WO2023225878A1 - 一种ai网络功能的重新认证授权方法/装置/设备及存储介质 - Google Patents

一种ai网络功能的重新认证授权方法/装置/设备及存储介质 Download PDF

Info

Publication number
WO2023225878A1
WO2023225878A1 PCT/CN2022/094806 CN2022094806W WO2023225878A1 WO 2023225878 A1 WO2023225878 A1 WO 2023225878A1 CN 2022094806 W CN2022094806 W CN 2022094806W WO 2023225878 A1 WO2023225878 A1 WO 2023225878A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication
network
network element
aaa
nssaaf
Prior art date
Application number
PCT/CN2022/094806
Other languages
English (en)
French (fr)
Inventor
陈栋
何智斌
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to PCT/CN2022/094806 priority Critical patent/WO2023225878A1/zh
Publication of WO2023225878A1 publication Critical patent/WO2023225878A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions

Definitions

  • the present disclosure relates to the field of communication technology, and in particular to a re-authentication authorization method/device/equipment and storage medium for AI network functions.
  • the network can use AI network functions to achieve a higher level of autonomy, thereby reducing costs and enhancing intelligent effects.
  • AI Artificial Intelligence, artificial intelligence
  • the AI network function may need to be re-authenticated and authorized after the initial registration is established (for example, the AI network function needs to be re-authenticated and authorized every time it is regularly checked). Therefore, there is an urgent need for a re-authentication and authorization method for the AI network function. .
  • the re-authentication and authorization method/device/equipment and storage medium of AI network functions proposed in this disclosure are used for re-authentication and authorization of AI network functions.
  • embodiments of the present disclosure provide a re-authentication and authorization method, which is executed by the NSSAAF network element and includes:
  • re-authentication authorization request sent by the authentication and authorization server AAA-S network element, where the re-authentication authorization request includes artificial intelligence function selection auxiliary information AIFSAI and a first identifier used to identify the user equipment UE served by the AI network function;
  • This disclosure provides a re-authentication and authorization method for AI network functions, which can be used to re-authenticate and authorize AI network functions, thereby ensuring the security of AI network functions and enabling AI network functions to provide security and stability for UEs. local service.
  • embodiments of the present disclosure provide a re-authentication and authorization method, which is executed by the AAA-S network element and includes:
  • the re-authentication authorization request includes the AIFSAI and a first identifier used to identify the UE served by the AI network function.
  • embodiments of the present disclosure provide a re-authentication and authorization method, which is executed by UDM and includes:
  • Search is performed based on the AIFSAI and the first identifier, and the search result is sent to the NSSAAF network element.
  • embodiments of the present disclosure provide a re-authentication and authorization method, which is executed by AMF and includes:
  • embodiments of the present disclosure provide a re-authentication authorization method, which is executed by a UE and includes:
  • the re-authentication authorization message is used to instruct the NSSAAF to re-authenticate and authorize the AI network function.
  • embodiments of the present disclosure provide a communication device, which is configured in an NSSAAF network element and includes:
  • Transceiver module configured to receive a re-authentication authorization request sent by the authentication and authorization server AAA-S network element.
  • the re-authentication authorization request includes artificial intelligence function selection auxiliary information AIFSAI and a user equipment UE used to identify the AI network function. first identification;
  • a processing module configured to re-authenticate and authorize the AI network function based on the AIFSAI and the first identification.
  • an embodiment of the present disclosure provides a communication device, which is configured in an AAA-S network element and includes:
  • the transceiver module is configured to send a re-authentication authorization request to the NSSAAF network element, where the re-authentication authorization request includes the AIFSAI and a first identifier used to identify the UE served by the AI network function.
  • an embodiment of the present disclosure provides a communication device configured in UDM, including
  • a transceiver module configured to receive a search request sent by the NSSAAF network element, where the search request includes the AIFSAI and a first identifier used to identify the UE served by the AI network function;
  • a processing module configured to perform a search based on the AIFSAI and the first identifier, and send the search result to the NSSAAF network element.
  • an embodiment of the present disclosure provides a communication device configured in an AMF, including:
  • the transceiver module is configured to receive the re-authentication authorization message sent by the NSSAAF network element.
  • the re-authentication authorization message is used to instruct the NSSAAF to re-authenticate and authorize the AI network function.
  • embodiments of the present disclosure provide a communication device, which is configured in a UE and includes:
  • a transceiver module configured to receive a re-authentication authorization message, where the re-authentication authorization message is used to instruct the NSSAAF to re-authenticate and authorize the AI network function.
  • an embodiment of the present disclosure provides a communication device.
  • the communication device includes a processor.
  • the processor calls a computer program in a memory, it executes the method described in the first aspect.
  • an embodiment of the present disclosure provides a communication device.
  • the communication device includes a processor.
  • the processor calls a computer program in a memory, it executes the method described in the second aspect.
  • an embodiment of the present disclosure provides a communication device.
  • the communication device includes a processor.
  • the processor calls a computer program in a memory, it executes the method described in the third aspect.
  • an embodiment of the present disclosure provides a communication device.
  • the communication device includes a processor.
  • the processor calls a computer program in a memory, it executes the method described in the fourth aspect.
  • an embodiment of the present disclosure provides a communication device.
  • the communication device includes a processor.
  • the processor calls a computer program in a memory, it executes the method described in the fifth aspect.
  • an embodiment of the present disclosure provides a communication device.
  • the communication device includes a processor and a memory, and a computer program is stored in the memory; the processor executes the computer program stored in the memory, so that the communication device Execute the method described in the first aspect above.
  • an embodiment of the present disclosure provides a communication device.
  • the communication device includes a processor and a memory, and a computer program is stored in the memory; the processor executes the computer program stored in the memory, so that the communication device Perform the method described in the second aspect above.
  • an embodiment of the present disclosure provides a communication device.
  • the communication device includes a processor and a memory, and a computer program is stored in the memory; the processor executes the computer program stored in the memory, so that the communication device Perform the method described in the third aspect above.
  • an embodiment of the present disclosure provides a communication device.
  • the communication device includes a processor and a memory, and a computer program is stored in the memory; the processor executes the computer program stored in the memory, so that the communication device Execute the method described in the fourth aspect above.
  • an embodiment of the present disclosure provides a communication device.
  • the communication device includes a processor and a memory, and a computer program is stored in the memory; the processor executes the computer program stored in the memory, so that the communication device Execute the method described in the fifth aspect above.
  • an embodiment of the present disclosure provides a communication device.
  • the device includes a processor and an interface circuit.
  • the interface circuit is used to receive code instructions and transmit them to the processor.
  • the processor is used to run the code instructions to The device is caused to perform the method described in the first aspect.
  • an embodiment of the present disclosure provides a communication device.
  • the device includes a processor and an interface circuit.
  • the interface circuit is used to receive code instructions and transmit them to the processor.
  • the processor is used to run the code instructions to The device is caused to perform the method described in the second aspect above.
  • an embodiment of the present disclosure provides a communication device.
  • the device includes a processor and an interface circuit.
  • the interface circuit is used to receive code instructions and transmit them to the processor.
  • the processor is used to run the code instructions to The device is caused to perform the method described in the third aspect above.
  • an embodiment of the present disclosure provides a communication device.
  • the device includes a processor and an interface circuit.
  • the interface circuit is used to receive code instructions and transmit them to the processor.
  • the processor is used to run the code instructions to The device is caused to perform the method described in the fourth aspect.
  • an embodiment of the present disclosure provides a communication device.
  • the device includes a processor and an interface circuit.
  • the interface circuit is used to receive code instructions and transmit them to the processor.
  • the processor is used to run the code instructions to The device is caused to perform the method described in the fifth aspect.
  • embodiments of the present disclosure provide a communication system, which includes the communication device described in the sixth aspect to the communication device described in the tenth aspect, or the system includes the communication device described in the eleventh aspect.
  • the communication device described in the fifteenth aspect or the system includes the communication device described in the sixteenth aspect to the communication device described in the twentieth aspect, or the system includes the communication device described in the twenty-first aspect Communication device to the communication device described in the twenty-fifth aspect.
  • embodiments of the present invention provide a computer-readable storage medium for storing instructions used by the above-mentioned network device.
  • the terminal device is caused to execute the above-mentioned first aspect to the third aspect. Methods described in any of the five aspects.
  • the present disclosure also provides a computer program product including a computer program, which, when run on a computer, causes the computer to execute the method described in any one of the above-mentioned first to fifth aspects.
  • the present disclosure provides a chip system.
  • the chip system includes at least one processor and an interface, and is used to support a network device to implement the functions involved in the method described in any one of the first to fifth aspects. , for example, determine or process at least one of the data and information involved in the above method.
  • the chip system further includes a memory, and the memory is used to store necessary computer programs and data of the source secondary node.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • the present disclosure provides a computer program that, when run on a computer, causes the computer to perform the method described in any one of the above-mentioned first to fifth aspects.
  • Figure 1 is a schematic architectural diagram of a communication system provided by an embodiment of the present disclosure
  • Figure 2 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by another embodiment of the present disclosure
  • Figure 3 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by yet another embodiment of the present disclosure
  • Figure 4 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by yet another embodiment of the present disclosure
  • Figure 5 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by another embodiment of the present disclosure
  • Figure 6 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by yet another embodiment of the present disclosure
  • Figure 7 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by another embodiment of the present disclosure.
  • Figure 8 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by an embodiment of the present disclosure
  • Figure 9 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by another embodiment of the present disclosure.
  • Figure 10 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by yet another embodiment of the present disclosure
  • Figure 11 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by another embodiment of the present disclosure.
  • Figure 12 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by another embodiment of the present disclosure.
  • Figure 13 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by yet another embodiment of the present disclosure
  • Figure 14 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by another embodiment of the present disclosure.
  • Figure 15 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by yet another embodiment of the present disclosure
  • Figure 16 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by another embodiment of the present disclosure.
  • Figure 17 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by another embodiment of the present disclosure.
  • Figure 18 is a schematic flowchart of an interactive method for re-authentication and authorization of AI network functions provided by yet another embodiment of the present disclosure
  • Figure 19 is a schematic structural diagram of a communication device provided by an embodiment of the present disclosure.
  • Figure 20 is a schematic structural diagram of a communication device provided by another embodiment of the present disclosure.
  • Figure 21 is a schematic structural diagram of a communication device provided by an embodiment of the present disclosure.
  • Figure 22 is a schematic structural diagram of a communication device provided by another embodiment of the present disclosure.
  • Figure 23 is a schematic structural diagram of a communication device provided by an embodiment of the present disclosure.
  • Figure 24 is a block diagram of a user equipment provided by an embodiment of the present disclosure.
  • Figure 25 is a block diagram of a network side device provided by an embodiment of the present disclosure.
  • first, second, third, etc. may be used to describe various information in the embodiments of the present disclosure, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from each other.
  • first information may also be called second information, and similarly, the second information may also be called first information.
  • the words "if” and “if” as used herein may be interpreted as “when” or “when” or “in response to determining.”
  • AI is a new technical science that studies and develops theories, methods, technologies and application systems for simulating, extending and expanding human intelligence.
  • the 6G network is a fully connected world integrating terrestrial wireless and satellite communications. By integrating satellite communications into 6G mobile communications, seamless global coverage is achieved, and network signals can reach any remote village. In addition, with the joint support of the global satellite positioning system, telecommunications satellite system, earth image satellite system and 6G terrestrial network, the full coverage network of ground and air can also help humans predict weather and quickly respond to natural disasters.
  • AMF Access and Mobility Management Function
  • AMF network element performs registration, connection, reachability, and mobility management. It provides a session management message transmission channel for terminal equipment and SMF network elements, and provides authentication and authentication functions for terminal equipment when accessing; it is the access point for terminal equipment and the wireless core network control plane.
  • AAA-S Authentication and Authorization Server
  • AAA-S network element is used for authentication and authorization processing of AI functions, etc.
  • NSSAAF Network Slice-Spwcific Authentication and Authorization Function
  • the PLMN Public Land Mobile Network, public land mobile network
  • S-NSSAI single network slice selection
  • HPLMN Home Public Land Mobile Network, local public land mobile network
  • Single Network Slice Selection Assistance Information performs authentication and authorization of specific network slices.
  • UDM is used for the management of user identification, contract data, authentication data, and user service network element registration management.
  • the various network elements/functions involved in the embodiments of the present disclosure can be either an independent hardware device or a function implemented by computer code within the hardware device. This is not the case in the embodiments of the present disclosure. limited.
  • FIG. 1 is a schematic architectural diagram of a communication system provided by an embodiment of the present disclosure.
  • the communication system may include but is not limited to one network device and one terminal device.
  • the number and form of devices shown in Figure 1 are only for examples and do not constitute a limitation on the embodiments of the present disclosure. In actual applications, two or more devices may be included. Network equipment, two or more terminal devices.
  • the communication system shown in Figure 1 includes a network device 11 and a terminal device 12 as an example.
  • LTE long term evolution
  • 5th generation fifth generation
  • 5G new radio (NR) system 5th generation new radio
  • the network device 11 in the embodiment of the present disclosure is an entity on the network side that is used to transmit or receive signals.
  • the network device 11 may be an evolved base station (evolved NodeB, eNB), a transmission reception point (TRP), a next generation base station (next generation NodeB, gNB) in an NR system, or other base stations in future mobile communication systems. Base stations or access nodes in wireless fidelity (WiFi) systems, etc.
  • the embodiments of the present disclosure do not limit the specific technologies and specific equipment forms used by network equipment.
  • the network equipment provided by the embodiments of the present disclosure may be composed of a centralized unit (CU) and a distributed unit (DU).
  • the CU may also be called a control unit (control unit).
  • CU-DU is used.
  • the structure can separate the protocol layers of network equipment, such as base stations, and place some protocol layer functions under centralized control on the CU. The remaining part or all protocol layer functions are distributed in the DU, and the CU centrally controls the
  • the terminal device 12 in the embodiment of the present disclosure is an entity on the user side for receiving or transmitting signals, such as a mobile phone.
  • Terminal equipment can also be called terminal equipment (terminal), user equipment (user equipment, UE), mobile station (mobile station, MS), mobile terminal equipment (mobile terminal, MT), etc.
  • the terminal device can be a car with communication functions, a smart car, a mobile phone, a wearable device, a tablet computer (Pad), a computer with wireless transceiver functions, a virtual reality (VR) terminal device, an augmented reality (augmented reality (AR) terminal equipment, wireless terminal equipment in industrial control, wireless terminal equipment in self-driving, wireless terminal equipment in remote medical surgery, smart grid ( Wireless terminal equipment in smart grid, wireless terminal equipment in transportation safety, wireless terminal equipment in smart city, wireless terminal equipment in smart home, etc.
  • the embodiments of the present disclosure do not limit the specific technology and specific equipment form used by the terminal equipment.
  • FIG. 2 is a schematic flow chart of a re-authentication and authorization method for AI network functions provided by an embodiment of the present disclosure. The method is executed by the NSSAAF network element. As shown in Figure 2, the re-authentication and authorization method for AI network functions may include the following. step:
  • Step 201 Receive the re-authentication authorization request sent by the AAA-S network element.
  • the re-authentication and authorization method in the present disclosure can be performed through the above-mentioned NSSAAF network element, and, for example, the NSSAAF network element can be AIAAF (Artificial Intelligence Authentication and Authorization Function, artificial Intelligent authentication and authorization functions) network elements.
  • AIAAF Artificial Intelligence Authentication and Authorization Function, artificial Intelligent authentication and authorization functions
  • the AI network function after the initial registration of the AI network function is completed, the AI network function usually needs to be re-authenticated and authorized (for example, when the AI network function needs to be regularly updated or parameters changed, etc.) , the AI network function needs to be re-authenticated and authorized).
  • the AAA-S network element will send a re-authentication and authorization request to the AIAAF network element.
  • the above-mentioned re-authentication authorization request may include AIFSAI (AI Function Selection Assistance Information, artificial intelligence function selection assistance information) and UE (User Equipment, user equipment) used to identify the AI network function. device) first identifier.
  • AIFSAI AI Function Selection Assistance Information
  • UE User Equipment, user equipment
  • the above-mentioned first identifier may be a GPSI (Generic Public Subscription Identifier, Universal Public User Identifier) identifier.
  • the above-mentioned AIFSAI may include a second identifier used to identify the AI network function, where the second identifier may be, for example, the AI service ID (Identifier, identification) corresponding to the AI network function ( That is, at least one of AI Service ID) and AI service type (AI Service type).
  • the AI service ID Identifier, identification
  • AI Service type AI Service type
  • the above method of receiving a re-authentication authorization request sent by the AAA-S network element may include: receiving an AAA re-authentication authorization request sent directly by the AAA-S network element (for example, it may For AAA Protocol Re-Auth Request).
  • the AAA re-authentication authorization request includes the AIFSAI and the first identifier.
  • the method for sending the re-authentication authorization request sent by the AAA-S network element may include: receiving the AAA re-authentication authorization request transparently transmitted by the AAA-S network element through AAA-P.
  • the AAA re-authentication authorization request may include the AIFSAI and the first identifier.
  • the re-authentication authorization request when the re-authentication authorization request is sent by the AAA-S network element to the AIAAF under the premise that "parameter changes need to be made to the AI network function"
  • the re-authentication authorization request may also include re-authentication parameters corresponding to the re-authentication authorization.
  • the re-authentication parameters may include: parameters that need to be changed in the AI network function, and the changed results corresponding to the parameters that need to be changed. , so that subsequent AIAAF network elements can re-authenticate the AI network function based on this re-authentication parameter.
  • the re-authentication authorization request when the re-authentication authorization request is sent from the AAA-S network element to the AIAAF network element on the premise that "the AI network function needs to be regularly updated", the re-authentication authorization request can only include the AIFSAI and the first logo.
  • Step 202 Re-authenticate and authorize the AI network function based on the AIFSAI and the first identity.
  • the content of the AIAAF network element re-authenticating and authorizing the AI network function based on the AIFSAI and the first identity will be introduced in detail in subsequent embodiments.
  • the NSSAAF network element will receive the re-authentication and authorization request sent by the AAA-S network element.
  • the re-authentication and authorization request includes AIFSAI and for identification.
  • the NSSAAF network element will re-authenticate and authorize the AI network function based on the AIFSAI and the first identifier.
  • the present disclosure provides a re-authentication and authorization method for AI network functions, which can be used to re-authenticate and authorize AI network functions, thereby ensuring the security of the AI network functions and enabling the AI network functions to provide UEs with Serve safely and stably.
  • FIG. 3 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by an embodiment of the present disclosure. The method is executed by the NSSAAF network element. As shown in Figure 3, the re-authentication and authorization method for AI network functions may include the following. step:
  • Step 301 Receive the re-authentication authorization request sent by the AAA-S network element.
  • step 201 For a detailed introduction to the above step 201, please refer to the description of the above embodiments, and the embodiments of the present disclosure will not be described again here.
  • Step 302 Send a search request to UDM (Unified Data Management, unified data management function).
  • UDM Unified Data Management, unified data management function
  • the above search request may include AIFSAI and the first identifier.
  • the AIAAF network element may specifically send a search request to the UDM through Nudm_UECM_Get.
  • the UDM can search based on the AIFSAI and the first identifier, and send the search result to the AIAAF network element. Specifically, in one embodiment of the present disclosure, the UDM can first search whether the second identifier exists in the UDM. If the second identifier exists in the UDM, it means that the AI network function corresponding to the second identifier has been successfully registered. Then it can be re-authorized and authenticated.
  • the UDM can further search for the AMF ID of the current service AMF (Access and Mobility Management Function Identity, Access and Mobility Management Function Identity) of the UE corresponding to the first identification based on the first identification, and send it to
  • the AIAAF network element sends the AMF ID; if the second identifier does not exist in the UDM, it means that the AI network function corresponding to the second identifier has not been registered successfully, and it cannot be re-authorized and authenticated.
  • the UDM will send a lookup to the AIAAF network element. Failure indication.
  • Step 303 Receive the search results sent by UDM.
  • the search result may include an AMF ID or a search failure indication.
  • Step 304 In response to the search result including the AMF ID, re-authenticate and authorize the AI network function.
  • the search result includes the AMF ID
  • the AI network function can be re-authenticated.
  • the AIAAF can directly re-authenticate and authorize the AI network function.
  • the AIAAF when the AIAAF re-authenticates and authorizes the AI network function, if the re-authentication authorization request received in step 201 above contains re-authentication parameters, the AIAAF can re-authentication based on the Parameters are used to re-authenticate and authorize the AI network function. For example, based on the re-authentication parameters, the parameters that need to be changed in the AI network function and the changed results corresponding to the parameters that need to be changed are determined, and then the parameters that need to be changed are directly Parameters are changed. And, if the re-authentication authorization request received in step 201 above does not contain re-authentication parameters, the AIAAF network element only needs to perform regular update checks on the AI network function to update the service log corresponding to the AI network function.
  • the NSSAAF network element will receive the re-authentication and authorization request sent by the AAA-S network element.
  • the re-authentication and authorization request includes AIFSAI and for identification.
  • the NSSAAF network element will re-authenticate and authorize the AI network function based on the AIFSAI and the first identifier.
  • the present disclosure provides a re-authentication and authorization method for AI network functions, which can be used to re-authenticate and authorize AI network functions, thereby ensuring the security of the AI network functions and enabling the AI network functions to provide UEs with Serve safely and stably.
  • FIG. 4 is a schematic flow chart of a re-authentication and authorization method for AI network functions provided by an embodiment of the present disclosure. The method is executed by the NSSAAF network element. As shown in Figure 4, the re-authentication and authorization method for AI network functions may include the following. step:
  • Step 401 Receive the re-authentication authorization request sent by the AAA-S network element.
  • Step 402 Send a search request to UDM.
  • Step 403 Receive the search results sent by UDM.
  • Step 404 In response to the search result including the search failure indication, the AI network function is not re-authenticated and authorized.
  • the search result when the search result includes a search failure indication, it means that the AI network function has not been successfully registered, and the AIAAF network element cannot re-authenticate and authorize the AI network function.
  • the NSSAAF network element will receive the re-authentication and authorization request sent by the AAA-S network element.
  • the re-authentication and authorization request includes AIFSAI and for identification.
  • the NSSAAF network element will re-authenticate and authorize the AI network function based on the AIFSAI and the first identifier.
  • the present disclosure provides a re-authentication and authorization method for AI network functions, which can be used to re-authenticate and authorize AI network functions, thereby ensuring the security of the AI network functions and enabling the AI network functions to provide UEs with Serve safely and stably.
  • FIG. 5 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by an embodiment of the present disclosure. The method is executed by the NSSAAF network element. As shown in Figure 5, the re-authentication and authorization method for AI network functions may include the following. step:
  • Step 501 Receive the re-authentication authorization request sent by the AAA-S network element.
  • Step 502 Send a search request to UDM.
  • Step 503 Receive the search results sent by UDM.
  • Step 504 In response to the search result including the AMF ID, establish a connection with the corresponding AMF based on the AMF ID.
  • the search result when the search result includes the AMF ID, it means that the AIAAF network element can subsequently re-authenticate and authorize the AI network function.
  • the AIAAF needs to first match the AMF ID with the corresponding The AMF establishes a connection so that it can subsequently notify the AMF that the AIAAF will re-authenticate and authorize the AI network functions.
  • the AIAAF network element can establish a connection with the AMF corresponding to the AMF ID based on the existing connection method. This embodiment will not be described in detail here.
  • Step 505 Send a re-authentication authorization message to the AMF.
  • the re-authentication authorization message is used to instruct the AIAAF network element to re-authenticate and authorize the AI network function.
  • the NSSAAF network element will receive the re-authentication and authorization request sent by the AAA-S network element.
  • the re-authentication and authorization request includes AIFSAI and for identification.
  • the NSSAAF network element will re-authenticate and authorize the AI network function based on the AIFSAI and the first identifier.
  • the present disclosure provides a re-authentication and authorization method for AI network functions, which can be used to re-authenticate and authorize AI network functions, thereby ensuring the security of the AI network functions and enabling the AI network functions to provide UEs with Serve safely and stably.
  • FIG. 6 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by an embodiment of the present disclosure. The method is executed by the NSSAAF network element. As shown in Figure 6, the re-authentication and authorization method for AI network functions may include the following. step:
  • Step 601 Receive the re-authentication authorization request sent by the AAA-S network element.
  • Step 602 Send a search request to UDM.
  • Step 603 Receive the search results sent by UDM.
  • Step 604 In response to the search result including the AMF ID, re-authenticate and authorize the AI network function.
  • Step 605 Send the authentication result to UDM.
  • the authentication result may include parameter information after re-authentication and authorization of the AI network function.
  • the AIAAF network element sends the authentication result to the UDM, so that the UDM can update the parameters of the AI network function based on the authentication result.
  • UDM can replace the original parameters in the AI network function with the corresponding parameter information in the authentication result based on the parameter information in the authentication result, so as to update the parameters of the AI network function.
  • the NSSAAF network element will receive the re-authentication and authorization request sent by the AAA-S network element.
  • the re-authentication and authorization request includes AIFSAI and for identification.
  • the NSSAAF network element will re-authenticate and authorize the AI network function based on the AIFSAI and the first identifier.
  • the present disclosure provides a re-authentication and authorization method for AI network functions, which can be used to re-authenticate and authorize AI network functions, thereby ensuring the security of the AI network functions and enabling the AI network functions to provide UEs with Serve safely and stably.
  • FIG. 7 is a schematic flow chart of a re-authentication and authorization method for AI network functions provided by an embodiment of the present disclosure. The method is executed by the NSSAAF network element. As shown in Figure 7, the re-authentication and authorization method for AI network functions may include the following. step:
  • Step 701 Receive the re-authentication authorization request sent by the AAA-S network element.
  • Step 702 Send a search request to UDM.
  • Step 703 Receive the search results sent by UDM.
  • Step 704 In response to the search result including the AMF ID, re-authenticate and authorize the AI network function.
  • steps 701-704 please refer to the above embodiment description, and the embodiments of the present disclosure will not be described again here.
  • Step 705 Send a re-authentication and authorization response to the AAA-S network element.
  • the re-authentication and authorization response is used to indicate that the AIAAF network element has re-authenticated and authorized the AI network function.
  • the above-mentioned method of sending a re-authentication authorization response to the AAA-S network element may include: directly sending an AAA re-authentication authorization response (such as AAA Protocol Re-Auth) to the AAA-S network element. Response), the AAA re-authentication authorization response is used to indicate that the AIAAF network element has re-authenticated and authorized the AI network function.
  • AAA re-authentication authorization response such as AAA Protocol Re-Auth
  • the above-mentioned method of sending a re-authentication authorization response to the AAA-S network element may include :
  • the AAA re-authentication and authorization response is transparently transmitted to the AAA-S network element through the AAA-P network element.
  • the AAA re-authentication and authorization response is used to indicate that the AIAAF network element has re-authenticated and authorized the AI network function.
  • the NSSAAF network element will receive the re-authentication and authorization request sent by the AAA-S network element.
  • the re-authentication and authorization request includes AIFSAI and for identification.
  • the NSSAAF network element will re-authenticate and authorize the AI network function based on the AIFSAI and the first identifier.
  • the present disclosure provides a re-authentication and authorization method for AI network functions, which can be used to re-authenticate and authorize AI network functions, thereby ensuring the security of the AI network functions and enabling the AI network functions to provide UEs with Serve safely and stably.
  • FIG 8 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by an embodiment of the present disclosure. The method is executed by the NSSAAF network element. As shown in Figure 8, the re-authentication and authorization method for AI network functions may include the following. step:
  • Step 801 Receive the re-authentication authorization request sent by the AAA-S network element.
  • Step 802 Send a search request to UDM.
  • Step 803 Receive the search results sent by UDM.
  • Step 804 In response to the search result including the search failure indication, the AI network function is not re-authenticated and authorized.
  • steps 801-804 please refer to the above embodiment description, and the embodiments of the present disclosure will not be described again here.
  • Step 805 Send a re-authentication and authorization response to the AAA-S network element.
  • the re-authentication and authorization response is used to indicate that the AIAAF network element has not re-authenticated and authorized the AI network function.
  • the above-mentioned method of sending a re-authentication authorization response to the AAA-S network element may include: directly sending an AAA re-authentication authorization response to the AAA-S network element.
  • the AAA re-authentication authorization response Used to indicate that the AIAAF network element has not re-authenticated and authorized the AI network function.
  • the above-mentioned method of sending a re-authentication authorization response to the AAA-S network element may include :
  • the AAA re-authentication and authorization response is transparently transmitted to the AAA-S network element through the AAA-P network element.
  • the AAA re-authentication and authorization response is used to indicate that the AIAAF network element has not re-authenticated and authorized the AI network function.
  • the NSSAAF network element will receive the re-authentication and authorization request sent by the AAA-S network element.
  • the re-authentication and authorization request includes AIFSAI and for identification.
  • the NSSAAF network element will re-authenticate and authorize the AI network function based on the AIFSAI and the first identifier.
  • the present disclosure provides a re-authentication and authorization method for AI network functions, which can be used to re-authenticate and authorize AI network functions, thereby ensuring the security of the AI network functions and enabling the AI network functions to provide UEs with Serve safely and stably.
  • FIG. 9 is a schematic flow chart of a re-authentication and authorization method for AI network functions provided by an embodiment of the present disclosure. The method is executed by the AAA-S network element. As shown in Figure 9, the re-authentication and authorization method for AI network functions can Includes the following steps:
  • Step 901 Send a re-authentication authorization request to the AIAAF network element.
  • the re-authentication authorization request may include the AIFSAI and a first identifier used to identify the UE served by the AI network function.
  • the above method of sending a re-authentication authorization request to the AIAAF network element may include: directly sending an AAA re-authentication authorization request to the AIAAF network element.
  • the AAA re-authentication authorization request includes the AIFSAI and the first identifier.
  • the AI service function needs to communicate with other network elements through the AAA-P (Authentication, Authorization, Accounting-Proxy, Authentication and Authorization Agent) network element, then the above-mentioned communication to the AIAAF network
  • the method for the element to send the re-authentication authorization request may include: transparently transmitting the AAA re-authentication authorization request to the AIAAF network element through the AAA-P network element.
  • the AAA re-authentication authorization request may include the AIFSAI and the first identifier.
  • the NSSAAF network element will receive the re-authentication and authorization request sent by the AAA-S network element.
  • the re-authentication and authorization request includes AIFSAI and for identification.
  • the NSSAAF network element will re-authenticate and authorize the AI network function based on the AIFSAI and the first identifier.
  • the present disclosure provides a re-authentication and authorization method for AI network functions, which can be used to re-authenticate and authorize AI network functions, thereby ensuring the security of the AI network functions and enabling the AI network functions to provide UEs with Serve safely and stably.
  • FIG 10 is a schematic flow chart of a re-authentication and authorization method for AI network functions provided by an embodiment of the present disclosure. The method is executed by the AAA-S network element. As shown in Figure 10, the re-authentication and authorization method for AI network functions can Includes the following steps:
  • Step 1001 Send a re-authentication authorization request to the AIAAF network element.
  • Step 1002 Receive the re-authentication authorization response sent by the AIAAF network element.
  • the above-mentioned re-authentication and authorization response may be used to indicate whether the AIAAF network element re-authenticates and authorizes the AI network function.
  • the re-authentication authorization response is used to indicate that the AIAAF network element re-authenticates and authorizes the AI network function.
  • the re-authentication authorization response is used to indicate that the AIAAF network element does not re-authenticate and authorize the AI network function.
  • the above method of receiving the re-authentication authorization response sent by the AIAAF network element may include: receiving the AAA re-authentication authorization response sent by the AIAAF network element.
  • the AAA re-authentication authorization response may be used to indicate whether the AIAAF network element re-authenticates and authorizes the AI network function.
  • the above method of receiving the re-authentication authorization response sent by the AIAAF network element may include: receiving the AIAAF The network element passes the AAA re-authentication authorization response transparently transmitted by the AAA-P network element.
  • the AAA re-authentication authorization request may include the AIFSAI and the first identifier.
  • the NSSAAF network element will receive the re-authentication and authorization request sent by the AAA-S network element.
  • the re-authentication and authorization request includes AIFSAI and for identification.
  • the NSSAAF network element will re-authenticate and authorize the AI network function based on the AIFSAI and the first identifier.
  • the present disclosure provides a re-authentication and authorization method for AI network functions, which can be used to re-authenticate and authorize AI network functions, thereby ensuring the security of the AI network functions and enabling the AI network functions to provide UEs with Serve safely and stably.
  • FIG 11 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by an embodiment of the present disclosure. The method is executed by UDM. As shown in Figure 11, the re-authentication and authorization method for AI network functions may include the following steps:
  • Step 1101 Receive the search request sent by the AIAAF network element.
  • the search request may include the AIFSAI and a first identifier used to identify the UE served by the AI network function.
  • the above-mentioned first identifier may be a GPSI identifier.
  • the AIFSAI may include a second identifier used to identify the AI network function, where the second identifier may be, for example, the AI service ID (Identifier) corresponding to the AI network function (i.e. At least one of AI Service ID) and AI service type (AI Service type).
  • the AI service ID Identifier
  • AI Service type AI Service type
  • Step 1102 Perform a search based on the AIFSAI and the first identifier, and send the search results to the AIAAF network element.
  • the search result may include an AMF ID or a search failure indication.
  • the NSSAAF network element will receive the re-authentication and authorization request sent by the AAA-S network element.
  • the re-authentication and authorization request includes AIFSAI and for identification.
  • the NSSAAF network element will re-authenticate and authorize the AI network function based on the AIFSAI and the first identifier.
  • the present disclosure provides a re-authentication and authorization method for AI network functions, which can be used to re-authenticate and authorize AI network functions, thereby ensuring the security of the AI network functions and enabling the AI network functions to provide UEs with Serve safely and stably.
  • FIG 12 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by an embodiment of the present disclosure. The method is executed by UDM. As shown in Figure 12, the re-authentication and authorization method for AI network functions may include the following steps:
  • Step 1201 Receive the search request sent by the AIAAF network element.
  • Step 1202 Check whether the second identifier exists in the UDM.
  • the UDM can determine whether the AI network function corresponding to the second identifier is successfully registered based on searching whether the second identifier exists in the UDM. Specifically, if the second identifier exists in the UDM, it means that the AI network function corresponding to the second identifier has been successfully registered; otherwise, the AI network function corresponding to the second identifier has not been successfully registered, and there is no information corresponding to the AI network function in the UDM. .
  • Step 1203 In response to the existence of the second identifier in the UDM, search the AMF ID of the current serving AMF of the UE corresponding to the first identifier based on the first identifier, and send the AMF ID to the AIAAF network element.
  • the NSSAAF network element will receive the re-authentication and authorization request sent by the AAA-S network element.
  • the re-authentication and authorization request includes AIFSAI and for identification.
  • the NSSAAF network element will re-authenticate and authorize the AI network function based on the AIFSAI and the first identifier.
  • the present disclosure provides a re-authentication and authorization method for AI network functions, which can be used to re-authenticate and authorize AI network functions, thereby ensuring the security of the AI network functions and enabling the AI network functions to provide UEs with Serve safely and stably.
  • FIG. 13 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by an embodiment of the present disclosure. The method is executed by UDM. As shown in Figure 13, the re-authentication and authorization method for AI network functions may include the following steps:
  • Step 1301 Receive the search request sent by the AIAAF network element.
  • Step 1302 Check whether the second identifier exists in the UDM.
  • the UDM can determine whether the AI network function corresponding to the second identifier is successfully registered based on searching whether the second identifier exists in the UDM. Specifically, if the second identifier exists in UDM, it means that the AI network function corresponding to the second identifier has been successfully registered; otherwise, the AI network function corresponding to the second identifier has not been successfully registered. At this time, the AI network function does not exist in UDM. corresponding information.
  • Step 1303 In response to the fact that the second identifier does not exist in the UDM, send a search failure indication to the AIAAF network element.
  • the NSSAAF network element will receive the re-authentication and authorization request sent by the AAA-S network element.
  • the re-authentication and authorization request includes AIFSAI and for identification.
  • the NSSAAF network element will re-authenticate and authorize the AI network function based on the AIFSAI and the first identifier.
  • the present disclosure provides a re-authentication and authorization method for AI network functions, which can be used to re-authenticate and authorize AI network functions, thereby ensuring the security of the AI network functions and enabling the AI network functions to provide UEs with Serve safely and stably.
  • FIG 14 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by an embodiment of the present disclosure. The method is executed by UDM. As shown in Figure 14, the re-authentication and authorization method for AI network functions may include the following steps:
  • Step 1401 Receive the search request sent by the AIAAF network element.
  • Step 1402 Perform a search based on the AIFSAI and the first identifier, and send the search results to the AIAAF network element.
  • Step 1403 In response to the search result including the AMF ID, receive the authentication result sent by the AIAAF network element.
  • the authentication result may include parameter information after re-authentication and authorization of the AI network function.
  • Step 1404 Update the parameters of the AI network function based on the authentication result.
  • UDM can determine the parameters that need to be updated for the AI network function and the updated parameters corresponding to the parameters based on the parameter information after re-authentication and authorization of the AI network function in the authentication result.
  • the parameters that need to be updated are directly updated to update the parameters of the AI network function.
  • the NSSAAF network element will receive the re-authentication and authorization request sent by the AAA-S network element.
  • the re-authentication and authorization request includes AIFSAI and for identification.
  • the NSSAAF network element will re-authenticate and authorize the AI network function based on the AIFSAI and the first identifier.
  • the present disclosure provides a re-authentication and authorization method for AI network functions, which can be used to re-authenticate and authorize AI network functions, thereby ensuring the security of the AI network functions and enabling the AI network functions to provide UEs with Serve safely and stably.
  • FIG. 15 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by an embodiment of the present disclosure. The method is executed by AMF. As shown in Figure 15, the re-authentication and authorization method for AI network functions may include the following steps:
  • Step 1501 Receive the re-authentication authorization message sent by the AIAAF network element.
  • the above-mentioned re-authentication authorization message may be used to instruct the AIAAF to re-authenticate and authorize the AI network function.
  • step 1501 please refer to the relevant introduction in the above embodiments, and the embodiments of the present disclosure will not be described again here.
  • the NSSAAF network element will receive the re-authentication and authorization request sent by the AAA-S network element.
  • the re-authentication and authorization request includes AIFSAI and for identification.
  • the NSSAAF network element will re-authenticate and authorize the AI network function based on the AIFSAI and the first identifier.
  • the present disclosure provides a re-authentication and authorization method for AI network functions, which can be used to re-authenticate and authorize AI network functions, thereby ensuring the security of the AI network functions and enabling the AI network functions to provide UEs with Serve safely and stably.
  • FIG 16 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by an embodiment of the present disclosure. The method is executed by AMF. As shown in Figure 16, the re-authentication and authorization method for AI network functions may include the following steps:
  • Step 1601 Receive the re-authentication authorization message sent by the AIAAF network element.
  • Step 1602 Transparently transmit the re-authentication authorization message to the UE through the base station.
  • the NSSAAF network element will receive the re-authentication and authorization request sent by the AAA-S network element.
  • the re-authentication and authorization request includes AIFSAI and for identification.
  • the NSSAAF network element will re-authenticate and authorize the AI network function based on the AIFSAI and the first identifier.
  • the present disclosure provides a re-authentication and authorization method for AI network functions, which can be used to re-authenticate and authorize AI network functions, thereby ensuring the security of the AI network functions and enabling the AI network functions to provide UEs with Serve safely and stably.
  • FIG 17 is a schematic flowchart of a re-authentication and authorization method for AI network functions provided by an embodiment of the present disclosure. The method is executed by a UE. As shown in Figure 17, the re-authentication and authorization method for AI network functions may include the following steps:
  • Step 1701 Receive the re-authentication authorization message.
  • the above-mentioned re-authentication authorization message may be used to instruct the AIAAF to re-authenticate and authorize the AI network function.
  • the re-authentication authorization message may be transparently transmitted by the AMF to the UE through the base station.
  • step 1701 please refer to the relevant introduction in the above embodiments, and the embodiments of the present disclosure will not be described again here.
  • the NSSAAF network element will receive the re-authentication and authorization request sent by the AAA-S network element.
  • the re-authentication and authorization request includes AIFSAI and for identification.
  • the NSSAAF network element will re-authenticate and authorize the AI network function based on the AIFSAI and the first identifier.
  • the present disclosure provides a re-authentication and authorization method for AI network functions, which can be used to re-authenticate and authorize AI network functions, thereby ensuring the security of the AI network functions and enabling the AI network functions to provide UEs with Serve safely and stably.
  • Figure 18 is an interactive method for re-authentication and authorization of AI network functions provided by an embodiment of the present disclosure. As shown in Figure 18, the interactive method may include the following steps:
  • Step 1801. The AAA-S network element sends an AAA Re-Authentication Authorization Request (AAA Protocol Re-Auth Request) to the AIAAF network element.
  • AAA Re-Authentication Authorization Request AAA Protocol Re-Auth Request
  • the AAA re-authentication authorization request includes the AIFSAI and a first identifier used to identify the user equipment UE served by the AI network function.
  • Step 1802 If the AI service function needs to communicate with other network elements through the AAA-P network element, the AAA-S network element transparently transmits the AAA re-authentication authorization request to the AIAAF network element through the AAA-P network element.
  • Step 1803 After receiving the AAA re-authentication authorization request, the AIAAF network element sends a search request to the UDM.
  • Step 1804 UDM sends the search result to the AIAAF network element.
  • the UDM finds the AMF ID of the current serving AMF corresponding to the first identification of the UE, the AMF ID is returned; otherwise, FALSE (search failure indication) is returned, and the process ends.
  • FALSE search failure indication
  • Step 1805 In response to the search result including the AMF ID, the AIAAF network element sends a re-authentication authorization message (AAA Protocol Re-Auth) to the AMF.
  • AAA Protocol Re-Auth re-authentication authorization message
  • Step 1806 The AMF receives the re-authentication authorization message sent by the AIAAF network element, and transparently transmits the re-authentication authorization message to the UE through the base station.
  • Step 1807 In response to the search result including the AMF ID, the AIAAF network element re-authenticates and authorizes the AI network function.
  • Step 1808 The AIAAF network element sends the authentication result to the UDM.
  • the authentication result includes parameter information after re-authentication and authorization of the AI network function.
  • the UDM after receiving the authentication result sent by the AIAAF network element, the UDM updates the parameters of the AI network function based on the authentication result.
  • Step 1809 The AIAAF network element sends a re-authentication and authorization response (AAA Protocol Re-Auth Response) to the AAA-S network element.
  • AAA Protocol Re-Auth Response AAA Protocol Re-Auth Response
  • the re-authentication and authorization response is used to indicate that the AIAAF network element successfully re-authentication and authorization of the AI network function.
  • the AIAAF network element transparently transmits re-authentication to the AAA-S network element through the AAA-P network element. Authorization response.
  • the AIAAF network element in response to the search result including FALSE, sends a re-authentication authorization response to the AAA-S network element, and the re-authentication authorization response is used to indicate that the AIAAF network element has not configured the AI network function. Perform re-authentication and authorization.
  • the methods provided by the embodiments of the present application are introduced from the perspectives of network equipment and UE respectively.
  • the network device and the UE may include a hardware structure and a software module to implement the above functions in the form of a hardware structure, a software module, or a hardware structure plus a software module.
  • a certain function among the above functions can be executed by a hardware structure, a software module, or a hardware structure plus a software module.
  • Figure 19 is a schematic structural diagram of a communication device provided by an embodiment of the present disclosure. As shown in Figure 19, the device may include:
  • the transceiver module 1901 is configured to receive a re-authentication authorization request sent by the AAA-S network element.
  • the re-authentication authorization request includes the AIFSAI and a first identifier used to identify the user equipment UE served by the AI network function;
  • the processing module 1902 is used to re-authenticate and authorize the AI network function based on the AIFSAI and the first identification.
  • the NSSAAF network element will receive the re-authentication authorization request sent by the AAA-S network element.
  • the re-authentication authorization request includes the AIFSAI and the information used to identify the AI network function served.
  • the first identifier of the user equipment UE The first identifier of the user equipment UE.
  • the NSSAAF network element will re-authenticate and authorize the AI network function based on the AIFSAI and the first identifier. It can be seen from this that the present disclosure provides a re-authentication and authorization method for AI network functions, which can be used to re-authenticate and authorize AI network functions, thereby ensuring the security of the AI network functions and enabling the AI network functions to provide UEs with Serve safely and stably.
  • the above-mentioned transceiver module 1901 is also used to:
  • the AAA re-authentication authorization request includes the AIFSAI and the first identifier.
  • the above-mentioned transceiver module 1901 is also used to:
  • AAA re-authentication authorization request transparently transmitted by the AAA-S network element through the authentication and authorization agent AAA-P network element, where the AAA re-authentication authorization request includes the AIFSAI and the first identifier.
  • the AIFSAI includes a second identifier used to identify the AI network function.
  • the above process 1902 is also used to:
  • the AI network function in response to the search result including the AMF ID, the AI network function is re-authenticated and authorized; in response to the search result including the search failure indication, the AI network function is not re-authenticated and authorized.
  • the above device is also used for:
  • the re-authentication authorization request also includes re-authentication parameters corresponding to the re-authentication authorization; the above-mentioned processing module 1902 is also used to:
  • the AI network function is re-authenticated and authorized based on the re-authentication parameters.
  • the device in response to re-authenticating and authorizing the AI network function, the device is also used to:
  • the device is also used for:
  • the device is also used for:
  • AAA re-authentication authorization response Send an AAA re-authentication authorization response to the AAA-S network element, where the AAA re-authentication authorization response is used to indicate whether the NSSAAF network element re-authenticates and authorizes the AI network function.
  • the device is also used for:
  • the AAA re-authentication authorization response is transparently transmitted to the AAA-S network element through the AAA-P network element.
  • the AAA re-authentication authorization response is used to indicate whether the NSSAAF network element re-authenticates and authorizes the AI network function.
  • Figure 20 is a schematic structural diagram of a communication device provided by an embodiment of the present disclosure. As shown in Figure 20, the device may include:
  • the transceiver module 2001 is configured to send a re-authentication authorization request to the NSSAAF network element.
  • the re-authentication authorization request includes the AIFSAI and a first identifier used to identify the UE served by the AI network function.
  • the NSSAAF network element will receive the re-authentication authorization request sent by the AAA-S network element.
  • the re-authentication authorization request includes the AIFSAI and the information used to identify the AI network function served.
  • the first identifier of the user equipment UE The first identifier of the user equipment UE.
  • the NSSAAF network element will re-authenticate and authorize the AI network function based on the AIFSAI and the first identifier. It can be seen from this that the present disclosure provides a re-authentication and authorization method for AI network functions, which can be used to re-authenticate and authorize AI network functions, thereby ensuring the security of the AI network functions and enabling the AI network functions to provide UEs with Serve safely and stably.
  • the above-mentioned transceiver module 2001 is also used to:
  • the AAA re-authentication authorization request includes the AIFSAI and the first identifier.
  • the configuration module is also used to:
  • the AAA re-authentication authorization request is transparently transmitted to the NSSAAF network element through the AAA-P network element, where the AAA re-authentication authorization request includes the AIFSAI and the first identifier.
  • the AIFSAI includes a second identifier used to identify the AI network function.
  • the device is also used for:
  • re-authentication authorization response sent by the NSSAAF network element, where the re-authentication authorization response is used to indicate whether the NSSAAF network element re-authenticates and authorizes the AI network function.
  • the device is also used for:
  • the device is also used for:
  • the AAA re-authentication authorization response transparently transmitted by the NSSAAF network element through the AAA-P network element.
  • the AAA re-authentication authorization response is used to indicate whether the NSSAAF network element re-authenticates and authorizes the AI network function.
  • Figure 21 is a schematic structural diagram of a communication device provided by an embodiment of the present disclosure. As shown in Figure 21, the device may include:
  • the transceiver module 2101 is configured to receive a search request sent by the NSSAAF network element.
  • the search request includes the AIFSAI and a first identifier used to identify the UE served by the AI network function;
  • the processing module 2102 is configured to perform a search based on the AIFSAI and the first identifier, and send the search results to the NSSAAF network element.
  • the NSSAAF network element will receive the re-authentication authorization request sent by the AAA-S network element.
  • the re-authentication authorization request includes the AIFSAI and the information used to identify the AI network function served.
  • the first identifier of the user equipment UE The first identifier of the user equipment UE.
  • the NSSAAF network element will re-authenticate and authorize the AI network function based on the AIFSAI and the first identifier. It can be seen from this that the present disclosure provides a re-authentication and authorization method for AI network functions, which can be used to re-authenticate and authorize AI network functions, thereby ensuring the security of the AI network functions and enabling the AI network functions to provide UEs with Serve safely and stably.
  • the AIFSAI includes a second identifier used to identify the AI network function; the above processing module 2102 is also used to:
  • a search failure indication is sent to the NSSAAF network element.
  • the above device in response to the search result including the AMF ID, is also used to:
  • the parameters of the AI network function are updated based on the authentication result.
  • Figure 22 is a schematic structural diagram of a communication device provided by an embodiment of the present disclosure. As shown in Figure 22, the device may include:
  • the transceiver module 2201 is configured to receive a re-authentication authorization message sent by the NSSAAF network element.
  • the re-authentication authorization message is used to instruct the NSSAAF to re-authenticate and authorize the AI network function.
  • the NSSAAF network element will receive the re-authentication authorization request sent by the AAA-S network element.
  • the re-authentication authorization request includes the AIFSAI and the information used to identify the AI network function served.
  • the first identifier of the user equipment UE The first identifier of the user equipment UE.
  • the NSSAAF network element will re-authenticate and authorize the AI network function based on the AIFSAI and the first identifier. It can be seen from this that the present disclosure provides a re-authentication and authorization method for AI network functions, which can be used to re-authenticate and authorize AI network functions, thereby ensuring the security of the AI network functions and enabling the AI network functions to provide UEs with Serve safely and stably.
  • the above device is also used for:
  • the re-authentication authorization message is transparently transmitted to the UE through the base station.
  • Figure 23 is a schematic structural diagram of a communication device provided by an embodiment of the present disclosure. As shown in Figure 23, the device may include:
  • the transceiver module 2301 is used to receive the re-authentication authorization message sent by the NSSAAF network element.
  • the re-authentication authorization message is used to instruct the NSSAAF to re-authenticate and authorize the AI network function.
  • the NSSAAF network element will receive the re-authentication authorization request sent by the AAA-S network element.
  • the re-authentication authorization request includes the AIFSAI and the information used to identify the AI network function served.
  • the first identifier of the user equipment UE The first identifier of the user equipment UE.
  • the NSSAAF network element will re-authenticate and authorize the AI network function based on the AIFSAI and the first identifier. It can be seen from this that the present disclosure provides a re-authentication and authorization method for AI network functions, which can be used to re-authenticate and authorize AI network functions, thereby ensuring the security of the AI network functions and enabling the AI network functions to provide UEs with Serve safely and stably.
  • FIG 24 is a schematic structural diagram of a communication device 2400 provided by an embodiment of the present application.
  • the communication device 2400 may be a network device, a terminal device, a chip, a chip system, or a processor that supports a network device to implement the above method, or a chip, a chip system, or a processor that supports a terminal device to implement the above method. Processor etc.
  • the device can be used to implement the method described in the above method embodiment. For details, please refer to the description in the above method embodiment.
  • Communication device 2400 may include one or more processors 2401.
  • the processor 2401 may be a general-purpose processor or a special-purpose processor, or the like.
  • it can be a baseband processor or a central processing unit.
  • the baseband processor can be used to process communication protocols and communication data.
  • the central processor can be used to control communication devices (such as base stations, baseband chips, terminal equipment, terminal equipment chips, DU or CU, etc.) and execute computer programs. , processing data for computer programs.
  • the communication device 2400 may also include one or more memories 2402, on which a computer program 2404 may be stored.
  • the processor 2401 executes the computer program 2404, so that the communication device 2400 performs the steps described in the above method embodiments. method.
  • the memory 2402 may also store data.
  • the communication device 2400 and the memory 2402 can be provided separately or integrated together.
  • the communication device 2400 may also include a transceiver 2405 and an antenna 2406.
  • the transceiver 2405 may be called a transceiver unit, a transceiver, a transceiver circuit, etc., and is used to implement transceiver functions.
  • the transceiver 2405 may include a receiver and a transmitter.
  • the receiver may be called a receiver or a receiving circuit, etc., used to implement the receiving function;
  • the transmitter may be called a transmitter, a transmitting circuit, etc., used to implement the transmitting function.
  • the communication device 2400 may also include one or more interface circuits 2407.
  • the interface circuit 2407 is used to receive code instructions and transmit them to the processor 2401.
  • the processor 2401 executes the code instructions to cause the communication device 2400 to perform the method described in the above method embodiment.
  • the communication device 2400 is an NSSAAF network element: the transceiver 2405 is used to perform step 201 in Figure 2; step 301 to step 303 in Figure 3; step 401 to step 403 in Figure 4; step 501 to step 503 in Figure 5 , Step 505; Step 601 to Step 603 and Step 605 in Figure 6; Step 701 to Step 703 and Step 705 in Figure 7; Step 801 to Step 803 and Step 805 in Figure 8.
  • the processor 2401 is used to execute step 202 in Figure 2; step 304 in Figure 3; step 404 in Figure 4; step 504 in Figure 5; step 604 in Figure 6; step 704 in Figure 7; Figure 8 Step 804 in .
  • the communication device 2400 is an AMF network element: the transceiver 2405 is used to perform step 1501 in Figure 15; step 1601 to step 1602 in Figure 16.
  • the communication device 2400 is an AAA-S network element: the transceiver 2405 is used to perform step 901 in Figure 9; step 1001 to step 1002 in Figure 10.
  • the processor 2401 is used to execute step 504 in FIG. 5 .
  • the communication device 2400 is UDM: the transceiver 2405 is used to perform step 1101 in Figure 11; step 1201 in Figure 12; step 1301 and step 1303 in Figure 13; and step 1401 and step 1403 in Figure 14.
  • the processor 2401 is used to execute step 1102 in Figure 11; step 1202 in Figure 12; step 1302 in Figure 13; and step 1402 and step 1404 in Figure 14.
  • the communication device 2400 is a terminal device: the transceiver 2405 is used to perform step 1701 in Figure 17.
  • the processor 2401 may include a transceiver for implementing receiving and transmitting functions.
  • the transceiver may be a transceiver circuit, an interface, or an interface circuit.
  • the transceiver circuits, interfaces or interface circuits used to implement the receiving and transmitting functions can be separate or integrated together.
  • the above-mentioned transceiver circuit, interface or interface circuit can be used for reading and writing codes/data, or the above-mentioned transceiver circuit, interface or interface circuit can be used for signal transmission or transfer.
  • the processor 2401 may store a computer program 2403, and the computer program 2403 runs on the processor 2401, causing the communication device 2400 to perform the method described in the above method embodiment.
  • the computer program 2403 may be solidified in the processor 2401, in which case the processor 2401 may be implemented by hardware.
  • the communication device 2400 may include a circuit, which may implement the functions of sending or receiving or communicating in the foregoing method embodiments.
  • the processor and transceiver described in this application can be implemented in integrated circuits (ICs), analog ICs, radio frequency integrated circuits RFICs, mixed signal ICs, application specific integrated circuits (ASICs), printed circuit boards ( printed circuit board (PCB), electronic equipment, etc.
  • the processor and transceiver can also be manufactured using various IC process technologies, such as complementary metal oxide semiconductor (CMOS), n-type metal oxide-semiconductor (NMOS), P-type Metal oxide semiconductor (positive channel metal oxide semiconductor, PMOS), bipolar junction transistor (BJT), bipolar CMOS (BiCMOS), silicon germanium (SiGe), gallium arsenide (GaAs), etc.
  • CMOS complementary metal oxide semiconductor
  • NMOS n-type metal oxide-semiconductor
  • PMOS P-type Metal oxide semiconductor
  • BJT bipolar junction transistor
  • BiCMOS bipolar CMOS
  • SiGe silicon germanium
  • GaAs gallium arsenide
  • the communication device described in the above embodiments may be a network device or a terminal device, but the scope of the communication device described in this application is not limited thereto, and the structure of the communication device may not be limited by FIG. 24 .
  • the communication device may be a stand-alone device or may be part of a larger device.
  • the communication device may be:
  • the IC collection may also include storage components for storing data and computer programs;
  • the communication device may be a chip or a chip system
  • the schematic structural diagram of the chip shown in FIG. 25 refer to the schematic structural diagram of the chip shown in FIG. 25 .
  • the chip shown in Figure 25 includes a processor 2501 and an interface 2502.
  • the number of processors 2501 may be one or more, and the number of interfaces 2502 may be multiple.
  • the chip also includes a memory 2503, which is used to store necessary computer programs and data.
  • This application also provides a readable storage medium on which instructions are stored. When the instructions are executed by a computer, the functions of any of the above method embodiments are implemented.
  • This application also provides a computer program product, which, when executed by a computer, implements the functions of any of the above method embodiments.
  • the above embodiments it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • software it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer programs.
  • the computer program When the computer program is loaded and executed on a computer, the processes or functions described in the embodiments of the present application are generated in whole or in part.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device.
  • the computer program may be stored in or transferred from one computer-readable storage medium to another, for example, the computer program may be transferred from a website, computer, server, or data center Transmission to another website, computer, server or data center through wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.) means.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more available media integrated.
  • the usable media may be magnetic media (e.g., floppy disks, hard disks, magnetic tapes), optical media (e.g., high-density digital video discs (DVD)), or semiconductor media (e.g., solid state disks, SSD)) etc.
  • magnetic media e.g., floppy disks, hard disks, magnetic tapes
  • optical media e.g., high-density digital video discs (DVD)
  • DVD digital video discs
  • semiconductor media e.g., solid state disks, SSD
  • At least one in this application can also be described as one or more, and the plurality can be two, three, four or more, which is not limited by this application.
  • the technical feature is distinguished by “first”, “second”, “third”, “A”, “B”, “C” and “D”, etc.
  • the technical features described in “first”, “second”, “third”, “A”, “B”, “C” and “D” are in no particular order or order.
  • the corresponding relationships shown in each table in this application can be configured or predefined.
  • the values of the information in each table are only examples and can be configured as other values, which are not limited by this application.
  • the corresponding relationships shown in some rows may not be configured.
  • appropriate deformation adjustments can be made based on the above table, such as splitting, merging, etc.
  • the names of the parameters shown in the titles of the above tables may also be other names understandable by the communication device, and the values or expressions of the parameters may also be other values or expressions understandable by the communication device.
  • other data structures can also be used, such as arrays, queues, containers, stacks, linear lists, pointers, linked lists, trees, graphs, structures, classes, heaps, hash tables or hash tables. wait.
  • Predefinition in this application can be understood as definition, pre-definition, storage, pre-storage, pre-negotiation, pre-configuration, solidification, or pre-burning.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开提出一种AI网络功能的重新认证授权方法/装置/设备/存储介质,属于通信技术领域。NSSAAF网元接收AAA-S网元发送的重新认证授权请求,重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识,NSSAAF网元基于AIFSAI和第一标识对AI网络功能进行重新认证和授权。由此可知,本公开提供了一种AI网络功能的重新认证授权方法,可以用于对AI网络功能进行重新认证和授权,从而保证了AI网络功能的安全性,使得AI网络功能可以为UE提供安全稳定地服务。

Description

一种AI网络功能的重新认证授权方法/装置/设备及存储介质 技术领域
本公开涉及通信技术领域,尤其涉及一种AI网络功能的重新认证授权方法/装置/设备及存储介质。
背景技术
在5G系统中,通过引入AI(Artificial Intelligence,人工智能)网络功能技术,以使网络利用AI网络功能实现更高水平的自治,进而实现降低成本,增强智能化效果。其中,AI网络功能在初步注册建立后,可能还需要进行重新认证授权(例如,AI网络功能每次定期检查时就需要重新认证授权),因此,亟需一种AI网络功能的重新认证授权方法。
发明内容
本公开提出的AI网络功能的重新认证授权方法/装置/设备及存储介质,用于AI网络功能的重新认证授权。
第一方面,本公开实施例提供一种重新认证授权方法,该方法由NSSAAF网元执行,包括:
接收认证和授权服务器AAA-S网元发送的重新认证授权请求,所述重新认证授权请求包括人工智能功能选择辅助信息AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识;
基于所述AIFSAI和所述第一标识对AI网络功能进行重新认证和授权。
本公开中,提供了一种AI网络功能的重新认证授权方法,可以用于对AI网络功能进行重新认证和授权,从而保证了AI网络功能的安全性,使得AI网络功能可以为UE提供安全稳定地服务。
第二方面,本公开实施例提供一种重新认证授权方法,该方法由AAA-S网元执行,包括:
向NSSAAF网元发送重新认证授权请求,所述重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的UE的第一标识。
第三方面,本公开实施例提供一种重新认证授权方法,该方法由UDM执行,包括:
接收NSSAAF网元发送的查找请求,所述查找请求包括AIFSAI和用于标识AI网络功能所服务的UE的第一标识;
基于所述AIFSAI和所述第一标识进行查找,并向所述NSSAAF网元发送查找结果。
第四方面,本公开实施例提供一种重新认证授权方法,该方法由AMF执行,包括:
接收NSSAAF网元发送的重新认证授权消息,所述重新认证授权消息用于指示所述NSSAAF对AI网络功能进行重新认证和授权。
第五方面,本公开实施例提供一种重新认证授权方法,该方法由UE执行,包括:
接收重新认证授权消息,所述重新认证授权消息用于指示所述NSSAAF对AI网络功能进行重新认证和授权。
第六方面,本公开实施例提供一种通信装置,该装置被配置在NSSAAF网元中,包括:
收发模块,用于接收认证和授权服务器AAA-S网元发送的重新认证授权请求,所述重新认证授权请求包括人工智能功能选择辅助信息AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识;
处理模块,用于基于所述AIFSAI和所述第一标识对AI网络功能进行重新认证和授权。
第七方面,本公开实施例提供一种通信装置,该装置被配置在AAA-S网元中,包括:
收发模块,用于向NSSAAF网元发送重新认证授权请求,所述重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的UE的第一标识。
第八方面,本公开实施例提供一种通信装置,该装置被配置在UDM中,包括
收发模块,用于接收NSSAAF网元发送的查找请求,所述查找请求包括AIFSAI和用于标识AI网络功能所服务的UE的第一标识;
处理模块,用于基于所述AIFSAI和所述第一标识进行查找,并向所述NSSAAF网元发送查找结果。
第九方面,本公开实施例提供一种通信装置,该装置被配置在AMF中,包括:
收发模块,用于接收NSSAAF网元发送的重新认证授权消息,所述重新认证授权消息用于指示所述NSSAAF对AI网络功能进行重新认证和授权。
第十方面,本公开实施例提供一种通信装置,该装置被配置在UE中,包括:
收发模块,用于接收重新认证授权消息,所述重新认证授权消息用于指示所述NSSAAF对AI网络功能进行重新认证和授权。
第十一方面,本公开实施例提供一种通信装置,该通信装置包括处理器,当该处理器调用存储器中的计算机程序时,执行上述第一方面所述的方法。
第十二方面,本公开实施例提供一种通信装置,该通信装置包括处理器,当该处理器调用存储器中的计算机程序时,执行上述第二方面所述的方法。
第十三方面,本公开实施例提供一种通信装置,该通信装置包括处理器,当该处理器调用存储器中的计算机程序时,执行上述第三方面所述的方法。
第十四方面,本公开实施例提供一种通信装置,该通信装置包括处理器,当该处理器调用存储器中的计算机程序时,执行上述第四方面所述的方法。
第十五方面,本公开实施例提供一种通信装置,该通信装置包括处理器,当该处理器调用存储器中的计算机程序时,执行上述第五方面所述的方法。
第十六方面,本公开实施例提供一种通信装置,该通信装置包括处理器和存储器,该存储器中存储有计算机程序;所述处理器执行该存储器所存储的计算机程序,以使该通信装置执行上述第一方面所述的方法。
第十七方面,本公开实施例提供一种通信装置,该通信装置包括处理器和存储器,该存储器中存储有计算机程序;所述处理器执行该存储器所存储的计算机程序,以使该通信装置执行上述第二方面所述的方法。
第十八方面,本公开实施例提供一种通信装置,该通信装置包括处理器和存储器,该存储器中存储有计算机程序;所述处理器执行该存储器所存储的计算机程序,以使该通信装置执行上述第三方面所述的方法。
第十九方面,本公开实施例提供一种通信装置,该通信装置包括处理器和存储器,该存储器中存储有计算机程序;所述处理器执行该存储器所存储的计算机程序,以使该通信装置执行上述第四方面所述的方法。
第二十方面,本公开实施例提供一种通信装置,该通信装置包括处理器和存储器,该存储器中存储有计算机程序;所述处理器执行该存储器所存储的计算机程序,以使该通信装置执行上述第五方面所述的方法。
第二十一方面,本公开实施例提供一种通信装置,该装置包括处理器和接口电路,该接口电路用于接收代码指令并传输至该处理器,该处理器用于运行所述代码指令以使该装置执行上述第一方面所述的方法。
第二十二方面,本公开实施例提供一种通信装置,该装置包括处理器和接口电路,该接口电路用于接收代码指令并传输至该处理器,该处理器用于运行所述代码指令以使该装置执行上述第二方面所述的方法。
第二十三方面,本公开实施例提供一种通信装置,该装置包括处理器和接口电路,该接口电路用于接收代码指令并传输至该处理器,该处理器用于运行所述代码指令以使该装置执行上述第三方面所述的方法。
第二十四方面,本公开实施例提供一种通信装置,该装置包括处理器和接口电路,该接口电路用于接收代码指令并传输至该处理器,该处理器用于运行所述代码指令以使该装置执行上述第四方面所述的方法。
第二十五方面,本公开实施例提供一种通信装置,该装置包括处理器和接口电路,该接口电路用于接收代码指令并传输至该处理器,该处理器用于运行所述代码指令以使该装置执行上述第五方面所述的方法。
第二十六方面,本公开实施例提供一种通信系统,该系统包括第六方面所述的通信装置至第十方面所述的通信装置,或者,该系统包括第十一方面所述的通信装置至第十五方面所述的通信装置,或者,该系统包括第十六方面所述的通信装置至第二十方面所述的通信装置,或者,该系统包括第二十一方面所述的通信装置至第二十五方面所述的通信装置。
第二十七方面,本发明实施例提供一种计算机可读存储介质,用于储存为上述网络设备所用的指令,当所述指令被执行时,使所述终端设备执行上述第一方面至第五方面的任一方面所述的方法。
第二十八方面,本公开还提供一种包括计算机程序的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第一方面至第五方面的任一方面所述的方法。
第二十九方面,本公开提供一种芯片系统,该芯片系统包括至少一个处理器和接口,用于支持网络设备实现第一方面至第五方面的任一方面所述的方法所涉及的功能,例如,确定或处理上述方法中所涉及的数据和信息中的至少一种。在一种可能的设计中,所述芯片系统还包括存储器,所述存储器,用于保存源辅节点必要的计算机程序和数据。该芯片系统,可以由芯片构成,也可以包括芯片和其他分立器件。
第三十方面,本公开提供一种计算机程序,当其在计算机上运行时,使得计算机执行上述第一方面至第五方面的任一方面所述的方法。
附图说明
本公开上述的和/或附加的方面和优点从下面结合附图对实施例的描述中将变得明显和容易理解,其中:
图1为本公开实施例提供的一种通信系统的架构示意图;
图2为本公开另一个实施例所提供的AI网络功能的重新认证授权方法的流程示意图;
图3为本公开再一个实施例所提供的AI网络功能的重新认证授权方法的流程示意图;
图4为本公开又一个实施例所提供的AI网络功能的重新认证授权方法的流程示意图;
图5为本公开另一个实施例所提供的AI网络功能的重新认证授权方法的流程示意图;
图6为本公开再一个实施例所提供的AI网络功能的重新认证授权方法的流程示意图;
图7为本公开又一个实施例所提供的AI网络功能的重新认证授权方法的流程示意图;
图8为本公开一个实施例所提供的AI网络功能的重新认证授权方法的流程示意图;
图9为本公开另一个实施例所提供的AI网络功能的重新认证授权方法的流程示意图;
图10为本公开再一个实施例所提供的AI网络功能的重新认证授权方法的流程示意图;
图11为本公开又一个实施例所提供的AI网络功能的重新认证授权方法的流程示意图;
图12为本公开另一个实施例所提供的AI网络功能的重新认证授权方法的流程示意图;
图13为本公开再一个实施例所提供的AI网络功能的重新认证授权方法的流程示意图;
图14为本公开又一个实施例所提供的AI网络功能的重新认证授权方法的流程示意图;
图15为本公开再一个实施例所提供的AI网络功能的重新认证授权方法的流程示意图;
图16为本公开又一个实施例所提供的AI网络功能的重新认证授权方法的流程示意图;
图17为本公开另一个实施例所提供的AI网络功能的重新认证授权方法的流程示意图;
图18为本公开再一个实施例所提供的AI网络功能的重新认证授权的交互方法的流程示意图;
图19为本公开一个实施例所提供的通信装置的结构示意图;
图20为本公开另一个实施例所提供的通信装置的结构示意图;
图21为本公开一个实施例所提供的通信装置的结构示意图;
图22为本公开另一个实施例所提供的通信装置的结构示意图;
图23为本公开一个实施例所提供的通信装置的结构示意图;
图24是本公开一个实施例所提供的一种用户设备的框图;
图25为本公开一个实施例所提供的一种网络侧设备的框图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开实施例相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开实施例的一些方面相一致的装置和方法的例子。
在本公开实施例使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开实施例。在本公开实施例和所附权利要求书中所使用的单数形式的“一种”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本公开实施例可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开实施例范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”及“若”可以被解释成为“在……时”或“当……时”或“响应于确定”。
下面详细描述本公开的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的要素。下面通过参考附图描述的实施例是示例性的,旨在用于解释本公开,而不能理解为对本公开的限制。
为了便于理解,首先介绍本申请涉及的术语。
1、人工智能(Artificial Intelligence,AI)
AI是研究、开发用于模拟、延伸和扩展人的智能的理论、方法、技术及应用系统的一门新的技术科学。
2、第六代移动通信技术(6th generation mobile networks,6G)
6G网络是一个地面无线与卫星通信集成的全连接世界。通过将卫星通信整合到6G移动通信,实现全球无缝覆盖,网络信号能够抵达任何一个偏远的乡村。此外,在全球卫星定位系统、电信卫星系统、地球图像卫星系统和6G地面网络的联动支持下,地空全覆盖网络还能帮助人类预测天气、快速应对自然灾害等。
3、接入与移动性管理功能(Access and Mobility Management Function,AMF)网元
AMF网元,执行注册、连接、可达性、移动性管理。为终端设备和SMF网元提供会话管理消息传输通道,为终端设备接入时提供认证、鉴权功能;是终端设备和无线的核心网控制面的接入点。
4、认证和授权服务器(Authentication and Authorization Server,AAA-S)网元
AAA-S网元,用于对AI功能等进行认证授权处理。
5、网络切片选择的认证和授权功能(Network Slice-Spwcific Authentication and Authorization Function,NSSAAF)网元
NSSAAF网元,用于要求服务的PLMN(Public Land Mobile Network,公共陆地移动网)应根据订阅信息对HPLMN(Home Public Land Mobile Network,本地公用陆地移动网络)的S-NSSAI(单网络片选择辅助信息,Single Network Slice Selection Assistance Information)进行特定网络切片的认证和鉴权。
6、统一数据管理功能(Unified Data Management,UDM)
UDM,用于用户标识、签约数据、鉴权数据的管理、以及用户的服务网元注册管理。
本公开实施例中涉及到的各种网元/功能,其既可以是一个独立的硬件设备,也可以是在硬件设备内的通过计算机代码实现的功能,本公开实施例中并不对此做出限定。
为了更好的理解本公开实施例公开的一种确定传输配置指示状态的方法,下面首先对本公开实施例适用的通信系统进行描述。
请参见图1,图1为本公开实施例提供的一种通信系统的架构示意图。该通信系统可包括但不限于 一个网络设备和一个终端设备,图1所示的设备数量和形态仅用于举例并不构成对本公开实施例的限定,实际应用中可以包括两个或两个以上的网络设备,两个或两个以上的终端设备。图1所示的通信系统以包括一个网络设备11、一个终端设备12为例。
需要说明的是,本公开实施例的技术方案可以应用于各种通信系统。例如:长期演进(long term evolution,LTE)系统、第五代(5th generation,5G)移动通信系统、5G新空口(new radio,NR)系统,或者其他未来的新型移动通信系统等。
本公开实施例中的网络设备11是网络侧的一种用于发射或接收信号的实体。例如,网络设备11可以为演进型基站(evolved NodeB,eNB)、发送接收点(transmission reception point,TRP)、NR系统中的下一代基站(next generation NodeB,gNB)、其他未来移动通信系统中的基站或无线保真(wireless fidelity,WiFi)系统中的接入节点等。本公开的实施例对网络设备所采用的具体技术和具体设备形态不做限定。本公开实施例提供的网络设备可以是由集中单元(central unit,CU)与分布式单元(distributed unit,DU)组成的,其中,CU也可以称为控制单元(control unit),采用CU-DU的结构可以将网络设备,例如基站的协议层拆分开,部分协议层的功能放在CU集中控制,剩下部分或全部协议层的功能分布在DU中,由CU集中控制DU。
本公开实施例中的终端设备12是用户侧的一种用于接收或发射信号的实体,如手机。终端设备也可以称为终端设备(terminal)、用户设备(user equipment,UE)、移动台(mobile station,MS)、移动终端设备(mobile terminal,MT)等。终端设备可以是具备通信功能的汽车、智能汽车、手机(mobile phone)、穿戴式设备、平板电脑(Pad)、带无线收发功能的电脑、虚拟现实(virtual reality,VR)终端设备、增强现实(augmented reality,AR)终端设备、工业控制(industrial control)中的无线终端设备、无人驾驶(self-driving)中的无线终端设备、远程手术(remote medical surgery)中的无线终端设备、智能电网(smart grid)中的无线终端设备、运输安全(transportation safety)中的无线终端设备、智慧城市(smart city)中的无线终端设备、智慧家庭(smart home)中的无线终端设备等等。本公开的实施例对终端设备所采用的具体技术和具体设备形态不做限定。
可以理解的是,本公开实施例描述的通信系统是为了更加清楚的说明本公开实施例的技术方案,并不构成对于本公开实施例提供的技术方案的限定,本领域普通技术人员可知,随着系统架构的演变和新业务场景的出现,本公开实施例提供的技术方案对于类似的技术问题,同样适用。
下面参考附图对本公开实施例所提供的AI网络功能的重新认证授权方法/装置/设备及存储介质进行详细描述。
图2为本公开实施例所提供的一种AI网络功能的重新认证授权方法的流程示意图,该方法由NSSAAF网元执行,如图2所示,该AI网络功能的重新认证授权方法可以包括以下步骤:
步骤201、接收AAA-S网元发送的重新认证授权请求。
其中,在本公开的一个实施例之中,可以通过上述NSSAAF网元来执行本公开中的重新认证授权方法,以及,示例的,该NSSAAF网元可以为AIAAF(Artificial Intelligence Authentication and Authorization Function,人工智能验证和授权功能)网元。
以及,在本公开的一个实施例之中,当AI网络功能初步注册完成后,通常还需要对该AI网络功能进行重新认证授权(如当需要对该AI网络功能进行定期更新或者参数更改等操作时,即需要对该AI网络功能进行重新认证授权),此时,AAA-S网元会向AIAAF网元发送重新认证授权请求。
其中,在本公开的一个实施例之中,上述重新认证授权请求可以包括AIFSAI(AI Fuction Selection Assistance Information,人工智能功能选择辅助信息)和用于标识AI网络功能所服务的UE(User Equipment,用户设备)的第一标识。其中,在本公开的一个实施例之中,上述第一标识可以是GPSI(Generic Public Subscription Identifier,通用公共用户标识)标识。以及,在本公开的一个实施例之中,上述AIFSAI可以包括用于标识AI网络功能的第二标识,其中,该第二标识例如可以为AI网络功能对应的AI服务ID(Identifier,标识)(即AI Service ID)、AI服务类型(即AI Service type)中的至少一种。
进一步地,在本公开的一个实施例之中,上述的接收AAA-S网元发送的重新认证授权请求的方法可以包括:接收直接由AAA-S网元发送的AAA重新认证授权请求(例如可以为AAA Protocol Re-Auth Request)。其中,在本公开的一个实施例之中,AAA重新认证授权请求包括AIFSAI和第一标识。
以及,在本公开的另一个实施例之中,若该AI服务功能需要通过AAA-P(Authentication、Authorization、Accounting-Proxy,认证和授权代理)网元与其他网元进行通信,则上述的接收AAA-S 网元发送的重新认证授权请求的方法可以包括:接收AAA-S网元通过AAA-P透传的AAA重新认证授权请求。其中,在本公开的一个实施例之中,AAA重新认证授权请求可以包括AIFSAI和第一标识。
此外,还需要说明的是,在本公开的一个实施例之中,当该重新认证授权请求是在“需要对该AI网络功能进行参数更改”这一前提下由AAA-S网元发送至AIAAF网元时,该重新认证授权请求还可以包括重新认证授权对应的重新认证参数,该重新认证参数具体可以包括:AI网络功能中需要更改的参数,以及该需要更改的参数对应的更改后的结果,以便后续AIAAF网元可以基于该重新认证参数对AI网络功能进行重新认证。以及,当该重新认证授权请求是在“需要对该AI网络功能进行定期更新”这一前提下由AAA-S网元发送至AIAAF网元时,该重新认证授权请求可以仅包括AIFSAI和第一标识。
步骤202、基于AIFSAI和第一标识对AI网络功能进行重新认证和授权。
其中,在本公开的一个实施例之中,AIAAF网元基于AIFSAI和第一标识对AI网络功能进行重新认证和授权的这部分内容会在后续实施例中详细介绍。
综上所述,在本公开实施例提供的AI网络功能的重新认证授权方法之中,NSSAAF网元会接收AAA-S网元发送的重新认证授权请求,重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识,之后,NSSAAF网元会基于AIFSAI和第一标识对AI网络功能进行重新认证和授权。由此可知,本公开提供了一种AI网络功能的重新认证授权方法,可以用于对AI网络功能进行重新认证和授权,从而保证了AI网络功能的安全性,使得AI网络功能可以为UE提供安全稳定地服务。
图3为本公开实施例所提供的一种AI网络功能的重新认证授权方法的流程示意图,该方法由NSSAAF网元执行,如图3所示,该AI网络功能的重新认证授权方法可以包括以下步骤:
步骤301、接收AAA-S网元发送的重新认证授权请求。
其中,关于上述步骤201的详细介绍可以参考上述实施例描述,本公开实施例在此不做赘述。
步骤302、向UDM(Unified Data Management,统一数据管理功能)发送查找请求。
其中,在本公开的一个实施例之中,上述查找请求可以包括AIFSAI和第一标识。
以及,在本公开的一个实施例之中,AIAAF网元具体可以通过Nudm_UECM_Get向UDM发送查找请求。
进一步地,在本公开的一个实施例之中,AIAAF网元向UDM发送查找请求之后,UDM可以基于AIFSAI和第一标识进行查找,并向AIAAF网元发送查找结果。具体的,在本公开的一个实施例之中,UDM可以先查找该UDM中是否存在第二标识,其中,若UDM中存在第二标识,说明该第二标识对应的AI网络功能已成功注册,则可以对其进行重新授权认证,此时UDM可以进一步基于第一标识查找第一标识对应UE的当前服务AMF(Access and Mobility Management Function,接入与移动性管理功能标识)的AMF ID,并向AIAAF网元发送AMF ID;若UDM中不存在第二标识,说明该第二标识对应的AI网络功能没有注册成功,则无法对其进行重新授权认证,此时,UDM会向AIAAF网元发送查找失败指示。
步骤303、接收UDM发送的查找结果。
其中,在本公开的一个实施例之中,查找结果可以包括AMF ID或查找失败指示。
步骤304、响应于查找结果包括AMF ID,对AI网络功能进行重新认证和授权。
其中,在本公开的一个实施例之中,若查找结果包括AMF ID时,则说明该AI网络功能可以被重新认证,此时AIAAF即可直接对该AI网络功能进行重新认证和授权。
以及,在本公开的一个实际例之中,AIAAF对AI网络功能进行重新认证和授权时,若上述步骤201收到的重新认证授权请求中包含有重新认证参数时,则AIAAF可以基于该重新认证参数来对AI网络功能进行重新认证和授权,如:基于该重新认证参数确定出AI网络功能中需要更改的参数和该需要更改的参数对应的更改后的结果,之后,直接对该需要更改的参数进行更改。以及,若上述步骤201收到的重新认证授权请求中不包含有重新认证参数时,AIAAF网元仅需对该AI网络功能进行定期更新检查,以更新AI网络功能对应的服务日志。
综上所述,在本公开实施例提供的AI网络功能的重新认证授权方法之中,NSSAAF网元会接收 AAA-S网元发送的重新认证授权请求,重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识,之后,NSSAAF网元会基于AIFSAI和第一标识对AI网络功能进行重新认证和授权。由此可知,本公开提供了一种AI网络功能的重新认证授权方法,可以用于对AI网络功能进行重新认证和授权,从而保证了AI网络功能的安全性,使得AI网络功能可以为UE提供安全稳定地服务。
图4为本公开实施例所提供的一种AI网络功能的重新认证授权方法的流程示意图,该方法由NSSAAF网元执行,如图4所示,该AI网络功能的重新认证授权方法可以包括以下步骤:
步骤401、接收AAA-S网元发送的重新认证授权请求。
步骤402、向UDM发送查找请求。
步骤403、接收UDM发送的查找结果。
其中,关于步骤401-步骤403的详细介绍可以参考上述实施例描述,本公开实施例在此不做赘述。
步骤404、响应于查找结果包括查找失败指示,对AI网络功能不进行重新认证和授权。
其中,在本公开的一个实施例之中,当查找结果中包括查找失败指示时,说明该AI网络功能未注册成功,则AIAAF网元无法对该AI网络功能进行重新认证和授权。
综上所述,在本公开实施例提供的AI网络功能的重新认证授权方法之中,NSSAAF网元会接收AAA-S网元发送的重新认证授权请求,重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识,之后,NSSAAF网元会基于AIFSAI和第一标识对AI网络功能进行重新认证和授权。由此可知,本公开提供了一种AI网络功能的重新认证授权方法,可以用于对AI网络功能进行重新认证和授权,从而保证了AI网络功能的安全性,使得AI网络功能可以为UE提供安全稳定地服务。
图5为本公开实施例所提供的一种AI网络功能的重新认证授权方法的流程示意图,该方法由NSSAAF网元执行,如图5所示,该AI网络功能的重新认证授权方法可以包括以下步骤:
步骤501、接收AAA-S网元发送的重新认证授权请求。
步骤502、向UDM发送查找请求。
步骤503、接收UDM发送的查找结果。
其中,关于步骤501-步骤503的详细介绍可以参考上述实施例描述,本公开实施例在此不做赘述。
步骤504、响应于查找结果包括AMF ID,基于AMF ID与对应的AMF建立连接。
其中,在本公开的一个实施例之中,当查找结果中包括有AMF ID时,说明AIAAF网元后续可以对该AI网络功能进行重新认证和授权,此时,AIAAF需要先AMF ID与对应的AMF建立连接,以便后续可以向该AMF通知AIAAF将对AI网络功能进行重新认证和授权。
以及,AIAAF网元可以基于现有连接方式与该AMF ID对应的AMF建立连接,本实施例在此不做赘述。
步骤505、向AMF发送重新认证授权消息。
其中,在本公开的一个实施例之中,重新认证授权消息用于指示AIAAF网元对AI网络功能进行重新认证和授权。
综上所述,在本公开实施例提供的AI网络功能的重新认证授权方法之中,NSSAAF网元会接收AAA-S网元发送的重新认证授权请求,重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识,之后,NSSAAF网元会基于AIFSAI和第一标识对AI网络功能进行重新认证和授权。由此可知,本公开提供了一种AI网络功能的重新认证授权方法,可以用于对AI网络功能进行重新认证和授权,从而保证了AI网络功能的安全性,使得AI网络功能可以为UE提供安全稳定地服务。
图6为本公开实施例所提供的一种AI网络功能的重新认证授权方法的流程示意图,该方法由NSSAAF网元执行,如图6所示,该AI网络功能的重新认证授权方法可以包括以下步骤:
步骤601、接收AAA-S网元发送的重新认证授权请求。
步骤602、向UDM发送查找请求。
步骤603、接收UDM发送的查找结果。
步骤604、响应于查找结果包括AMF ID,对AI网络功能进行重新认证和授权。
其中,关于步骤601-步骤604的详细介绍可以参考上述实施例描述,本公开实施例在此不做赘述。
步骤605、向UDM发送认证结果。
其中,在本公开的一个实施例之中,认证结果可以包括对AI网络功能进行重新认证和授权后的参数信息。
以及,在本公开的一个实施例之中,AIAAF网元通过向UDM发送认证结果,以便UDM可以基于认证结果对AI网络功能的参数进行更新。具体的,UDM可以基于认证结果中的参数信息,将该AI网络功能中原有的参数替换为认证结果中对应的参数信息,以对AI网络功能的参数进行更新。
综上所述,在本公开实施例提供的AI网络功能的重新认证授权方法之中,NSSAAF网元会接收AAA-S网元发送的重新认证授权请求,重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识,之后,NSSAAF网元会基于AIFSAI和第一标识对AI网络功能进行重新认证和授权。由此可知,本公开提供了一种AI网络功能的重新认证授权方法,可以用于对AI网络功能进行重新认证和授权,从而保证了AI网络功能的安全性,使得AI网络功能可以为UE提供安全稳定地服务。
图7为本公开实施例所提供的一种AI网络功能的重新认证授权方法的流程示意图,该方法由NSSAAF网元执行,如图7所示,该AI网络功能的重新认证授权方法可以包括以下步骤:
步骤701、接收AAA-S网元发送的重新认证授权请求。
步骤702、向UDM发送查找请求。
步骤703、接收UDM发送的查找结果。
步骤704、响应于查找结果包括AMF ID,对AI网络功能进行重新认证和授权。
其中,关于步骤701-704的详细介绍可以参考上述实施例描述,本公开实施例在此不做赘述。
步骤705、向AAA-S网元发送重新认证授权响应,重新认证授权响应用于指示AIAAF网元对AI网络功能进行了重新认证和授权。
其中,在本公开的一个实施例之中,上述的向AAA-S网元发送重新认证授权响应的方法可以包括:直接向AAA-S网元发送AAA重新认证授权响应(如AAA Protocol Re-Auth Response),该AAA重新认证授权响应用于指示AIAAF网元对AI网络功能进行了重新认证和授权。
以及,在本公开的另一个实施例之中,若该AI服务功能需要通过AAA-P网元与其他网元进行通信,则上述的向AAA-S网元发送重新认证授权响应的方法可以包括:通过AAA-P网元向AAA-S网元透传AAA重新认证授权响应,AAA重新认证授权响应用于指示AIAAF网元对AI网络功能进行了重新认证和授权。
综上所述,在本公开实施例提供的AI网络功能的重新认证授权方法之中,NSSAAF网元会接收AAA-S网元发送的重新认证授权请求,重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识,之后,NSSAAF网元会基于AIFSAI和第一标识对AI网络功能进行重新认证和授权。由此可知,本公开提供了一种AI网络功能的重新认证授权方法,可以用于对AI网络功能进行重新认证和授权,从而保证了AI网络功能的安全性,使得AI网络功能可以为UE提供安全稳定地服务。
图8为本公开实施例所提供的一种AI网络功能的重新认证授权方法的流程示意图,该方法由NSSAAF网元执行,如图8所示,该AI网络功能的重新认证授权方法可以包括以下步骤:
步骤801、接收AAA-S网元发送的重新认证授权请求。
步骤802、向UDM发送查找请求。
步骤803、接收UDM发送的查找结果。
步骤804、响应于查找结果包括查找失败指示,对AI网络功能不进行重新认证和授权。
其中,关于步骤801-804的详细介绍可以参考上述实施例描述,本公开实施例在此不做赘述。
步骤805、向AAA-S网元发送重新认证授权响应,重新认证授权响应用于指示AIAAF网元未对 AI网络功能进行重新认证和授权。
其中,在本公开的一个实施例之中,上述的向AAA-S网元发送重新认证授权响应的方法可以包括:直接向AAA-S网元发送AAA重新认证授权响应,该AAA重新认证授权响应用于指示AIAAF网元未对AI网络功能进行重新认证和授权。
以及,在本公开的另一个实施例之中,若该AI服务功能需要通过AAA-P网元与其他网元进行通信,则上述的向AAA-S网元发送重新认证授权响应的方法可以包括:通过AAA-P网元向AAA-S网元透传AAA重新认证授权响应,AAA重新认证授权响应用于指示AIAAF网元未对AI网络功能进行重新认证和授权。
综上所述,在本公开实施例提供的AI网络功能的重新认证授权方法之中,NSSAAF网元会接收AAA-S网元发送的重新认证授权请求,重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识,之后,NSSAAF网元会基于AIFSAI和第一标识对AI网络功能进行重新认证和授权。由此可知,本公开提供了一种AI网络功能的重新认证授权方法,可以用于对AI网络功能进行重新认证和授权,从而保证了AI网络功能的安全性,使得AI网络功能可以为UE提供安全稳定地服务。
图9为本公开实施例所提供的一种AI网络功能的重新认证授权方法的流程示意图,该方法由AAA-S网元执行,如图9所示,该AI网络功能的重新认证授权方法可以包括以下步骤:
步骤901、向AIAAF网元发送重新认证授权请求。
其中,在本公开的一个实施例之中,重新认证授权请求可以包括AIFSAI和用于标识AI网络功能所服务的UE的第一标识。
以及,在本公开的一个实施例之中,上述的向AIAAF网元发送重新认证授权请求的方法可以包括:直接向AIAAF网元发送AAA重新认证授权请求。其中,在本公开的一个实施例之中,AAA重新认证授权请求包括AIFSAI和第一标识。
在本公开的另一个实施例之中,若该AI服务功能需要通过AAA-P(Authentication、Authorization、Accounting-Proxy,认证和授权代理)网元与其他网元进行通信,则上述的向AIAAF网元发送重新认证授权请求的方法可以包括:通过AAA-P网元向AIAAF网元透传AAA重新认证授权请求。其中,在本公开的一个实施例之中,AAA重新认证授权请求可以包括AIFSAI和第一标识。
关于本实施例中其它内容的详细介绍可以参考上述实施例中的相关介绍,本公开的实施例在此不做赘述。
综上所述,在本公开实施例提供的AI网络功能的重新认证授权方法之中,NSSAAF网元会接收AAA-S网元发送的重新认证授权请求,重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识,之后,NSSAAF网元会基于AIFSAI和第一标识对AI网络功能进行重新认证和授权。由此可知,本公开提供了一种AI网络功能的重新认证授权方法,可以用于对AI网络功能进行重新认证和授权,从而保证了AI网络功能的安全性,使得AI网络功能可以为UE提供安全稳定地服务。
图10为本公开实施例所提供的一种AI网络功能的重新认证授权方法的流程示意图,该方法由AAA-S网元执行,如图10所示,该AI网络功能的重新认证授权方法可以包括以下步骤:
步骤1001、向AIAAF网元发送重新认证授权请求。
步骤1002、接收AIAAF网元发送的重新认证授权响应。
其中,在本公开的一个实施例之中,上述重新认证授权响可以用于指示AIAAF网元是否对AI网络功能进行重新认证和授权。
具体的,在本公开的一个实施例之中,若AIAAF网元对AI网络功能进行了重新认证和授权,重新认证授权响应用于指示AIAAF网元对AI网络功能进行了重新认证和授权。
在本公开的另一个实施例之中,若AIAAF网元未对AI网络功能进行重新认证和授权,重新认证授权响应用于指示AIAAF网元未对AI网络功能进行重新认证和授权。
以及,在本公开的一个实施例之中,上述的接收AIAAF网元发送的重新认证授权响应的方法可以 包括:接收AIAAF网元发送的AAA重新认证授权响应。其中,在本公开的一个实施例之中,AAA重新认证授权响应可以用于指示AIAAF网元是否对AI网络功能进行重新认证和授权。
在本公开的另一个实施例之中,若该AI服务功能需要通过AAA-P网元与其他网元进行通信,则上述的接收AIAAF网元发送的重新认证授权响应的方法可以包括:接收AIAAF网元通过AAA-P网元透传的AAA重新认证授权响应。其中,在本公开的一个实施例之中,AAA重新认证授权请求可以包括AIFSAI和第一标识。
关于本实施例中其它内容的详细介绍可以参考上述实施例中的相关介绍,本公开的实施例在此不做赘述。
综上所述,在本公开实施例提供的AI网络功能的重新认证授权方法之中,NSSAAF网元会接收AAA-S网元发送的重新认证授权请求,重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识,之后,NSSAAF网元会基于AIFSAI和第一标识对AI网络功能进行重新认证和授权。由此可知,本公开提供了一种AI网络功能的重新认证授权方法,可以用于对AI网络功能进行重新认证和授权,从而保证了AI网络功能的安全性,使得AI网络功能可以为UE提供安全稳定地服务。
图11为本公开实施例所提供的一种AI网络功能的重新认证授权方法的流程示意图,该方法由UDM执行,如图11所示,该AI网络功能的重新认证授权方法可以包括以下步骤:
步骤1101、接收AIAAF网元发送的查找请求。
其中,在本公开的一个实施例之中,查找请求可以包括AIFSAI和用于标识AI网络功能所服务的UE的第一标识。
以及,在本公开的一个实施例之中,上述第一标识可以是GPSI标识。以及,在本公开的一个实施例之中,AIFSAI可以包括用于标识AI网络功能的第二标识,其中,该第二标识例如可以为AI网络功能对应的AI服务ID(Identifier,标识)(即AI Service ID)、AI服务类型(即AI Service type)中的至少一种。
步骤1102、基于AIFSAI和第一标识进行查找,并向AIAAF网元发送查找结果。
其中,在本公开的一个实施例之中,查找结果可以包括AMF ID或查找失败指示。
关于本实施例中其它内容的详细介绍可以参考上述实施例中的相关介绍,本公开的实施例在此不做赘述。
综上所述,在本公开实施例提供的AI网络功能的重新认证授权方法之中,NSSAAF网元会接收AAA-S网元发送的重新认证授权请求,重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识,之后,NSSAAF网元会基于AIFSAI和第一标识对AI网络功能进行重新认证和授权。由此可知,本公开提供了一种AI网络功能的重新认证授权方法,可以用于对AI网络功能进行重新认证和授权,从而保证了AI网络功能的安全性,使得AI网络功能可以为UE提供安全稳定地服务。
图12为本公开实施例所提供的一种AI网络功能的重新认证授权方法的流程示意图,该方法由UDM执行,如图12所示,该AI网络功能的重新认证授权方法可以包括以下步骤:
步骤1201、接收AIAAF网元发送的查找请求。
步骤1202、查找UDM中是否存在第二标识。
其中,在本申请的一个实施例之中,UDM可以基于查找该UDM中是否存在第二标识,以确定该第二标识对应的AI网络功能是否成功注册。具体的,若UDM中存在第二标识,说明该第二标识对应的AI网络功能已成功注册;否则,该第二标识对应的AI网络功能没有注册成功,UDM中没有该AI网络功能对应的信息。
步骤1203、响应于UDM中存在第二标识,基于第一标识查找第一标识对应UE的当前服务AMF的AMF ID,并向AIAAF网元发送AMF ID。
关于本实施例中其它内容的详细介绍可以参考上述实施例中的相关介绍,本公开的实施例在此不做赘述。
综上所述,在本公开实施例提供的AI网络功能的重新认证授权方法之中,NSSAAF网元会接收AAA-S网元发送的重新认证授权请求,重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识,之后,NSSAAF网元会基于AIFSAI和第一标识对AI网络功能进行重新认证和授权。由此可知,本公开提供了一种AI网络功能的重新认证授权方法,可以用于对AI网络功能进行重新认证和授权,从而保证了AI网络功能的安全性,使得AI网络功能可以为UE提供安全稳定地服务。
图13为本公开实施例所提供的一种AI网络功能的重新认证授权方法的流程示意图,该方法由UDM执行,如图13所示,该AI网络功能的重新认证授权方法可以包括以下步骤:
步骤1301、接收AIAAF网元发送的查找请求。
步骤1302、查找UDM中是否存在第二标识。
其中,在本申请的一个实施例之中,UDM可以基于查找该UDM中是否存在第二标识,以确定该第二标识对应的AI网络功能是否成功注册。具体的,若UDM中存在第二标识,说明该第二标识对应的AI网络功能已成功注册;否则,该第二标识对应的AI网络功能没有注册成功,此时,UDM中没有该AI网络功能对应的信息。
步骤1303、响应于UDM中不存在第二标识,向AIAAF网元发送查找失败指示。
关于本实施例中其它内容的详细介绍可以参考上述实施例中的相关介绍,本公开的实施例在此不做赘述。
综上所述,在本公开实施例提供的AI网络功能的重新认证授权方法之中,NSSAAF网元会接收AAA-S网元发送的重新认证授权请求,重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识,之后,NSSAAF网元会基于AIFSAI和第一标识对AI网络功能进行重新认证和授权。由此可知,本公开提供了一种AI网络功能的重新认证授权方法,可以用于对AI网络功能进行重新认证和授权,从而保证了AI网络功能的安全性,使得AI网络功能可以为UE提供安全稳定地服务。
图14为本公开实施例所提供的一种AI网络功能的重新认证授权方法的流程示意图,该方法由UDM执行,如图14所示,该AI网络功能的重新认证授权方法可以包括以下步骤:
步骤1401、接收AIAAF网元发送的查找请求。
步骤1402、基于AIFSAI和第一标识进行查找,并向AIAAF网元发送查找结果。
步骤1403、响应于查找结果包括AMF ID,接收AIAAF网元发送的认证结果。
其中,在本公开的一个实施例之中,认证结果可以包括对AI网络功能进行重新认证和授权后的参数信息。
步骤1404、基于认证结果对AI网络功能的参数进行更新。
其中,在本公开的一个实施例之中,UDM可以基于认证结果中对AI网络功能进行重新认证和授权后的参数信息,确定出该AI网络功能需要更新的参数和该参数对应的更新后的结果,之后,直接对该需要更新的参数进行更新,以对AI网络功能的参数进行更新。
关于本实施例中其它内容的详细介绍可以参考上述实施例中的相关介绍,本公开的实施例在此不做赘述。
综上所述,在本公开实施例提供的AI网络功能的重新认证授权方法之中,NSSAAF网元会接收AAA-S网元发送的重新认证授权请求,重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识,之后,NSSAAF网元会基于AIFSAI和第一标识对AI网络功能进行重新认证和授权。由此可知,本公开提供了一种AI网络功能的重新认证授权方法,可以用于对AI网络功能进行重新认证和授权,从而保证了AI网络功能的安全性,使得AI网络功能可以为UE提供安全稳定地服务。
图15为本公开实施例所提供的一种AI网络功能的重新认证授权方法的流程示意图,该方法由AMF执行,如图15所示,该AI网络功能的重新认证授权方法可以包括以下步骤:
步骤1501、接收AIAAF网元发送的重新认证授权消息。
其中,在本公开的一个实施例之中,上述重新认证授权消息可以用于指示AIAAF对AI网络功能进行重新认证和授权。
关于步骤1501的详细介绍可以参考上述实施例中的相关介绍,本公开的实施例在此不做赘述。
综上所述,在本公开实施例提供的AI网络功能的重新认证授权方法之中,NSSAAF网元会接收AAA-S网元发送的重新认证授权请求,重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识,之后,NSSAAF网元会基于AIFSAI和第一标识对AI网络功能进行重新认证和授权。由此可知,本公开提供了一种AI网络功能的重新认证授权方法,可以用于对AI网络功能进行重新认证和授权,从而保证了AI网络功能的安全性,使得AI网络功能可以为UE提供安全稳定地服务。
图16为本公开实施例所提供的一种AI网络功能的重新认证授权方法的流程示意图,该方法由AMF执行,如图16所示,该AI网络功能的重新认证授权方法可以包括以下步骤:
步骤1601、接收AIAAF网元发送的重新认证授权消息。
步骤1602、通过基站向UE透传重新认证授权消息。
其中,关于步骤1601-1602的详细介绍可以参考上述实施例中的相关介绍,本公开的实施例在此不做赘述。
综上所述,在本公开实施例提供的AI网络功能的重新认证授权方法之中,NSSAAF网元会接收AAA-S网元发送的重新认证授权请求,重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识,之后,NSSAAF网元会基于AIFSAI和第一标识对AI网络功能进行重新认证和授权。由此可知,本公开提供了一种AI网络功能的重新认证授权方法,可以用于对AI网络功能进行重新认证和授权,从而保证了AI网络功能的安全性,使得AI网络功能可以为UE提供安全稳定地服务。
图17为本公开实施例所提供的一种AI网络功能的重新认证授权方法的流程示意图,该方法由UE执行,如图17所示,该AI网络功能的重新认证授权方法可以包括以下步骤:
步骤1701、接收重新认证授权消息。
其中,在本公开的一个实施例之中,上述重新认证授权消息可以用于指示AIAAF对AI网络功能进行重新认证和授权。
以及,该重新认证授权消息可以为AMF通过基站透传至UE的。
其中,关于步骤1701的详细介绍可以参考上述实施例中的相关介绍,本公开的实施例在此不做赘述。
综上所述,在本公开实施例提供的AI网络功能的重新认证授权方法之中,NSSAAF网元会接收AAA-S网元发送的重新认证授权请求,重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识,之后,NSSAAF网元会基于AIFSAI和第一标识对AI网络功能进行重新认证和授权。由此可知,本公开提供了一种AI网络功能的重新认证授权方法,可以用于对AI网络功能进行重新认证和授权,从而保证了AI网络功能的安全性,使得AI网络功能可以为UE提供安全稳定地服务。
基于上述描述,图18为本公开一个实施例提供的一种AI网络功能的重新认证授权的交互方法,如图18所示,该交互方法可以包括以下步骤:
步骤1801、AAA-S网元向AIAAF网元发送AAA重新认证授权请求(AAA Protocol Re-Auth Request)。
其中,在本公开的一个实施例之中,AAA重新认证授权请求包括AIFSAI和用于标AI网络功能所服务的用户设备UE的第一标识。
步骤1802、若AI服务功能需要通过AAA-P网元与其他网元进行通信,则AAA-S网元通过AAA-P网元向AIAAF网元透传AAA重新认证授权请求。
步骤1803、AIAAF网元接收到AAA重新认证授权请求后,向UDM发送查找请求。
步骤1804、UDM向AIAAF网元发送查找结果。
其中,在本公开的一个实施例之中,若UDM查找到第一标识对应UE的当前服务AMF的AMF ID, 则返回AMF ID;否则,返回FALSE(查找失败指示),并结束流程。
步骤1805、响应于查找结果中包括AMF ID,AIAAF网元向AMF发送重新认证授权消息(AAA Protocol Re-Auth)
步骤1806、AMF接收AIAAF网元发送的重新认证授权消息,并通过基站向UE透传重新认证授权消息。
步骤1807、响应于查找结果中包括AMF ID,AIAAF网元对AI网络功能进行重新认证和授权。
步骤1808、AIAAF网元向UDM发送认证结果,认证结果包括对AI网络功能进行重新认证和授权后的参数信息。
其中,在本公开的一个实施例之中,UDM接收AIAAF网元发送的认证结果后,会基于认证结果对AI网络功能的参数进行更新。
步骤1809、AIAAF网元向AAA-S网元发送重新认证授权响应(AAA Protocol Re-Auth Response)重新认证授权响应用于指示AIAAF网元成功对AI网络功能进行重新认证和授权。
其中,在本公开的一个实施例之中,若AI服务功能需要通过AAA-P网元与其他网元进行通信,则AIAAF网元通过AAA-P网元向AAA-S网元透传重新认证授权响应。
以及,在本公开的一个实施例之中,响应于查找结果中包括FALSE,AIAAF网元向AAA-S网元发送重新认证授权响应,重新认证授权响应用于指示AIAAF网元未对AI网络功能进行重新认证和授权。
上述本申请提供的实施例中,分别从网络设备、UE的角度对本申请实施例提供的方法进行了介绍。为了实现上述本申请实施例提供的方法中的各功能,网络设备和UE可以包括硬件结构、软件模块,以硬件结构、软件模块、或硬件结构加软件模块的形式来实现上述各功能。上述各功能中的某个功能可以以硬件结构、软件模块、或者硬件结构加软件模块的方式来执行。
图19为本公开实施例所提供的一种通信装置的结构示意图,如图19所示,装置可以包括:
收发模块1901,用于接收AAA-S网元发送的重新认证授权请求,重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识;
处理模块1902,用于基于AIFSAI和第一标识对AI网络功能进行重新认证和授权。
综上所述,在本公开实施例提供的通信装置之中,NSSAAF网元会接收AAA-S网元发送的重新认证授权请求,重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识,之后,NSSAAF网元会基于AIFSAI和第一标识对AI网络功能进行重新认证和授权。由此可知,本公开提供了一种AI网络功能的重新认证授权方法,可以用于对AI网络功能进行重新认证和授权,从而保证了AI网络功能的安全性,使得AI网络功能可以为UE提供安全稳定地服务。
可选的,在本公开的一个实施例之中,上述收发模块1901,还用于:
接收AAA-S网元发送的AAA重新认证授权请求,AAA重新认证授权请求包括AIFSAI和第一标识。
可选的,在本公开的一个实施例之中,上述收发模块1901,还用于:
接收所述AAA-S网元通过认证和授权代理AAA-P网元透传的AAA重新认证授权请求,所述AAA重新认证授权请求包括所述AIFSAI和第一标识。
可选的,在本公开的一个实施例之中,AIFSAI包括用于标识所述AI网络功能的第二标识。
可选的,在本公开的一个实施例之中,上述处理1902,还用于:
向UDM发送查找请求,所述查找请求包括所述AIFSAI和第一标识;
接收所述UDM发送的查找结果;
基于所述查找结果确定是否对AI网络功能进行重新认证和授权;
其中,响应于所述查找结果包括AMF ID,对所述AI网络功能进行重新认证和授权;响应于所述查找结果包括查找失败指示,对所述AI网络功能不进行重新认证和授权。
可选的,在本公开的一个实施例之中,上述装置,还用于:
响应于所述查找结果包括AMF ID,基于所述AMF ID与对应的AMF建立连接;
向所述AMF发送重新认证授权消息,所述重新认证授权消息用于指示所述NSSAAF对AI网络功能进行重新认证和授权。
可选的,在本公开的一个实施例之中,重新认证授权请求中还包括重新认证授权对应的重新认证参数;上述处理模块1902,还用于:
基于所述重新认证参数对所述AI网络功能进行重新认证和授权。
可选的,在本公开的一个实施例之中,响应于对AI网络功能进行重新认证和授权,所述装置,还用于:
向所述UDM发送认证结果,所述认证结果包括对所述AI网络功能进行重新认证和授权后的参数信息。
可选的,在本公开的一个实施例之中,所述装置,还用于:
向所述AAA-S网元发送重新认证授权响应,所述重新认证授权响应用于指示所述NSSAAF网元是否对所述AI网络功能进行重新认证和授权。
可选的,在本公开的一个实施例之中,所述装置,还用于:
向所述AAA-S网元发送AAA重新认证授权响应,所述AAA重新认证授权响应用于指示所述NSSAAF网元是否对所述AI网络功能进行重新认证和授权。
可选的,在本公开的一个实施例之中,所述装置,还用于:
通过AAA-P网元向所述AAA-S网元透传AAA重新认证授权响应,所述AAA重新认证授权响应用于指示所述NSSAAF网元是否对所述AI网络功能进行重新认证和授权。
图20为本公开实施例所提供的一种通信装置的结构示意图,如图20所示,装置可以包括:
收发模块2001,用于向NSSAAF网元发送重新认证授权请求,重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的UE的第一标识。
综上所述,在本公开实施例提供的通信装置之中,NSSAAF网元会接收AAA-S网元发送的重新认证授权请求,重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识,之后,NSSAAF网元会基于AIFSAI和第一标识对AI网络功能进行重新认证和授权。由此可知,本公开提供了一种AI网络功能的重新认证授权方法,可以用于对AI网络功能进行重新认证和授权,从而保证了AI网络功能的安全性,使得AI网络功能可以为UE提供安全稳定地服务。
可选的,在本公开的一个实施例之中,上述收发模块2001,还用于:
向NSSAAF网元发送AAA重新认证授权请求,AAA重新认证授权请求包括AIFSAI和第一标识。
可选的,在本公开的一个实施例之中,所述配置模块,还用于:
通过AAA-P网元向NSSAAF网元透传AAA重新认证授权请求,所述AAA重新认证授权请求包括所述AIFSAI和第一标识。
可选的,在本公开的一个实施例之中,AIFSAI包括用于标识AI网络功能的第二标识。
可选的,在本公开的一个实施例之中,所述装置还用于:
接收所述NSSAAF网元发送的重新认证授权响应,所述重新认证授权响应用于指示所述NSSAAF网元是否对所述AI网络功能进行重新认证和授权。
可选的,在本公开的一个实施例之中,所述装置还用于:
接收所述NSSAAF网元发送的AAA重新认证授权响应,所述AAA重新认证授权响应用于指示所述NSSAAF网元是否对所述AI网络功能进行重新认证和授权。
可选的,在本公开的一个实施例之中,所述装置还用于:
接收所述NSSAAF网元通过AAA-P网元透传的AAA重新认证授权响应,所述AAA重新认证授权响应用于指示所述NSSAAF网元是否对所述AI网络功能进行重新认证和授权。
图21为本公开实施例所提供的一种通信装置的结构示意图,如图21所示,装置可以包括:
收发模块2101,用于接收NSSAAF网元发送的查找请求,查找请求包括AIFSAI和用于标识AI网络功能所服务的UE的第一标识;
处理模块2102,用于基于AIFSAI和第一标识进行查找,并向NSSAAF网元发送查找结果。
综上所述,在本公开实施例提供的通信装置之中,NSSAAF网元会接收AAA-S网元发送的重新认证授权请求,重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识,之后,NSSAAF网元会基于AIFSAI和第一标识对AI网络功能进行重新认证和授权。由此可知,本公开提供了一种AI网络功能的重新认证授权方法,可以用于对AI网络功能进行重新认证和授权,从而保证了AI网络功能的安全性,使得AI网络功能可以为UE提供安全稳定地服务。
可选的,在本公开的一个实施例之中,AIFSAI包括用于标识AI网络功能的第二标识;上述处理模块2102还用于:
查找所述UDM中是否存在所述第二标识;
响应于所述UDM中存在所述第二标识,基于所述第一标识查找所述第一标识对应UE的当前服务AMF的AMF ID,并向所述NSSAAF网元发送所述AMF ID;
响应于所述UDM中不存在所述第二标识,向所述NSSAAF网元发送查找失败指示。
可选的,在本公开的一个实施例之中,响应于查找结果包括AMF ID,上述装置还用于:
接收所述NSSAAF网元发送的认证结果,所述认证结果包括对所述AI网络功能进行重新认证和授权后的参数信息;
基于所述认证结果对所述AI网络功能的参数进行更新。
图22为本公开实施例所提供的一种通信装置的结构示意图,如图22所示,装置可以包括:
收发模块2201,用于接收NSSAAF网元发送的重新认证授权消息,所述重新认证授权消息用于指示所述NSSAAF对AI网络功能进行重新认证和授权。
综上所述,在本公开实施例提供的通信装置之中,NSSAAF网元会接收AAA-S网元发送的重新认证授权请求,重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识,之后,NSSAAF网元会基于AIFSAI和第一标识对AI网络功能进行重新认证和授权。由此可知,本公开提供了一种AI网络功能的重新认证授权方法,可以用于对AI网络功能进行重新认证和授权,从而保证了AI网络功能的安全性,使得AI网络功能可以为UE提供安全稳定地服务。
可选的,在本公开的一个实施例之中,上述装置还用于:
通过基站向UE透传所述重新认证授权消息。
图23为本公开实施例所提供的一种通信装置的结构示意图,如图23所示,装置可以包括:
收发模块2301,用于接收NSSAAF网元发送的重新认证授权消息,重新认证授权消息用于指示所述NSSAAF对AI网络功能进行重新认证和授权。
综上所述,在本公开实施例提供的通信装置之中,NSSAAF网元会接收AAA-S网元发送的重新认证授权请求,重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识,之后,NSSAAF网元会基于AIFSAI和第一标识对AI网络功能进行重新认证和授权。由此可知,本公开提供了一种AI网络功能的重新认证授权方法,可以用于对AI网络功能进行重新认证和授权,从而保证了AI网络功能的安全性,使得AI网络功能可以为UE提供安全稳定地服务。
请参见图24,图24是本申请实施例提供的一种通信装置2400的结构示意图。通信装置2400可以是网络设备,也可以是终端设备,也可以是支持网络设备实现上述方法的芯片、芯片系统、或处理器等,还可以是支持终端设备实现上述方法的芯片、芯片系统、或处理器等。该装置可用于实现上述方法实施例中描述的方法,具体可以参见上述方法实施例中的说明。
通信装置2400可以包括一个或多个处理器2401。处理器2401可以是通用处理器或者专用处理器等。例如可以是基带处理器或中央处理器。基带处理器可以用于对通信协议以及通信数据进行处理,中央处理器可以用于对通信装置(如,基站、基带芯片,终端设备、终端设备芯片,DU或CU等)进行控制,执行计算机程序,处理计算机程序的数据。
可选的,通信装置2400中还可以包括一个或多个存储器2402,其上可以存有计算机程序2404,处理器2401执行所述计算机程序2404,以使得通信装置2400执行上述方法实施例中描述的方法。可选的,所述存储器2402中还可以存储有数据。通信装置2400和存储器2402可以单独设置,也可以集成在一起。
可选的,通信装置2400还可以包括收发器2405、天线2406。收发器2405可以称为收发单元、收发机、或收发电路等,用于实现收发功能。收发器2405可以包括接收器和发送器,接收器可以称为接收机或接收电路等,用于实现接收功能;发送器可以称为发送机或发送电路等,用于实现发送功能。
可选的,通信装置2400中还可以包括一个或多个接口电路2407。接口电路2407用于接收代码指令并传输至处理器2401。处理器2401运行所述代码指令以使通信装置2400执行上述方法实施例中描述的方法。
通信装置2400为NSSAAF网元:收发器2405用于执行图2中的步骤201;图3中的步骤301至步骤303;图4中的步骤401至步骤403;图5中的步骤501至步骤503、步骤505;图6中的步骤601至步骤603、步骤605;图7中的步骤701至步骤703、步骤705;图8中的步骤801至步骤803、步骤805。处理器2401用于执行图2中的步骤202;图3中的步骤304;图4中的步骤404;图5中的步骤504;图6中的步骤604;图7中的步骤704;图8中的步骤804。
通信装置2400为AMF网元:收发器2405用于执行图15中的步骤1501;图16中的步骤1601至步骤1602。
通信装置2400为AAA-S网元:收发器2405用于执行图9中的步骤901;图10中的步骤1001至步骤1002。处理器2401用于执行图5中的步骤504。
通信装置2400为UDM:收发器2405用于执行图11中的步骤1101;图12中的步骤1201;图13中步骤1301、步骤1303;图14中的步骤1401、步骤1403。处理器2401用于执行图11中的步骤1102;图12中的步骤1202;图13中的步骤1302;图14中的步骤1402、步骤1404。
通信装置2400为终端设备:收发器2405用于执行图17中的步骤1701。
在一种实现方式中,处理器2401中可以包括用于实现接收和发送功能的收发器。例如该收发器可以是收发电路,或者是接口,或者是接口电路。用于实现接收和发送功能的收发电路、接口或接口电路可以是分开的,也可以集成在一起。上述收发电路、接口或接口电路可以用于代码/数据的读写,或者,上述收发电路、接口或接口电路可以用于信号的传输或传递。
在一种实现方式中,处理器2401可以存有计算机程序2403,计算机程序2403在处理器2401上运行,可使得通信装置2400执行上述方法实施例中描述的方法。计算机程序2403可能固化在处理器2401中,该种情况下,处理器2401可能由硬件实现。
在一种实现方式中,通信装置2400可以包括电路,所述电路可以实现前述方法实施例中发送或接收或者通信的功能。本申请中描述的处理器和收发器可实现在集成电路(integrated circuit,IC)、模拟IC、射频集成电路RFIC、混合信号IC、专用集成电路(application specific integrated circuit,ASIC)、印刷电路板(printed circuit board,PCB)、电子设备等上。该处理器和收发器也可以用各种IC工艺技术来制造,例如互补金属氧化物半导体(complementary metal oxide semiconductor,CMOS)、N型金属氧化物半导体(nMetal-oxide-semiconductor,NMOS)、P型金属氧化物半导体(positive channel metal oxide semiconductor,PMOS)、双极结型晶体管(bipolar junction transistor,BJT)、双极CMOS(BiCMOS)、硅锗(SiGe)、砷化镓(GaAs)等。
以上实施例描述中的通信装置可以是网络设备或者终端设备,但本申请中描述的通信装置的范围并不限于此,而且通信装置的结构可以不受图24的限制。通信装置可以是独立的设备或者可以是较大设备的一部分。例如所述通信装置可以是:
(1)独立的集成电路IC,或芯片,或,芯片系统或子系统;
(2)具有一个或多个IC的集合,可选的,该IC集合也可以包括用于存储数据,计算机程序的存储部件;
(3)ASIC,例如调制解调器(Modem);
(4)可嵌入在其他设备内的模块;
(5)接收机、终端设备、智能终端设备、蜂窝电话、无线设备、手持机、移动单元、车载设备、网络设备、云设备、人工智能设备等等;
(6)其他等等。
对于通信装置可以是芯片或芯片系统的情况,可参见图25所示的芯片的结构示意图。图25所示的芯片包括处理器2501和接口2502。其中,处理器2501的数量可以是一个或多个,接口2502的数量可以是多个。
可选的,芯片还包括存储器2503,存储器2503用于存储必要的计算机程序和数据。
本领域技术人员还可以了解到本申请实施例列出的各种说明性逻辑块(illustrative logical block)和步骤(step)可以通过电子硬件、电脑软件,或两者的结合进行实现。这样的功能是通过硬件还是软件来实现取决于特定的应用和整个系统的设计要求。本领域技术人员可以对于每种特定的应用,可以使用各种方法实现所述的功能,但这种实现不应被理解为超出本申请实施例保护的范围。
本申请还提供一种可读存储介质,其上存储有指令,该指令被计算机执行时实现上述任一方法实施例的功能。
本申请还提供一种计算机程序产品,该计算机程序产品被计算机执行时实现上述任一方法实施例的功能。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机程序。在计算机上加载和执行所述计算机程序时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机程序可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机程序可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬盘(solid state disk,SSD))等。
本领域普通技术人员可以理解:本申请中涉及的第一、第二等各种数字编号仅为描述方便进行的区分,并不用来限制本申请实施例的范围,也表示先后顺序。
本申请中的至少一个还可以描述为一个或多个,多个可以是两个、三个、四个或者更多个,本申请不做限制。在本申请实施例中,对于一种技术特征,通过“第一”、“第二”、“第三”、“A”、“B”、“C”和“D”等区分该种技术特征中的技术特征,该“第一”、“第二”、“第三”、“A”、“B”、“C”和“D”描述的技术特征间无先后顺序或者大小顺序。
本申请中各表所示的对应关系可以被配置,也可以是预定义的。各表中的信息的取值仅仅是举例,可以配置为其他值,本申请并不限定。在配置信息与各参数的对应关系时,并不一定要求必须配置各表中示意出的所有对应关系。例如,本申请中的表格中,某些行示出的对应关系也可以不配置。又例如,可以基于上述表格做适当的变形调整,例如,拆分,合并等等。上述各表中标题示出参数的名称也可以采用通信装置可理解的其他名称,其参数的取值或表示方式也可以通信装置可理解的其他取值或表示方式。上述各表在实现时,也可以采用其他的数据结构,例如可以采用数组、队列、容器、栈、线性表、指针、链表、树、图、结构体、类、堆、散列表或哈希表等。
本申请中的预定义可以理解为定义、预先定义、存储、预存储、预协商、预配置、固化、或预烧制。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。 因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (32)

  1. 一种AI网络功能的重新认证授权方法,其特征在于,被网络切片选择的认证和授权功能NSSAAF网元执行,包括:
    接收认证和授权服务器AAA-S网元发送的重新认证授权请求,所述重新认证授权请求包括人工智能功能选择辅助信息AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识;
    基于所述AIFSAI和所述第一标识对AI网络功能进行重新认证和授权。
  2. 如权利要求1所述的方法,其特征在于,所述接收AAA-S网元发送的重新认证授权请求,包括:
    接收所述AAA-S网元发送的AAA重新认证授权请求,所述AAA重新认证授权请求包括所述AIFSAI和第一标识。
  3. 如权利要求1所述的方法,其特征在于,所述接收AAA-S网元发送的重新认证授权请求,包括:
    接收所述AAA-S网元通过认证和授权代理AAA-P网元透传的AAA重新认证授权请求,所述AAA重新认证授权请求包括所述AIFSAI和第一标识。
  4. 如权利要求1-3任一所述的方法,其特征在于,所述AIFSAI包括用于标识所述AI网络功能的第二标识。
  5. 如权利要求4所述的方法,其特征在于,所述基于所述AIFSAI和所述第一标识对AI网络功能进行重新认证和授权,包括:
    向统一数据管理功能UDM发送查找请求,所述查找请求包括所述AIFSAI和第一标识;
    接收所述UDM发送的查找结果;
    基于所述查找结果确定是否对AI网络功能进行重新认证和授权;
    其中,响应于所述查找结果包括接入与移动性管理功能标识AMF ID,对所述AI网络功能进行重新认证和授权;响应于所述查找结果包括查找失败指示,对所述AI网络功能不进行重新认证和授权。
  6. 如权利要求5所述的方法,其特征在于,所述方法还包括:
    响应于所述查找结果包括AMF ID,基于所述AMF ID与对应的AMF建立连接;
    向所述AMF发送重新认证授权消息,所述重新认证授权消息用于指示所述NSSAAF对AI网络功能进行重新认证和授权。
  7. 如权利要求5所述的方法,其特征在于,所述重新认证授权请求中还包括重新认证授权对应的重新认证参数;
    所述对所述AI网络功能进行重新认证和授权,包括:
    基于所述重新认证参数对所述AI网络功能进行重新认证和授权。
  8. 如权利要求5所述的方法,其特征在于,响应于对所述AI网络功能进行重新认证和授权,所述方法还包括:
    向所述UDM发送认证结果,所述认证结果包括对所述AI网络功能进行重新认证和授权后的参数信息。
  9. 如权利要求5所述的方法,其特征在于,所述方法还包括:
    向所述AAA-S网元发送重新认证授权响应,所述重新认证授权响应用于指示所述NSSAAF网元是否对所述AI网络功能进行重新认证和授权。
  10. 如权利要求9所述的方法,其特征在于,所述向所述AAA-S网元发送重新认证授权响应,包括:
    向所述AAA-S网元发送AAA重新认证授权响应,所述AAA重新认证授权响应用于指示所述NSSAAF网元是否对所述AI网络功能进行重新认证和授权。
  11. 如权利要求9所述的方法,其特征在于,所述向所述AAA-S网元发送重新认证授权响应,包括:
    通过AAA-P网元向所述AAA-S网元透传AAA重新认证授权响应,所述AAA重新认证授权响应 用于指示所述NSSAAF网元是否对所述AI网络功能进行重新认证和授权。
  12. 一种AI网络功能的重新认证授权方法,其特征在于,被AAA-S网元执行,包括:
    向NSSAAF网元发送重新认证授权请求,所述重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的UE的第一标识。
  13. 如权利要求12所述的方法,其特征在于,所述向NSSAAF网元发送重新认证授权请求,包括:
    向所述NSSAAF网元发送AAA重新认证授权请求,所述AAA重新认证授权请求包括所述AIFSAI和第一标识。
  14. 如权利要求12所述的方法,其特征在于,所述向NSSAAF网元发送重新认证授权请求,包括:
    通过AAA-P网元向NSSAAF网元透传AAA重新认证授权请求,所述AAA重新认证授权请求包括所述AIFSAI和第一标识。
  15. 如权利要求12-14任一所述的方法,其特征在于,所述AIFSAI包括用于标识所述AI网络功能的第二标识。
  16. 如权利要求12所述的方法,其特征在于,所述方法还包括:
    接收所述NSSAAF网元发送的重新认证授权响应,所述重新认证授权响应用于指示所述NSSAAF网元是否对所述AI网络功能进行重新认证和授权。
  17. 如权利要求16所述的方法,其特征在于,所述接收所述NSSAAF网元发送的重新认证授权响应,包括:
    接收所述NSSAAF网元发送的AAA重新认证授权响应,所述AAA重新认证授权响应用于指示所述NSSAAF网元是否对所述AI网络功能进行重新认证和授权。
  18. 如权利要求16所述的方法,其特征在于,所述接收所述NSSAAF网元发送的重新认证授权响应,包括:
    接收所述NSSAAF网元通过AAA-P网元透传的AAA重新认证授权响应,所述AAA重新认证授权响应用于指示所述NSSAAF网元是否对所述AI网络功能进行重新认证和授权。
  19. 一种AI网络功能的重新认证授权方法,其特征在于,被UDM执行,包括:
    接收NSSAAF网元发送的查找请求,所述查找请求包括AIFSAI和用于标识AI网络功能所服务的UE的第一标识;
    基于所述AIFSAI和所述第一标识进行查找,并向所述NSSAAF网元发送查找结果。
  20. 如权利要求19所述的方法,其特征在于,所述AIFSAI包括用于标识AI网络功能的第二标识;
    所述基于所述AIFSAI和所述第一标识进行查找,并向所述NSSAAF网元发送查找结果,包括:
    查找所述UDM中是否存在所述第二标识;
    响应于所述UDM中存在所述第二标识,基于所述第一标识查找所述第一标识对应UE的当前服务AMF的AMF ID,并向所述NSSAAF网元发送所述AMF ID;
    响应于所述UDM中不存在所述第二标识,向所述NSSAAF网元发送查找失败指示。
  21. 如权利要求19所述的方法,其特征在于,响应于所述查找结果包括AMF ID,所述方法还包括:
    接收所述NSSAAF网元发送的认证结果,所述认证结果包括对所述AI网络功能进行重新认证和授权后的参数信息;
    基于所述认证结果对所述AI网络功能的参数进行更新。
  22. 一种AI网络功能的重新认证授权方法,其特征在于,被AMF执行,包括:
    接收NSSAAF网元发送的重新认证授权消息,所述重新认证授权消息用于指示所述NSSAAF对AI网络功能进行重新认证和授权。
  23. 如权利要求21所述的方法,其特征在于,所述方法还包括:
    通过基站向UE透传所述重新认证授权消息。
  24. 一种AI网络功能的重新认证授权方法,其特征在于,被UE执行,包括:
    接收重新认证授权消息,所述重新认证授权消息用于指示所述NSSAAF对AI网络功能进行重新认 证和授权。
  25. 一种通信装置,被配置在NSSAAF网元,包括:
    收发模块,用于接收认证和授权服务器AAA-S网元发送的重新认证授权请求,所述重新认证授权请求包括人工智能功能选择辅助信息AIFSAI和用于标识AI网络功能所服务的用户设备UE的第一标识;
    处理模块,用于基于所述AIFSAI和所述第一标识对AI网络功能进行重新认证和授权。
  26. 一种通信装置,被配置在AAA-S网元中,包括:
    收发模块,用于向NSSAAF网元发送重新认证授权请求,所述重新认证授权请求包括AIFSAI和用于标识AI网络功能所服务的UE的第一标识。
  27. 一种通信装置,被配置在UDM中,包括:
    收发模块,用于接收NSSAAF网元发送的查找请求,所述查找请求包括AIFSAI和用于标识AI网络功能所服务的UE的第一标识;
    处理模块,用于基于所述AIFSAI和所述第一标识进行查找,并向所述NSSAAF网元发送查找结果。
  28. 一种通信装置,被配置在AMF中,包括:
    收发模块,用于接收NSSAAF网元发送的重新认证授权消息,所述重新认证授权消息用于指示所述NSSAAF对AI网络功能进行重新认证和授权。
  29. 一种通信装置,被配置在UE中,包括:
    收发模块,用于接收重新认证授权消息,所述重新认证授权消息用于指示所述NSSAAF对AI网络功能进行重新认证和授权。
  30. 一种通信装置,其特征在于,所述装置包括处理器和存储器,其中,所述存储器中存储有计算机程序,所述处理器执行所述存储器中存储的计算机程序,以使所述装置执行如权利要求1至11中任一项所述的方法,或所述处理器执行所述存储器中存储的计算机程序,以使所述装置执行如权利要求12至18中任一项所述的方法,或所述处理器执行所述存储器中存储的计算机程序,以使所述装置执行如权利要求19至21中任一项所述的方法,或所述处理器执行所述存储器中存储的计算机程序,以使所述装置执行如权利要求22至23中任一项所述的方法,或所述处理器执行所述存储器中存储的计算机程序,以使所述装置执行如权利要求24中所述的方法。
  31. 一种通信装置,其特征在于,包括:处理器和接口电路,其中
    所述接口电路,用于接收代码指令并传输至所述处理器;
    所述处理器,用于运行所述代码指令以执行如权利要求1至11中任一项所述的方法,或用于运行所述代码指令以执行如权利要求12至18中任一项所述的方法,或用于运行所述代码指令以执行如权利要求19至21中任一项所述的方法,或用于运行所述代码指令以执行如权利要求22至23中任一项所述的方法,或用于运行所述代码指令以执行如权利要求24中所述的方法。
  32. 一种计算机可读存储介质,用于存储有指令,当所述指令被执行时,使如权利要求1至11中任一项所述的方法被实现,或当所述指令被执行时,使如权利要求12至18中任一项所述的方法被实现,或当所述指令被执行时,使如权利要求19至21中任一项所述的方法被实现,或当所述指令被执行时,使如权利要求22至23中任一项所述的方法被实现,或当所述指令被执行时,使如权利要求24中所述的方法被实现。
PCT/CN2022/094806 2022-05-24 2022-05-24 一种ai网络功能的重新认证授权方法/装置/设备及存储介质 WO2023225878A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/094806 WO2023225878A1 (zh) 2022-05-24 2022-05-24 一种ai网络功能的重新认证授权方法/装置/设备及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/094806 WO2023225878A1 (zh) 2022-05-24 2022-05-24 一种ai网络功能的重新认证授权方法/装置/设备及存储介质

Publications (1)

Publication Number Publication Date
WO2023225878A1 true WO2023225878A1 (zh) 2023-11-30

Family

ID=88918269

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/094806 WO2023225878A1 (zh) 2022-05-24 2022-05-24 一种ai网络功能的重新认证授权方法/装置/设备及存储介质

Country Status (1)

Country Link
WO (1) WO2023225878A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021089703A1 (en) * 2019-11-08 2021-05-14 Telefonaktiebolaget Lm Ericsson (Publ) Storage of network slice authorization status
WO2021133092A1 (en) * 2019-12-24 2021-07-01 Samsung Electronics Co., Ltd. Method and apparatus to manage nssaa procedure in wireless communication network
CN114270931A (zh) * 2019-07-03 2022-04-01 中兴通讯股份有限公司 用于网络切片的授权方法
CN114301788A (zh) * 2020-09-22 2022-04-08 华为技术有限公司 一种切片管理方法、装置及通信设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114270931A (zh) * 2019-07-03 2022-04-01 中兴通讯股份有限公司 用于网络切片的授权方法
WO2021089703A1 (en) * 2019-11-08 2021-05-14 Telefonaktiebolaget Lm Ericsson (Publ) Storage of network slice authorization status
WO2021133092A1 (en) * 2019-12-24 2021-07-01 Samsung Electronics Co., Ltd. Method and apparatus to manage nssaa procedure in wireless communication network
CN114301788A (zh) * 2020-09-22 2022-04-08 华为技术有限公司 一种切片管理方法、装置及通信设备

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HUAWEI, HISILICON: "Sending NSSAI to AAA", 3GPP DRAFT; S3-201154, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG3, no. Online Meeting ;20200511 - 20200515, 1 May 2020 (2020-05-01), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051879793 *

Similar Documents

Publication Publication Date Title
CN114342483B (zh) 接入控制方法及装置
WO2024077455A1 (zh) 一种非陆地网络的接入方法及装置
WO2023225878A1 (zh) 一种ai网络功能的重新认证授权方法/装置/设备及存储介质
CN115997392A (zh) 侧行链路定位消息的发送方法、接收方法及其装置
WO2023221000A1 (zh) 一种核心网中ai功能的认证授权方法及其装置
WO2024016191A1 (zh) 一种限制信息确定方法/装置/设备及存储介质
WO2024050778A1 (zh) 一种人工智能服务策略的更新方法及装置
WO2024065706A1 (zh) 一种构建连接的方法及装置
WO2024098219A1 (zh) 一种密钥分发方法、装置、设备及存储介质
WO2024082233A1 (zh) 移动性限制实现方法和装置
WO2023173257A1 (zh) 一种请求系统信息的方法及其装置
WO2024011432A1 (zh) 一种信息传输方法及其装置
WO2024011545A1 (zh) 切换方法及装置
WO2024011638A1 (zh) 一种路径切换方法、装置、设备及存储介质
WO2024020751A1 (zh) 一种第三方服务管理方法/装置/设备及存储介质
WO2023206035A1 (zh) 跨网络的切换认证方法和装置
WO2023245520A1 (zh) 一种定位服务的直接通信方法及装置
WO2023245452A1 (zh) 一种系统信息配置方法/装置/设备及存储介质
WO2024026890A1 (zh) 一种定位方法/装置/设备及存储介质
WO2024026697A1 (zh) 一种卫星终端接入移动网络的方法及其装置
WO2023184452A1 (zh) 终端设备使用的模型的确定方法和装置
WO2023216034A1 (zh) 一种校验位置信息的方法及其装置
WO2024065339A1 (zh) 一种网络卫星覆盖数据的授权方法、设备及存储介质
WO2023147708A1 (zh) 一种人工智能会话的更新方法及其装置
CN118160336A (zh) 一种构建连接的方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22943084

Country of ref document: EP

Kind code of ref document: A1