括:第三网元向第一网元发送订阅消息,该订阅消息用于订阅第一区块链的信息,该订阅消息中包括该第一区块链的标识;该第三网元接收来自该第一网元的通知消息,该通知消息中包括更新后的该第一区块链的信息,或者包括指示订阅失败的信息。
以上第六方面所示方法的有益效果可参照第一方面及其可能的设计中的有益效果。
第七方面,提供了一种通信方法,该方法可以由第二网元执行,或者,也可以由第二网元的组成部件(例如芯片或者电路)执行,对此不作限定,为了便于描述,下面以由第二网元执行为例进行说明。
该方法应用于包括至少一个区块链的通信系统,该方法包括:第二网元接收来自第一网元的第一配置消息,该第一配置消息中包括以下信息中的至少一项:该第一配置对应的标识、该第一区块链的标识、该第二网元的标识、该第一区块链的地址、该第一数据的格式、或该第一数据的类型。
结合第七方面,在第七方面的某些实现方式中,该方法还包括:该第二网元向第一网元发送第一指示信息,该第一指示信息用于指示该第一配置成功或者失败。
结合第七方面,在第七方面的某些实现方式中,该方法还包括:该第二网元接收来自该第一网元的第二指示信息;或者,该第二网元向第一网元发送该第二指示信息,其中,该第二指示信息用于指示以下任意一项:指示更新该第一配置、指示该第一配置取消、指示该第一配置暂停、或指示该第一配置恢复。
以上第七方面及其可能的设计所示方法的有益效果可参照第一方面及其可能的设计中的有益效果。
第八方面,提供了一种通信装置,该通信装置用于执行上述第一方面提供的方法。具体地,该通信装置可以包括用于执行第一方面的上述任意一种实现方式提供的方法的单元和/或模块,如处理单元和获取单元。
在一种实现方式中,收发单元可以是收发器,或,输入/输出接口;处理单元可以是至少一个处理器。可选地,收发器可以为收发电路。可选地,输入/输出接口可以为输入/输出电路。
在另一种实现方式中,收发单元可以是该芯片、芯片系统或电路上的输入/输出接
口、接口电路、输出电路、输入电路、管脚或相关电路等;处理单元可以是至少一个处理器、处理电路或逻辑电路等。
第九方面,提供了一种通信装置,该装置用于执行上述第二方面提供的方法。具体地,该通信装置可以包括用于执行第二方面提供的方法的单元和/或模块,如处理单元和获取单元。
在一种实现方式中,收发单元可以是收发器,或,输入/输出接口;处理单元可以是至少一个处理器。可选地,收发器可以为收发电路。可选地,输入/输出接口可以为输入/输出电路。
在另一种实现方式中,收发单元可以是该芯片、芯片系统或电路上的输入/输出接口、接口电路、输出电路、输入电路、管脚或相关电路等;处理单元可以是至少一个处理器、处理电路或逻辑电路等。
第十方面,提供了一种通信装置,该装置用于执行上述第三方面提供的方法。具体地,该通信装置可以包括用于执行第三方面提供的方法的单元和/或模块,如处理单元和获取单元。
在一种实现方式中,收发单元可以是收发器,或,输入/输出接口;处理单元可以是至少一个处理器。可选地,收发器可以为收发电路。可选地,输入/输出接口可以为输入/输出电路。
第十一方面,提供了一种通信装置,该装置用于执行上述第四方面提供的方法。具体地,该通信装置可以包括用于执行第四方面提供的方法的单元和/或模块,如处理单元和获取单元。
在一种实现方式中,收发单元可以是收发器,或,输入/输出接口;处理单元可以是至少一个处理器。可选地,收发器可以为收发电路。可选地,输入/输出接口可以为输入/输出电路。
在另一种实现方式中,收发单元可以是该芯片、芯片系统或电路上的输入/输出接口、接口电路、输出电路、输入电路、管脚或相关电路等;处理单元可以是至少一个处理器、处理电路或逻辑电路等。
在另一种实现方式中,收发单元可以是该芯片、芯片系统或电路上的输入/输出接口、接口电路、输出电路、输入电路、管脚或相关电路等;处理单元可以是至少一个处理器、处理电路或逻辑电路等。
第十二方面,提供了一种通信装置,该装置用于执行上述第五方面至第七方面提供的方法。具体地,该通信装置可以包括用于执行第五方面至第七方面提供的方法的单元和/或模块,如处理单元和获取单元。
在一种实现方式中,收发单元可以是收发器,或,输入/输出接口;处理单元可以是至少一个处理器。可选地,收发器可以为收发电路。可选地,输入/输出接口可以为输入/输出电路。
在另一种实现方式中,收发单元可以是该芯片、芯片系统或电路上的输入/输出接口、接口电路、输出电路、输入电路、管脚或相关电路等;处理单元可以是至少一个处理器、处理电路或逻辑电路等。
在另一种实现方式中,收发单元可以是该芯片、芯片系统或电路上的输入/输出接
口、接口电路、输出电路、输入电路、管脚或相关电路等;处理单元可以是至少一个处理器、处理电路或逻辑电路等。
第十三方面,本申请提供一种处理器,用于执行上述各方面提供的方法。
对于处理器所涉及的发送和获取/接收等操作,如果没有特殊说明,或者,如果未与其在相关描述中的实际作用或者内在逻辑相抵触,则可以理解为处理器输出和接收、输入等操作,也可以理解为由射频电路和天线所进行的发送和接收操作,本申请对此不做限定。
第十四方面,提供一种计算机可读存储介质,该计算机可读存储介质存储用于设备执行的程序代码,该程序代码包括用于执行上述各方面提供的方法。
第十五方面,提供一种包含指令的计算机程序产品,当该计算机程序产品在计算机上运行时,使得计算机执行上述各方面提供的方法。
第十六方面,提供一种芯片,芯片包括处理器与通信接口,处理器通过通信接口读取存储器上存储的指令,执行上述各方面提供的方法。
可选地,作为一种实现方式,芯片还包括存储器,存储器中存储有计算机程序或指令,处理器用于执行存储器上存储的计算机程序或指令,当计算机程序或指令被执行时,处理器用于执行上述各方面提供的方法。
第十七方面,提供一种通信系统,包括第八方面所述的通信装置、第九方面所述的通信装置、第十方面所述的通信装置、第十一方面所述的通信装置和第十二方面所述的通信装置。
图1是适用本申请实施例的通信系统的示意图。
图2是本申请实施例提供的一种通信方法的示意性流程图。
图3是本申请实施例提供的另一种通信方法的示意性流程图。
图4是本申请实施例提供的又一种通信方法的示意性流程图。
图5是本申请实施例提供的又一种通信方法的示意性流程图。
图6是本申请实施例提供的又一种通信方法的示意性流程图。
图7是本申请实施例提供的又一种通信方法的示意性流程图。
图8是本申请实施例提供的又一种通信方法的示意性流程图。
图9是本申请实施例提供的又一种通信方法的示意性流程图。
图10是本申请实施例提供的一种通信装置的示意性框图。
图11是本申请实施例提供的另一种通信装置的示意性框图。
下面将结合附图,对本申请实施例中的技术方案进行描述。
本申请实施例的技术方案可以应用于区块链和目前已有通信网络或未来通信网络相融合的通信系统中,其中,目前已有通信网络或未来通信网络包括但不限于:第五代(5th generation,5G)系统或新无线(new radio,NR)、长期演进(long term evolution,LTE)系统、LTE频分双工(frequency division duplex,FDD)系统、LTE时分双工(time division
duplex,TDD)、设备到设备(device to device,D2D)通信系统、车辆外联(vehicle-to-everything,V2X)通信系统、机器到机器(machine to machine,M2M)通信系统、机器类型通信(machine type communication,MTC)系统、以及物联网(internet of things,IoT)通信系统或第六代(6th generation,6G)移动通信系统等。
为便于理解本申请实施例,下面以区块链和6G通信网络相融合为例简单介绍本申请实施例适用的通信系统。
本申请实施例的技术方案可以应用于图1所示的区块链和6G通信网络相融合网络架构中,当然也可以用在区块链和未来通信网络相融合的网络架构,比如区块链和未来通信网络相融合的网络架构等,本申请实施例对此不作具体限定。
下面将结合图1举例说明本申请实施例适用的区块链和6G通信网络相融合的通信系统。应理解,本文中描述的6G系统仅是示例,不应对本申请构成任何限定。
还应理解,6G系统中某些网元之间可以采用服务化接口,或点对点的接口进行通信,下面结合图1介绍基于服务化接口的6G系统框架。
作为示例性说明,图1示出了本申请实施例适用的区块链和6G通信网络相融合的通信系统100的架构示意图。该网络架构可以包括但不限于以下网元(或者称为功能网元、功能实体、节点、设备等):
用户设备(user equipment,UE)、(无线)接入网设备(radio access network,(R)AN)、6G核心网(6G core,6GC)、数据网络(data network,DN)和区块链(block chain,BC),其中,6GC包括但不限于以下网元:
接入和移动性管理功能(access and mobility management function,AMF)网元、会话管理功能(session management function,SMF)网元、用户面功能(user plane function,UPF)网元、策略控制功能(policy control function,PCF)网元、统一数据管理(unified data management,UDM)网元、应用功能(application function,AF)网元、认证服务器功能(authentication server function,AUSF)、统一数据管理(unified data management,UDM)、能力开放功能(network exposure function,NEF)网元、统一数据存储(unified data repository,UDR)、账本锚定功能(Ledger anchor function,LAF)网元等。
下面对图1中示出的各网元进行简单介绍:
1、UE:为与(R)AN通信的终端也可以称为终端设备(terminal equipment)、接入终端、用户单元、用户站、移动站、移动台(mobile station,MS)、移动终端(mobile terminal,MT)、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。终端设备可以是一种向用户提供语音/数据连通性的设备,例如,具有无线连接功能的手持式设备、车载设备等。目前,一些终端的举例可以为:手机(mobile phone)、平板电脑(pad)、带无线收发功能的电脑(如笔记本电脑、掌上电脑等)、移动互联网设备(mobile internet device,MID)、虚拟现实(virtual reality,VR)设备、增强现实(augmented reality,AR)设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程医疗(remote medical)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端、蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字助
理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备、无人机,6G网络中的终端设备或者未来演进的公用陆地移动通信网络(public land mobile network,PLMN)中的终端设备等。
此外,终端设备还可以是物联网(Internet of things,IoT)系统中的终端设备。IoT是未来信息技术发展的重要组成部分,其主要技术特点是将物品通过通信技术与网络连接,从而实现人机互连,物物互连的智能化网络。IoT技术可以通过例如窄带(narrow band,NB)技术,做到海量连接,深度覆盖,终端省电。
应理解,终端设备可以是任何可以接入网络的设备。终端设备与接入网设备之间可以采用某种空口技术相互通信。
可选地,用户设备可以用于充当基站。例如,用户设备可以充当调度实体,其在V2X或D2D等中的用户设备之间提供侧行链路信号。比如,蜂窝电话和汽车利用侧行链路信号彼此通信。蜂窝电话和智能家居设备之间通信,而无需通过基站中继通信信号。
2、(R)AN:用于为特定区域的授权用户设备提供入网功能,并能够根据用户设备的级别,业务的需求等使用不同服务质量的传输隧道。
(R)AN能够管理无线资源,为用户设备提供接入服务,进而完成控制信号和用户设备数据在用户设备和核心网之间的转发,(R)AN也可以理解为传统网络中的基站。
示例性地,本申请实施例中的接入网设备可以是用于与用户设备通信的任意一种具有无线收发功能的通信设备。该接入网设备包括但不限于:演进型节点B(evolved Node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(Node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(home evolved Node B,HeNB,或home Node B,HNB)、基带单元(baseBand unit,BBU),无线保真(wireless fidelity,WIFI)系统中的接入点(access point,AP)、无线中继节点、无线回传节点、传输点(transmission point,TP)或者发送接收点(transmission and reception point,TRP)、卫星、D2D通信中承担基站功能的终端设备等。
在一些部署中,gNB可以包括集中式单元(centralized unit,CU)和DU。gNB还可以包括有源天线单元(active antenna unit,AAU)。CU实现gNB的部分功能,DU实现gNB的部分功能。比如,CU负责处理非实时协议和服务,实现无线资源控制(radio resource control,RRC),分组数据汇聚层协议(packet data convergence protocol,PDCP)层的功能。DU负责处理物理层协议和实时服务,实现无线链路控制(radio link control,RLC)层、媒体接入控制(media access control,MAC)层和物理(physical,PHY)层的功能。AAU实现部分物理层处理功能、射频处理及有源天线的相关功能。由于RRC层的信息最终会变成PHY层的信息,或者,由PHY层的信息转变而来,因而,在这种架构下,高层信令,如RRC层信令,也可以认为是由DU发送的,或者,由DU+AAU发送的。可以理解的是,接入网设备可以为包括CU节点、DU节点、AAU节点中一项或多项的设备。此外,可以将CU划分为接入网(radio access network,RAN)中的接入网设备,也可以将CU划分为核心网(core network,CN)中的接入网设备,本申请对此不做限定。
3、用户面网元:用于分组路由和转发以及用户面数据的服务质量(quality of service,QoS)处理等。
如图1所示,在6G通信系统中,该用户面网元可以是UPF网元,可以包括中间用户面功能(intermediate user plane function,I-UPF)网元、锚点用户面功能(PDU Session anchor user plane function,PSA-UPF)网元。在未来通信系统中,用户面网元仍可以是UPF网元,或者,还可以有其它的名称,本申请不做限定。
4、数据网络:用于提供传输数据的网络。
在未来通信系统中,数据网络仍可以是DN,或者,还可以有其它的名称,本申请不做限定。
在6G通信系统中,终端设备接入网络后可以建立协议数据单元(protocol data unit,PDU)会话,并通过PDU会话访问DN,可以与部署在DN中的应用功能网元(应用功能网元比如为应用服务器)交互。如图1所示,根据用户访问的DN不同,网络可以根据网络策略选择接入DN的UPF作为为PDU会话锚点(PDU Session Anchor,PSA),并通过PSA的N6接口访问应用功能网元。
5、接入与移动性管理网元:主要用于移动性管理和接入管理等,可以用于实现移动性管理网元(mobility management entity,MME)功能中除会话管理之外的其它功能,例如,合法监听以及接入授权/鉴权等功能。
如图1所示,在6G通信系统中,该接入管理网元可以是AMF网元。在未来通信系统中,接入管理网元仍可以是AMF网元,或者,还可以有其它的名称,本申请不做限定。
6、会话管理网元:主要用于会话管理、终端设备的网络互连协议(internet protocol,IP)地址分配和管理、选择可管理终端设备平面功能、策略控制和收费功能接口的终结点以及下行数据通知等。
如图1所示,在6G通信系统中,该会话管理网元可以是SMF网元,可以包括中间会话管理功能(intermediate session management function,I-SMF)网元、锚点会话管理功能(anchor session management function,A-SMF)网元。在未来通信系统中,会话管理网元仍可以是SMF网元,或者,还可以有其它的名称,本申请不做限定。
7、策略控制网元:用于指导网络行为的统一策略框架,为控制面功能网元(例如AMF,SMF网元等)提供策略规则信息等。
在4G通信系统中,该策略控制网元可以是策略和计费规则功能(policy and charging rules function,PCRF)网元。如图1所示,在6G通信系统中,该策略控制网元可以是PCF网元。在未来通信系统中,策略控制网元仍可以是PCF网元,或者,还可以有其它的名称,本申请不做限定。
8、数据管理网元:用于处理终端设备标识,接入鉴权,注册以及移动性管理等。
如图1所示,在6G通信系统中,该数据管理网元可以是UDM网元或UDR网元。在未来通信系统中,统一数据管理仍可以是UDM、UDR网元,或者,还可以有其它的名称,本申请不做限定。
本申请实施例中的UDM或UDR网元可以是指用户数据库。可以作为一个存储用户数据的单一逻辑存储库存在。
9、应用功能网元:应用功能网元可以通过应用功能网元与6G系统交互,用于接入网络开放功能网元或与策略框架交互进行策略控制等。
如图1所示,在6G通信系统中,该应用功能网元可以是application function,AF网
元。在未来通信系统中,应用功能网元仍可以是AF网元,或者,还可以有其它的名称,本申请不做限定。
10、认证服务网元:用于鉴权服务、产生密钥实现对终端设备的双向鉴权,支持统一的鉴权框架。
如图1所示,在6G通信系统中,该认证服务网元可以是AUSF网元。在未来通信系统中,认证服务功能网元仍可以是AUSF网元,或者,还可以有其它的名称,本申请不做限定。
11、网络开放功能网元:用于提供网络开放的定制功能。
如图1所示,在6G通信系统中,该网络开放功能网元可以是网络开放功能(network exposure function,NEF)网元在未来通信系统中,该网络开放功能网元仍可以是NEF网元,或者,还可以有其它的名称,本申请不做限定。
6G通信系统还可以通过NEF网元,向外部的应用功能网元开放6GC支持的能力,譬如提供小数据传递能力等。
12、账本锚定功能网元:作为通信网络和区块链的接口,负责终端设备对区块链的访问和写入的授权和管理,运营商可以将不同区块链节点挂载到总线上,账本锚定功能网元作为整体管理锚点,负责终端设备访问区块链的二次认证和授权、终端设备上链配置和终端设备信息上链处理三个方面的功能。
13、区块链:网络中的交易以区块为单位产生和存储,并按照时间顺序连成链式结构。网络中的经过确认和证明的交易从区块链的开头区块链接到最新的区块,多个区块链接在一起形成的账本称为区块链。
区块链技术实现了一种按照时间顺序将数据和信息区块以顺序相连的方式组成的一种链式数据结构,并以密码学方式保证的不可篡改和不可伪造的分布式存储。一般情况下,将区块链中的数据和信息称为“交易(Transaction)”。
区块链技术不是单项的技术,而是作为点对点传输、共识机制、分布式数据存储和密码学原理集成应用的系统,该系统具有全公开和防篡改的技术特性。
1)点对点传输:参与区块链的节点是独立的、对等的,节点与节点之间通过点对点传输技术实现数据和信息的同步。节点可以是不同的物理机器,也可以是云端不同的实例。
2)共识机制:区块链的共识机制是指多方参与的节点在预设的逻辑规则下,通过节点间的交互实现各节点对特定数据和信息达成一致的过程。共识机制需要依赖于良好设计的算法,因此不同的共识机制性能(如:交易的吞吐量交易/秒(transaction per second,TPS)、达成共识的时延、耗费的计算资源、耗费的传输资源等)存在一定的差异。
3)分布式数据存储:区块链中的分布式存储是参与该区块链的节点各自都存有独立的、完整的数据,保证了数据存储在节点间全公开。与传统的分布式数据存储不同,传统的分布式数据存储按照一定规则将数据分成多份进行备份或同步存储,而区块链分布式数据存储则依赖于区块链中各地位对等的、独立的节点间的共识来实现高一致性的数据存储。
4)密码学原理:区块链通常是基于非对称加密技术实现可信的信息传播、校验等。
其中“区块”的概念是将一条或多条数据记录以“块”的形式组织,“区块”的大小可以根据实际应用场景自定义;而“链”是一种数据结构,该数据结构将存储数据记录的“区块”按照时间顺序并以哈希技术相连。在区块链中,每个“区块”包含“区块头”和
“区块体”两个部分,其中“区块体”包含打包进“区块”的交易记录;“区块头”包含“区块”中所有交易的根HASH和前一“区块”的HASH。区块链的数据结构保证了区块链上存储的数据具有不可篡改的特性。
区块链目前可以分为三类:公有链、联盟链和私有链。
公有链是指参与任何记账节点(peer)都可以作为区块链的共识节点(也可以称为共识计算节点),进而参与区块链数据存储的共识计算并且匿名的维护该区块链,节点与节点之间相互不信任。
联盟链在公有链的基础上增加了准入权限,使得具有一定资格的节点才可以作为区块链的共识计算节点,进而参与该区块链数据存储的共识计算并维护该区块链,节点与节点之间存在一定的信任。
私有链相比联盟链的准入机制更加苛刻,使得该区块链以及区块链的共识计算节点为私人独有。
示例性地,区块链和6G融合通信系统中,区块链可以挂载在总线上,与6GC之间基于服务化接口通信,如,图1中所示的BC#1、BC#2和BC#3。或者,区块链可以不挂载在总线上,与LAF之间基于通信接口通信,如,图1中所示的BC#4。其中,区块链挂载在总线上可以理解为区块链上的至少一个节点采用服务化接口和6GC通信;区块链不挂载在总线上,与LAF之间基于通信接口通信可以理解为:区块链上的至少一个节点与LAF之间基于通信接口通信。
如图1所示,在区块链和6G融合通信系统中,该账本锚定功能网元可以是LAF,在未来通信系统中,该账本锚定功能网元仍可以是LAF网元,或者,还可以有其它的名称,本申请不做限定。
需要说明的是,LAF可以是独立设置的功能网元,也可以是与其他功能网元合设的功能网元,例如,对AMF网元进行功能增强,使得AMF网元具备LAF网元的功能。
图1中各个控制面网元之间的接口是服务化的接口。具体地,图1中Nudr、Nausf、Nnef、Namf、Npcf、Nsmf、Nudm、Naf、Nlaf分别为上述UDR、AUSF、NEF、AMF、PCF、SMF、UDM、AF和LAF提供的服务化接口的示例,用于调用相应的服务化操作。N1、N2、N3、N4、N9以及N6为接口序列号。
1)、N1:AMF与终端之间的接口,可以用于向终端传递QoS控制规则等。
2)、N2:AMF与RAN之间的接口,可以用于传递核心网侧至RAN的无线承载控制信息等。
3)、N3:RAN与UPF之间的接口,主要用于传递RAN与UPF间的上下行用户面数据。
4)、N4:SMF与UPF之间的接口,可以用于控制面与用户面之间传递信息,包括控制面向用户面的转发规则、QoS控制规则、流量统计规则等的下发以及用户面的信息上报。
5)、N9:UPF和UPF之间的用户面接口,用于传递UPF间的上下行用户数据流。
6)、N6:UPF与DN的接口,用于传递UPF与DN之间的上下行用户数据流。
具体地。这些接口序列号的含义可参见第三代合作伙伴计划(3rd generation partnership project,3GPP)标准协议中定义的含义,在此不做限制。
可以理解的是,上述网元或者功能既可以是硬件设备中的网络元件,也可以是在专用
硬件上运行的软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。上述网元或者功能可划分出一个或多个服务,进一步,还可能会出现独立于网络功能存在的服务。在本申请中,上述功能的实例、或上述功能中包括的服务的实例、或独立于网络功能存在的服务实例均可称为服务实例。
进一步地,可以将AF网元简称为AF,LAF网元简称为LAF,AMF网元简称为AMF。即本申请后续所描述的AF均可替换为应用功能网元,LAF均可替换为账本锚定功能网元,AMF均可替换为接入与移动性管理网元。
可以理解的是,上述网元或者功能网元既可以是硬件设备中的网络元件,也可以是在专用硬件上运行软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。上述网元或者功能可划分出一个或多个服务,进一步,还可能会出现独立于网络功能存在的服务。在本申请中,上述功能的实例、或上述功能中包括的服务的实例、或独立于网络功能存在的服务实例均可称为服务实例。
应理解,上述本申请实施例能够应用的网络架构仅是示例性说明,本申请实施例适用的网络架构并不局限于此,任何包括能够实现上述各个网元的功能的网络架构都适用于本申请实施例。
还应理解,图1所示的AMF、SMF、UPF、PCF、NEF等可以理解为用于实现不同功能的网元,例如可以按需组合成网络切片。这些网元可以各自独立的设备,也可以集成于同一设备中实现不同的功能,或者可以是硬件设备中的网络元件,也可以是在专用硬件上运行的软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能,本申请对于上述网元的具体形态不作限定。
还应理解,上述命名仅为便于区分不同的功能而定义,不应对本申请构成任何限定。本申请并不排除在6G网络以及未来其它的网络中采用其他命名的可能。例如,在6G网络中,上述各个网元中的部分或全部可以沿用6G中的术语,也可能采用其他名称等。
还应理解,图1的各个网元之间的接口名称只是一个示例,具体实现中接口的名称可能为其他的名称,本申请对此不作具体限定。此外,上述各个网元之间的所传输的消息(或信令)的名称也仅仅是一个示例,对消息本身的功能不构成任何限定。
为了便于理解本申请实施例的技术方案,首先对本申请实施例可能涉及到的一些术语或概念进行简单描述。
1、上链配置:指的是通过配置消息配置需要发送给区块链的数据,如,数据类型等。
2、数据上链:指的是数据通过共识机制打包在一个区块成为一个新的区块,并且链接到前面的区块,成为链上不可篡改的数据。
3、准入机制:区块链节点中的成员服务提供者(membership service provider,MSP)模块负责身份管理,主要完成数字证书验证、签名与验证、私钥管理等功能。智能合约可依据调用者的数字证书、MSP ID及其属性字段实现多种级别的访问控制。
4、可扩展的身份验证协议(Extensible Authentication Protocol,EAP):一系列验证方式的集合,设计理念是满足任何链路层的身份验证需求,支持多种链路层认证方式。EAP协议是IEEE 802.1x认证机制的核心。
在一个遵循802.1X的无线局域网中,一个用户请求访问一个接入点,接入点强迫用户进入一种未经授权状态,这种状态下用户就只能发送一个EAP开始消息。然后接入点
返回给用户一个EAP消息请求用户进行身份验证。用户将身份验证发给接入点,之后接入点就会将其转发给验证服务器,由它使用一个算法来验证用户是否合法并且将接受或拒绝消息返还给接入点。当验证通过即接收到的是接受消息,则接入点将把用户的状态变为已授权,此时就可以进行正常的通信了。
5、6G通信网络:6G网络空间上可由空天地海组成,设备构成上由多个设备组成,实际网络载体可由卫星网络、无人机等中低空平台、蜂窝网络、车联网、IoT网络、水面及水下网络组成。6G网络终端是支撑6G业务应用的重要组成部分,6G网络扩展了5G通信终端的形态和功能,6G网络终端包括但不限于车、蜂窝网络终端(融合卫星终端功能)、无人机、IoT。此外,6G网络终端的能力相比于5G网络终端有所增强,例如车的计算能力和通信能力有了大幅提升,可以满足区块链运行的基本需求。同时,按照6G网络精细设计的区块链也可以支持更多形态的终端。
6G网络具有跨行业、多设备深度参与的特点,网络中的不同设备能够提供各种不同的业务和服务,其中,不同设备可能属于不同运营商,而非局限于单个运营商,因此6G网络需要一个多方互信的机制和平台。
区块链技术本质上改变了人类社会的信任逻辑,可以很好地满足6G网络的上述需求。
区块链是一种综合了密码学技术、P2P网络、分布式数据库等多种技术的分布式账本。由于区块链是一种将数据以区块(块)为单位产生和存储,并按照时间顺序连成链式(链)数据结构,其中所有节点共同参与区块链系统的数据验证、存储和维护,新区块的创建需得到共识确认,并向各节点广播实现全网同步,之后就很难更改或删除,因此通过利用区块链自然的可信属性,能够有效填补通信网络中可信能力的缺失。下面将简单介绍区块链和6G通信网络相融合。
6、区块链和6G通信网络相融合:将区块链应用于6G通信网络(或未来通信网络),可以为6G通信网络增强安全可信、跨行业、跨域管理提供了新的思路和更多的可能性,依赖于区块链技术的特性,区块链可以作为统一的可信平台实现历史事件的追溯和自动化的网络管理,如日志的审计、自动化的结算、安全的接入和验证等等。
具体地,区块链和6G通信网络相融合可以提供以下两点需求:
1)区块链资源服务。
由于通信网的需求,运营商会具有终端的业务数据,如用户配置文件(profile)信息、位置信息、标识(identify,ID)信息、陆上公用移动通信网(Public Land Mobile Network,PLMN)信息、服务信息等等;区块链可将与核心网网元相关的个人信息(可提供给核心网网元使用。
同时,区块链也会有采集到的各种感知、测绘数据可作为服务提供给核心网网元。如,车联网中的路况信息、交通信息、环境信息等。运营商可以通过区块链为核心网网元开创安全防篡改的数据共享平台。
2)区块链需要核心网网元上报环境、关键业绩指标(Key Performance Indicator,KPI)、测绘等信息。
传统网络的各种实际运营产生的KPI指标数据信息,主要是基站本地采集和收集,再通过私有接口直接上报给本地的子网管和数据库系统,再分级汇总统计上报给更高级别的网管和数据中心。利用区块链技术,核心网网元可实时上报(如,向区块链或网络上报)
各种网络KPI数据。
新型业务需要大量用户的测绘数据,如测试汽车的传感器通常会捕获其他汽车、行人、自行车以及交通标志、红绿灯、路沿、车道、其他基础设施及道路景观的影像和信息。IoT网络中会测绘环境的湿度、温度、环境状况等等。通过区块链,网络可以记录并存储测绘数据。
7、智能合约:是一种旨在以信息化方式传播、验证或执行合同的计算机协议。智能合约允许在没有第三方的情况下进行可信交易,这些交易可追踪且不可逆转。本申请实施例中涉及的调用智能的权限类似于“写”操作,即数据上链可以是直接“写”入区块链还可以是通过调用智能合约实现。
8、Token验证:Token是服务端生成的一串字符串,以作客户端进行请求的一个令牌,当第一次登录后,服务器生成一个Token信息便将此Token信息返回给客户端,以后客户端只需带上这个Token信息前来请求数据即可,无需再次带上用户名和密码。
由上述可知区块链和6G通信网络相融合区块链可以提供资源服务、信息上报等功能,目前区块链和6G通信网络相融合的相关技术中仅涉及终端设备签约数据的上链,并未涉及核心网网元(如,AMF、SMF、UPF、或NEF等)访问区块链。本申请提供一种通信方法,通过支持通信系统中的核心网网元访问区块链,以助于运营商可以通过区块链为核心网网元开创安全防篡改的数据共享平台。
上文结合图1介绍了本申请实施例能够应用的场景,还简单介绍了本申请中涉及的基本概念,下文中将结合附图详细介绍本申请提供的通信方法。
下文示出的实施例并未对本申请实施例提供的方法的执行主体的具体结构特别限定,只要能够通过运行记录有本申请实施例的提供的方法的代码的程序,以根据本申请实施例提供的方法进行通信即可,例如,本申请实施例提供的方法的执行主体可以是核心网设备,或者是核心网设备中能够调用程序并执行程序的功能模块。
为了便于理解本申请实施例,做出以下几点说明。
第一,在本申请中,“用于指示”可以理解为“使能”,“使能”可以包括直接使能和间接使能。当描述某一信息用于使能A时,可以包括该信息直接使能A或间接使能A,而并不代表该信息中一定携带有A。
将信息所使能的信息称为待使能信息,则具体实现过程中,对待使能信息进行使能的方式有很多种,例如但不限于,可以直接使能待使能信息,如待使能信息本身或者该待使能信息的索引等。也可以通过使能其他信息来间接使能待使能信息,其中该其他信息与待使能信息之间存在关联关系。还可以仅仅使能待使能信息的一部分,而待使能信息的其他部分则是已知的或者提前约定的。例如,还可以借助预先约定(例如协议规定)的各个信息的排列顺序来实现对特定信息的使能,从而在一定程度上降低使能开销。同时,还可以识别各个信息的通用部分并统一使能,以降低单独使能同样的信息而带来的使能开销。
第二,在本申请中示出的第一、第二以及各种数字编号(例如,“#1”、“#2”等)仅为描述方便,用于区分的对象,并不用来限制本申请实施例的范围。例如,区分不同消息等。而不是用于描述特定的顺序或先后次序。应该理解这样描述的对象在适当情况下可以互换,以便能够描述本申请的实施例以外的方案。
第三,在本申请中,“预配置”可包括预先定义,例如,协议定义。其中,“预先定
义”可以通过在设备(例如,包括各个网元)中预先保存相应的代码、表格或其他可用于指示相关信息的方式来实现,本申请对于其具体的实现方式不做限定。
第四,本申请实施例中涉及的“保存”,可以是指的保存在一个或者多个存储器中。所述一个或者多个存储器,可以是单独的设置,也可以是集成在编码器或者译码器,处理器、或通信装置中。所述一个或者多个存储器,也可以是一部分单独设置,一部分集成在译码器、处理器、或通信装置中。存储器的类型可以是任意形式的存储介质,本申请并不对此限定。
第五,本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
第六,本申请实施例中涉及的“协议”可以是指通信领域的标准协议,例如可以包括6G协议、新空口(new radio,NR)协议以及应用于未来的通信系统中的相关协议,本申请对此不做限定。
第七,本申请实施例中涉及一个信息(如,信息#1)中“包括”另一个信息(如,信息#2),可以理解为该信息#1中显示携带或隐式携带该信息#2,例如,信息#1中直接携带该信息#2;还例如,信息#1中携带指示该信息#2的指示信息,接收该信息#1的接收端设备可以根据该指示信息得到该信息#2,而指示信息用于指示信息#2可以是预定义或协议规定的,或者是显示或隐式的指示。
以下,不失一般性,以网元之间的交互为例详细说明本申请实施例提供的通信方法。该通信方法应用于区块链和通信系统(如,6G通信系统)融合的场景下(如,图1所示的场景)。图2是本申请实施例提供的一种通信方法的示意性流程图,包括以下步骤:
S210,第二网元向第一网元发送访问请求,或者说第一网元接收来自第二网元的访问请求。
示例性地,第一网元为具有对区块链的访问授权和管理的功能网元。包括但不限于:LAF、AMF、AUSF或SEAF等网元,应理解,本申请实施例中对于第一网元的名称不做任何限定。
一种可能的实现方式,LAF和AMF(或SEAF/AUSF)合设的情况下,即把LAF的功能集成于AMF(或SEAF/AUSF)中,则第一网元可以是AMF(或SEAF/AUSF)。
另一种可能的实现方式,LAF独立设置的情况下,第一网元可以是LAF。
示例性地,第二网元可以是通信系统中除第一网元之外的核心网网元,包括但不限于:AMF、SMF、UPF、或NEF等。
为了便于描述,本申请实施例中以LAF独立设置,第一网元为LAF为例进行说明。第二网元统称为功能(network function,NFs)网元为例进行说明。
具体地,该访问请求中包括第一区块链的标识,用于请求访问第一区块链,其中,访问第一区块链可以是第二网元需要向第一区块链发送二数据,还可以是第二网元需要从第一区块链获取第一数据,还可以是第二网元调用第一区块链上的智能合约。
示例性地,第二网元确定需要访问第一区块链的情况下,生成该访问请求。
作为一种可能的实现方式,第二网元可以根据本地的配置信息确定需要访问第一区块链,例如,配置信息指示第二网元将特定的数据存储在第一区块链上。
作为另一种可能的实现方式,第二网元可以根据其他设备的指示确定需要访问第一区块链,例如,第二网元接收到其他设备的用于指示从第一区块链获取信息的指示信息。
需要说明的是,本申请实施例中对于第二网元如何确定访问第一区块链不做任何限定,可以是发生任何需要访问第一区块链的情况下,第二网元确定访问第一区块链。
另外,需要说明的是,上述的第一区块链可以是一个或者多个区块链,也就是说第二网元可以确定对多个区块链发起访问。为了便于描述,将第二网元需要访问的区块链统称为第一区块链。
示例性地,第一区块链的标识可以是第一区块链的ID,或者第一区块链所属的区块链群组的ID。
例如,终端设备确定需要访问的区块链包括区块链#1、区块链#2和区块链#3,其中,区块链#1的ID为ID#1、区块链#2的ID为ID#2和区块链#3的ID为ID#3,则第一区块链的标识可以是ID#1、ID#2和ID#3。
为了便于理解,结合表1说明终端设备访问的第一区块链是以单个区块链为粒度的情况下,第一区块链的标识的可能形式:
表1
第一区块链的信息 | 区块链 | 地址 |
ID#1 | Ledger#1 | IP#1-1或IP#1-2 |
ID#2 | Ledger#2 | IP#2-1 |
ID#3 | Ledger#3 | IP#3-1或IP#3-2 |
如表1中所示某个区块链可能对应多个地址(如,Ledger#1对应IP#1-1和IP#1-2),可以理解为该区块链上包括多个节点,每个节点的IP地址不同,如,Ledger#1上有节点#1和节点#2,其中,节点#1的地址为IP#1-1,节点#2的地址为IP#1-2。
还例如,终端设备确定需要访问的区块链包括区块链#1、区块链#2和区块链#3,其中,区块链#1、区块链#2和区块链#3属于区块链群组#1,且区块链群组#1的标识为组ID#1,则第一区块链的标识可以是组ID#1。
为了便于理解,结合表2说明终端设备访问的第一区块链是以区块链群组为粒度的情况下,第一区块链的标识的可能形式:
表2
应理解,本申请实施例中对于第一区块链的标识不做限制,上述的第一区块链的标识、第一区块链所属的区块链群组的标识只是举例,对本申请的保护范围不构成任何的限定,其他能够由于标识第一区块链的标识也在本申请的保护范围之内,例如,该第一区块链的类型指示信息等。
可选地,访问请求中还可以包括第二网元的标识和/或指示访问类型的信息,其中,第二网元的标识用于标识该第二网元,包括但不限于:第二网元的ID、第二网元的类型指示
信息等;所述访问类型包括读(如,从第一区块链获取第一数据)、写(如,向第一区块链发送二数据)、或调用智能合约。
作为一种可能的实现方式,该访问请求可以称为Token请求,用于实现Token验证。
作为另一种可能的实现方式,该访问请求可以是基于其他验证方式的请求消息,以实现对第二网元进行认证。
示例性地,该实施例中以访问请求为Token请求为例进行说明。
可选地,第一网元可以验证上述的访问请求,以确定第二网元是否具有访问所述第一区块链的权限,图2所示的方法流程还包括:
S220,第一网元验证访问请求。
示例性地,访问请求携带完整性保护和签名,第一网元收到访问请求后会验证访问请求的签名和完整性;和/或,访问请求可用对称或非对称密钥加密,第一网元收到访问请求后会解密访问请求。
需要说明的是,本申请中涉及的交互消息都可以携带完整性保护和签名,收到消息的对端会验证消息的签名和完整性之后,执行相应的动作;和/或,本申请中涉及的交互消息可用对称或非对称密钥加密,由对端解密后执行响应的动作,下述消息的加密或解密不再赘述。
S230,第一网元向第二网元发送访问响应,或者说第二网元接收来自第一网元的访问响应。
该访问响应中包括用于验证所述第二网元是否可以访问所述第一区块链的信息。
该实施例中主要考虑第一网元验证访问请求通过,确定第二网元具有访问所述第一区块链的权限的情况。该情况下,第一网元验证第二网元通过后生成Token信息。该访问响应中包括Token信息,其中Token信息包括但不限于:第二网元的标识、第一区块链的标识、访问类型、过期时间和签名等。
具体地,第二网元接收到上述的Token信息之后,图2所示的方法流程还包括:
S240,第二网元向第一区块链发送第三请求,或者说第一区块链接收来自第二网元的第三请求。
所述第三请求用于请求获取所述第一区块链上的第一数据,或者用于请求向所述第一区块链发送第二数据。具体地,该第三请求中包括上述的Token信息。
在第三请求用于请求向所述第一区块链发送第二数据的情况下,第三请求中携带该第二数据。
S250,第一区块链确定第二网元是否具有请求权限。
具体地,第一区块链验证所述第三请求中携带的Token信息确定所述第二网元是否具有获取所述第一区块链上的第一数据的权限,或者确定所述第二网元是否具有向所述第一区块链发送第二数据的权限。
S260,第一区块链向第二网元发送第三响应,或者说第二网元接收来自第一区块链的第三响应。
第三响应用于指示所述第三请求成功或者失败。
示例性地,在第三请求用于请求获取所述第一区块链上的第一数据,且第三响应用于指示获取第一区块链上的第一数据成功,则第三响应中携带该第一数据。
示例性地,在第三请求用于请求向所述第一区块链发送第二数据,该第三请求中包括所述第二数据,第三响应用于指示第二数据上链成功或者失败。
图2所示的方法流程主要介绍了第一网元生成Token信息并下发Token信息,第一区块链验证Token信息的方案,本申请还提供另一种认证核心网网元的方法,由第一网元认证核心网网元是否可以获取第一区块链上的第一数据,下面结合图3说明该认证核心网网元的方法。为了便于描述,还是以核心网网元为第二网元为例进行说明,应理解,图3中所示的第二网元只是举例,不代表一定和图2中所示的为同一个核心网网元。图3是本申请实施例提供的另一种通信方法的示意性流程图,包括以下步骤:
S310,第二网元向第一网元发送读取请求,或者说第一网元接收来自第二网元的读取请求。
所述读取请求用于请求获取区块链(如,第一区块链)上的所述第一数据,所述读取请求中包括所述第一区块链的标识。应理解,第一区块链只是举例,第二网元可以请求获取任意的区块链上的数据。
示例性地,所述读取请求中还包括以下信息中的至少一项:
交易的标识、区块的标识、世界状态、或索引。
其中,交易的标识用于指示某个(或者某一类)交易,包括但不限于:交易格式、交易类型等,应理解该交易的标识所指示的交易可以为具有一定特征的交易,不限定为某一个具体的交易。
区块的标识用于指示某个(或者某一类)区块,包括但不限于:区块链上的某个(或者某一类)区块,应理解该区块的标识所指示的区块可以为具有一定特征的区块,不限定为某一个具体的区块。
世界状态用于指示区块链的整体状态,如账号信息、账号状态,等等,其中,账号信息可以是账户的标识。
索引可能用于指示某个信息的索引,比如关键词。
示例性地,上述的读取请求中包括的第一区块链的标识、交易的标识、区块的标识、世界状态、或索引等可以作为读取请求的密钥。
可选地,第一网元可以验证上述的读取请求,以确定第二网元是否具有获取所述第一区块链上的第一数据的权限,图3所示的方法流程还包括:
S320,第一网元验证读取请求。
在第二网元具有获取所述第一区块链上的第一数据的权限的情况下,图3所示的方法流程还包括:
S330,第一网元向第一区块链发送读取请求,或者说第一区块链接收来自第一网元的读取请求。
S340,第一区块链向第一网元发送第一数据,或者说第一网元接收来自第一区块链的第一数据。
S350,第一网元向第二网元发送第一数据,或者说第二网元接收来自第一网元的第一数据。
图3所示的为核心网网元读取区块链上的数据的情况,核心网网元还可以将数据上链到区块链上,下面结合图4说明核心网网元数据上链的方法。为了便于描述,还是以核心
网网元为第二网元为例进行说明,应理解,图4中所示的第二网元只是举例,不代表一定和图2(或图3)中所示的为同一个核心网网元。图4是本申请实施例提供的又一种通信方法的示意性流程图,包括以下步骤:
S410,第二网元向第一网元发送第二数据,或者说第一网元接收来自第二网元的第二数据。
具体地,第二网元向第一网元发送第二数据时,还可以向第一网元发送区块链的标识(如,第一区块链的标识)和以下信息中的至少一项:
第二网元的标识、交易的标识、区块的标识、世界状态、或索引。
应理解,第一区块链只是举例,第二网元可以向任意的区块链发送数据。
示例性地,上述的第一区块链的标识、交易的标识、区块的标识、世界状态、或索引等可以作为读取请求的密钥。
可选地,第一网元可以判断第二网元是否具有向所述第一区块链发送第二数据的权限,图4所示的方法流程还包括:
S420,第一网元验证第二网元。
在第二网元具有向所述第一区块链发送第二数据的权限的情况下,图4所示的方法流程还包括:
S430,第一网元向第一区块链发送第二数据,或者说第一区块链接收来自第一网元的第二数据。
S440,第一区块链向第一网元发送确认消息,或者说第一网元接收来自第一区块链的确认消息。
S450,第一网元向第二网元发送确认消息,或者说第二网元接收来自第一网元的确认消息。
示例性地,上述的第二网元直接(如,上述的步骤S260:第三响应中携带第一数据)或间接(如,上述的步骤S350:第一网元向第二网元发送第一数据)获取第一区块链上的第一数据,可以是第二网元根据配置消息确定需要获取第一区块链上的第一数据;和/或,
第二网元向第一区块链直接(如,上述的步骤S240:第三请求中携带第二数据)或者间接(如,上述的步骤S430:第一网元向第一区块链发送第二数据)发送第二数据,可以是第二网元根据配置消息确定需要向第一区块链发送第二数据。下面结合图5详细介绍核心网网元的配置流程。为了便于描述,还是以核心网网元为第二网元为例进行说明,应理解,图5中所示的第二网元只是举例,不代表一定和图2中所示的为同一个核心网网元。图5是本申请实施例提供的又一种通信方法的示意性流程图,包括以下步骤:
S510,第一网元向第二网元发送第一配置消息,或者说第二网元接收来自第一网元的第一配置消息。
所述第一配置消息中包括以下信息中的至少一项:
所述第一配置对应的标识、所述第一区块链的标识、所述第二网元的标识、所述第一区块链的地址、所述第一数据的格式、或所述第一数据的类型。
例如,第一配置消息包括:第一配置的ID,标识此次配置;还包括消息类型:激活配置;还包括配置的区块链:BC ID;还包括接受配置的设备:第二网元的标识,如第二网元在区块链上的标识;还包括区块链的地址:Chain IP;还包括交易格式;还包括密码学
相关信息,如加密、哈希、签名算法等;还包括上报类型,如基于计时器或计数器上报、基于周期上报、基于触发上报等;上报的方式:如直接发布交易(写)、调用智能合约。还包括传输的数据内容,例如,业务相关数据(网元日志);还例如,设备信息(网元所在硬件信息、安全能力);还例如,安全信息(可信计算远程证明信息、远程证明结果);还例如,网络KPI信息(小区负荷、频谱使用情况、第二网元的关键行为等);还例如,网元证书信息。
具体地,该实施例中第一网元获知上述的第一配置消息包括以下两种方式:
方式一:第一网元生成第一配置消息。
在方式一下,图5所示的方法流程还包括:
S511,第一网元生成第一配置消息。
区块链向第一网元注册该区块链的信息之后,第一网元根据区块链的信息,识别对应网元(如,第二网元),生成第一配置消息。
例如,第一区块链的信息中包括第一区块链上保存的数据类型,第一网元根据该信息可以确定哪些网元可以从第一区块链上获取相应的数据;
还例如,第一区块链的信息中包括第一区块链所需的数据类型,第一网元根据该信息可以确定从网元可以获取第一区块链所需的数据。
方式二:第一网元从区块链接收第一配置消息。
在方式一下,图5所示的方法流程还包括:
S512,第一网元接收来自第一区块链的第一配置消息,或者说第一区块链向第一网元发送第一配置消息。
示例性地,第一配置消息携带在第一区块链的信息中,在注册过程中发送给第一网元。
例如,第一区块链通过第一区块链的信息向第一网元发布需要采集的信息、涉及的网元、上报的策略等。
具体地,第二网元可以通过第一指示信息通知第一网元是否配置成功。图5所示的方法流程还包括:
S520,第二网元向第一网元发送第一指示信息,或者说第一网元接收来自第二网元的第一指示信息。
第一指示信息用于指示所述第一配置成功或者失败。
S530,第一网元向第一区块链发送第三响应,或者说第一区块链接收来自第一网元的第三响应。
在所述第一指示信息指示所述第一配置成功的情况下,所述第三响应中包括所述第三网元的信息。
在所述第一指示信息指示所述第一配置失败的情况下,所述第三响应用于指示配置失败。
进一步地,在上述第一配置完后之后,可以通过第二指示信息指示第一配置发生变化。
例如,第一网元或第二网元可以通过第二指示信息指示以下任意一项:指示更新该第一配置、指示该第一配置暂停、指示该第一配置取消、或指示该第一配置恢复。则图5所示的方法流程还可以包括:
S540,第一网元向第二网元发送第二指示信息,或者第二网元向第一网元发送第二指示信息。
作为一种可能的实现方式,第二指示信息指示更新第一配置,第二指示信息中包括以下信息中至少一项:
第一配置的ID,指示更新的配置;还包括信息类型:更新配置;还包括配置的区块链:BC ID;还包括接受配置的设备:第二网元的标识,如第二网元在区块链上的标识;还包括区块链的地址:Chain IP;还包括交易格式;还包括密码学相关信息,如加密、哈希、签名算法等;还包括上报类型,如基于计时器或计数器上报、基于周期上报、基于触发上报等;上报的方式:如直接发布交易(写)、调用智能合约。还包括传输的数据内容等。
可以理解,更新第一配置类似与上述的配置第一配置,不同点在于更新为对已有的配置进行重新配置。
作为另一种可能的实现方式,第二指示信息指示暂停第一配置,第二指示信息中包括以下信息中至少一项:
第一配置的ID,指示更新的配置;还包括信息类型:暂停配置;还包括配置的区块链:BC ID;还包括接受配置的设备:第二网元的标识,如第二网元在区块链上的标识。
作为又一种可能的实现方式,第二指示信息指示取消第一配置,第二指示信息中包括以下信息中至少一项:
第一配置的ID,指示更新的配置;还包括信息类型:取消配置;还包括配置的区块链:BC ID;还包括接受配置的设备:第二网元的标识,如第二网元在区块链上的标识。
作为又一种可能的实现方式,第二指示信息指示恢复第一配置,第二指示信息中包括以下信息中至少一项:
第一配置的ID,指示更新的配置;还包括信息类型:恢复配置;还包括配置的区块链:BC ID;还包括接受配置的设备:第二网元的标识,如第二网元在区块链上的标识。
另外,本申请中,区块链的信息可以注册在第一网元中,由第一网元进行管理,下面结合图6和图7详细介绍第一网元中注册区块链的信息的情况,图6是本申请实施例提供的又一种通信方法的示意性流程图,包括以下步骤:
S610,第一设备向第一网元发送第一请求,或者说第一网元接收来自第一设备的第一请求。
所述第一请求用于请求在所述第一网元中注册区块链(如,第一区块链),所述第一请求中包括所述第一区块链的信息。应理解,第一区块链只是举例,任意的区块链的信息均可以注册在第一网元上。
其中,所述第一区块链的信息包括以下至少一项:
所述第一区块链的标识、所述第一区块链的地址、所述第一区块链的认证机制、所述第一区块链的成员、所述第一区块链的类型、所述第一区块链上保存的数据类型、第一区块链的状态、核心网网元对应的策略和配置、终端设备对应的策略和配置、或第三方设备对应的策略和配置。
本申请中区块链的信息可以理解为区块链的注册文件,该注册文件中包括以下信息中的至少一种:
区块链基本信息、区块链上链策略信息、或区块链状态管理视图信息。
其中,区块链基本信息包括但不限于:账本ID(Ledger ID)、通道ID(Channel ID)、账本类型(Ledger type)、账本状态(Ledger state)(如,每秒交易数(Transactions per second,TPS)状态、活跃的账户状态等)、账本成员(Members of the Committee)、IP地址(IP addresses)、全节点或记账节点(the full/archive nodes)的正式域名(Fully Qualified Domain Name,FQDN)、共识机制(Consensus mechanism)、账本相关的应用信息(Ledger application related information)、账本结构(Ledger architecture)、认证机制(Authentication mechanism)等;
区块链上链策略信息包括但不限于:需要的信息类型、触发终端设备或接入网设备数据的上链策略(如,基于时间间隔的上链策略、基于预配置的上链策略、基于位置信息的上链策略、选择终端设备策略等)、网元数据上链的策略(如,基于时间间隔、基于预配置策略、基于业务触发、基于网络KPI等等)、是否对第三方开放访问、开放策略等。
链状态管理视图信息包括但不限于:可信执行环境、可信硬件平台执行情况、Linux系统性能监控数据(如,监控Linux系统的CPU占用率、内存占用情况等)、日志数据(如,docker运行日志、fabric运行日志、错误日志等)、监控运维(如,区块链网络状态、区块高度、链码和链上数据等)、业务数据(如,通道数据、交易数据、区块链本身存储的数据等)、合规审计(如,针对联盟链网络的合规审计功能,设定敏感词库防止非法信息上链、设立投诉举报机制,发起者与参与者共同监督、维护联盟链数据安全)、区块链治理(如,各链冻结、解冻、注销账户、更新、或维护等)。
上述的第一设备可以是网管或者第一区块链上的管理节点。
第一网元接收到第一请求之后可以将第一区块链的信息保存在本地,图6所示的方法流程还包括:
S620,第一网元保存第一区块链的信息。
S630,第一网元向所述第一设备发送第一响应,或者说第一设备接收来自第一网元的第一响应。
所述第一响应用于指示所述第一区块链注册成功或者失败。
可选地,第一区块链的信息注册成功之后,可以通过第二请求更新或者删除第一区块链的信息,图6所示的方法流程还可以包括:
S640,第一设备向第一网元发送第二请求,或者说第一网元接收来自第一设备的第二请求。
所述第二请求用于请求更新所述第一区块链的信息或删除所述第一区块链的信息,
在所述第二请求用于请求所述第一网元更新所述第一区块链的信息的情况下,所述第二请求中包括更新后的所述第一区块链的信息;或者,
在所述第二请求用于请求所述第一网元删除(或者说注销)所述第一区块链的信息的情况下,所述第二请求中包括所述第一区块链的标识。
S650,第一网元向所述第一设备发送第二响应,或者说第一设备接收来自第一网元的第二响应。
所述第二响应用于指示所述第一区块链的信息更新或删除成功;或者用于指示所述第一区块链的信息更新或删除失败。
图6所示的方法流程介绍了第一设备主动注册、更新或删除第一区块链的信息,本申
请还提供一种通信方法,第一网元可以主动获取第一区块链的状态,下面结合图7进行说明。图7是本申请实施例提供的又一种通信方法的示意性流程图,包括以下步骤:
S710,第一网元向所述第一设备发送第一查询消息,或者说第一设备接收来自第一网元的第一查询消息。
第一查询消息用于查询区块链(如,第一区块链)的状态。其中,第一区块链的状态包括第一区块链的信息待注册、第一区块链的信息待更新、或第一区块链的信息待删除。应理解,第一区块链只是举例,第一网元可以查询任意的区块链的状态。
S720,第一设备向第一网元发送第一通知消息,或者说第一网元接收来自第一设备的第一通知消息。
在第一区块链的状态为第一区块链的信息待注册的情况下,第一通知消息中包括第一区块链的信息,第一网元保存该第一区块链的信息。
在第一区块链的状态为第一区块链的信息待更新的情况下,第一通知消息中包括第一区块链的信息,第一网元将该第一区块链的信息覆盖本地已保存的第一区块链的信息。
在第一区块链的状态为第一区块链的信息待删除的情况下,第一通知消息中删除指示信息,第一网元将本地已保存的第一区块链的信息删除。
具体地,第一网元本地保存有区块链的信息,核心网网元可以查询第一网元本地保存的区块链的信息,下面结合图8详细介绍核心网网元从第一网元查询区块链的信息的流程,图8是本申请实施例提供的又一种通信方法的示意性流程图,包括以下步骤:
S810,第三网元向第一网元发送第二查询消息,或者说第一网元接收来自第三网元的第二查询消息。
示例性地,第三网元基于区块链(如,第一区块链)的名字或者ID信息检索第一区块链上节点的注册信息和策略信息等。如路由策略、IP地址、第三网元是否需要上报信息及上报策略等。应理解,第一区块链只是举例,第三网元可以查询任意区块链的信息。
第二查询消息用于查询所述第一区块链的信息,所述第二查询消息中包括所述第一区块链的标识。
可选地,第二查询消息中包括所要查询的数据,如全节点的IP地址等。
S820,第一网元验证第三网元。
第一网元确定所述第三网元是否具有查询所述第一区块链的信息的权限。
S830,第一网元向所述第三网元发送第二通知消息,或者说第三网元接收来自第一网元的第二通知消息。
第二通知消息中包括第一区块链的信息,或者指示查询失败的信息。
可选地,在第二通知消息中包括指示查询失败的信息的情况下,该第二通知消息中还可以包括指示查询失败的原因的信息,如验证不通过。
具体地,核心网网元还可以订阅第一网元本地保存的区块链的信息,下面结合图8详细介绍核心网网元从第一网元订阅区块链的信息的流程,图9是本申请实施例提供的又一种通信方法的示意性流程图,包括以下步骤:
S910,第三网元向第一网元发送订阅消息,或者说第一网元接收来自第三网元的订阅消息。
订阅消息用于订阅区块链(如,第一区块链)的信息,所述订阅消息中包括所述第一区块链的标识。应理解,第一区块链只是举例,第三网元可以订阅任意区块链的信息。
S920,第一网元验证第三网元。
第一网元确定所述第三网元是否具有订阅所述第一区块链的信息的权限。
S930,第一网元向所述第三网元发送通知消息,或者说第三网元接收来自第一网元的通知消息。
通知消息中包括指示订阅成功或者订阅失败的信息。
可选地,在通知消息中包括指示订阅失败的信息的情况下,通知消息中还可以包括指示失败原因的信息,如指示第三网元没有订阅权限。
可选地,当第一网元本地保存的某个(或某些)区块链(如,图9中所示的第一区块链)的信息更新的情况下,第一区块链向第一网元发送更新后的区块链的信息。图9所示的方法流程还包括:
S940,第一区块链向第一网元发送更新后的第一区块链的信息,或者说第一网元接收来自第一区块链的更新后的第一区块链的信息。
例如,第一网元本地保存了第一区块链的信息#1,第一区块链的信息#1更新为第一区块链的信息#2的情况下,第一区块链向第一网元发送第一区块链的信息#2,该第一区块链的信息#2覆盖第一网元本地保存的第一区块链的信息#1,作为第一区块链的最新状态信息。
S950,第一网元确定第三网元订阅了第一区块链的信息。
具体地,第一网元能够识别订阅了第一区块链的信息的网元(如,第三网元)。
S960,第一网元向所述第三网元发送更新后的第一区块链的信息,或者说第三网元接收来自第一网元的更新后的第一区块链的信息。
应理解,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
还应理解,在本申请的各个实施例中,如果没有特殊说明以及逻辑冲突,不同的实施例之间的术语和/或描述具有一致性、且可以相互引用,不同的实施例中的技术特征根据其内在的逻辑关系可以组合形成新的实施例。
例如,图5所示的配置流程和图2(或图3、图4)所示的认证流程可以结合,从而在认证之后根据配置访问区块链,能够提高安全保障。
还应理解,在上述一些实施例中,主要以现有的网络架构中的设备为例进行了示例性说明(如核心网设备),应理解,对于设备的具体形式本申请实施例不作限定。例如,在未来可以实现同样功能的设备都适用于本申请实施例。
可以理解的是,上述各个方法实施例中,由设备(如上述核心网设备)实现的方法和操作,也可以由设备的部件(例如芯片或者电路)实现。
以上,结合图2至图9详细说明了本申请实施例提供的通信方法。上述通信方法主要从各个网元之间交互的角度进行了介绍。可以理解的是,各个网元,为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。
本领域技术人员应该可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬
件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
以下,结合图10和图11详细说明本申请实施例提供的通信装置。应理解,装置实施例的描述与方法实施例的描述相互对应,因此,未详细描述的内容可以参见上文方法实施例,为了简洁,部分内容不再赘述。
本申请实施例可以根据上述方法示例对发射端设备或者接收端设备进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。下面以采用对应各个功能划分各个功能模块为例进行说明。
图10是本申请实施例提供的通信装置1000的示意性框图。该装置1000包括收发单元1010和处理单元1020。收发单元1010可以实现相应的通信功能,处理单元1020用于进行数据处理。收发单元1010还可以称为通信接口或通信单元,收发单元1010实现获取信息功能的情况下,还可以称为获取单元。
可选地,该装置1000还可以包括存储单元,该存储单元可以用于存储指令和、或数据,处理单元1020可以读取存储单元中的指令和、或数据,以使得装置实现前述方法实施例。
该装置1000可以用于执行上文方法实施例中设备(如上述核心网设备、区块链等)所执行的动作,这时,该装置1000可以为设备或者可配置于设备的部件(例如芯片或电路),收发单元1010用于执行上文方法实施例中设备的收发相关的操作,处理单元1020用于执行上文方法实施例中设备处理相关的操作。
作为一种设计,该装置1000用于执行上文方法实施例中第一网元(如,LAF)所执行的动作。
作为一种可能的实现方式:
收发单元1010,用于接收来自第二网元的访问请求,该访问请求用于请求访问第一区块链,该访问请求中包括该该第一区块链的标识;
该收发单元1010,还用于向该第二网元发送访问响应,该访问响应中包括用于验证该第二网元是否可以访问该第一区块链的信息,
其中,该第一网元具有授权和管理该第二网元对区块链的访问的功能,该第二网元为该通信系统中除该第一网元之外的核心网网元。
可选地,处理单元1020,用于生成用于验证该第二网元是否可以访问该第一区块链的信息。
可选地,处理单元1020,用于确定该第二网元是否具有访问该第一区块链的权限。
作为另一种可能的实现方式:
收发单元1010,用于接收来自该第二网元的读取请求,该读取请求用于请求获取该第一区块链上的该第一数据,该读取请求中包括该第一区块链的标识;该收发单元1010,还用于向该第一区块链发送该读取请求;该收发单元1010,还用于接收来自该第
一区块链的该第一数据;该收发单元1010,还用于向该第二网元发送该第一数据。
可选地,处理单元1020,用于确定该第二网元是否具有获取该第一区块链上的该第一数据的权限。
可选地,该读取请求中还包括以下信息中的至少一项:交易的标识、区块的标识、或账户的标识。
作为又一种可能的实现方式:
收发单元1010,用于接收来自该第二网元的第二数据;该收发单元1010,还用于向该第一区块链发送该第二数据。
可选地,处理单元1020,用于确定该第二网元具有向该第一区块链发送该第二数据的权限。
作为又一种可能的实现方式:
收发单元1010,用于接收来自第一设备的第一请求,该第一请求用于请求在该第一网元中注册该第一区块链,该第一请求中包括该第一区块链的信息;
该收发单元1010,还用于向该第一设备发送第一响应,该第一响应用于指示该第一区块链注册成功或者失败,其中,该第一区块链的信息包括以下至少一项:该第一区块链的标识、该第一区块链的地址、该第一区块链的认证机制、该第一区块链的成员、该第一区块链的类型、该第一区块链上保存的数据类型、第一区块链的状态、核心网网元对应的策略和配置、终端设备对应的策略和配置、或第三方设备对应的策略和配置。
可选地,该收发单元1010,还用于接收来自该第一设备的第二请求,该第二请求用于请求更新该第一区块链的信息或删除该第一区块链的信息,在该第二请求用于请求该第一网元更新该第一区块链的信息的情况下,该第二请求中包括更新后的该第一区块链的信息;或者,在该第二请求用于请求该第一网元删除该第一区块链的信息的情况下,该第二请求中包括该第一区块链的标识。
作为又一种可能的实现方式:
收发单元1010,用于向该第一设备发送第一查询消息,该第一查询消息用于查询该第一区块链的状态;该收发单元1010,还用于接收来自该第一设备的第一通知消息,该第一通知消息中包括第一区块链的信息,或删除指示信息。
作为又一种可能的实现方式:
收发单元1010,用于收来自第三网元的第二查询消息,该第二查询消息用于查询该第一区块链的信息,该第二查询消息中包括该第一区块链的标识;该收发单元1010,还用于向该第三网元发送该第一区块链的信息,或者指示查询失败的信息。
可选地,处理单元1020,用于确定该第三网元是否具有查询该第一区块链的信息的权限。
作为又一种可能的实现方式:
收发单元1010,用于接收来自第三网元的订阅消息,该订阅消息用于订阅该第一区块链的信息,该订阅消息中包括该第一区块链的标识;该收发单元1010,还用于向该第三网元发送通知消息,该通知消息中包括更新后的该第一区块链的信息,或者包括指示订阅失败的信息。
可选地,处理单元1020,用于确定该第三网元是否具有订阅该第一区块链的信息的
权限。
作为又一种可能的实现方式:
收发单元1010,用于向该第二网元发送第一配置消息,该第一配置消息中包括以下信息中的至少一项:该第一配置对应的标识、该第一区块链的标识、该第二网元的标识、该第一区块链的地址、该第一数据的格式、或该第一数据的类型。
可选地,该第一区块链的信息中包括该第一配置消息,或者处理单元1020,用于根据该第一区块链的信息生成该第一配置消息。
可选地,该收发单元1010,还用于接收来自该第二网元第一指示信息,该第一指示信息用于指示该第一配置成功或者失败;在该第一指示信息指示该第一配置成功的情况下,该收发单元1010,还用于向该第一区块链发送第三响应,该第三响应中包括该第三网元的信息;或者,在该第一指示信息指示该第一配置失败的情况下,该收发单元1010,还用于向该第一区块链发送第三响应,该第三响应用于指示配置失败。
可选地,该收发单元1010,还用于向该第二网元发送第二指示信息;或者,该收发单元1010,还用于接收来自该第二网元的该第二指示信息,其中,该第二指示信息用于指示以下任意一项:指示更新该第一配置、指示该第一配置取消、指示该第一配置暂停、或指示该第一配置恢复。
该装置1000可实现对应于根据本申请实施例的方法实施例中的第一网元执行的步骤或者流程,该装置1000可以包括用于执行方法实施例中的第一网元执行的方法的单元。并且,该装置1000中的各单元和上述其他操作和、或功能分别为了实现方法实施例中的第一网元的相应流程。
其中,当该装置1000用于执行图2中的方法时,收发单元1010可用于执行方法中的收发步骤,如步骤S210、S230、S240、S260;处理单元1020可用于执行方法中的处理步骤,如步骤S220。
当该装置1000用于执行图3中的方法时,收发单元1010可用于执行方法中的收发步骤,如步骤S310、S330、S340、S350;处理单元1020可用于执行方法中的处理步骤,如步骤S320。
当该装置1000用于执行图4中的方法时,收发单元1010可用于执行方法中的收发步骤,如步骤S410、S430、S440、S450;处理单元1020可用于执行方法中的处理步骤,如步骤S420。
当该装置1000用于执行图5中的方法时,收发单元1010可用于执行方法中的收发步骤,如步骤S510、S512、S520、S530、S540;处理单元1020可用于执行方法中的处理步骤,如步骤S511。
当该装置1000用于执行图6中的方法时,收发单元1010可用于执行方法中的收发步骤,如步骤S610、S630、S640、S650;处理单元1020可用于执行方法中的处理步骤,如步骤S620。
当该装置1000用于执行图7中的方法时,收发单元1010可用于执行方法中的收发步骤,如步骤S710、S720;处理单元1020可用于执行方法中的处理步骤。
当该装置1000用于执行图8中的方法时,收发单元1010可用于执行方法中的收发步骤,如步骤S810、S830;处理单元1020可用于执行方法中的处理步骤,如步骤S820。
当该装置1000用于执行图9中的方法时,收发单元1010可用于执行方法中的收发步骤,如步骤S910、S930、S940、S960;处理单元1020可用于执行方法中的处理步骤,如步骤S920、S950。
应理解,各单元执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。
作为另一种设计,该装置1000用于执行上文方法实施例中第二网元(如,LAF)所执行的动作。
作为一种可能的实现方式:
收发单元1010,用于向该第一网元发送访问请求,该访问请求用于请求访问该第一区块链,该访问请求中包括该第三网元的标识和该第一区块链的标识;该收发单元1010,还用于接收来自该第一网元的访问响应,该访问响应中包括用于验证该第二网元是否可以访问该第一区块链的信息,其中,该第一网元具有负责该第二网元对区块链的访问授权和管理功能,该第二网元为该通信系统中除该第一网元之外的核心网网元。
可选地,收发单元1010,用于向该第一区块链发送第三请求,该第三请求用于请求获取该第一区块链上的第一数据,或者用于请求向该第一区块链发送第二数据;该收发单元1010,还用于接收来自该第一区块链的第三响应,该第三响应用于指示该第三请求成功或者失败,其中,该第三请求中包括一下信息中的至少一项:该第二网元的标识、该第一区块链的标识、该第三请求的类型、该第三请求的过期时间、或该第三请求的签名信息。
作为另一种可能的实现方式:
收发单元1010,用于向该第一网元发送读取请求,该读取请求用于请求获取该第一区块链上的该第一数据,该读取请求中包括该第一区块链的标识;该第二网元接收来自该第一网元的该第一数据。
可选地,该读取请求中还包括以下信息中的至少一项:交易的标识、区块的标识、或账户的标识。
作为又一种可能的实现方式:
收发单元1010,用于向第一网元发送第二数据。
作为又一种可能的实现方式:
收发单元1010,用于接收来自第一网元的第一配置消息,该第一配置消息中包括以下信息中的至少一项:该第一配置对应的标识、该第一区块链的标识、该第二网元的标识、该第一区块链的地址、该第一数据的格式、或该第一数据的类型。
可选地,收发单元1010,用于向第一网元发送第一指示信息,该第一指示信息用于指示该第一配置成功或者失败。
可选地,该收发单元1010,还用于接收来自该第一网元的第二指示信息;或者,该收发单元1010,还用于向第一网元发送该第二指示信息,其中,该第二指示信息用于指示以下任意一项:指示更新该第一配置、指示该第一配置取消、指示该第一配置暂停、或指示该第一配置恢复。
该装置1000可实现对应于根据本申请实施例的方法实施例中的第二网元执行的步骤或者流程,该装置1000可以包括用于执行方法实施例中的第二网元执行的方法的单元。
并且,该装置1000中的各单元和上述其他操作和、或功能分别为了实现方法实施例中的第二网元的相应流程。
其中,当该装置1000用于执行图2中的方法时,收发单元1010可用于执行方法中的收发步骤,如步骤S210、S230、S240、S260;处理单元1020可用于执行方法中的处理步骤。
当该装置1000用于执行图3中的方法时,收发单元1010可用于执行方法中的收发步骤,如步骤S310、S350;处理单元1020可用于执行方法中的处理步骤。
当该装置1000用于执行图4中的方法时,收发单元1010可用于执行方法中的收发步骤,如步骤S410、S450;处理单元1020可用于执行方法中的处理步骤。
当该装置1000用于执行图5中的方法时,收发单元1010可用于执行方法中的收发步骤,如步骤S510、S520、S540;处理单元1020可用于执行方法中的处理步骤。
应理解,各单元执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。
作为又一种设计,该装置1000用于执行上文方法实施例中第三网元所执行的动作。
作为一种可能的实现方式:
收发单元1010,用于向第一网元发送第二查询消息,该第二查询消息用于查询第一区块链的信息,该第二查询消息中包括该第一区块链的标识;收发单元1010,用于接收来自该第一网元的该第一区块链的信息,或者指示查询失败的信息。
作为另一种可能的实现方式:
收发单元1010,用于向第一网元发送订阅消息,该订阅消息用于订阅第一区块链的信息,该订阅消息中包括该第一区块链的标识;收发单元1010,用于接收来自该第一网元的通知消息,该通知消息中包括更新后的该第一区块链的信息,或者包括指示订阅失败的信息。
该装置1000可实现对应于根据本申请实施例的方法实施例中的第三网元执行的步骤或者流程,该装置1000可以包括用于执行方法实施例中的第三网元执行的方法的单元。并且,该装置1000中的各单元和上述其他操作和、或功能分别为了实现方法实施例中的第三网元的相应流程。
其中,当该装置1000用于执行图8中的方法时,收发单元1010可用于执行方法中的收发步骤,如步骤S810、S830;处理单元1020可用于执行方法中的处理步骤。
当该装置1000用于执行图9中的方法时,收发单元1010可用于执行方法中的收发步骤,如步骤S910、S930、S960;处理单元1020可用于执行方法中的处理步骤。
作为又一种设计,该装置1000用于执行上文方法实施例中第一设备所执行的动作。
作为一种可能的实现方式:
收发单元1010,用于向第一网元发送第一请求,该第一请求用于请求在该第一网元中注册第一区块链,该第一请求中包括该第一区块链的信息;收发单元1010,用于接收来自该第一网元的第一响应,该第一响应用于指示该第一区块链注册成功或者失败,其中,该第一区块链的信息包括以下至少一项:该第一区块链的标识、该第一区块链的地址、该第一区块链的认证机制、该第一区块链的成员、该第一区块链的类型、该第一区块链上保存的数据类型、第一区块链的状态、核心网网元对应的策略和配置、终端设备
对应的策略和配置、或第三方设备对应的策略和配置。
可选地,该收发单元1010,还用于向该第一网元发送第二请求,该第二请求用于请求更新该第一区块链的信息或删除该第一区块链的信息,在该第二请求用于请求该第一网元更新该第一区块链的信息的情况下,该第二请求中包括更新后的该第一区块链的信息;或者,在该第二请求用于请求该第一网元删除该第一区块链的信息的情况下,该第二请求中包括该第一区块链的标识。
作为另一种可能的实现方式:
收发单元1010,用于向接收来自该第一网元的第一查询消息,该第一查询消息用于查询该第一区块链的状态;该收发单元1010,还用于向该第一网元发送第一通知消息,该第一通知消息中包括第一区块链的信息,或删除指示信息。
该装置1000可实现对应于根据本申请实施例的方法实施例中的第一设备执行的步骤或者流程,该装置1000可以包括用于执行方法实施例中的第一设备执行的方法的单元。并且,该装置1000中的各单元和上述其他操作和、或功能分别为了实现方法实施例中的第一设备的相应流程。
其中,当该装置1000用于执行图6中的方法时,收发单元1010可用于执行方法中的收发步骤,如步骤S610、S630、S640、S650;处理单元1020可用于执行方法中的处理步骤。
当该装置1000用于执行图7中的方法时,收发单元1010可用于执行方法中的收发步骤,如步骤S710、S720;处理单元1020可用于执行方法中的处理步骤。
应理解,各单元执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。
作为又一种设计,该装置1000用于执行上文方法实施例中区块链所执行的动作。
收发单元1010,用于接收来自第二网元的第三请求,该第三请求用于请求获取该第一区块链上的第一数据,或者用于请求向该第一区块链发送第二数据;该第一区块链验证该第三请求确定该第二网元是否具有获取该第一区块链上的第一数据的权限,或者确定该第二网元是否具有向该第一区块链发送第二数据的权限;收发单元1010,用于向该第二网元发送第三响应,该第三响应用于指示该第三请求成功或者失败,其中,该第三请求中包括一下信息中的至少一项:该第二网元的标识、该第一区块链的标识、该第三请求的类型、该第三请求的过期时间、或该第三请求的签名信息。
该装置1000可实现对应于根据本申请实施例的方法实施例中的区块链执行的步骤或者流程,该装置1000可以包括用于执行方法实施例中的区块链执行的方法的单元。并且,该装置1000中的各单元和上述其他操作和、或功能分别为了实现方法实施例中的区块链的相应流程。
其中,当该装置1000用于执行图2中的方法时,收发单元1010可用于执行方法中的收发步骤,如步骤S240、S260;处理单元1020可用于执行方法中的处理步骤,如步骤S250。
当该装置1000用于执行图3中的方法时,收发单元1010可用于执行方法中的收发步骤,如步骤S330、S340;处理单元1020可用于执行方法中的处理步骤。
当该装置1000用于执行图4中的方法时,收发单元1010可用于执行方法中的收发步骤,如步骤S430、S440;处理单元1020可用于执行方法中的处理步骤。
当该装置1000用于执行图5中的方法时,收发单元1010可用于执行方法中的收发步骤,如步骤S512、S530;处理单元1020可用于执行方法中的处理步骤。
应理解,各单元执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。
上文实施例中的处理单元1020可以由至少一个处理器或处理器相关电路实现。收发单元1010可以由收发器或收发器相关电路实现。存储单元可以通过至少一个存储器实现。
如图11所示,本申请实施例还提供一种装置1100。该装置1100包括处理器1110,还可以包括一个或多个存储器1120。处理器1110与存储器1120耦合,存储器1120用于存储计算机程序或指令和/或数据,处理器1110用于执行存储器1120存储的计算机程序或指令和/或数据,使得上文方法实施例中的方法被执行。可选地,该装置1100包括的处理器1110为一个或多个。
可选地,该存储器1120可以与该处理器1110集成在一起,或者分离设置。
可选地,如图11所示,该装置1100还可以包括收发器1130,收发器1130用于信号的接收和/或发送。例如,处理器1110用于控制收发器1130进行信号的接收和/或发送。
作为一种方案,该装置1100用于实现上文方法实施例中由设备(如上述核心网设备、区块链等)执行的操作。
本申请实施例还提供一种计算机可读存储介质,其上存储有用于实现上述方法实施例中由设备(如上述核心网设备、区块链等)执行的方法的计算机指令。
例如,该计算机程序被计算机执行时,使得该计算机可以实现上述方法实施例中由网络设备执行的方法。
本申请实施例还提供一种包含指令的计算机程序产品,该指令被计算机执行时使得该计算机实现上述方法实施例中由设备(如上述核心网设备、区块链等)执行的方法。
本申请实施例还提供一种通信系统,该通信系统包括上文实施例中的设备(如上述核心网设备、区块链等)。
上述提供的任一种装置中相关内容的解释及有益效果均可参考上文提供的对应的方法实施例,此处不再赘述。
应理解,本申请实施例中提及的处理器可以是中央处理单元(central processing unit,CPU),还可以是其他通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
还应理解,本申请实施例中提及的存储器可以是易失性存储器和/或非易失性存储器。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM)。例如,RAM可以用作外部高速缓存。作为示例而非限定,RAM可以包括如下多种形式:静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data
rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。
需要说明的是,当处理器为通用处理器、DSP、ASIC、FPGA或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件时,存储器(存储模块)可以集成在处理器中。
还需要说明的是,本文描述的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的保护范围。
在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。此外,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元实现本申请提供的方案。
另外,在本申请各个实施例中的各功能单元可以集成在一个单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。例如,所述计算机可以是个人计算机,服务器,或者网络设备等。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘(solid state disk,SSD)等。例如,前述的可用介质可以包括但不限于:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。
Claims (29)
- 一种通信方法,其特征在于,应用于包括至少一个区块链的通信系统,所述方法包括:第一网元接收来自第二网元的访问请求,所述访问请求用于请求访问第一区块链,所述访问请求中包括所述第一区块链的标识;所述第一网元向所述第二网元发送访问响应,所述访问响应中包括用于验证所述第二网元是否可以访问所述第一区块链的信息,其中,所述第一网元具有授权和管理所述第二网元访问区块链的功能,所述第二网元为所述通信系统中除所述第一网元之外的核心网网元。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:所述第一网元确定所述第二网元是否具有访问所述第一区块链的权限。
- 根据权利要求1或2所述的方法,其特征在于,所述方法还包括:所述第一网元接收来自所述第二网元的读取请求,所述读取请求用于请求获取所述第一区块链上的所述第一数据,所述读取请求中包括所述第一区块链的标识;所述第一网元向所述第一区块链发送所述读取请求;所述第一网元接收来自所述第一区块链的所述第一数据;所述第一网元向所述第二网元发送所述第一数据。
- 根据权利要求3所述的方法,其特征在于,所述读取请求中还包括以下信息中的至少一项:交易的标识、区块的标识、或账户的标识。
- 根据权利要求1至4中任一项所述的方法,其特征在于,所述方法还包括:所述第一网元接收来自所述第二网元的第二数据;所述第一网元向所述第一区块链发送所述第二数据。
- 根据权利要求5所述的方法,其特征在于,在所述第一网元向所述第一区块链发送所述第二数据之前,所述方法还包括:所述第一网元确定所述第二网元具有向所述第一区块链发送所述第二数据的权限。
- 根据权利要求1至4中任一项所述的方法,其特征在于,所述方法还包括:所述第一网元接收来自第一设备的第一请求,所述第一请求用于请求在所述第一网元中注册所述第一区块链,所述第一请求中包括所述第一区块链的信息;所述第一网元向所述第一设备发送第一响应,所述第一响应用于指示所述第一区块链注册成功或者失败,其中,所述第一区块链的信息包括以下至少一项:所述第一区块链的标识、所述第一区块链的地址、所述第一区块链的认证机制、所述第一区块链的成员、所述第一区块链的类型、所述第一区块链上保存的数据类型、第一区块链的状态、核心网网元对应的策略和配置、终端设备对应的策略和配置、或第三方设备对应的策略和配置。
- 根据权利要求7所述的方法,其特征在于,所述方法还包括:所述第一网元接收来自所述第一设备的第二请求,所述第二请求用于请求更新所述第一区块链的信息或删除所述第一区块链的信息,在所述第二请求用于请求所述第一网元更新所述第一区块链的信息的情况下,所述第二请求中包括更新后的所述第一区块链的信息;或者,在所述第二请求用于请求所述第一网元删除所述第一区块链的信息的情况下,所述第二请求中包括所述第一区块链的标识。
- 根据权利要求7或8所述的方法,其特征在于,所述方法还包括:所述第一网元向所述第一设备发送第一查询消息,所述第一查询消息用于查询所述第一区块链的状态。
- 根据权利要求7至9中任一项所述的方法,其特征在于,所述方法还包括:所述第一网元接收来自第三网元的第二查询消息,所述第二查询消息用于查询所述第一区块链的信息,所述第二查询消息中包括所述第一区块链的标识;所述第一网元向所述第三网元发送所述第一区块链的信息,或者指示查询失败的信息。
- 根据权利要求10所述的方法,其特征在于,所述方法还包括:所述第一网元确定所述第三网元是否具有查询所述第一区块链的信息的权限。
- 根据权利要求7至11中任一项所述的方法,其特征在于,所述方法还包括:所述第一网元接收来自第三网元的订阅消息,所述订阅消息用于订阅所述第一区块链的信息,所述订阅消息中包括所述第一区块链的标识;所述第一网元向所述第三网元发送通知消息,所述通知消息中包括更新后的所述第一区块链的信息,或者包括指示订阅失败的信息。
- 根据权利要求12所述的方法,其特征在于,所述方法还包括:所述第一网元确定所述第三网元是否具有订阅所述第一区块链的信息的权限。
- 根据权利要求1至13中任一项所述的方法,其特征在于,所述方法还包括:所述第一网元向所述第二网元发送第一配置消息,所述第一配置消息中包括以下信息中的至少一项:所述第一配置对应的标识、所述第一区块链的标识、所述第二网元的标识、所述第一区块链的地址、所述第一数据的格式、或所述第一数据的类型。
- 根据权利要求14所述的方法,其特征在于,所述第一区块链的信息中包括所述第一配置消息,或者所述方法还包括:所述第一网元根据所述第一区块链的信息生成所述第一配置消息。
- 根据权利要求14或15所述的方法,其特征在于,所述方法还包括:所述第一网元接收来自所述第二网元第一指示信息,所述第一指示信息用于指示所述第一配置成功或者失败;在所述第一指示信息指示所述第一配置成功的情况下,所述方法还包括:所述第一网元向所述第一区块链发送第三响应,所述第三响应中包括所述第三网元的信息;或者,在所述第一指示信息指示所述第一配置失败的情况下,所述方法还包括:所述第一网元向所述第一区块链发送第三响应,所述第三响应用于指示配置失败。
- 根据权利要求14至16中任一项所述的方法,其特征在于,所述方法还包括:所述第一网元向所述第二网元发送第二指示信息;或者,所述第一网元接收来自所述第二网元的所述第二指示信息,其中,所述第二指示信息用于指示以下任意一项:指示更新所述第一配置、指示所述第一配置取消、指示所述第一配置暂停、或指示所述第一配置恢复。
- 一种通信方法,其特征在于,应用于包括至少一个区块链的通信系统,所述方法包括:第二网元向所述第一网元发送访问请求,所述访问请求用于请求访问所述第一区块链,所述访问请求中包括所述第三网元的标识和所述第一区块链的标识;第二网元接收来自所述第一网元的访问响应,所述访问响应用于指示所述第四网元是否可以访问所述第一区块链,其中,所述第一网元具有负责所述第二网元对区块链的访问授权和管理功能,所述第二网元为所述通信系统中除所述第一网元之外的核心网网元。
- 根据权利要求18所述的方法,其特征在于,在所述第二网元具有访问所述第一区块链的信息的权限的情况下,所述方法还包括:所述第二网元向所述第一网元发送读取请求,所述读取请求用于请求获取所述第一区块链上的所述第一数据,所述读取请求中包括所述第一区块链的标识;所述第二网元接收来自所述第一网元的所述第一数据。
- 根据权利要求19所述的方法,其特征在于,所述读取请求中还包括以下信息中的至少一项:交易的标识、区块的标识、或账户的标识。
- 根据权利要求18至20中任一项所述的方法,其特征在于,在所述第二网元具有访问所述第一区块链的信息的权限的情况下,所述方法还包括:所述第二网元向所述第一网元发送第二数据。
- 根据权利要求18至21中任一项所述的方法,其特征在于,所述方法还包括:所述第二网元向所述第一区块链发送第三请求,所述第三请求用于请求获取所述第一区块链上的第一数据,或者用于请求向所述第一区块链发送第二数据;所述第二网元接收来自所述第一区块链的第三响应,所述第三响应用于指示所述第三请求成功或者失败,其中,所述第三请求中包括一下信息中的至少一项:所述第二网元的标识、所述第一区块链的标识、所述第三请求的类型、所述第三请求的过期时间、或所述第三请求的签名信息。
- 一种通信方法,其特征在于,应用于包括至少一个区块链的通信系统,所述方法包括:第一区块链接收来自第二网元的第三请求,所述第三请求用于请求获取所述第一区块链上的第一数据,或者用于请求向所述第一区块链发送第二数据;所述第一区块链验证所述第三请求确定所述第二网元是否具有获取所述第一区块链上的第一数据的权限,或者确定所述第二网元是否具有向所述第一区块链发送第二数据 的权限;所述第一区块链向所述第二网元发送第三响应,所述第三响应用于指示所述第三请求成功或者失败,其中,所述第三请求中包括一下信息中的至少一项:所述第二网元的标识、所述第一区块链的标识、所述第三请求的类型、所述第三请求的过期时间、或所述第三请求的签名信息。
- 一种通信装置,其特征在于,包括:用于执行如权利要求1至17中任一项所示的方法的单元或模块。
- 一种通信装置,其特征在于,包括:用于执行如权利要求18至22中任一项所示的方法的单元或模块。
- 一种通信装置,其特征在于,包括:用于执行如权利要求23所示的方法的单元或模块。
- 一种通信系统,其特征在于,包括:至少一个如权利要求24所述的通信装置、至少一个如权利要求25所述的通信装置和至少一个如权利要求26所述的通信装置。
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储程序代码,所述程序代码在通信装置上运行时,如权利要求1-22中任意一项所述的方法被执行。
- 一种包含指令的计算机程序产品,其特征在于,所述计算机程序产品在计算机上运行时,如权利要求1-22中任意一项所述的方法被执行。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210216217.0A CN116782224A (zh) | 2022-03-07 | 2022-03-07 | 通信方法和装置 |
CN202210216217.0 | 2022-03-07 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023169122A1 true WO2023169122A1 (zh) | 2023-09-14 |
Family
ID=87937108
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2023/074964 WO2023169122A1 (zh) | 2022-03-07 | 2023-02-08 | 通信方法和装置 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN116782224A (zh) |
WO (1) | WO2023169122A1 (zh) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112449350A (zh) * | 2019-08-30 | 2021-03-05 | 华为技术有限公司 | 一种利用区块链为终端提供业务的方法、装置及系统 |
CN112449343A (zh) * | 2019-08-30 | 2021-03-05 | 华为技术有限公司 | 用户身份标识管理的方法、设备及系统 |
CN112787837A (zh) * | 2019-11-07 | 2021-05-11 | 华为技术有限公司 | 数据共享的方法、设备及系统 |
CN112866981A (zh) * | 2019-11-08 | 2021-05-28 | 华为技术有限公司 | 一种签约数据的管理方法、装置 |
CN113939029A (zh) * | 2021-09-22 | 2022-01-14 | 中国联合网络通信集团有限公司 | 一种网络切片的生成方法、装置、设备及存储介质 |
-
2022
- 2022-03-07 CN CN202210216217.0A patent/CN116782224A/zh active Pending
-
2023
- 2023-02-08 WO PCT/CN2023/074964 patent/WO2023169122A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112449350A (zh) * | 2019-08-30 | 2021-03-05 | 华为技术有限公司 | 一种利用区块链为终端提供业务的方法、装置及系统 |
CN112449343A (zh) * | 2019-08-30 | 2021-03-05 | 华为技术有限公司 | 用户身份标识管理的方法、设备及系统 |
CN112787837A (zh) * | 2019-11-07 | 2021-05-11 | 华为技术有限公司 | 数据共享的方法、设备及系统 |
CN112866981A (zh) * | 2019-11-08 | 2021-05-28 | 华为技术有限公司 | 一种签约数据的管理方法、装置 |
CN113939029A (zh) * | 2021-09-22 | 2022-01-14 | 中国联合网络通信集团有限公司 | 一种网络切片的生成方法、装置、设备及存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN116782224A (zh) | 2023-09-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020220865A1 (zh) | 网络功能服务的身份校验方法及相关装置 | |
WO2021037175A1 (zh) | 一种网络切片的管理方法及相关装置 | |
WO2021017550A1 (zh) | 一种事件报告的发送方法、装置及系统 | |
US20180316562A1 (en) | Network policy configuration | |
WO2021135187A1 (zh) | 一种切片控制方法及装置 | |
WO2022222745A1 (zh) | 一种通信方法及装置 | |
AU2018340618A1 (en) | Parameter protection method and device, and system | |
WO2021138822A1 (zh) | 签约信息获取方法及装置 | |
CN116113936A (zh) | 针对启用区块链的无线系统中的交易管理的方法、架构、装置和系统 | |
WO2023011630A1 (zh) | 授权验证的方法及装置 | |
KR102500594B1 (ko) | 통신 네트워크에서의 서비스 계층 메시지 템플릿들 | |
WO2020253343A1 (zh) | 一种管理服务的发现方法及装置 | |
WO2024149148A1 (zh) | 一种通信方法、通信装置和通信系统 | |
WO2023213177A1 (zh) | 一种通信方法及装置 | |
WO2023246942A1 (zh) | 通信方法及装置 | |
WO2023143244A1 (zh) | 终端管理方法和核心网设备 | |
US20230409734A1 (en) | Systems and methods for secure aggregating and reporting of monitored data | |
WO2023169122A1 (zh) | 通信方法和装置 | |
WO2023169127A1 (zh) | 通信方法、终端设备和通信装置 | |
WO2022032525A1 (zh) | 一种组密钥分发方法及装置 | |
WO2024040512A1 (zh) | 区块链的创建方法及相关装置 | |
WO2024037215A1 (zh) | 通信方法及装置 | |
WO2024099016A1 (zh) | 一种通信方法及装置 | |
WO2024032226A1 (zh) | 通信方法和通信装置 | |
WO2023030077A1 (zh) | 一种通信方法、通信装置及通信系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23765700 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2023765700 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2023765700 Country of ref document: EP Effective date: 20240912 |