WO2024032245A1 - Communication method and communication apparatus - Google Patents

Communication method and communication apparatus Download PDF

Info

Publication number
WO2024032245A1
WO2024032245A1 PCT/CN2023/104692 CN2023104692W WO2024032245A1 WO 2024032245 A1 WO2024032245 A1 WO 2024032245A1 CN 2023104692 W CN2023104692 W CN 2023104692W WO 2024032245 A1 WO2024032245 A1 WO 2024032245A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
sepp
network element
information
network
Prior art date
Application number
PCT/CN2023/104692
Other languages
French (fr)
Chinese (zh)
Inventor
邵国强
石玺
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2024032245A1 publication Critical patent/WO2024032245A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update

Definitions

  • the embodiments of the present application relate to the field of communication, and more specifically, to a communication method and a communication device.
  • the service-oriented interface of the 5G core network carries a large amount of topology information. If this topology information is not processed, it may flow out of the control scope of the local network along with the roaming interface and interworking interface. Therefore, the topology information needs to be hidden when sending a message and restored when the message is received.
  • Embodiments of the present application provide a communication method and a communication device, which can correctly restore hidden topology information, thereby avoiding service failure caused by differences between the first SEPP and the second SEPP.
  • a communication method includes: in response to a first network element sending a first request message to a second network, the first security and border proxy network element SEPP according to the first algorithm and the first encryption
  • the key ID generates hidden information, which is the hidden topology information of the first network element
  • the first SEPP sends a first message to the second network, the first message includes the first request message and the hidden information, and the hidden information
  • the information carries the first key ID
  • the second SEPP receives the second message sent by the second network in response to the first message, the second message includes the first reply message and the hidden information, the first SEPP and the third
  • the two SEPPs belong to the first network, and the first SEPP and the second SEPP are preset with the first algorithm and the first key ID; the second SEPP restores the hidden information based on the first key ID, and then obtains the Topology information of the first network element, so as to route the first reply message to the first network element according to the topology information of the first network element.
  • the second SEPP recovers the hidden information according to the first key ID based on the first algorithm.
  • the first network element is any one of the access and mobility management function AMF, the session management function SMF, the unified data management UDM, the user plane function UPF, the authentication server function AUSF, and the short message service function SMSF.
  • the first SEPP and the second SEPP are the same SEPP.
  • SEPP by presetting the same algorithm and key ID information on SEPPs in the same network, the functions of mutual hiding and recovery of topology information between different SEPPs on the same network can be realized, thereby realizing the functions of all SEPPs in the same network.
  • SEPP receives the topology hidden information that needs to be restored, it can correctly restore the hidden topology information, thereby further routing the corresponding message to the correct address based on the topology information, and avoiding service failures caused by different SEPPs.
  • the first SEPP generates hidden information, including: the first SEPP receives a first request message sent by the first network element and the topology information of the first network element; A SEPP encrypts the topology information of the first network element according to the first algorithm and the first key ID, and then generates the hidden information.
  • encryption is used to hide the topology information in the message.
  • the topology information between different SEPPs on the same network can be mutually communicated. Hide and restore functionality.
  • the first SEPP sends a first message to the second network, including: the first SEPP generates a first fully qualified domain name FQDN, where the first FQDN includes the hidden information and the third A key ID; the first SEPP sends a first message to the second network, where the first message includes the first request message and the first FQDN.
  • the first FQDN also includes domain information of the first network element.
  • the hidden information carried by the message may exist in the FQDN, and the FQDN also includes the first network
  • the FQDN also includes the first network
  • a communication method in response to the first network element sending a first request message to the second network, the first security and border proxy network element SEPP sends the first request message to the second network.
  • the first message includes the first request message and first indication information, the first indication information is used to indicate that the routing category corresponding to the first SEPP is strict routing;
  • the first SEPP receives the response from the second network to The first message, the second message sent according to the first path, the second message includes the first reply message, the first path is generated by the second network according to the path of the first message, the first path includes a or multiple devices, each of the one or more devices corresponds to a routing category, and the routing category includes strict routing;
  • the first SEPP sends the first reply message to the first network element.
  • this route category also includes relaxed routes.
  • the routing category corresponding to a device included in the message path is strict routing, then the message sent along the message path must pass through the device; if the routing category corresponding to a device included in the message path is loose routing , then the message sent according to the message path may or may not pass through the device.
  • the first network element is any one of the access and mobility management function AMF, the session management function SMF, the unified data management UDM, the user plane function UPF, the authentication server function AUSF, and the short message service function SMSF.
  • the path of the request message is recorded, and the path of the reply message is generated based on the path, and the SEPP in the path is marked as strict routing, so that the reply message corresponding to the request message must go through the path marked as strict routing.
  • SEPP in this way, the message path can be controlled so that messages are sent and received through the same SEPP, thereby avoiding service failures caused by different SEPPs.
  • the first message further includes hidden information, the hidden information being the hidden topology information of the first network element
  • the second message further includes the hidden information
  • the third A SEPP sends the first reply message to the first network element, including: the first SEPP restores the hidden information to the topology information of the first network element; the first SEPP sends the first reply message to the first network element according to the topology information of the first network element.
  • the first network element sends the first reply message.
  • the first SEPP generates the hidden information by encrypting the topology information of the first network element.
  • the method further includes: the first SEPP receiving the first request message sent by the first network element and the topology information of the first network element.
  • messages with destination addresses hidden by SEPP can be routed to itself, thereby avoiding the situation where messages are routed to other SEPPs and cannot be recovered, thereby making the hidden Topology information can be restored correctly, avoiding service failures caused by different SEPPs.
  • a communication method includes: the second network element receives a first message sent by the first security and border proxy network element SEPP, where the first message includes a first request message and first indication information, The first indication information is used to indicate that the routing category corresponding to the first SEPP is strict routing; the second network element generates a first path according to the path of the first message, and the first path includes one or more devices. Or multiple devices each correspond to a routing category, and the routing category includes strict routing; in response to the first message, the second network element sends a second message to the first SEPP according to the first path, the second message includes the One reply message.
  • the second network element sends a second message to the first SEPP according to the routing category corresponding to the first path and the device on the first path, and the second message includes a first reply message.
  • the second network element records the path of the first message.
  • the second network element is any one of the access and mobility management function AMF, the session management function SMF, the unified data management UDM, the user plane function UPF, the authentication server function AUSF, and the short message service function SMSF.
  • the second network element arranges the paths of the first message in reverse order to generate the first path.
  • the path of the request message is recorded, and the path of the reply message is generated based on the path, and the SEPP in the path is marked as strict routing, so that the reply message corresponding to the request message must go through the path marked as strict routing.
  • SEPP in this way, the message path can be controlled so that messages are sent and received through the same SEPP, thereby avoiding service failures caused by different SEPPs.
  • the first message further includes hidden information
  • the hidden information is the hidden topology information of the first network element
  • the second message further includes the hidden information
  • messages with destination addresses hidden by SEPP can be routed to itself, thereby avoiding the situation where messages are routed to other SEPPs and cannot be recovered, thereby making the hidden Topology information can be restored correctly, avoiding service failures caused by different SEPPs.
  • a communication method in response to the first network element sending a first request message to the second network, the first security and border proxy network element SEPP sends the first request message to the second network.
  • the first message includes the first request message and the hidden information, the hidden information is the hidden topology information of the first network element; the second SEPP receives the second network in response to the first message.
  • the second message includes the first reply message and the hidden information; the second SEPP sends a second request message to the third network element, the second request message is used to request to obtain the topology of the first network element information, the second request message includes the hidden information; the second SEPP receives the second reply message sent by the third network element in response to the second request message, the second reply message includes the topology information of the first network element , so as to route the request reply message to the first network element according to the topology information of the first network element.
  • the first SEPP generates the hidden information by encrypting the topology information of the first network element.
  • the method further includes: the first SEPP receiving the first request message sent by the first network element and the topology information of the first network element.
  • the first network element is any one of AMF, SMF, UDM, UPF, AUSF, and SMSF.
  • the SEPP that receives the reply message requests other network elements to provide topology information recovery services.
  • the other network elements query the pre-hiding topology information through the hidden topology information, and then send the queried pre-hiding topology information.
  • topology information recovery services are provided to each other through SEPP to realize the conversion from the hidden topology information to the pre-hidden topology information, so that the hidden topology information can be correctly restored, thereby avoiding the SEPP and reception of hidden topology information. Service failure caused by different SEPPs used to hide topology information.
  • the third network element is the first SEPP.
  • the function of SEPP is extended so that it can provide external services when receiving a recovery request message, query the topology information before hiding through the hidden topology information, and then query the topology information before hiding. Sent to the SEPP that issued the recovery request message.
  • topology information recovery services are provided to each other through SEPP to realize the conversion from the hidden topology information to the pre-hidden topology information, so that the hidden topology information can be correctly restored, thereby avoiding the SEPP and reception of hidden topology information. Service failure caused by different SEPPs used to hide topology information.
  • the third network element is the access and mobility management function AMF, the session management function SMF, the unified data management UDM, the user plane function UPF, the authentication server function AUSF, the short-term network element Any one of the message service functions SMSF.
  • the hiding and recovery service of topology information is provided by adding a new NF.
  • the newly added NF can query the topology information before hiding through the hidden topology information, and then query the topology information.
  • the topology information before hiding is sent to the SEPP that issued the recovery request message. In this way, the hidden topology information can be restored correctly, thereby avoiding service failure caused by the difference between the SEPP for sending the hidden topology information and the SEPP for receiving the hidden topology information.
  • a communication device which device includes a module for executing the method in the above-mentioned first aspect or any possible implementation of the first aspect; or, includes a module for executing the above-mentioned second aspect or the second aspect.
  • a communication device in a sixth aspect, includes a processor and an interface circuit.
  • the interface circuit is configured to receive signals from other communication devices other than the communication device and transmit them to the processor or to transmit signals from other communication devices.
  • the signal of the processor is sent to other communication devices other than the communication device, and the processor is used to implement any possible method in any one of the above first to fourth aspects through logic circuits or execution of code instructions. Methods in the implementation.
  • a communication device including a processor.
  • the processor is coupled to a memory and may be used to execute instructions in the memory to implement the method in any possible implementation manner of any one of the above-mentioned first to fourth aspects.
  • the device further includes memory.
  • the device further includes a communication interface, and the processor is coupled to the communication interface.
  • a computer-readable storage medium is provided.
  • Computer programs or instructions are stored in the computer-readable storage medium.
  • any one of the above-mentioned first to fourth aspects is implemented.
  • a computer program product containing instructions is provided. When the instructions are executed, the method in any possible implementation manner of any one of the above-mentioned first to fourth aspects is implemented.
  • a communication chip in which instructions are stored, and when run on a computer device, the communication chip causes the communication chip to execute the method in any possible implementation manner in the above-mentioned first to fourth aspects.
  • a communication system including AMF, NG-RAN and SEPP.
  • the communication system may also include SMF.
  • the communication system may also include UDM.
  • the communication system also includes other devices that communicate with the above network elements.
  • Figure 1 is an application architecture diagram of a roaming docking scenario provided by an embodiment of the present application
  • Figure 2 is a schematic diagram of two topological information hiding processes provided by embodiments of the present application.
  • FIG. 3 is a schematic diagram of the two topology information recovery processes provided by the embodiment of the present application.
  • Figure 4 is a solution for implementing topology hiding provided by an embodiment of the present application.
  • Figure 5 is a schematic interaction diagram of a topological information hiding method provided by an embodiment of the present application.
  • Figure 6 is a schematic flow chart of yet another method of hiding topology information provided by an embodiment of the present application.
  • Figure 7 is a schematic flow chart of a method for restoring topology information provided by an embodiment of the present application.
  • Figure 8 is a schematic flow chart of yet another method of hiding topology information provided by an embodiment of the present application.
  • Figure 9 is a schematic diagram of a topology hidden communication method provided by an embodiment of the present application.
  • Figure 10 is a schematic interaction diagram of a strict routing communication method provided by an embodiment of the present application.
  • Figure 11 is an information interaction diagram of a method for sending and receiving messages between SEPPs in different networks provided by the embodiment of the present application;
  • Figure 12 is a schematic diagram of yet another topology hidden communication method provided by an embodiment of the present application.
  • Figure 13 is a schematic interaction diagram of yet another topology information hiding communication method provided by an embodiment of the present application.
  • Figure 14 is a schematic interaction diagram of yet another topology information hiding communication method provided by an embodiment of the present application.
  • Figure 15 is a schematic block diagram of a communication device provided by an embodiment of the present application.
  • FIG. 16 is another possible structural schematic diagram of the communication device involved in the above embodiment provided by the embodiment of the present application.
  • the technical solution provided by this application can be applied to various communication systems, such as: new radio (NR) system, long term evolution (LTE) system, LTE frequency division duplex (FDD) system , LTE time division duplex (TDD) system, etc.
  • NR new radio
  • LTE long term evolution
  • FDD frequency division duplex
  • TDD time division duplex
  • This application can also be applied to device-to-device (D2D) communication, vehicle-toeverything (V2X) communication, machine-to-machine (M2M) communication, machine type communication, MTC), and Internet of things (IoT) communication systems or other communication systems.
  • NR new radio
  • LTE long term evolution
  • FDD frequency division duplex
  • TDD LTE time division duplex
  • IoT Internet of things
  • the part operated by the operator can be called the public land mobile network (PLMN), or the operator network, etc.
  • PLMN is a network established and operated by the government or its approved operators for the purpose of providing land mobile communication services to the public. It is mainly a public network where mobile network operators (MNOs) provide mobile broadband access services to users. .
  • MNOs mobile network operators
  • the PLMN described in the embodiments of this application may specifically be a network that meets the standard requirements of the 3rd generation partnership project (3GPP), referred to as a 3GPP network.
  • 3GPP networks generally include but are not limited to fifth-generation mobile communication (5th-generation, 5G) networks, fourth-generation mobile communication networks, and other future communication systems, such as sixth-generation mobile communication networks.
  • the embodiments of this application will take the PLMN or 5G network as an example for description.
  • the service based interface (SBI) of the 5G core network carries a large amount of topology information, including the IP address of the network function (NF), the fully qualified domain name (fully qualified domain name FQDN), the uniform resource identifier ( uniform resource identifier, URI), etc. If not processed, this information will flow out of the control scope of the network along with the roaming interface and interworking interface, which may cause harm that is difficult to control.
  • NF network function
  • FQDN fully qualified domain name
  • URI uniform resource identifier
  • the criminals may analyze the deployment of this network based on this information, thereby providing information for attacking this network; if the leaked information is obtained by competitors, Competitors can further identify the corresponding operator's business plan based on the network deployment situation of this network, such as how many AMFs have been deployed, and speculate on its target number of new 5G users in the next 3-5 years.
  • SEPP security and edge protection proxy
  • topology hiding Since the existing protocol only defines that SEPP needs to support the topology hiding function, it does not define an implementation solution for topology hiding. In actual applications, an operator may deploy multiple SEPPs, and these SEPPs may be purchased from different equipment vendors. Since the implementation of topology hiding is not defined in the standard, each equipment vendor may adopt different solutions. Topology hiding; at the same time, since hiding and restoring the same topology information are usually not completed in the same session, the subscription request and callback notification message belong to different HTTP transactions and may be processed by different SEPPs in the visited domain. Therefore, the topology information hidden by equipment vendor A's SEPP may not be restored on equipment vendor B's SEPP, causing service failure.
  • embodiments of the present application provide a communication method and a communication device. This method can avoid service failure due to topology hiding in different SEPP networking situations.
  • the solution of the embodiment of the present application is applied to message interaction scenarios between networks, for example, it can be used in roaming docking scenarios between 5G networks.
  • Network topology refers to the physical layout of various devices interconnected using transmission media.
  • Network topology can be expressed through a set of associated information, including the device's IP address, domain name, device type, name, correlation, number of sets, etc. This set of information used to express the network layout is called topology information.
  • the VIA header field of the forwarding path of the message records the address (FQDN/IP address) of the proxy through which the message passes, including router information and device interconnection information.
  • the FQDN of the server (5GC's cNF/pNF).
  • the FQDN usually carries the location, type, name and other information of the device deployment.
  • IP address of the server usually the IP address is the operator's internal private network IP address, which will expose the IP address planning rules within the network and provide attackers with a clear attack target or springboard.
  • the external device needs to route the message to SEPP, and SEPP forwards it to the network. As long as the external device can forward the message to the SEPP interface, there is no need to know the topology information in the network. Therefore, when sending messages from within the network to outside the network, SEPP can hide the topology information in the network and try to avoid the exposure of topology information without affecting roaming connection.
  • the network architecture involved in the embodiments of this application may be a fifth generation system (5th generation system, 5GS), and the network elements in 5GS may also be called 5G core network elements.
  • 5GS fifth generation system
  • 5G core network elements 5th generation core network elements
  • FIG 1 shows an application architecture diagram of the roaming docking scenario provided by the embodiment of the present application. The functions of each network element or device involved in the network architecture will be described below.
  • Terminal equipment which can also be called user equipment (UE), mobile station (MS), mobile terminal (MT), etc.
  • the terminal device may include a handheld device, a vehicle-mounted device, etc. with a wireless connection function.
  • the terminal device can be: mobile phone, tablet computer, notebook computer, handheld computer, mobile Internet device (mobile internet device, MID), wearable device, virtual reality (VR) device, augmented reality device Augmented reality (AR) equipment, wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in remote medical surgery, smart grid ), wireless terminals in transportation safety, wireless terminals in smart cities, or wireless terminals in smart homes, etc.
  • the terminal device described in Figure 1 is shown as UE, which is only used as an example and does not limit the terminal device.
  • Access management network element mainly used for mobility management and access management.
  • the access management network element can be the access and mobility management function (AMF), as shown in Figure 1, for example, which mainly performs mobility management, access authentication/authorization, etc. Function.
  • AMF access and mobility management function
  • PCF policy control function
  • NAS non-access stratum
  • MM mobility management
  • SM session management
  • Relevant signaling for example, base station granular N2 (next generation, NG) 2 interface
  • the AMF network element can receive a location service request related to the target UE from a 5G core network (5GC) location services (LCS) entity, or the AMF itself can also initiate some location services on behalf of a specific target UE. , and forwards the location service request to the location management network element. After obtaining the location information returned by the UE, the relevant location information is returned to the 5GC LCS entity.
  • 5GC 5G core network
  • LCS location services
  • the access management network element can still be an AMF network element, or have other names, which is not limited in this application.
  • Session management network element Mainly used for session management, Internet protocol (IP) address allocation and management of user equipment, selection of endpoints for manageable user plane functions, policy control and charging function interfaces, and downlink data Notifications etc.
  • IP Internet protocol
  • SMF session management function
  • Network storage network element Provides storage and selection functions for network function entity information for other core network elements.
  • the network element can be a network function repository function (NRF), which mainly includes the following functions: service discovery function, maintaining NF of available network function (NF) instances texts and the services they support.
  • NRF network function repository function
  • the above functional network elements can be either network elements in hardware devices, software functions running on dedicated hardware, or virtualization functions instantiated on a platform (for example, a cloud platform).
  • the above functional network elements can be divided into one or more services. Furthermore, there may also be services that exist independently of network functions.
  • instances of the above-mentioned functional network elements, or instances of services included in the above-mentioned functional network elements, or service instances that exist independently of network functions may be called service instances.
  • Unified data management network element responsible for the management of user identification, contract data, authentication data, and user service network element registration management.
  • the unified data management network element can be unified data management (UDM), which mainly includes the following functions: unified data management, support for authentication credentials processing in the 3GPP authentication and key agreement mechanism, user Identity processing, access authorization, registration and mobility management, subscription management and short message management, etc.
  • UDM unified data management
  • This network element can be a security and edge protection proxy (SEPP) security edge protection proxy. It is an important part of the 5G roaming security architecture and is used for user roaming and communication with other operators. Communication interworking is responsible for message filtering and policy management on the control plane interfaces between operators, and mainly serves as the border gateway between the control planes of the operators' core networks. As a non-transparent proxy node, SEPP can provide application layer control plane security and realize secure communication between network function consumers and network function providers across operators.
  • SEPP security and edge protection proxy
  • SEPP's security features include message filtering, access control, topology hiding, and error detection and handling.
  • the two SEPPs at the network boundary establish a connection through the N32 interface and implement protection policies to process each control plane message in cross-network signaling.
  • UPF User plane function
  • UPF network functions include data packet routing and transmission, data packet detection, business usage reporting, quality of service (QoS) processing, legal interception, uplink data packet detection, downlink data packet storage and other user plane functions.
  • QoS quality of service
  • PCF Policy control function
  • AUSF Authentication server function
  • AUSF is a control plane function provided by the operator, and is usually used for authentication between the terminal device 110 (subscriber) and the operator's network.
  • the AUSF network function can authenticate and/or authorize the contracted user through the authentication information and/or authorization information stored in the UDM network function, or generate the authentication and/or authorization of the contracted user through the UDM network function. or authorization information.
  • the AUSF network function can feedback authentication information and/or authorization information to contract users.
  • Access network equipment can also be called access equipment.
  • (R)AN can manage wireless resources and provide access services for user equipment. Complete For the forwarding of user equipment data between the user equipment and the core network, (R)AN can also be understood as a base station in the network.
  • Network slice selection function network element responsible for selecting network slices for UE.
  • the application network element can be a network slice selection function (NSSF) network element.
  • NSSF can be understood as network slicing selection Select the naming of functional network elements in the 5G architecture.
  • the network slice selection function network element mainly includes the following functions: selecting a group of network slice instances for the UE, determining the allowed network slice selection assistance information (NSSAI), and determining the AMF set that can serve the UE.
  • NSSAI network slice selection assistance information
  • SEPP is used for the docking of two 5GC networks.
  • the interface between SEPPs is defined as the N32 interface. All messages across PLMNs during roaming need to be forwarded through the N32 interface. SEPP needs to provide message access and security protection capabilities in roaming scenarios.
  • SEPP when SEPP forwards the request message to the N32 interface, it needs to hide the topology information in the message first; when SEPP receives the message from the N32 interface, if there is hidden topology information in it, it needs to restore it to the original Topological information.
  • system architecture involved in Figure 1 may also include other network elements, such as unified data repository (UDR) and other network elements or equipment, without specific limitations.
  • UDR unified data repository
  • interfaces or service-oriented interfaces between network elements shown in Figure 1 are only an example. In 5G networks and other future networks, the interfaces or service-oriented interfaces between network elements may not be as shown in the figure. interface, this application does not limit this.
  • each network element shown in Figure 1 is only a name, and the name does not limit the function of the network element itself.
  • each of the above network elements may also have other names, which are not specifically limited in the embodiments of this application.
  • some or all of the above-mentioned network elements may use the terminology used in 5G, or may be named by other names, etc., which will be described uniformly here and will not be described in detail below.
  • a communication system to which the present application may be applied may include more or fewer network elements or devices.
  • the equipment or network elements in Figure 1 can be hardware, functionally divided software, or a combination of the above two.
  • the devices or network elements in Figure 1 can communicate with each other through other devices or network elements.
  • Figure 2 shows a schematic diagram of two topological information hiding processes provided by embodiments of the present application.
  • FIG. 2 shows a schematic diagram of the topology information hiding process provided by the embodiment of the present application when two SEPPs directly use transport layer security (TLS) to connect (using the HTTPS protocol).
  • TLS transport layer security
  • the protocol consists of two layers: TLS record protocol (TLS record) and TLS handshake protocol (TLS handshake).
  • TLS record TLS record protocol
  • TLS handshake TLS handshake protocol
  • S201a The client sends the original message to cSEPP in the local network through the Nx interface.
  • the original message includes a message part and a topology information part.
  • the topology information refers to the information related to the NF that sent the message.
  • cSEPP After receiving the original message, cSEPP obtains the operator information and topology hiding identifier of the local network, hides the topology information, and then generates a new message.
  • the new message includes the above message part and the hidden topology information part.
  • S203a cSEPP sends the above new message to pSEPP on the opposite end network through the N32 interface, and pSEPP forwards the new message to the server.
  • FIG. 2 Parallel to (a) in Figure 2, (b) in Figure 2 shows that the embodiment of the present application provides a docking method when two SEPPs use IPX device relay (using the N32 interconnection security protocol (protocol for N32 interconnect security, PRINS) mode), a schematic diagram of the topological information hiding process.
  • the process of topological information hiding can be as follows:
  • S201b The client sends the original message to cSEPP in the local network through the Nx interface.
  • the original message includes a message part and a topology information part.
  • the topology information refers to the information related to the NF that sent the message.
  • cSEPP After receiving the original message, cSEPP obtains the operator information and topology hiding identifier of the local network, hides the topology information, and then generates a new message.
  • the new message includes the above message part and the hidden topology information part.
  • S203b cSEPP sends the above new message to pSEPP on the opposite end network through the N32 interface and Internet Packet Exchange Protocol (IPX), and pSEPP forwards the new message to the server.
  • IPX Internet Packet Exchange Protocol
  • IPX operators provide group addressing and routing functions to ensure reliable arrival, which is equivalent to the function of datagram; at the same time, IPX operators also provide roaming services, such as roaming optimization and welcome text messages.
  • Fig. 3 shows a schematic diagram of two types of topology information recovery processes provided by embodiments of the present application.
  • FIG. 3 shows a schematic diagram of the topology information recovery process provided by the embodiment of the present application when two SEPPs directly connect using TLS (using the HTTPS protocol).
  • the specific process of topology information recovery can be:
  • S301a The pSEPP on the server sends the original message to the cSEPP in the opposite network through the N32 interface.
  • the original message includes a message part and a hidden topology information part.
  • the topology information refers to the information related to the NF that sends the message on the client side.
  • cSEPP After receiving the original message, cSEPP obtains the operator information and topology hidden identifier of the local network, restores the topology information, and then generates a new message.
  • the new message includes the above message part and the topology information part.
  • FIG. 3 Parallel to (a) in Figure 3, (b) in Figure 3 shows the topology information recovery process provided by the embodiment of the present application when two SEPPs adopt the IPX device relay docking method (using PRINS mode).
  • S301b The pSEPP on the server sends the original message to the cSEPP in the opposite network through the N32 interface and IPX.
  • the original message includes a message part and a hidden topology information part.
  • the topology information refers to the information related to the NF that sends the message on the client side.
  • cSEPP After receiving the original message, cSEPP obtains the operator information and topology hidden identifier of the local network, restores the topology information, and then generates a new message.
  • the new message includes the above message part and the topology information part.
  • Figure 4 shows a solution for implementing topology hiding provided by the embodiment of the present application, which is applied to the user data change scenario on the AMF subscription UDM.
  • the solution includes the following steps:
  • S401 The AMF in the visited domain sends a subscription request message to SEPP-a on the same side.
  • the subscription request message carries CallbackURIA, where CallbackURIA refers to unhidden AMF-related topology information.
  • SEPP-a of the visited domain hides CallbackURIA, sends a subscription request message to SEPP-1 on the opposite side, and further sends the subscription request message to UDM.
  • the subscription request message carries CallbackURIA1, where CallbackURIA1 refers to the hidden CallbackURIA.
  • AMF related topology information is included in the subscription request message.
  • SEPP-b After receiving the notification request message carrying CallbackURIA1, SEPP-b restores CallbackURIA1 to CallbackURIA. To facilitate routing of notification request messages to AMF based on CallbackURIA.
  • step S404 since the algorithms of SEPP-a and SEPP-b may be different, SEPP-b may be unable to restore CallbackURIA1 to CallbackURIA, resulting in service failure.
  • FIG. 5 shows a schematic interaction diagram of a topological information hiding method 500 provided by the embodiment of the present application.
  • the method 500 is applied to the scenario of sending and receiving messages across the first network element and the second network element of the network.
  • the method 500 includes:
  • the first network element sends a first request message to the first SEPP.
  • the first request message is used to request to subscribe to target information from the second network element, or the first request message is used to request to obtain the target from the second network element. information.
  • first network element described in all embodiments of this application refers to the network element that generates and sends the first request message, and is not an intermediate network element.
  • the first network element while sending the first request message to the first SEPP, the first network element also sends the topology information of the first network element.
  • the first network element may send the topology information of the first network element in a manner carried by the first request information, may be sent individually, may be sent in a package, or may be sent by This application does not limit the forwarding methods of other devices or network elements.
  • the topology information of the first network element may be one or more of the IP address, FQDN, and URI of the first network element, or other topology information, which is not limited in this application.
  • the first SEPP After receiving the first request message, the first SEPP obtains the topology information of the first network element and Topological information is hidden and hidden information is generated.
  • the hidden information refers to the hidden topological information of the first network element.
  • the first SEPP encrypts the topology information of the first network element according to the first algorithm and the first key ID, and then generates hidden information.
  • the first SEPP sends a first message to the third SEPP located in the second network.
  • the first message includes the first request message and hidden information.
  • the above hidden information may be sent by being carried by the first request message, may be sent individually, may be packaged and sent, or may be forwarded by other devices or network elements. , this application does not limit this.
  • the first message also includes a first key ID.
  • the second network element In response to the received first message, the second network element sends a second message to the third SEPP on the same side, where the second message includes the first reply message and hidden information.
  • the first reply message is a message sent by the second network element in response to the first request message.
  • the above-mentioned hidden information may be sent by being carried by the first reply message, may be sent individually, may be packaged and sent, or may be forwarded by other devices or network elements. , this application does not limit this.
  • the second message also includes the first key ID.
  • the second message carries a topology information recovery request message, which is used to request recovery of the hidden information it carries.
  • S506 The third SEPP forwards the above-mentioned second message to the second SEPP located in the first network.
  • the second SEPP After receiving the second message, the second SEPP obtains the hidden information in the second message and restores the hidden information to the topology information of the first network element in the unhidden state.
  • the second SEPP restores the hidden information to the topology information of the first network element in the unhidden state according to the first key ID.
  • SEPP in S503 and S507 can be the same SEPP or different SEPPs.
  • the second SEPP sends the first reply message to the first network element according to the topology information of the first network element.
  • encryption can be used to hide the topology information in the message.
  • topology information between different SEPPs on the same network can be realized.
  • the mutual recovery function enables all SEPPs in the same network to correctly recover the hidden topology information when receiving a request message requiring topology recovery, thus avoiding service failures caused by different SEPPs.
  • FIG. 6 shows a schematic diagram of a SEPP method 600 for hiding topology information provided by the embodiment of the present application.
  • sexual flow chart As shown in Figure 6, the method 600 includes:
  • the first SEPP encrypts the topology information of the first network element according to the first algorithm and the first key ID.
  • S602 Convert the encrypted topology information into characters allowed by FQDN.
  • S603 Convert ciphertext, encryption material and domain information into an FQDN according to the specified format.
  • the ciphertext refers to the encrypted topology information (converted into characters allowed by FQDN) (ie: hidden information), the encryption material includes the first key ID, and the domain information refers to the domain information corresponding to the topology information.
  • the type of topology information is the FQDN of the first network element.
  • the first SEPP takes out the topology information part in the FQDN, encrypts it according to the first algorithm and the first key ID, and then converts the encrypted topology information are the characters allowed by FQDN; finally, the ciphertext, encryption material, and domain information in the original FQDN are formatted into a new FQDN according to the specified format.
  • the FQDN before hiding is: topology information to be hidden + domain information;
  • the hidden FQDN is: CP+ciphertext+encrypted material+domain information.
  • CP is the prefix, indicating that the encrypted string follows.
  • the type of topology information is the IP address of the first network element.
  • the first SEPP encrypts the IP address according to the first algorithm and the first key ID, and then converts the encrypted IP address into an IP address allowed by the FQDN. characters; finally, the ciphertext, encryption material, and domain information in the original FQDN are formatted into a new FQDN according to the specified format.
  • the FQDN before hiding is: the topology information to be hidden;
  • the hidden FQDN is: CP+ciphertext+encrypted material+domain information.
  • CP is the prefix, indicating that the encrypted string follows.
  • FIG. 7 shows a SEPP recovery hidden topology provided by the embodiment of the present application.
  • the second SEPP obtains the encryption material and ciphertext part from the FQDN that hides the topology information.
  • the encryption material includes the first key ID, and the ciphertext is the hidden topological information (that is, hidden information).
  • S702 The second SEPP decrypts the ciphertext according to the first key ID and obtains unhidden topology information.
  • the recovery process of the topology information may also include the following steps:
  • S703 The second SEPP splices the decrypted topology information and the domain information in the original FQDN to restore the original FQDN.
  • FIG. 8 shows a schematic flow chart of a method 800 for hiding topology information provided by an embodiment of the present application.
  • This method takes the topology information type as FQDN as an example, as shown in Figure 8.
  • the method 800 includes:
  • SEPP obtains the topology information to be hidden from the original FQDN.
  • the original FQDN consists of the topology information and domain information to be hidden.
  • the original FQDN is:
  • AES is a symmetric encryption algorithm
  • 256 represents the ciphertext block length
  • GCM is the encryption mode.
  • BASE32 refers to an encoding technology that converts binary code streams into visual characters.
  • the encryption material includes the first key ID and VI value (in order for other SEPPs to query the local configuration and obtain the real key).
  • the CP prefix indicates that it is followed by an encrypted string, and the domain information is the domain included in the original FQDN. information.
  • the new FQDN obtained is:
  • the encryption algorithm in the embodiment of this application can be any reversible secure encryption algorithm and is not limited to AES_GCM.
  • a universal encryption algorithm is provided to hide topology information, so that different SEPPs can mutually recover each other's hidden topology information as long as their preset encryption algorithms and key information are the same.
  • the encryption process of this method uses well-known algorithms in the industry, which can prevent brute force cracking and quantum-level attacks. Because the encryption result (ciphertext) is different each time, it cannot be cracked through repeated attempts. It is safe and reliable; and, different encryption results (ciphertext) on the same network are different.
  • SEPP can be used in all SEPPs and has strong versatility; and because the SKIDs in different network conditions are different, even if other networks use the same solution, they cannot be resolved.
  • this method can deploy a configuration , can cover all FQDNs, thereby avoiding misconfiguration or under-configuration, and facilitating operation and maintenance; using non-mapping algorithms (such as SEPP to locally maintain one-to-many mapping relationships) will not cause an increase in configuration due to future increases in NF or FQDN.
  • non-mapping algorithms such as SEPP to locally maintain one-to-many mapping relationships
  • Figure 9 exemplarily shows a schematic diagram of a method 900 for implementing topology hidden communication provided by an embodiment of the present application.
  • the method 900 is applied to user data changes on AMF subscription UDM. Scenes.
  • the solution includes the following steps:
  • S901 The AMF in the visited domain sends a subscription request message to SEPP-a on the same side.
  • the subscription request message carries CallbackURIA, where CallbackURIA refers to unhidden AMF-related topology information.
  • SEPP-a of the visited domain hides CallbackURIA, sends a subscription request message to SEPP-1 on the opposite side, and further sends the subscription request message to UDM.
  • the subscription request message carries CallbackURIA1, where CallbackURIA1 refers to the hidden CallbackURIA.
  • AMF related topology information is included in the subscription request message.
  • S904 After receiving the notification request message carrying CallbackURIA1, SEPP-a restores CallbackURIA1 to CallbackURIA. To facilitate routing of notification request messages to AMF based on CallbackURIA.
  • the SEPP path during the sending process of the subscription request message is the same as the SEPP path during the receiving process of the notification request message.
  • the hiding and recovery of the topology information can be completed by the same SEPP, so that after hiding The topology information can be restored correctly, thereby avoiding service failures caused by different SEPPs for hiding topology information and restoring topology information.
  • Figure 10 shows a schematic interaction diagram of a method 1000 for strictly routing communications provided by an embodiment of the present application.
  • the method 1000 is applied to the scenario of sending and receiving messages across the first network element and the second network element of the network.
  • the method 1000 includes:
  • the first network element sends a first request message to the first SEPP.
  • the first request message is used to request to subscribe to target information from the second network element, or the first request message is used to request to obtain the target from the second network element. information.
  • the first network element while sending the first request message to the first SEPP, the first network element also sends the topology information of the first network element.
  • the first network element may send the topology information of the first network element in a manner carried by the first request information, may be sent individually, may be sent in a package, or may be sent by This application does not limit the forwarding methods of other devices or network elements.
  • the topology information of the first network element may be one or more of the IP address, FQDN, and URI of the first network element, or other topology information, which is not limited in this application.
  • the first SEPP obtains the topology information of the first network element, hides the topology information of the first network element, and generates hidden information.
  • the hidden information refers to the hidden topological information of the first network element.
  • the first SEPP sends a first message to the third SEPP located in the second network.
  • the first message includes a first request message and first indication information.
  • the first indication information is used to indicate the routing category corresponding to the first SEPP. For strict routing.
  • the first message also includes the above hidden information.
  • the above hidden information may be sent in a manner carried by the first request message, may be sent individually, may be sent in a package, or may be forwarded by other devices or network elements.
  • this application does not limit this.
  • the second network element After receiving the first message, the second network element generates a first path, and the first path is generated based on the path of the first message.
  • the first path includes one or more devices, each of the one or more devices corresponds to a routing category, and the routing category includes strict routing and may also include loose routing.
  • the parameter mark of strict routing can be sr, which means that the message must pass through the device corresponding to the strict route; the loose route can be represented by no mark, which means that the message may or may not pass through the device corresponding to the loose route.
  • the second network element records the path of the first message.
  • the second network element arranges the paths of the first message in reverse order to generate the first path.
  • the second network element In response to the received first message, the second network element sends a second message to the third SEPP on the same side according to the first path, where the second message includes the first reply message.
  • the first reply message is a message sent by the second network element in response to the first request message.
  • the second message also includes the above hidden information.
  • the above-mentioned hidden information may be sent in a manner carried by the first reply message, may be sent individually, may be sent in a package, or may be forwarded by other devices or network elements.
  • this application does not limit this.
  • the second message carries a topology information recovery request message, which is used to request recovery of the hidden information it carries.
  • S1006 The third SEPP forwards the above-mentioned second message to the first SEPP.
  • the routing category corresponding to the first SEPP is strict routing, the second message will definitely pass through the first SEPP.
  • the first SEPP acquires the hidden information in the second message and restores the hidden information to the topology information of the first network element in the unhidden state.
  • the first SEPP sends the first reply message to the first network element according to the topology information of the first network element.
  • SEPP can control that messages with its hidden address as the destination address can be routed to itself, thereby avoiding the situation where messages are routed to other SEPPs and cannot be recovered, thereby enabling the hidden topology information to be correctly recovered. This avoids business failure due to different SEPPs.
  • Figure 11 shows inter-SEPP implementation messages (involving topology hiding and recovery) in different networks provided by the embodiments of the present application.
  • Information interaction diagram of the sending and receiving method 1100 is
  • the first network includes cNF (the first network element), cSCP and cSEPP, and the second network includes pNF (as the first network element), pSCP and pSEPP.
  • the network elements in the first network have the prefix c
  • the network elements in the second network have the prefix p.
  • the first request message is the initial request message
  • the first reply message is the callback. Taking the request message as an example for illustration, the method 1100 includes:
  • the cNF sends an initial request message to the cSCP.
  • the initial request message is used to request to obtain the target information from the pNF, or the initial request message is used to request to subscribe to the pN for the target information.
  • the initial request message carries cNF topology information.
  • topology information of cNF carried in the initial request message is represented in Figure 11 as: callbackURI:cNF.
  • cSCP forwards the initial request message as a proxy, and synchronously puts its own topology information (which can be the FQDN of cSCF) into the via header field, and indicates loose routing.
  • topology information of cSCP carried in the initial request message forwarded by cSCP is represented in Figure 11 as: Via:cSCP.
  • cSCP processes the initial request message as a proxy, it indicates whether it is strict routing (the indication mark can be sr) through the extended parameter in the added via: header field. If it is strict routing, it indicates the subsequent request message or the callback request message. Must go through the proxy.
  • the sr parameter is used to indicate strict routing, and no parameters are carried to indicate loose routing.
  • Loose routing and strict routing can be determined according to the actual situation or needs. marking method.
  • cSEPP After receiving the initial request message sent by cSCP, cSEPP hides the topology information of cNF, converts the callback address from cNF to cNFA, deletes the FQDN of cSCP in via, and puts its own FQND into via, indicating strict Route (indicator tag can be sr). Then, the initial request message is sent to pSEPP in the peer network.
  • the suffix letter A indicates that the information is hidden information.
  • callbackURI cNFA
  • Via cSEPP
  • sr the information carried in the initial request message sent by cSEPP to pSEPP.
  • S1104 After receiving the initial request message sent by cSEPP, pSEPP puts its FQND into via, indicating strict routing. It further forwards the initial request message to pSCP.
  • callbackURI cNFA
  • S1105 After receiving the initial request message sent by pSEPP, pSCP puts its FQND into via, indicating loose routing. The initial request message is further forwarded to pNF.
  • callbackURI cNFA
  • pNF on the server side After receiving the initial request message sent by pSCP, pNF on the server side records the callback address cNFA and via header field for subsequent sending of callback request messages (usually using the notify method); and generates a response message and sends the response message to pSEPP. .
  • the response message carries the Location header field, and pNF converts the via header field into the record-route header field and puts it into the response message.
  • the information carried in the response message sent by pNF to pSEPP is represented in Figure 11 as: Location: pNF; Record-route: cSEPP; sr; Record-route: pSEPP; sr; Record-route: pSCP.
  • pSEPP After pSEPP receives the response message sent by pNF, it deletes the pSCP information in the record-route header field, converts the address in the location header field from pNF to pNFA, and then further forwards the response message to cSEPP.
  • the information carried in the response message forwarded by pSEPP to cSEPP is represented in Figure 11 as: Location: pNFA; Record-route: cSEPP; sr; Record-route: pSEPP; sr.
  • the suffix letter A indicates that the information is hidden information.
  • cSEPP After receiving the response message forwarded by pSEPP, cSEPP puts the cSCP information into the record-route header field, and then further forwards the response message to cNF.
  • the information carried in the response message forwarded by cSEPP to cNF is shown in Figure 11 as: Location: pNFA; Record-route: cSCP; Record-route: cSEPP; sr; Record-route: pSEPP; sr.
  • cNF After receiving the response message forwarded by cSEPP, cNF records the address pNFA in the location header field as the target address of the subsequent request, and records the information in the record-route header field as the route of the subsequent request, and generates a subsequent request message to cSCP sends this subsequent request message.
  • cNF converts the location header field into a URI header field, and converts the record-route header field into a route header field and puts them into the subsequent request message.
  • the recorded record-route is put into the route field of the subsequent request message as the route for the subsequent request message.
  • URI pNFA
  • route cSCP
  • route cSEPP
  • sr route: pSEPP
  • sr route: pSEPP
  • cSCP After receiving the subsequent request message sent by cNF, cSCP deletes its own address from the route according to the route instructions, and further forwards the subsequent request message to cSEPP.
  • the information carried in the subsequent request message forwarded by cSCP to cSEPP is represented in Figure 11 as: URI: pNFA; route: cSEPP; sr; route: pSEPP; sr.
  • the intermediate proxy routes according to the route instructions. If the indication is strict routing, it cannot be skipped; the intermediate proxy deletes its own address from the route one by one when processing subsequent requests.
  • cSEPP After receiving the subsequent request message forwarded by cSCP, cSEPP deletes its own address from the route according to the route instructions, and further forwards the subsequent request message to pSEPP.
  • URI pNFA
  • route pSEPP
  • sr the information carried in the subsequent request message forwarded by cSEPP to pSEPP.
  • pSEPP After receiving the subsequent request message, pSEPP restores the pNFA in the URI header field to pNF; deletes its own address from the route, and further forwards the subsequent request message to pNF through pSCP according to the restored pNF address.
  • restoring the pNFA in the URI header field to pNF means restoring the topology information of the hidden pNF so that subsequent request messages can be routed to the pNF according to the topology information of the pNF.
  • the information carried in the subsequent request message forwarded by pSEPP to pNF is represented in Figure 11 as: URI:pNF.
  • step S1113 After receiving the subsequent request message, pNF uses the callback address cNFA to initiate a callback request message.
  • the via header field recorded in step S1106 is placed in the route header field of the callback request message in reverse order, as This callback requests the routing of the message.
  • pNF sends the callback request to pSCP.
  • the information carried in the callback request message sent by pNF to pSCP is represented in Figure 11 as: URI: cNFA; route: Pscp; route: pSEPP; sr; route: cSEPP; sr.
  • pSCP After pSCP receives the callback request message sent by pNF, it deletes its own address from the route according to the route instructions, and further forwards the subsequent request message to pSEPP.
  • the information carried in the subsequent request message forwarded by pSCP to pSEPP is represented in Figure 11 as: URI: cNFA; route: pSEPP; sr; route: cSEPP; sr.
  • the intermediate proxy routes according to the route instructions. If the indication is strict routing, it cannot be skipped; the intermediate proxy deletes its own address from the route one by one when processing subsequent requests.
  • pSEPP After pSEPP receives the callback request message sent by pSCP, it deletes its own address from the route according to the route instructions, and further forwards the subsequent request message to cSEPP.
  • the information carried in the subsequent request message forwarded by pSEPP to cSEPP is represented in Figure 11 as: URI: cNFA; route: cSEPP; sr.
  • cSEPP After receiving the callback request message, cSEPP restores the cNFA in the URI header field to cNF; deletes its own address from the route, and further forwards the callback request message to cNF based on the restored cNF address.
  • restoring the cNFA in the URI header field to cNF means restoring the topology information of the hidden cNF so that subsequent request messages can be routed to the cNF based on the topology information of the cNF.
  • the information carried in the callback request message forwarded by cSEPP to pSEPP is represented in Figure 11 as: URI:cNF.
  • the pNF may send a response message to the cNF for the subsequent request message.
  • cNF can send a response message to the callback request message to pNF.
  • header field naming in the embodiment of this application is a reference naming, which does not constitute any limitation on the solution of this application, and can also be replaced with other naming.
  • routing scheme proposed in the embodiment of this application can also be used on other HTTP proxies such as SCP to achieve routing control, and is not limited to SEPP.
  • the HTTP extension header fields record-route and route are added, which are used to carry the route of subsequent request messages and the route of this message (callback request message) respectively.
  • the route header field supports carrying parameters to identify whether it is a strict route.
  • SEPP can control that messages with its hidden address as the destination address can be routed to itself, thereby avoiding the situation where messages are routed to other SEPPs and cannot be recovered, thereby enabling the hidden topology information to be correctly recovered, avoiding the problem of SEPP Business failure caused by differences; and, by improving the routing mechanism of SBI interface messages, the proxy can control the sending path of the associated request messages.
  • it solves the problem of topology hiding from different manufacturers, and it can also provide a mechanism for business processing of subsequent associated sessions.
  • Figure 12 shows a schematic diagram of yet another method 1200 for implementing topology hidden communication provided by the embodiment of the present application.
  • This method 1200 is applied to AMF subscription UDM.
  • the solution includes the following steps:
  • S1201 The AMF in the visited domain sends a subscription request message to SEPP-a on the same side.
  • the subscription request message carries CallbackURIA, where CallbackURIA refers to unhidden AMF-related topology information.
  • S1202 SEPP-a of the visited domain hides CallbackURIA, sends a subscription request message to SEPP-1 on the opposite side, and further sends the subscription request message to UDM.
  • the subscription request message carries CallbackURIA1, where CallbackURIA1 refers to the hidden CallbackURIA.
  • AMF related topology information is included in the subscription request message.
  • SEPP-b After receiving the notification request message carrying CallbackURIA1, SEPP-b calls the service provided by SEPP-a to query the restored address information callbackURIA of callbackURIA1.
  • SEPP-b after SEPP-b receives the notification request message carrying CallbackURIA1, it can send a second request message to SEPP-a.
  • the second request message is used to request SEPP-a to restore CallbackURIA1 to CallbackURIA; and then responds to the received In the second request message, SEPP-a sends a second reply message to SEPP-b, and the second reply message is CallbackURIA.
  • SEPP-b replaces the target address in the notification request message with callbackURIA, so that the notification request message is routed to the AMF according to the CallbackURIA.
  • this embodiment takes SEPP-a hiding and SEPP-b recovery in the first network as an example.
  • SEPP-1 and SEPP-2 also need to provide each other with the above-mentioned similar query services.
  • the function of SEPP is extended so that it can provide external services.
  • the topology information before hiding can be queried through the hidden topology information, and the queried topology information before hiding can be sent to the requester who issued the request message.
  • SEPP SEPP.
  • topology information recovery services are provided to each other through SEPP to realize the conversion from the hidden topology information to the pre-hidden topology information, so that the hidden topology information can be correctly restored, thereby avoiding the SEPP and reception of hidden topology information. Service failure caused by different SEPPs used to hide topology information.
  • Figure 13 shows a schematic interaction diagram of yet another topology information hiding communication method 1300 provided by the embodiment of the present application.
  • the method 1300 is applied to the scenario of sending and receiving messages across the first network element and the second network element of the network.
  • the method 1300 includes:
  • the first network element sends a first request message to the first SEPP.
  • the first request message is used to request to subscribe to target information from the second network element, or the first request message is used to request to obtain the target from the second network element. information.
  • the first network element while sending the first request message to the first SEPP, the first network element also sends the topology information of the first network element.
  • the first network element may send the topology information of the first network element in a manner carried by the first request information, may be sent individually, may be sent in a package, or may be sent by This application does not limit the forwarding methods of other devices or network elements.
  • the topology information of the first network element may be one or more of the IP address, FQDN, and URI of the first network element, or other topology information, which is not limited in this application.
  • the first SEPP After receiving the first request message, the first SEPP obtains the topology information of the first network element, hides the topology information of the first network element, and generates hidden information.
  • the hidden information refers to the hidden topological information of the first network element.
  • the first SEPP sends a first message to the third SEPP located in the second network.
  • the first message includes the first request message and hidden information.
  • the above hidden information may be sent by being carried by the first request message, may be sent individually, may be packaged and sent, or may be forwarded by other devices or network elements. , this application does not limit this.
  • the second network element In response to the received first message, the second network element sends a second message to the third SEPP on the same side, where the second message includes the first reply message and hidden information.
  • the first reply message is a message sent by the second network element in response to the first request message.
  • the above-mentioned hidden information may be sent by being carried by the first reply message, may be sent individually, may be packaged and sent, or may be forwarded by other devices or network elements. , this application does not limit this.
  • the second message carries a topology information recovery request message, which is used to request recovery of the hidden information it carries.
  • S1306 The third SEPP forwards the above-mentioned second message to the second SEPP located in the first network.
  • the second SEPP After receiving the second message, the second SEPP sends a second request message to the first SEPP.
  • the second request message is used to request to obtain the restored hidden message, and the second request message carries the hidden information.
  • the first SEPP In response to receiving the second request message, the first SEPP restores the hidden message to the unhidden topology information, and then sends the restored topology information of the first network element to the second SEPP.
  • the second SEPP sends the first reply message to the first network element according to the topology information of the first network element.
  • the function of SEPP is extended so that it can provide external services.
  • the topology information before hiding can be queried through the hidden topology information, and the queried topology information before hiding can be sent to the requester who issued the request message.
  • SEPP SEPP.
  • topology information recovery services are provided to each other through SEPP to realize the conversion from the hidden topology information to the pre-hidden topology information, so that the hidden topology information can be correctly restored, thereby avoiding the SEPP and reception of hidden topology information. Service failure caused by different SEPPs used to hide topology information.
  • FIG. 14 shows a schematic interaction diagram of yet another method 1400 for topological information hiding communication provided by an embodiment of the present application.
  • the method 1400 is applied to the scenario of sending and receiving messages across the first network element and the second network element of the network.
  • the method 1400 includes:
  • the first network element sends a first request message to the first SEPP.
  • the first request message is used to request to subscribe to target information from the second network element, or the first request message is used to request to obtain the target from the second network element. information.
  • the first network element while sending the first request message to the first SEPP, the first network element also sends the topology information of the first network element.
  • the first network element may send the topology information of the first network element in a manner carried by the first request information, may be sent individually, may be sent in a package, or may be sent by This application does not limit the forwarding methods of other devices or network elements.
  • the topology information of the first network element may be one or more of the IP address, FQDN, and URI of the first network element, or other topology information, which is not limited in this application.
  • the first SEPP After receiving the first request message, the first SEPP obtains the topology information of the first network element, hides the topology information of the first network element, and generates hidden information.
  • the hidden information refers to the hidden topological information of the first network element.
  • the first SEPP sends a first message to the third SEPP located in the second network.
  • the first message includes the first request message and hidden information.
  • the above hidden information may be sent by being carried by the first request message, may be sent individually, may be packaged and sent, or may be forwarded by other devices or network elements. , this application does not limit this.
  • the second network element In response to the received first message, the second network element sends a second message to the third SEPP on the same side, where the second message includes the first reply message and hidden information.
  • the first reply message is a message sent by the second network element in response to the first request message.
  • the above-mentioned hidden information may be sent by being carried by the first reply message, may be sent individually, may be packaged and sent, or may be forwarded by other devices or network elements. , this application does not limit this.
  • the second message carries a topology information recovery request message, which is used to request recovery of the hidden information it carries.
  • S1406 The third SEPP forwards the above-mentioned second message to the second SEPP located in the first network.
  • the second SEPP After receiving the second message, the second SEPP sends a second request message to the third network element located on the same side.
  • the second request message is used to request to obtain the restored hidden message.
  • the second request message carries the hidden information. .
  • the third network element In response to receiving the second request message, the third network element restores the hidden message to the unhidden topology information, and then sends the restored topology information of the first network element to the second SEPP.
  • S1409 The second SEPP sends the first reply message to the first network element according to the topology information of the first network element.
  • topology information hiding and recovery services are provided by adding a new NF.
  • the newly added NF can query the pre-hiding topology information through the hidden topology information, and then send the queried pre-hiding topology information to SEPP that issued the request message.
  • the hidden topology information can be restored correctly, thereby avoiding service failure caused by the difference between the SEPP for sending the hidden topology information and the SEPP for receiving the hidden topology information.
  • FIG 15 is a schematic block diagram of a communication device 1500 provided by an embodiment of the present application.
  • the device 1500 includes a receiving module 1501, which can be used to implement corresponding receiving functions.
  • the receiving module 1501 may also be called a receiving unit.
  • the device 1500 also includes a processing module 1502, which can be used to implement corresponding processing functions, such as hiding the topology information of the first network element or restoring the topology information of the first network element.
  • a processing module 1502 can be used to implement corresponding processing functions, such as hiding the topology information of the first network element or restoring the topology information of the first network element.
  • the device 1500 also includes a sending module 1503, which can be used to implement corresponding sending functions.
  • the sending module 1503 can also be called a sending unit.
  • the device 1500 also includes a storage unit, which can be used to store instructions and/or data, and the processing unit 1502 can read the instructions and/or data in the storage unit, so that the device implements each of the foregoing method embodiments. the actions of related devices.
  • a storage unit which can be used to store instructions and/or data
  • the processing unit 1502 can read the instructions and/or data in the storage unit, so that the device implements each of the foregoing method embodiments. the actions of related devices.
  • the device 1500 can be used to perform the actions performed by the network equipment (such as AMF, UDM or SEPP) in each of the above method embodiments.
  • the device 1500 can be a component of the network equipment, and the receiving module 1501 is used to perform
  • the processing module 1502 is used to perform operations related to the reception of the network device in the above method embodiment, and the sending module 1503 is used to perform the sending operation of the network device in the above method embodiment. related operations.
  • the device 1500 is used to perform actions performed by any network element or any device in each of the above method embodiments.
  • the communication device may be used to perform operations of the network equipment (for example, the first network element, the second network element, the third network element or the SEPP) in FIGS. 4 to 14 described above.
  • the network equipment for example, the first network element, the second network element, the third network element or the SEPP
  • the receiving module 1501 is configured to receive a first request message and send a first request message to the first SEPP.
  • the first request message is used to request to subscribe to the target information from the second network element, or the first request message is used to request from the second network element. Obtain target information at the second network element.
  • the receiving module 1501 while sending the first request message to the first SEPP, the receiving module 1501 also sends the topology information of the first network element.
  • the processing module 1502 is configured to obtain the topology information of the first network element, hide the topology information of the first network element, and generate hidden information.
  • the hidden information refers to the hidden topological information of the first network element.
  • the sending module 1503 is configured to send a first message to the third SEPP located in the second network, where the first message includes the first request message and hidden information.
  • the above hidden information may be sent by being carried by the first request message, may be sent individually, may be packaged and sent, or may be forwarded by other devices or network elements. , this application does not limit this.
  • the receiving module 1501, the processing module 1502 and the sending module 1503 in the communication device can also implement other operations or functions of the network device in the above method, which will not be described again here.
  • the receiving module 1501, the processing module 1502 and the sending module 1503 in the communication device can also implement the operations or functions of other devices in the above method, which will not be described again here.
  • Figure 16 shows another possible structural diagram of the communication device involved in the above embodiment.
  • the communication device includes a processor 1601.
  • the communication device may also include at least one memory 1602 for storing program instructions and/or data.
  • Memory 1602 and processor 1601 are coupled.
  • the coupling in the embodiment of this application is an indirect coupling or communication connection between devices, units or modules, which may be in electrical, mechanical or other forms, and is used for information interaction between devices, units or modules.
  • Processor 1601 may cooperate with memory 1602.
  • Processor 1601 may execute program instructions stored in memory 1602. At least one of the at least one memory may be included in the processor.
  • the communication device may also include a transceiver 1603 for communicating with other devices over a transmission medium so that the device may Communicate with other devices.
  • the transceiver 1603 may be an interface, a bus, a circuit, or a device capable of implementing transceiver functions.
  • transceiver 1603 may include a receiver and a transmitter.
  • connection medium between the above-mentioned processor 1601, memory 1602 and transceiver 1603 is not limited in the embodiment of the present application.
  • the processor 1601, the memory 1602 and the transceiver 1603 are connected through a bus 1604 in Figure 16.
  • the bus is represented by a thick line in Figure 16.
  • the connection methods between other components are only schematically explained. , is not limited.
  • the bus can be divided into address bus, data bus, control bus, etc. For ease of presentation, only one thick line is used in Figure 16, but it does not mean that there is only one bus or one type of bus.
  • processor 1601 is configured for other operations or functions of the network device.
  • the transceiver 1603 is used to implement communication between the communication device and other network elements/devices (such as UE/gNB).
  • the processor can be used to execute the program instructions and implement the above method flow.
  • the processor may include but is not limited to at least one of the following: a central processing unit (CPU), a microprocessor, a digital signal processor (DSP), a microcontroller unit (MCU), or artificial intelligence
  • CPU central processing unit
  • DSP digital signal processor
  • MCU microcontroller unit
  • Each computing device may include one or more cores for executing software instructions to perform calculations or processing.
  • the processor can be built into an SoC (system on a chip) or an application specific integrated circuit (ASIC), or it can be an independent semiconductor chip.
  • the processor can further include necessary hardware accelerators, such as field programmable gate array (FPGA), PLD (programmable logic device) , or a logic circuit that implements dedicated logic operations.
  • FPGA field programmable gate array
  • PLD programmable logic device
  • the hardware can be a CPU, microprocessor, DSP, MCU, artificial intelligence processor, ASIC, SoC, FPGA, PLD, dedicated digital circuit, hardware accelerator or non-integrated discrete device Any one or any combination thereof, which can run necessary software or not rely on software to perform the above method process.
  • the above modules or units When the above modules or units are implemented using software, they may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with the embodiments of the present invention are generated in whole or in part.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another, e.g., the computer instructions may be transferred from a website, computer, server, or data center Transmission to another website, computer, server or data center by wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.) means.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more available media integrated.
  • the available media may be magnetic media (eg, floppy disk, hard disk, magnetic tape), optical media (eg, DVD), or semiconductor media (eg, solid state disk (SSD)), etc.
  • the present application also provides a computer program product.
  • the computer program product includes: computer program code.
  • the computer program code When the computer program code is run on a computer, it causes the computer to execute the first step in the foregoing method embodiment.
  • One network element side method When the computer program code is run on a computer, it causes the computer to execute the first step in the foregoing method embodiment.
  • One network element side method When the computer program code is run on a computer, it causes the computer to execute the first step in the foregoing method embodiment.
  • One network element side method One network element side method.
  • the present application also provides a computer program product.
  • the computer program product includes: computer program code.
  • the computer program code When the computer program code is run on a computer, it causes the computer to execute the first step in the foregoing method embodiment. Method on the second network element side.
  • the present application also provides a computer program product.
  • the computer program product includes: computer program code.
  • the computer program code When the computer program code is run on a computer, it causes the computer to execute the SEPP in the foregoing method embodiment. side method.
  • the present application also provides a computer-readable medium.
  • the computer-readable medium stores program code.
  • the program code When the program code is run on a computer, it causes the computer to execute the first step in the foregoing method embodiment.
  • One network element side method One network element side method.
  • the present application also provides a computer-readable medium.
  • the computer-readable medium stores program code.
  • the program code When the program code is run on a computer, it causes the computer to execute the first step in the foregoing method embodiment. Method on the second network element side.
  • the present application also provides a computer-readable medium.
  • the computer-readable medium stores program code.
  • the program code When the program code is run on a computer, it causes the computer to execute the SEPP in the foregoing method embodiment. side method.
  • An embodiment of the present application also provides a processing device, including a processor and an interface; the processor is configured to execute the communication method in any of the above method embodiments.
  • the disclosed systems, devices and methods can be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or can be integrated into another system, or some features can be ignored, or not implemented.
  • the coupling or direct coupling or communication connection between each other shown or discussed may be through some interfaces, and the indirect coupling or communication connection of the devices or units may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or they may be distributed to multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application can be integrated into one processing unit, each unit can exist physically alone, or two or more units can be integrated into one unit.
  • the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the present application is essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in various embodiments of this application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk and other media that can store program code. .

Abstract

The embodiments of the present application provide a communication method and a communication apparatus. The method comprises: in response to a first network element sending a first request message to a second network, a first SEPP sending a first message to the second network, wherein the first message comprises the first request message and hidden information, and the hidden information is topological information of a hidden first network element; a second SEPP receiving a second message sent by the second network, wherein the second message comprises a first reply message and the hidden information; and the second SEPP recovering the hidden information, so as to route the first reply message to the first network element. Case 1 involves the first SEPP and the second SEPP having the same preset algorithm; case 2 involves the first SEPP being the same as the second SEPP; and case 3 involves the second SEPP requesting another network device to recover the topological information. The three solutions can all correctly recover hidden topological information, such that a service failure caused by a first SEPP being different from a second SEPP can be avoided.

Description

通信方法和通信装置Communication method and communication device
本申请要求于2022年08月08日提交中国专利局、申请号为202210943273.4、申请名称为“通信方法和通信装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims priority to the Chinese patent application filed with the China Patent Office on August 8, 2022, with the application number 202210943273.4 and the application title "Communication Method and Communication Device", the entire content of which is incorporated into this application by reference.
技术领域Technical field
本申请实施例涉及通信领域,并且更具体地,涉及一种通信方法和通信装置。The embodiments of the present application relate to the field of communication, and more specifically, to a communication method and a communication device.
背景技术Background technique
5G核心网的服务化接口中携带大量的拓扑信息,这些拓扑信息如果不加处理,可能会随着漫游接口和互通接口流出本网控制范围。因此,在发送消息时需要将该拓扑信息隐藏,在收到消息时再将其恢复。The service-oriented interface of the 5G core network carries a large amount of topology information. If this topology information is not processed, it may flow out of the control scope of the local network along with the roaming interface and interworking interface. Therefore, the topology information needs to be hidden when sending a message and restored when the message is received.
在此情况下,如何使得被隐藏的拓扑信息能够被顺利恢复,是当下亟需解决的问题。In this case, how to successfully recover the hidden topology information is an urgent problem that needs to be solved.
发明内容Contents of the invention
本申请实施例提供一种通信方法和通信装置,该方法能够使得隐藏后的拓扑信息正确的恢复,从而能够避免因为第一SEPP和第二SEPP不同而导致的业务失败。Embodiments of the present application provide a communication method and a communication device, which can correctly restore hidden topology information, thereby avoiding service failure caused by differences between the first SEPP and the second SEPP.
第一方面,提供了一种通信方法,该方法包括:响应于第一网元向第二网络发送第一请求消息的需求,第一安全和边界代理网元SEPP根据第一算法和第一密钥ID生成隐藏信息,该隐藏信息为隐藏后的第一网元的拓扑信息;第一SEPP向第二网络发送第一消息,该第一消息包括该第一请求消息和该隐藏信息,该隐藏信息携带第一密钥ID;第二SEPP接收该第二网络为响应于该第一消息发送的第二消息,该第二消息包括第一回复消息和该隐藏信息,该第一SEPP和该第二SEPP属于第一网络,该第一SEPP和该第二SEPP预置有该第一算法和该第一密钥ID;该第二SEPP根据该第一密钥ID恢复该隐藏信息,进而获得该第一网元的拓扑信息,以便根据该第一网元的拓扑信息将该第一回复消息路由至该第一网元。In a first aspect, a communication method is provided, which method includes: in response to a first network element sending a first request message to a second network, the first security and border proxy network element SEPP according to the first algorithm and the first encryption The key ID generates hidden information, which is the hidden topology information of the first network element; the first SEPP sends a first message to the second network, the first message includes the first request message and the hidden information, and the hidden information The information carries the first key ID; the second SEPP receives the second message sent by the second network in response to the first message, the second message includes the first reply message and the hidden information, the first SEPP and the third The two SEPPs belong to the first network, and the first SEPP and the second SEPP are preset with the first algorithm and the first key ID; the second SEPP restores the hidden information based on the first key ID, and then obtains the Topology information of the first network element, so as to route the first reply message to the first network element according to the topology information of the first network element.
具体地,该第二SEPP基于该第一算法,根据该第一密钥ID恢复该隐藏信息。Specifically, the second SEPP recovers the hidden information according to the first key ID based on the first algorithm.
可选地,该第一网元为接入与移动性管理功能AMF、会话管理功能SMF、统一数据管理UDM、用户面功能UPF、认证服务器功能AUSF、短消息服务功能SMSF中的任意一种。Optionally, the first network element is any one of the access and mobility management function AMF, the session management function SMF, the unified data management UDM, the user plane function UPF, the authentication server function AUSF, and the short message service function SMSF.
可选地,第一SEPP和所述第二SEPP为同一个SEPP。Optionally, the first SEPP and the second SEPP are the same SEPP.
本申请实施例中,通过在同网络中的SEPP上预置相同的算法和密钥ID信息,能够实现同网络下不同SEPP之间的拓扑信息互相隐藏和恢复的功能,进而实现同网络中所有SEPP在收到需要恢复的拓扑隐藏信息时,能够正确恢复该隐藏的拓扑信息,从而进一步根据该拓扑信息将对应的消息路由到正确的地址,能够避免由于SEPP不同而导致的业务失败。In the embodiment of this application, by presetting the same algorithm and key ID information on SEPPs in the same network, the functions of mutual hiding and recovery of topology information between different SEPPs on the same network can be realized, thereby realizing the functions of all SEPPs in the same network. When SEPP receives the topology hidden information that needs to be restored, it can correctly restore the hidden topology information, thereby further routing the corresponding message to the correct address based on the topology information, and avoiding service failures caused by different SEPPs.
结合第一方面,在一种可能的实现方式中,第一SEPP生成隐藏信息,包括:该第一SEPP接收第一网元发送的第一请求消息和该第一网元的拓扑信息;该第一SEPP根据第一算法和第一密钥ID加密该第一网元的拓扑信息,进而生成该隐藏信息。In conjunction with the first aspect, in a possible implementation manner, the first SEPP generates hidden information, including: the first SEPP receives a first request message sent by the first network element and the topology information of the first network element; A SEPP encrypts the topology information of the first network element according to the first algorithm and the first key ID, and then generates the hidden information.
本申请实施例中,采用加密的方式对消息中的拓扑信息进行隐藏,只要同网络中的SEPP上预置相同的算法和密钥ID,即可实现同网络下不同SEPP之间的拓扑信息互相隐藏和恢复的功能。In the embodiment of this application, encryption is used to hide the topology information in the message. As long as the same algorithm and key ID are preset on the SEPPs in the same network, the topology information between different SEPPs on the same network can be mutually communicated. Hide and restore functionality.
结合第一方面,在一种可能的实现方式中,第一SEPP向第二网络发送第一消息,包括:第一SEPP生成第一完全限定域名FQDN,该第一FQDN包括该隐藏信息和该第一密钥ID;该第一SEPP向第二网络发送第一消息,该第一消息包括该第一请求消息和该第一FQDN。In conjunction with the first aspect, in a possible implementation manner, the first SEPP sends a first message to the second network, including: the first SEPP generates a first fully qualified domain name FQDN, where the first FQDN includes the hidden information and the third A key ID; the first SEPP sends a first message to the second network, where the first message includes the first request message and the first FQDN.
可选地,该第一FQDN还包括该第一网元的域信息。Optionally, the first FQDN also includes domain information of the first network element.
本申请实施例中,消息携带的隐藏信息可以以存在于FQDN中,并且,该FQDN还包括该第一网 元的域信息,这样,拓扑信息在隐藏后,能够跟与其相对应的密钥信息和域信息被打包在同一个FQDN中,能够便于SEPP在接收到该隐藏信息后更容易识别,并且,也更容易获取恢复该隐藏信息所需要使用的密钥ID等信息,能够提高拓扑信息的恢复准确率和恢复效率。In the embodiment of the present application, the hidden information carried by the message may exist in the FQDN, and the FQDN also includes the first network In this way, after the topology information is hidden, it can be packaged in the same FQDN with the corresponding key information and domain information, which can make it easier for SEPP to identify after receiving the hidden information, and also It is easier to obtain the key ID and other information needed to recover the hidden information, which can improve the recovery accuracy and efficiency of topology information.
第二方面,提供了一种通信方法,该方法包括:响应于第一网元向第二网络发送第一请求消息的需求,第一安全和边界代理网元SEPP向该第二网络发送第一消息,该第一消息包括该第一请求消息和第一指示信息,该第一指示信息用于指示该第一SEPP对应的路由类别为严格路由;该第一SEPP接收该第二网络为响应于该第一消息,根据第一路径发送的第二消息,该第二消息包括第一回复消息,该第一路径是该第二网络根据该第一消息的路径生成的,该第一路径包括一个或多个设备,该一个或多个设备均对应一个路由类别,该路由类别包括严格路由;该第一SEPP向该第一网元发送该第一回复消息。In a second aspect, a communication method is provided, which method includes: in response to the first network element sending a first request message to the second network, the first security and border proxy network element SEPP sends the first request message to the second network. message, the first message includes the first request message and first indication information, the first indication information is used to indicate that the routing category corresponding to the first SEPP is strict routing; the first SEPP receives the response from the second network to The first message, the second message sent according to the first path, the second message includes the first reply message, the first path is generated by the second network according to the path of the first message, the first path includes a or multiple devices, each of the one or more devices corresponds to a routing category, and the routing category includes strict routing; the first SEPP sends the first reply message to the first network element.
可选地,该路由类别还包括宽松路由。Optionally, this route category also includes relaxed routes.
应理解:若消息路径所包括的某个设备对应的路由类别为严格路由,那么按照该消息路径发送的消息就必须经过该设备;若消息路径所包括的某个设备对应的路由类别为宽松路由,那么按照该消息路径发送的消息可以经过经过该设备,也可以不经过该设备。It should be understood that if the routing category corresponding to a device included in the message path is strict routing, then the message sent along the message path must pass through the device; if the routing category corresponding to a device included in the message path is loose routing , then the message sent according to the message path may or may not pass through the device.
可选地,第一网元为接入与移动性管理功能AMF、会话管理功能SMF、统一数据管理UDM、用户面功能UPF、认证服务器功能AUSF、短消息服务功能SMSF中的任意一种。Optionally, the first network element is any one of the access and mobility management function AMF, the session management function SMF, the unified data management UDM, the user plane function UPF, the authentication server function AUSF, and the short message service function SMSF.
本申请实施例中,通过记录请求消息的路径,并根据该路径生成回复消息的路径的方式,且将路径中的SEPP标记为严格路由,使得请求消息对应的回复消息必须经过被标记为严格路由的SEPP,这样,能够实现对消息路径的控制,使得消息的收发都经过同一个SEPP,进而能够避免由于SEPP不同而导致的业务失败。In the embodiment of this application, the path of the request message is recorded, and the path of the reply message is generated based on the path, and the SEPP in the path is marked as strict routing, so that the reply message corresponding to the request message must go through the path marked as strict routing. SEPP, in this way, the message path can be controlled so that messages are sent and received through the same SEPP, thereby avoiding service failures caused by different SEPPs.
结合第二方面,在一种可能的实现方式中,第一消息还包括隐藏信息,该隐藏信息为隐藏后的该第一网元的拓扑信息,该第二消息还包括该隐藏信息,该第一SEPP向该第一网元发送该第一回复消息,包括:该第一SEPP将该隐藏信息恢复为该第一网元的拓扑信息;该第一SEPP根据该第一网元的拓扑信息向该第一网元发送该第一回复消息。In conjunction with the second aspect, in a possible implementation, the first message further includes hidden information, the hidden information being the hidden topology information of the first network element, the second message further includes the hidden information, and the third A SEPP sends the first reply message to the first network element, including: the first SEPP restores the hidden information to the topology information of the first network element; the first SEPP sends the first reply message to the first network element according to the topology information of the first network element. The first network element sends the first reply message.
可选地,该第一SEPP通过加密该第一网元的拓扑信息,生成该隐藏信息。Optionally, the first SEPP generates the hidden information by encrypting the topology information of the first network element.
可选地,方法还包括:该第一SEPP接收该第一网元发送的该第一请求消息和该第一网元的拓扑信息。Optionally, the method further includes: the first SEPP receiving the first request message sent by the first network element and the topology information of the first network element.
本申请实施例中,通过对消息路径的控制,进而能够使得以SEPP隐藏的地址为目的地址的消息都能路由到他自己,从而避免出现消息路由到其他SEPP无法恢复的情况,进而使得隐藏的拓扑信息能够被正确恢复,避免了由于SEPP不同而导致的业务失败。In the embodiment of the present application, by controlling the message path, messages with destination addresses hidden by SEPP can be routed to itself, thereby avoiding the situation where messages are routed to other SEPPs and cannot be recovered, thereby making the hidden Topology information can be restored correctly, avoiding service failures caused by different SEPPs.
第三方面,提供了一种通信方法,该方法包括:第二网元接收第一安全和边界代理网元SEPP发送的第一消息,该第一消息包括第一请求消息和第一指示信息,该第一指示信息用于指示该第一SEPP对应的路由类别为严格路由;该第二网元根据该第一消息的路径生成第一路径,该第一路径包括一个或多个设备,该一个或多个设备均对应一个路由类别,该路由类别包括严格路由;响应于该第一消息,该第二网元根据该第一路径向该第一SEPP发送第二消息,该第二消息包括第一回复消息。In a third aspect, a communication method is provided, which method includes: the second network element receives a first message sent by the first security and border proxy network element SEPP, where the first message includes a first request message and first indication information, The first indication information is used to indicate that the routing category corresponding to the first SEPP is strict routing; the second network element generates a first path according to the path of the first message, and the first path includes one or more devices. Or multiple devices each correspond to a routing category, and the routing category includes strict routing; in response to the first message, the second network element sends a second message to the first SEPP according to the first path, the second message includes the One reply message.
其中,更具体地,该第二网元根据该第一路径和该第一路径上的设备对应的路由类别向该第一SEPP发送第二消息,该第二消息包括第一回复消息。Wherein, more specifically, the second network element sends a second message to the first SEPP according to the routing category corresponding to the first path and the device on the first path, and the second message includes a first reply message.
可选地,所述第二网元记录该第一消息的路径。Optionally, the second network element records the path of the first message.
可选地,该第二网元为接入与移动性管理功能AMF、会话管理功能SMF、统一数据管理UDM、用户面功能UPF、认证服务器功能AUSF、短消息服务功能SMSF中的任意一种。Optionally, the second network element is any one of the access and mobility management function AMF, the session management function SMF, the unified data management UDM, the user plane function UPF, the authentication server function AUSF, and the short message service function SMSF.
可选地,第二网元将该第一消息的路径倒序排放,进而生成该第一路径。Optionally, the second network element arranges the paths of the first message in reverse order to generate the first path.
本申请实施例中,通过记录请求消息的路径,并根据该路径生成回复消息的路径的方式,且将路径中的SEPP标记为严格路由,使得请求消息对应的回复消息必须经过被标记为严格路由的SEPP,这样,能够实现对消息路径的控制,使得消息的收发都经过同一个SEPP,进而能够避免由于SEPP不同而导致的业务失败。In the embodiment of this application, the path of the request message is recorded, and the path of the reply message is generated based on the path, and the SEPP in the path is marked as strict routing, so that the reply message corresponding to the request message must go through the path marked as strict routing. SEPP, in this way, the message path can be controlled so that messages are sent and received through the same SEPP, thereby avoiding service failures caused by different SEPPs.
结合第三方面,在一种可能的实现方式中,该第一消息还包括隐藏信息,该隐藏信息为隐藏后的第一网元的拓扑信息,该第二消息还包括所述隐藏信息。 Combined with the third aspect, in a possible implementation manner, the first message further includes hidden information, and the hidden information is the hidden topology information of the first network element, and the second message further includes the hidden information.
本申请实施例中,通过对消息路径的控制,进而能够使得以SEPP隐藏的地址为目的地址的消息都能路由到他自己,从而避免出现消息路由到其他SEPP无法恢复的情况,进而使得隐藏的拓扑信息能够被正确恢复,避免了由于SEPP不同而导致的业务失败。In the embodiment of the present application, by controlling the message path, messages with destination addresses hidden by SEPP can be routed to itself, thereby avoiding the situation where messages are routed to other SEPPs and cannot be recovered, thereby making the hidden Topology information can be restored correctly, avoiding service failures caused by different SEPPs.
第四方面,提供了一种通信方法,该方法包括:响应于第一网元向第二网络发送第一请求消息的需求,第一安全和边界代理网元SEPP向该第二网络发送第一消息,该第一消息包括该第一请求消息和该隐藏信息,该隐藏信息为隐藏后的该第一网元的拓扑信息;该第二SEPP接收该第二网络为响应于该第一消息发送的第二消息,该第二消息包括第一回复消息和该隐藏信息;该第二SEPP向第三网元发送第二请求消息,该第二请求消息用于请求获取该第一网元的拓扑信息,该第二请求消息包括该隐藏信息;该第二SEPP接收该第三网元为响应于第二请求消息发送的第二回复消息,该第二回复消息包括该第一网元的拓扑信息,以便根据该第一网元的拓扑信息将该请求回复消息路由至该第一网元。In a fourth aspect, a communication method is provided, which method includes: in response to the first network element sending a first request message to the second network, the first security and border proxy network element SEPP sends the first request message to the second network. message, the first message includes the first request message and the hidden information, the hidden information is the hidden topology information of the first network element; the second SEPP receives the second network in response to the first message. The second message includes the first reply message and the hidden information; the second SEPP sends a second request message to the third network element, the second request message is used to request to obtain the topology of the first network element information, the second request message includes the hidden information; the second SEPP receives the second reply message sent by the third network element in response to the second request message, the second reply message includes the topology information of the first network element , so as to route the request reply message to the first network element according to the topology information of the first network element.
可选地,该第一SEPP通过加密该第一网元的拓扑信息,生成该隐藏信息。Optionally, the first SEPP generates the hidden information by encrypting the topology information of the first network element.
可选地,方法还包括:该第一SEPP接收该第一网元发送的该第一请求消息和该第一网元的拓扑信息。Optionally, the method further includes: the first SEPP receiving the first request message sent by the first network element and the topology information of the first network element.
可选地,该第一网元为AMF、SMF、UDM、UPF、AUSF、SMSF中的任意一种。Optionally, the first network element is any one of AMF, SMF, UDM, UPF, AUSF, and SMSF.
本申请实施例中,接收回复消息的SEPP请求其他网元提供拓扑信息恢复服务,该其他网元通过被隐藏的拓扑信息查询到隐藏前的拓扑信息,再将查询到的隐藏前的拓扑信息发送给该接收回复消息的SEPP。这样,通过SEPP相互提供拓扑信息恢复服务,实现从隐藏后的拓扑信息到隐藏前拓扑信息的转换,能够使得隐藏后的拓扑信息能够正确的恢复,从而能够避免因为发送隐藏拓扑信息的SEPP和接收隐藏拓扑信息的SEPP不同而导致的业务失败。In the embodiment of this application, the SEPP that receives the reply message requests other network elements to provide topology information recovery services. The other network elements query the pre-hiding topology information through the hidden topology information, and then send the queried pre-hiding topology information. To the SEPP that receives the reply message. In this way, topology information recovery services are provided to each other through SEPP to realize the conversion from the hidden topology information to the pre-hidden topology information, so that the hidden topology information can be correctly restored, thereby avoiding the SEPP and reception of hidden topology information. Service failure caused by different SEPPs used to hide topology information.
结合第四方面,在一种可能的实现方式中,该第三网元为该第一SEPP。Combined with the fourth aspect, in a possible implementation manner, the third network element is the first SEPP.
本申请实施例中,对SEPP进行功能扩展,使其能够在接收到恢复请求消息时对外提供服务,通过被隐藏的拓扑信息查询到隐藏前的拓扑信息,再将查询到的隐藏前的拓扑信息发送给发出该恢复请求消息的SEPP。这样,通过SEPP相互提供拓扑信息恢复服务,实现从隐藏后的拓扑信息到隐藏前拓扑信息的转换,能够使得隐藏后的拓扑信息能够正确的恢复,从而能够避免因为发送隐藏拓扑信息的SEPP和接收隐藏拓扑信息的SEPP不同而导致的业务失败。In the embodiment of the present application, the function of SEPP is extended so that it can provide external services when receiving a recovery request message, query the topology information before hiding through the hidden topology information, and then query the topology information before hiding. Sent to the SEPP that issued the recovery request message. In this way, topology information recovery services are provided to each other through SEPP to realize the conversion from the hidden topology information to the pre-hidden topology information, so that the hidden topology information can be correctly restored, thereby avoiding the SEPP and reception of hidden topology information. Service failure caused by different SEPPs used to hide topology information.
结合第四方面,在一种可能的实现方式中,该第三网元为接入与移动性管理功能AMF、会话管理功能SMF、统一数据管理UDM、用户面功能UPF、认证服务器功能AUSF、短消息服务功能SMSF中的任意一种。Combined with the fourth aspect, in a possible implementation manner, the third network element is the access and mobility management function AMF, the session management function SMF, the unified data management UDM, the user plane function UPF, the authentication server function AUSF, the short-term network element Any one of the message service functions SMSF.
本申请实施例中,通过新增NF提供拓扑信息的隐藏和恢复服务,新增的NF可以在接收到恢复请求消息时,通过被隐藏的拓扑信息查询到隐藏前的拓扑信息,再将查询到的隐藏前的拓扑信息发送给发出该恢复请求消息的SEPP。这样,能够使得隐藏后的拓扑信息能够正确的恢复,从而能够避免因为发送隐藏拓扑信息的SEPP和接收隐藏拓扑信息的SEPP不同而导致的业务失败。In the embodiment of this application, the hiding and recovery service of topology information is provided by adding a new NF. When receiving the recovery request message, the newly added NF can query the topology information before hiding through the hidden topology information, and then query the topology information. The topology information before hiding is sent to the SEPP that issued the recovery request message. In this way, the hidden topology information can be restored correctly, thereby avoiding service failure caused by the difference between the SEPP for sending the hidden topology information and the SEPP for receiving the hidden topology information.
第五方面,提供了一种通信装置,该装置包括用于执行上述第一方面或第一方面的任意可能的实现方式中的方法的模块;或者,包括用于执行上述第二方面或第二方面的任意可能的实现方式中的方法的模块;或者,包括用于执行上述第三方面或第三方面的任意可能的实现方式中的方法的模块;或者,包括用于执行上述第四方面或第四方面的任意可能的实现方式中的方法的模块。In a fifth aspect, a communication device is provided, which device includes a module for executing the method in the above-mentioned first aspect or any possible implementation of the first aspect; or, includes a module for executing the above-mentioned second aspect or the second aspect. A module for performing a method in any possible implementation of the aspect; or, including a module for performing the above third aspect or a method in any possible implementation of the third aspect; or, including a module for performing the above fourth aspect or A module of a method in any possible implementation of the fourth aspect.
第六方面,提供了一种通信装置,该装置包括处理器和接口电路,所述接口电路用于接收来自所述通信装置之外的其它通信装置的信号并传输至所述处理器或将来自所述处理器的信号发送给所述通信装置之外的其它通信装置,所述处理器通过逻辑电路或执行代码指令用于实现上述第一方面至第四方面中任一方面中的任意可能的实现方式中的方法。In a sixth aspect, a communication device is provided. The device includes a processor and an interface circuit. The interface circuit is configured to receive signals from other communication devices other than the communication device and transmit them to the processor or to transmit signals from other communication devices. The signal of the processor is sent to other communication devices other than the communication device, and the processor is used to implement any possible method in any one of the above first to fourth aspects through logic circuits or execution of code instructions. Methods in the implementation.
第七方面,提供了一种通信装置,包括处理器。该处理器与存储器耦合,可用于执行存储器中的指令,以实现上述第一方面至第四方面中任一方面中的任意可能的实现方式中的方法。In a seventh aspect, a communication device is provided, including a processor. The processor is coupled to a memory and may be used to execute instructions in the memory to implement the method in any possible implementation manner of any one of the above-mentioned first to fourth aspects.
可选地,该装置还包括存储器。Optionally, the device further includes memory.
可选地,该装置还包括通信接口,处理器与通信接口耦合。Optionally, the device further includes a communication interface, and the processor is coupled to the communication interface.
第八方面,提供了一种计算机可读存储介质,该计算机可读存储介质中存储有计算机程序或指令,当该计算机程序或指令被执行时,实现上述第一方面至第四方面中任一方面中的任意可能的实现方式中的方法。 In an eighth aspect, a computer-readable storage medium is provided. Computer programs or instructions are stored in the computer-readable storage medium. When the computer program or instructions are executed, any one of the above-mentioned first to fourth aspects is implemented. A method in any possible implementation of an aspect.
第九方面,提供了一种包含指令的计算机程序产品,当该指令被运行时,实现上述第一方面至第四方面中任一方面中的任意可能的实现方式中的方法。In a ninth aspect, a computer program product containing instructions is provided. When the instructions are executed, the method in any possible implementation manner of any one of the above-mentioned first to fourth aspects is implemented.
第十方面,提供了一种通信芯片,其中存储有指令,当其在计算机设备上运行时,使得所述通信芯片执行上述第一方面至第四方面中任意可能的实现方式中的方法。In a tenth aspect, a communication chip is provided, in which instructions are stored, and when run on a computer device, the communication chip causes the communication chip to execute the method in any possible implementation manner in the above-mentioned first to fourth aspects.
第十一方面,提供了一种通信系统,该通信系统包括AMF、NG-RAN和SEPP。可选地,该通信系统还可以包括SMF。可选地,该通信系统还可以包括UDM。In an eleventh aspect, a communication system is provided, the communication system including AMF, NG-RAN and SEPP. Optionally, the communication system may also include SMF. Optionally, the communication system may also include UDM.
可选地,该通信系统还包括与上述网元进行通信的其他设备。Optionally, the communication system also includes other devices that communicate with the above network elements.
附图说明Description of drawings
图1是本申请实施例提供的一种漫游对接场景的应用架构图;Figure 1 is an application architecture diagram of a roaming docking scenario provided by an embodiment of the present application;
图2是本申请实施例提供的两种拓扑信息隐藏的过程示意图;Figure 2 is a schematic diagram of two topological information hiding processes provided by embodiments of the present application;
图3是本申请实施例提供的两种拓扑信息恢复的过程示意图;Figure 3 is a schematic diagram of the two topology information recovery processes provided by the embodiment of the present application;
图4是本申请实施例提供的一种实现拓扑隐藏的方案;Figure 4 is a solution for implementing topology hiding provided by an embodiment of the present application;
图5是本申请实施例提供的一种拓扑信息隐藏的方法的示意性交互图;Figure 5 is a schematic interaction diagram of a topological information hiding method provided by an embodiment of the present application;
图6是本申请实施例提供的又一种隐藏拓扑信息的方法的示意性流程图;Figure 6 is a schematic flow chart of yet another method of hiding topology information provided by an embodiment of the present application;
图7是本申请实施例提供的一种恢复拓扑信息的方法的示意性流程图;Figure 7 is a schematic flow chart of a method for restoring topology information provided by an embodiment of the present application;
图8是本申请实施例提供的再一种隐藏拓扑信息的方法的示意性流程图;Figure 8 is a schematic flow chart of yet another method of hiding topology information provided by an embodiment of the present application;
图9是本申请实施例提供的一种拓扑隐藏通信的方法的示意图;Figure 9 is a schematic diagram of a topology hidden communication method provided by an embodiment of the present application;
图10是本申请实施例提供的一种严格路由通信的方法的示意性交互图;Figure 10 is a schematic interaction diagram of a strict routing communication method provided by an embodiment of the present application;
图11是本申请实施例提供的不同网络中的SEPP间实现消息收发的的方法的信息交互图;Figure 11 is an information interaction diagram of a method for sending and receiving messages between SEPPs in different networks provided by the embodiment of the present application;
图12是本申请实施例提供的又一种拓扑隐藏通信的方法的示意图;Figure 12 is a schematic diagram of yet another topology hidden communication method provided by an embodiment of the present application;
图13是本申请实施例提供的又一种拓扑信息隐藏通信的方法的示意性交互图;Figure 13 is a schematic interaction diagram of yet another topology information hiding communication method provided by an embodiment of the present application;
图14是本申请实施例提供的再一种拓扑信息隐藏通信的方法的示意性交互图;Figure 14 is a schematic interaction diagram of yet another topology information hiding communication method provided by an embodiment of the present application;
图15是本申请实施例提供的一种通信装置的示意性框图;Figure 15 is a schematic block diagram of a communication device provided by an embodiment of the present application;
图16是本申请实施例提供的上述实施例中所涉及的通信装置的另一种可能的结构示意图。FIG. 16 is another possible structural schematic diagram of the communication device involved in the above embodiment provided by the embodiment of the present application.
具体实施方式Detailed ways
下面结合附图对本申请实施例进行详细描述。The embodiments of the present application will be described in detail below with reference to the accompanying drawings.
本申请提供的技术方案可以应用于各种通信系统,例如:新无线(new radio,NR)系统、长期演进(long term evolution,LTE)系统、LTE频分双工(frequency division duplex,FDD)系统、LTE时分双工(time division duplex,TDD)系统等。本申请还可以应用于设备到设备(device to device,D2D)通信,车到万物(vehicle-toeverything,V2X)通信,机器到机器(machine to machine,M2M)通信,机器类型通信(machine type communication,MTC),以及物联网(internet of things,IoT)通信系统或者其他通信系统。The technical solution provided by this application can be applied to various communication systems, such as: new radio (NR) system, long term evolution (LTE) system, LTE frequency division duplex (FDD) system , LTE time division duplex (TDD) system, etc. This application can also be applied to device-to-device (D2D) communication, vehicle-toeverything (V2X) communication, machine-to-machine (M2M) communication, machine type communication, MTC), and Internet of things (IoT) communication systems or other communication systems.
在通信系统中,运营者运营的部分可称为公共陆地移动网络(public land mobilenetwork,PLMN),也可称为运营商网络等。PLMN是由政府或其所批准的经营者为公众提供陆地移动通信业务目的而建立和经营的网络,主要是移动网络运营商(mobile network operator,MNO)为用户提供移动宽带接入服务的公共网络。本申请实施例中所描述的PLMN,具体可为符合第三代合作伙伴项目(3rd generation partnership project,3GPP)标准要求的网络,简称3GPP网络。3GPP网络通常包括但不限于第五代移动通信(5th-generation,5G)网络、第四代移动通信网络,以及未来的其他通信系统,例如第六代移动通信网络等。In the communication system, the part operated by the operator can be called the public land mobile network (PLMN), or the operator network, etc. PLMN is a network established and operated by the government or its approved operators for the purpose of providing land mobile communication services to the public. It is mainly a public network where mobile network operators (MNOs) provide mobile broadband access services to users. . The PLMN described in the embodiments of this application may specifically be a network that meets the standard requirements of the 3rd generation partnership project (3GPP), referred to as a 3GPP network. 3GPP networks generally include but are not limited to fifth-generation mobile communication (5th-generation, 5G) networks, fourth-generation mobile communication networks, and other future communication systems, such as sixth-generation mobile communication networks.
为了方便描述,本申请实施例中将以PLMN或5G网络为例进行说明。For convenience of description, the embodiments of this application will take the PLMN or 5G network as an example for description.
5G核心网的服务化接口(service based interface,SBI)中携带大量的拓扑信息,包括网络功能(network function,NF)的IP地址、完全限定域名(fully qualified domain name FQDN),统一资源标识符(uniform resource identifier,URI)等。如果不加处理,这些信息会随着漫游接口和互通接口流出本网控制范围,可能会产生难以控制的危害。例如:如果流出的信息被不法分子利用,不法分子可能会根据该信息分析出本网的部署情况,从而为攻击本网提供信息;如果流出的信息被竞争对手获取, 竞争对手可以进一步根据本网的网络部署情况识别对应的运营商的商业计划,比如部署了多少AMF,推测其未来3-5年的新增5G用户数目标等。The service based interface (SBI) of the 5G core network carries a large amount of topology information, including the IP address of the network function (NF), the fully qualified domain name (fully qualified domain name FQDN), the uniform resource identifier ( uniform resource identifier, URI), etc. If not processed, this information will flow out of the control scope of the network along with the roaming interface and interworking interface, which may cause harm that is difficult to control. For example: if the leaked information is used by criminals, the criminals may analyze the deployment of this network based on this information, thereby providing information for attacking this network; if the leaked information is obtained by competitors, Competitors can further identify the corresponding operator's business plan based on the network deployment situation of this network, such as how many AMFs have been deployed, and speculate on its target number of new 5G users in the next 3-5 years.
然而,在两个网络之间互通时,网络并不需要知道对方设备的详细地址,只需要将需要发送的消息路由到对端网络的安全和边界代理(security and edge protection proxy,SEPP)即可。因此3GPP TS33.501要求SEPP具备拓扑隐藏能力,即:在发送SBI消息到网外时将该消息中的拓扑信息隐藏,在收到外部到本网的消息时再将拓扑信息恢复,以便将该消息路由到正确的地址。However, when two networks communicate with each other, the network does not need to know the detailed address of the other party's device. It only needs to route the messages that need to be sent to the security and edge protection proxy (SEPP) of the opposite network. . Therefore, 3GPP TS33.501 requires SEPP to have topology hiding capabilities, that is, to hide the topology information in the SBI message when sending it outside the network, and then restore the topology information when receiving the message from the outside to the local network, so that the topology information can be restored. The message is routed to the correct address.
由于现有协议仅定义SEPP需要支持拓扑隐藏功能,并没有定义拓扑隐藏的实现方案。而在实际应用中,一个运营商可能部署多套SEPP,这些SEPP可能会采购于不同的设备商,由于拓扑隐藏的实现方案在标准中未定义,因此,各个设备商可能会采用不同的方案实现拓扑隐藏;同时,由于对同一拓扑信息的隐藏和恢复通常不是在同一会话完成的,其中的订阅请求和回调通知消息属于不同的HTTP事务,可能会由拜访域中不同的SEPP处理。因此设备商A的SEPP隐藏的拓扑信息可能在设备商B的SEPP上无法恢复,从而导致业务失败。Since the existing protocol only defines that SEPP needs to support the topology hiding function, it does not define an implementation solution for topology hiding. In actual applications, an operator may deploy multiple SEPPs, and these SEPPs may be purchased from different equipment vendors. Since the implementation of topology hiding is not defined in the standard, each equipment vendor may adopt different solutions. Topology hiding; at the same time, since hiding and restoring the same topology information are usually not completed in the same session, the subscription request and callback notification message belong to different HTTP transactions and may be processed by different SEPPs in the visited domain. Therefore, the topology information hidden by equipment vendor A's SEPP may not be restored on equipment vendor B's SEPP, causing service failure.
有鉴于此,本申请实施例提供了一种通信方法和通信装置。该方法能够避免在不同SEPP组网的情况下,由于拓扑隐藏导致的业务失败。In view of this, embodiments of the present application provide a communication method and a communication device. This method can avoid service failure due to topology hiding in different SEPP networking situations.
本申请实施例的方案应用于网络之间的消息交互场景,例如:可用于5G网络之间的漫游对接场景。The solution of the embodiment of the present application is applied to message interaction scenarios between networks, for example, it can be used in roaming docking scenarios between 5G networks.
为了更好地理解本申请提供的技术方案,下面先对本申请实施例中所涉及到的术语作出详细说明:In order to better understand the technical solutions provided by this application, the terms involved in the embodiments of this application will be described in detail below:
1.网络拓扑1.Network topology
网络拓扑是指用传输介质互连各种设备的物理布局。网络拓扑可以通过一组相关联的信息表述,包括设备的IP地址、域名、设备类型、名称,相关性,台套数等,这一组用于表述网络布局的信息都称为拓扑信息。Network topology refers to the physical layout of various devices interconnected using transmission media. Network topology can be expressed through a set of associated information, including the device's IP address, domain name, device type, name, correlation, number of sets, etc. This set of information used to express the network layout is called topology information.
在漫游对接场景中,漫游对接消息中常见的拓扑信息有三种:In a roaming connection scenario, there are three common types of topology information in roaming connection messages:
1、消息的转发路径VIA头域,记录了消息经过的proxy的地址(FQDN/IP地址),包含了路由器信息及设备互联信息。1. The VIA header field of the forwarding path of the message records the address (FQDN/IP address) of the proxy through which the message passes, including router information and device interconnection information.
2、服务器(5GC的cNF/pNF)的FQDN,FQDN中通常会携带设备部署的位置,类型,名称等信息。2. The FQDN of the server (5GC's cNF/pNF). The FQDN usually carries the location, type, name and other information of the device deployment.
3、服务器的IP地址,通常IP地址是运营商内部私网IP地址,会暴露网内IP地址规划规则,并为攻击者提供明确的攻击目标或者跳板。3. The IP address of the server. Usually the IP address is the operator's internal private network IP address, which will expose the IP address planning rules within the network and provide attackers with a clear attack target or springboard.
2.拓扑隐藏2. Topology hiding
在漫游对接时,外部设备需要将消息路由到SEPP,SEPP再往网内转发,外部设备只要能够将消息转发到SEPP接口,没有必要知道网内的拓扑信息。因此在从网内发送消息到网外时,SEPP可以将网络中的拓扑信息隐藏起来,在不影响漫游对接的情况尽量避免拓扑信息的暴露。During roaming connection, the external device needs to route the message to SEPP, and SEPP forwards it to the network. As long as the external device can forward the message to the SEPP interface, there is no need to know the topology information in the network. Therefore, when sending messages from within the network to outside the network, SEPP can hide the topology information in the network and try to avoid the exposure of topology information without affecting roaming connection.
应理解,本申请实施例所涉及的网络架构可以是第五代系统(5th generation system,5GS),5GS中的网元也可以称为5G核心网网元。It should be understood that the network architecture involved in the embodiments of this application may be a fifth generation system (5th generation system, 5GS), and the network elements in 5GS may also be called 5G core network elements.
图1示出了本申请实施例提供的漫游对接场景的应用架构图,下面对该网络架构中涉及的各个网元或设备的功能分别进行说明。Figure 1 shows an application architecture diagram of the roaming docking scenario provided by the embodiment of the present application. The functions of each network element or device involved in the network architecture will be described below.
1、终端设备,又可以称之为用户设备(user equipment,UE)、移动台(mobile station,MS)、移动终端(mobile terminal,MT)等,是一种向用户提供语音和/或数据连通性的设备。例如,所述终端设备可以包括具有无线连接功能的手持式设备、车载设备等。目前,所述终端设备可以是:手机(mobile phone)、平板电脑、笔记本电脑、掌上电脑、移动互联网设备(mobile internet device,MID)、可穿戴设备,虚拟现实(virtual reality,VR)设备、增强现实(augmented reality,AR)设备、工业控制(industrial control)中的无线终端、无人驾驶(self-driving)中的无线终端、远程手术(remote medical surgery)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端,或智慧家庭(smart home)中的无线终端等。其中,图1中所述终端设备以UE示出,仅作为示例,并不对终端设备进行限定。1. Terminal equipment, which can also be called user equipment (UE), mobile station (MS), mobile terminal (MT), etc., is a device that provides voice and/or data connectivity to users. sexual equipment. For example, the terminal device may include a handheld device, a vehicle-mounted device, etc. with a wireless connection function. Currently, the terminal device can be: mobile phone, tablet computer, notebook computer, handheld computer, mobile Internet device (mobile internet device, MID), wearable device, virtual reality (VR) device, augmented reality device Augmented reality (AR) equipment, wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in remote medical surgery, smart grid ), wireless terminals in transportation safety, wireless terminals in smart cities, or wireless terminals in smart homes, etc. The terminal device described in Figure 1 is shown as UE, which is only used as an example and does not limit the terminal device.
2、接入管理网元:主要用于移动性管理和接入管理等。在5G通信系统中,该接入管理网元可以是接入和移动性管理功能(access and mobility management function,AMF),例如图1所示,主要进行移动性管理、接入鉴权/授权等功能。此外,还负责在终端与策略控制功能(policy control function, PCF)网元间传递用户策略。其可以接收终端设备的非接入层(non-access stratum,NAS)信令(包括移动管理(mobility management,MM)信令和会话管理(session management,SM)信令)和接入网设备的相关信令(例如,与AMF交互的基站粒度的N2(下一代网络(next generation,NG)2接口)信令),完成用户的注册流程和SM信令的转发以及移动性管理。具体地,AMF网元可以从5G核心网(5G core network,5GC)位置服务(location services,LCS)实体接收与目标UE相关的位置服务请求,或者AMF本身也可代表特定目标UE启动一些位置服务,并将位置服务请求转发给位置管理网元,当得到UE返回的位置信息后,将相关位置信息返回给5GC LCS实体。在未来通信,如6G中,所述接入管理网元仍可以是AMF网元,或有其它的名称,本申请不做限定。2. Access management network element: mainly used for mobility management and access management. In the 5G communication system, the access management network element can be the access and mobility management function (AMF), as shown in Figure 1, for example, which mainly performs mobility management, access authentication/authorization, etc. Function. In addition, it is also responsible for the terminal and policy control function (policy control function, PCF) transmits user policies between network elements. It can receive non-access stratum (NAS) signaling of terminal equipment (including mobility management (MM) signaling and session management (SM) signaling) and access network equipment. Relevant signaling (for example, base station granular N2 (next generation, NG) 2 interface) signaling that interacts with AMF) completes the user's registration process and forwarding of SM signaling and mobility management. Specifically, the AMF network element can receive a location service request related to the target UE from a 5G core network (5GC) location services (LCS) entity, or the AMF itself can also initiate some location services on behalf of a specific target UE. , and forwards the location service request to the location management network element. After obtaining the location information returned by the UE, the relevant location information is returned to the 5GC LCS entity. In future communications, such as 6G, the access management network element can still be an AMF network element, or have other names, which is not limited in this application.
3、会话管理网元:主要用于会话管理、用户设备的网络互连协议(internet protocol,IP)地址分配和管理、选择可管理用户平面功能、策略控制和收费功能接口的终结点以及下行数据通知等。例如可以是会话管理功能(session management function,SMF)网元,负责会话管理功能,完成与PDU会话相关的建立、释放、更新等流程。3. Session management network element: Mainly used for session management, Internet protocol (IP) address allocation and management of user equipment, selection of endpoints for manageable user plane functions, policy control and charging function interfaces, and downlink data Notifications etc. For example, it can be a session management function (SMF) network element, which is responsible for the session management function and completes the establishment, release, update and other processes related to the PDU session.
4、网络存储网元:为其他核心网元提供网络功能实体信息的存储功能和选择功能。在5G通信系统中,该网元可以是网络功能存储库功能网元(network function repository function,NRF),主要包括以下功能:服务发现功能,维护可用的网络功能(network function,NF)实例的NF文本以及他们支持的服务。4. Network storage network element: Provides storage and selection functions for network function entity information for other core network elements. In the 5G communication system, the network element can be a network function repository function (NRF), which mainly includes the following functions: service discovery function, maintaining NF of available network function (NF) instances texts and the services they support.
上述功能网元既可以是硬件设备中的网络元件,也可以是在专用硬件上运行的软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。上述功能网元可划分出一个或多个服务,进一步,还可能会出现独立于网络功能存在的服务。在本申请中,上述功能网元的实例、或上述功能网元中包括的服务的实例、或独立于网络功能存在的服务实例均可称为服务实例。The above functional network elements can be either network elements in hardware devices, software functions running on dedicated hardware, or virtualization functions instantiated on a platform (for example, a cloud platform). The above functional network elements can be divided into one or more services. Furthermore, there may also be services that exist independently of network functions. In this application, instances of the above-mentioned functional network elements, or instances of services included in the above-mentioned functional network elements, or service instances that exist independently of network functions may be called service instances.
5、统一数据管理网元:负责用户标识、签约数据、鉴权数据的管理、用户的服务网元注册管理。在5G通信系统中,该统一数据管理网元可以是统一数据管理(unified data management,UDM),主要包括以下功能:统一数据管理,支持3GPP认证和密钥协商机制中的认证信任状处理,用户身份处理,接入授权,注册和移动性管理,签约管理和短消息管理等。5. Unified data management network element: Responsible for the management of user identification, contract data, authentication data, and user service network element registration management. In the 5G communication system, the unified data management network element can be unified data management (UDM), which mainly includes the following functions: unified data management, support for authentication credentials processing in the 3GPP authentication and key agreement mechanism, user Identity processing, access authorization, registration and mobility management, subscription management and short message management, etc.
6、安全和边界代理:该网元可以是安全边缘保护代理(security and edge protection proxy,SEPP)安全边缘保护代理,是5G漫游安全架构的重要组成部分,用于用户漫游,与其他运营商的通信互通,负责运营商之间控制平面接口上的消息过滤和策略管理,主要作为运营商核心网控制面之间的边界网关。SEPP作为非透明代理节点,能够提供应用层控制平面安全性,实现跨运营商中网络功能消费者与网络功能提供者之间的安全通信。6. Security and edge proxy: This network element can be a security and edge protection proxy (SEPP) security edge protection proxy. It is an important part of the 5G roaming security architecture and is used for user roaming and communication with other operators. Communication interworking is responsible for message filtering and policy management on the control plane interfaces between operators, and mainly serves as the border gateway between the control planes of the operators' core networks. As a non-transparent proxy node, SEPP can provide application layer control plane security and realize secure communication between network function consumers and network function providers across operators.
SEPP的安全功能包括消息过滤、访问控制、拓扑隐藏以及错误检测和处理。网络边界的两个SEPP之间通过N32接口建立连接并实施保护策略,对跨网络信令中的每个控制面消息进行处理。SEPP's security features include message filtering, access control, topology hiding, and error detection and handling. The two SEPPs at the network boundary establish a connection through the N32 interface and implement protection policies to process each control plane message in cross-network signaling.
7、用户面功能(user plane function,UPF):UPF是由运营商提供的网关,是运营商网络与数据网络DN通信的网关。7. User plane function (UPF): UPF is a gateway provided by the operator and is the gateway for communication between the operator network and the data network DN.
UPF网络功能包括数据包路由和传输、数据包检测、业务用量上报、服务质量(quality of service,QoS)处理、合法监听、上行数据包检测、下行数据包存储等用户面功能。UPF network functions include data packet routing and transmission, data packet detection, business usage reporting, quality of service (QoS) processing, legal interception, uplink data packet detection, downlink data packet storage and other user plane functions.
8、策略控制功能(policy control function,PCF):PCF是由运营商提供的控制面功能,它支持统一的策略框架来治理网络行为、向其他控制功能提供策略规则、策略决策相关的签约信息等。8. Policy control function (PCF): PCF is a control plane function provided by operators. It supports a unified policy framework to govern network behavior, provides policy rules, policy decision-related contract information, etc. to other control functions. .
9、认证服务器功能(authentication server function,AUSF):AUSF是由运营商提供的控制面功能,通常用于终端设备110(签约用户)与运营商网络之间的认证。AUSF网络功能接收到签约用户发起的认证请求之后,可通过UDM网络功能中存储的认证信息和/或授权信息对签约用户进行认证和/或授权,或者通过UDM网络功能生成签约用户的认证和/或授权信息。AUSF网络功能可向签约用户反馈认证信息和/或授权信息。9. Authentication server function (AUSF): AUSF is a control plane function provided by the operator, and is usually used for authentication between the terminal device 110 (subscriber) and the operator's network. After receiving the authentication request initiated by the contracted user, the AUSF network function can authenticate and/or authorize the contracted user through the authentication information and/or authorization information stored in the UDM network function, or generate the authentication and/or authorization of the contracted user through the UDM network function. or authorization information. The AUSF network function can feedback authentication information and/or authorization information to contract users.
10、(无线)接入网设备(radio access network,(R)AN):接入网设备也可以称为接入设备,(R)AN能够管理无线资源,为用户设备提供接入服务,完成用户设备数据在用户设备和核心网之间的转发,(R)AN也可以理解为网络中的基站。10. (Radio access network, (R)AN): Access network equipment can also be called access equipment. (R)AN can manage wireless resources and provide access services for user equipment. Complete For the forwarding of user equipment data between the user equipment and the core network, (R)AN can also be understood as a base station in the network.
11、网络切片选择功能网元:负责为UE选择网络切片,在5G通信系统中,该应用网元可以是网络切片选择功能(network slice selection function,NSSF)网元。也即,NSSF可以理解为网络切片选 择功能网元在5G架构中的命名。其中,网络切片选择功能网元主要包括以下功能:为UE选择一组网络切片实例、确定允许的网络切片选择辅助信息(network slice selection assistance information,NSSAI),以及确定可以服务UE的AMF集等。11. Network slice selection function network element: Responsible for selecting network slices for UE. In the 5G communication system, the application network element can be a network slice selection function (NSSF) network element. In other words, NSSF can be understood as network slicing selection Select the naming of functional network elements in the 5G architecture. Among them, the network slice selection function network element mainly includes the following functions: selecting a group of network slice instances for the UE, determining the allowed network slice selection assistance information (NSSAI), and determining the AMF set that can serve the UE.
应理解,这里做统一说明,下文的架构中若出现了上述网元,上述对各个网元包括的功能的描述可以同样适用,为了简洁,下次出现将不作赘述。It should be understood that a unified explanation is given here. If the above-mentioned network elements appear in the following architecture, the above-mentioned description of the functions included in each network element can be equally applicable. For the sake of simplicity, no further description will be made next time.
从图1中可以看到,SEPP用于两个5GC网络的对接。SEPP之间的接口定义为N32接口,漫游时跨PLMN的所有消息都需要经过N32接口转发,SEPP需要提供漫游场景的消息接入及安全防护能力。As can be seen from Figure 1, SEPP is used for the docking of two 5GC networks. The interface between SEPPs is defined as the N32 interface. All messages across PLMNs during roaming need to be forwarded through the N32 interface. SEPP needs to provide message access and security protection capabilities in roaming scenarios.
其中,SEPP在转发请求消息到N32接口时,需要先对消息中的拓扑信息进行隐藏操作;当SEPP收到N32接口的消息时,如果其中存在被隐藏的拓扑信息,则需要将其恢复为原始拓扑信息。Among them, when SEPP forwards the request message to the N32 interface, it needs to hide the topology information in the message first; when SEPP receives the message from the N32 interface, if there is hidden topology information in it, it needs to restore it to the original Topological information.
应注意:上图属于逻辑架构,仅为示例性说明,每个运营商仅展示一个SEPP,在实际部署过程中,每个运营商会存在多个SEPP。It should be noted that the above figure belongs to the logical architecture and is only an illustrative illustration. Each operator only shows one SEPP. In the actual deployment process, each operator will have multiple SEPPs.
当然,图1所涉及的系统架构中还可能包括其他网元,如统一数据存储库(unified data repository,UDR)等网元或设备等,不作具体限定。Of course, the system architecture involved in Figure 1 may also include other network elements, such as unified data repository (UDR) and other network elements or equipment, without specific limitations.
应理解,图1所示的网元之间的接口或服务化接口仅是一个示例,在5G网络以及未来其它的网络中,网元之间的接口或服务化接口也可以不是图中所示的接口,本申请对此不作限定。It should be understood that the interfaces or service-oriented interfaces between network elements shown in Figure 1 are only an example. In 5G networks and other future networks, the interfaces or service-oriented interfaces between network elements may not be as shown in the figure. interface, this application does not limit this.
应理解,图1所示的各个网元的命名仅是一个名字,名字对网元本身的功能不构成限定。在5G网络以及未来其它的网络中,上述各个网元也可以是其他的名字,本申请实施例对此不作具体限定。例如,在6G网络中,上述各个网元中的部分或全部可以沿用5G中的术语,也可能是其他命名,等等,在此进行统一说明,以下不再赘述。It should be understood that the naming of each network element shown in Figure 1 is only a name, and the name does not limit the function of the network element itself. In 5G networks and other future networks, each of the above network elements may also have other names, which are not specifically limited in the embodiments of this application. For example, in a 6G network, some or all of the above-mentioned network elements may use the terminology used in 5G, or may be named by other names, etc., which will be described uniformly here and will not be described in detail below.
还应理解,本申请实施例并不限于图1所示的系统架构中。例如,可以应用本申请的通信系统可以包括更多或更少的网元或设备。图1中的设备或网元可以是硬件,也可以是从功能上划分的软件或者以上二者的结合。图1中的设备或网元之间可以通过其他设备或网元通信。It should also be understood that the embodiments of the present application are not limited to the system architecture shown in Figure 1 . For example, a communication system to which the present application may be applied may include more or fewer network elements or devices. The equipment or network elements in Figure 1 can be hardware, functionally divided software, or a combination of the above two. The devices or network elements in Figure 1 can communicate with each other through other devices or network elements.
为了更清楚地理解本申请实施例提供的拓扑信息的隐藏和恢复的过程。以下,结合图2和图3,对拓扑信息的隐藏和恢复过程进行介绍。In order to more clearly understand the process of hiding and recovering topological information provided by the embodiments of this application. Below, combined with Figure 2 and Figure 3, the hiding and recovery process of topological information is introduced.
图2示出了本申请实施例提供的两种拓扑信息隐藏的过程示意图。Figure 2 shows a schematic diagram of two topological information hiding processes provided by embodiments of the present application.
图2中的(a)示出了本申请实施例提供的当两个SEPP直接采用安全传输层协议(transport layer security,TLS)对接的方式(采用HTTPS协议)时,拓扑信息隐藏过程的示意图。其中,TLS用于在两个通信应用程序之间提供保密性和数据完整性。该协议由两层组成:TLS记录协议(TLS record)和TLS握手协议(TLS handshake)。如图2中的(a)所示,拓扑信息隐藏的过程具体可以是:(a) in Figure 2 shows a schematic diagram of the topology information hiding process provided by the embodiment of the present application when two SEPPs directly use transport layer security (TLS) to connect (using the HTTPS protocol). Among them, TLS is used to provide confidentiality and data integrity between two communication applications. The protocol consists of two layers: TLS record protocol (TLS record) and TLS handshake protocol (TLS handshake). As shown in (a) in Figure 2, the process of topological information hiding can be as follows:
S201a:客户端通过Nx接口将原消息发送给本侧网络中的cSEPP。S201a: The client sends the original message to cSEPP in the local network through the Nx interface.
其中,原消息中包括消息部分和拓扑信息部分,该拓扑信息是指发出该消息的NF相关的信息。The original message includes a message part and a topology information part. The topology information refers to the information related to the NF that sent the message.
S202a:cSEPP收到原消息后,获取本侧网络的运营商信息以及拓扑隐藏标识,进行拓扑信息的隐藏,进而生成新消息。S202a: After receiving the original message, cSEPP obtains the operator information and topology hiding identifier of the local network, hides the topology information, and then generates a new message.
其中,新消息包括上述消息部分和隐藏后的拓扑信息部分。The new message includes the above message part and the hidden topology information part.
S203a:cSEPP将上述新消息通过N32接口发送给对端网络的pSEPP,pSEPP再将该新消息转发给服务端。S203a: cSEPP sends the above new message to pSEPP on the opposite end network through the N32 interface, and pSEPP forwards the new message to the server.
与图2中的(a)并列地,图2中的(b)示出了本申请实施例提供当两个SEPP采用IPX设备中转的对接方式(采用N32对接安全协议(protocol for N32 interconnect security,PRINS)模式)时,拓扑信息隐藏过程的示意图。如图2中的(b)所示,拓扑信息隐藏的过程具体可以是:Parallel to (a) in Figure 2, (b) in Figure 2 shows that the embodiment of the present application provides a docking method when two SEPPs use IPX device relay (using the N32 interconnection security protocol (protocol for N32 interconnect security, PRINS) mode), a schematic diagram of the topological information hiding process. As shown in (b) in Figure 2, the process of topological information hiding can be as follows:
S201b:客户端通过Nx接口将原消息发送给本侧网络中的cSEPP。S201b: The client sends the original message to cSEPP in the local network through the Nx interface.
其中,原消息中包括消息部分和拓扑信息部分,该拓扑信息是指发出该消息的NF相关的信息。The original message includes a message part and a topology information part. The topology information refers to the information related to the NF that sent the message.
S202b:cSEPP收到原消息后,获取本侧网络的运营商信息以及拓扑隐藏标识,进行拓扑信息的隐藏,进而生成新消息。S202b: After receiving the original message, cSEPP obtains the operator information and topology hiding identifier of the local network, hides the topology information, and then generates a new message.
其中,新消息包括上述消息部分和隐藏后的拓扑信息部分。The new message includes the above message part and the hidden topology information part.
S203b:cSEPP将上述新消息通过N32接口以及互联网分组交换协议(IPX)发送给对端网络的pSEPP,pSEPP再将该新消息转发给服务端。S203b: cSEPP sends the above new message to pSEPP on the opposite end network through the N32 interface and Internet Packet Exchange Protocol (IPX), and pSEPP forwards the new message to the server.
其中,IPX运营商提供分组寻址和选择路由的功能,保证可靠到达,相当于数据报的功能;同时, IPX运营商还提供漫游业务,比如漫游优选和欢迎短信等。Among them, IPX operators provide group addressing and routing functions to ensure reliable arrival, which is equivalent to the function of datagram; at the same time, IPX operators also provide roaming services, such as roaming optimization and welcome text messages.
与图2所示实施例相对应地,图3示出了本申请实施例提供的两种拓扑信息恢复的过程示意图。Corresponding to the embodiment shown in Fig. 2, Fig. 3 shows a schematic diagram of two types of topology information recovery processes provided by embodiments of the present application.
图3中的(a)示出了本申请实施例提供的当两个SEPP直接采用TLS对接的方式(采用HTTPS协议)时,拓扑信息恢复过程的示意图。如图3中的(a)所示,拓扑信息恢复的过程具体可以是:(a) in Figure 3 shows a schematic diagram of the topology information recovery process provided by the embodiment of the present application when two SEPPs directly connect using TLS (using the HTTPS protocol). As shown in (a) in Figure 3, the specific process of topology information recovery can be:
S301a:服务端的pSEPP通过N32接口将原消息发送给对侧网络中的cSEPP。S301a: The pSEPP on the server sends the original message to the cSEPP in the opposite network through the N32 interface.
其中,原消息中包括消息部分和隐藏后的拓扑信息部分,该拓扑信息是指客户端侧发出该消息的NF相关的信息。The original message includes a message part and a hidden topology information part. The topology information refers to the information related to the NF that sends the message on the client side.
S302a:cSEPP收到原消息后,获取本侧网络的运营商信息以及拓扑隐藏标识,进行拓扑信息的恢复,进而生成新消息。S302a: After receiving the original message, cSEPP obtains the operator information and topology hidden identifier of the local network, restores the topology information, and then generates a new message.
其中,新消息包括上述消息部分和拓扑信息部分。The new message includes the above message part and the topology information part.
S303a:cSEPP将上述新消息通过Nx接口发送给本端网络中的客户端。S303a: cSEPP sends the above new message to the client in the local network through the Nx interface.
与图3中的(a)并列地,图3中的(b)示出了本申请实施例提供的当两个SEPP采用IPX设备中转的对接方式(采用PRINS模式)时,拓扑信息恢复过程的示意图。如图3中的(b)所示,拓扑信息恢复的过程具体可以是:Parallel to (a) in Figure 3, (b) in Figure 3 shows the topology information recovery process provided by the embodiment of the present application when two SEPPs adopt the IPX device relay docking method (using PRINS mode). Schematic diagram. As shown in (b) in Figure 3, the specific process of topology information recovery can be:
S301b:服务端的pSEPP通过N32接口和IPX将原消息发送给对侧网络中的cSEPP。S301b: The pSEPP on the server sends the original message to the cSEPP in the opposite network through the N32 interface and IPX.
其中,原消息中包括消息部分和隐藏后的拓扑信息部分,该拓扑信息是指客户端侧发出该消息的NF相关的信息。The original message includes a message part and a hidden topology information part. The topology information refers to the information related to the NF that sends the message on the client side.
S302b:cSEPP收到原消息后,获取本侧网络的运营商信息以及拓扑隐藏标识,进行拓扑信息的恢复,进而生成新消息。S302b: After receiving the original message, cSEPP obtains the operator information and topology hidden identifier of the local network, restores the topology information, and then generates a new message.
其中,新消息包括上述消息部分和拓扑信息部分。The new message includes the above message part and the topology information part.
S303b:cSEPP将上述新消息通过Nx接口发送给本端网络中的客户端。S303b: cSEPP sends the above new message to the client in the local network through the Nx interface.
示例性地,图4示出了本申请实施例提供的一种实现拓扑隐藏的方案,该方案应用于AMF订阅UDM上的用户数据变化场景。如图4所示,该方案包括以下步骤:Illustratively, Figure 4 shows a solution for implementing topology hiding provided by the embodiment of the present application, which is applied to the user data change scenario on the AMF subscription UDM. As shown in Figure 4, the solution includes the following steps:
S401:拜访域的AMF向同侧的SEPP-a发送订阅请求消息,该订阅请求消息携带CallbackURIA,其中,CallbackURIA是指未经隐藏的AMF相关的拓扑信息。S401: The AMF in the visited domain sends a subscription request message to SEPP-a on the same side. The subscription request message carries CallbackURIA, where CallbackURIA refers to unhidden AMF-related topology information.
S402:拜访域的SEPP-a隐藏CallbackURIA,向对侧的SEPP-1发送订阅请求消息,并进一步将该订阅请求消息发送给UDM,此时的订阅请求消息携带CallbackURIA1,其中,CallbackURIA1是指隐藏后的AMF相关的拓扑信息。S402: SEPP-a of the visited domain hides CallbackURIA, sends a subscription request message to SEPP-1 on the opposite side, and further sends the subscription request message to UDM. At this time, the subscription request message carries CallbackURIA1, where CallbackURIA1 refers to the hidden CallbackURIA. AMF related topology information.
S403:当UDM上的用户数据发生变化时,UDM通过同侧的SEPP-2向拜访域的SEPP-b发送通知请求消息,该通知请求消息携带上述CallbackURIA1。S403: When the user data on the UDM changes, the UDM sends a notification request message to the SEPP-b of the visited domain through SEPP-2 on the same side. The notification request message carries the above-mentioned CallbackURIA1.
S404:SEPP-b接收到携带CallbackURIA1的通知请求消息后,将CallbackURIA1恢复为CallbackURIA。以便于根据CallbackURIA将通知请求消息路由到AMF。S404: After receiving the notification request message carrying CallbackURIA1, SEPP-b restores CallbackURIA1 to CallbackURIA. To facilitate routing of notification request messages to AMF based on CallbackURIA.
然而,在步骤S404中,由于SEPP-a和SEPP-b的算法可能不同,很可能会导致SEPP-b无法将CallbackURIA1恢复为CallbackURIA,从而使得业务失败。However, in step S404, since the algorithms of SEPP-a and SEPP-b may be different, SEPP-b may be unable to restore CallbackURIA1 to CallbackURIA, resulting in service failure.
示例性地,图5示出了本申请实施例提供的一种拓扑信息隐藏的方法500的示意性交互图。该方法500应用于跨网络的第一网元与第二网元进行消息收发的场景。如图5所示,该方法500包括:Exemplarily, FIG. 5 shows a schematic interaction diagram of a topological information hiding method 500 provided by the embodiment of the present application. The method 500 is applied to the scenario of sending and receiving messages across the first network element and the second network element of the network. As shown in Figure 5, the method 500 includes:
S501:第一网元向第一SEPP发送第一请求消息,该第一请求消息用于请求向第二网元订阅目标信息,或者,第一请求消息用于请求从第二网元处获取目标信息。S501: The first network element sends a first request message to the first SEPP. The first request message is used to request to subscribe to target information from the second network element, or the first request message is used to request to obtain the target from the second network element. information.
应理解:本申请的所有实施例中所述的第一网元是指生成该第一请求消息并发送的网元,并不是中间网元。It should be understood that the first network element described in all embodiments of this application refers to the network element that generates and sends the first request message, and is not an intermediate network element.
其中,可选地,第一网元在向第一SEPP发送第一请求消息的同时,还发送了第一网元的拓扑信息。Wherein, optionally, while sending the first request message to the first SEPP, the first network element also sends the topology information of the first network element.
可选地,第一网元发送第一网元的拓扑信息的方式,可以是被第一请求信息携带的方式,还可以是单独发送的方式,还可以是打包发送的方式,还可以是由其他设备或者网元转发的方式,本申请对此不作限定。Optionally, the first network element may send the topology information of the first network element in a manner carried by the first request information, may be sent individually, may be sent in a package, or may be sent by This application does not limit the forwarding methods of other devices or network elements.
可选地,该第一网元的拓扑信息可以是该第一网元的IP地址、FQDN、URI中的一项或者多项,还可以是其他拓扑信息,本申请对此不作限定。Optionally, the topology information of the first network element may be one or more of the IP address, FQDN, and URI of the first network element, or other topology information, which is not limited in this application.
S502:第一SEPP接收到上述第一请求消息后,获取该第一网元的拓扑信息,并对该第一网元的 拓扑信息进行隐藏,生成隐藏信息。其中,隐藏信息是指隐藏后的第一网元的拓扑信息。S502: After receiving the first request message, the first SEPP obtains the topology information of the first network element and Topological information is hidden and hidden information is generated. The hidden information refers to the hidden topological information of the first network element.
可选地,第一SEPP根据第一算法和第一密钥ID对第一网元的拓扑信息加密,进而生成隐藏信息。Optionally, the first SEPP encrypts the topology information of the first network element according to the first algorithm and the first key ID, and then generates hidden information.
S503:第一SEPP向位于第二网络的第三SEPP发送第一消息,该第一消息包括第一请求消息和隐藏信息。S503: The first SEPP sends a first message to the third SEPP located in the second network. The first message includes the first request message and hidden information.
可选地,上述隐藏信息的发送方式,可以是被第一请求消息携带的方式,还可以是单独发送的方式,还可以是打包发送的方式,还可以是由其他设备或者网元转发的方式,本申请对此不作限定。Optionally, the above hidden information may be sent by being carried by the first request message, may be sent individually, may be packaged and sent, or may be forwarded by other devices or network elements. , this application does not limit this.
可选地,第一消息还包括第一密钥ID。Optionally, the first message also includes a first key ID.
S504:第三SEPP向第二网元转发上述第一消息。S504: The third SEPP forwards the above first message to the second network element.
S505:响应于接收到的第一消息,第二网元向同侧的第三SEPP发送第二消息,该第二消息包括第一回复消息和隐藏信息。其中,第一回复消息是第二网元为响应于第一请求消息所发送的消息。S505: In response to the received first message, the second network element sends a second message to the third SEPP on the same side, where the second message includes the first reply message and hidden information. The first reply message is a message sent by the second network element in response to the first request message.
可选地,上述隐藏信息的发送方式,可以是被第一回复消息携带的方式,还可以是单独发送的方式,还可以是打包发送的方式,还可以是由其他设备或者网元转发的方式,本申请对此不作限定。Optionally, the above-mentioned hidden information may be sent by being carried by the first reply message, may be sent individually, may be packaged and sent, or may be forwarded by other devices or network elements. , this application does not limit this.
可选地,第二消息还包括第一密钥ID。Optionally, the second message also includes the first key ID.
可选地,第二消息携带拓扑信息恢复请求消息,用于请求恢复其所携带的隐藏信息。Optionally, the second message carries a topology information recovery request message, which is used to request recovery of the hidden information it carries.
S506:第三SEPP向位于第一网络的第二SEPP转发上述第二消息。S506: The third SEPP forwards the above-mentioned second message to the second SEPP located in the first network.
S507:第二SEPP接收到第二消息后,获取第二消息中的隐藏信息,将该隐藏信息恢复为处于未隐藏状态的第一网元的拓扑信息。S507: After receiving the second message, the second SEPP obtains the hidden information in the second message and restores the hidden information to the topology information of the first network element in the unhidden state.
可选地,第二SEPP根据第一密钥ID将隐藏信息恢复为处于未隐藏状态的第一网元的拓扑信息。Optionally, the second SEPP restores the hidden information to the topology information of the first network element in the unhidden state according to the first key ID.
应注意:本方案中,第一SEPP和第二SEPP预置的算法相同。It should be noted that in this solution, the preset algorithms of the first SEPP and the second SEPP are the same.
应注意:S503和S507中的SEPP可以是同一个SEPP,也可以是不同的SEPP。It should be noted that the SEPP in S503 and S507 can be the same SEPP or different SEPPs.
S508:第二SEPP根据第一网元的拓扑信息向第一网元发送第一回复消息。S508: The second SEPP sends the first reply message to the first network element according to the topology information of the first network element.
本申请实施例中,能够采用加密的方式对消息中的拓扑信息进行隐藏,只要同网络中的SEPP上预置相同的算法和密钥信息,即可实现同网络下不同SEPP之间的拓扑信息互相恢复功能,进而实现同网络中所有SEPP在收到需要拓扑恢复的请求消息时,能够正确恢复该隐藏的拓扑信息,避免了由于SEPP不同而导致的业务失败。In the embodiment of this application, encryption can be used to hide the topology information in the message. As long as the same algorithm and key information are preset on SEPPs in the same network, topology information between different SEPPs on the same network can be realized. The mutual recovery function enables all SEPPs in the same network to correctly recover the hidden topology information when receiving a request message requiring topology recovery, thus avoiding service failures caused by different SEPPs.
为了更加清楚地理解图5所示的实施例中的步骤S502(生成隐藏信息)的过程,示例性地,图6示出了本申请实施例提供的一种SEPP隐藏拓扑信息的方法600的示意性流程图。如图6所示,该方法600包括:In order to more clearly understand the process of step S502 (generating hidden information) in the embodiment shown in FIG. 5 , for example, FIG. 6 shows a schematic diagram of a SEPP method 600 for hiding topology information provided by the embodiment of the present application. Sexual flow chart. As shown in Figure 6, the method 600 includes:
S601:第一SEPP根据第一算法和第一密钥ID加密第一网元的拓扑信息。S601: The first SEPP encrypts the topology information of the first network element according to the first algorithm and the first key ID.
应理解:第一SEPP所在的第一网络中的所有SEPP都预置了该第一算法和该第一密钥ID。It should be understood that all SEPPs in the first network where the first SEPP is located have preset the first algorithm and the first key ID.
S602:将加密后的拓扑信息转换为FQDN允许的字符。S602: Convert the encrypted topology information into characters allowed by FQDN.
S603:将密文、加密材料和域信息按照指定的格式转化为一个FQDN。S603: Convert ciphertext, encryption material and domain information into an FQDN according to the specified format.
其中,密文是指加密后的拓扑信息(已转换为FQDN允许的字符)(即:隐藏信息),加密材料包括第一密钥ID,域信息是指与拓扑信息相对应的域信息。Among them, the ciphertext refers to the encrypted topology information (converted into characters allowed by FQDN) (ie: hidden information), the encryption material includes the first key ID, and the domain information refers to the domain information corresponding to the topology information.
在一个示例中,拓扑信息的类型为第一网元的FQDN,第一SEPP取出FQDN中的拓扑信息部分,根据第一算法和第一密钥ID对其加密,然后把加密后的拓扑信息转换为FQDN允许的字符;最后将密文、加密材料、原FQDN中的域信息按照指定的格式格式化成一个新的FQDN。In one example, the type of topology information is the FQDN of the first network element. The first SEPP takes out the topology information part in the FQDN, encrypts it according to the first algorithm and the first key ID, and then converts the encrypted topology information are the characters allowed by FQDN; finally, the ciphertext, encryption material, and domain information in the original FQDN are formatted into a new FQDN according to the specified format.
隐藏前的FQDN为:待隐藏的拓扑信息+域信息;The FQDN before hiding is: topology information to be hidden + domain information;
隐藏后的FQDN为:CP+密文+加密材料+域信息。The hidden FQDN is: CP+ciphertext+encrypted material+domain information.
其中,CP为前缀,表示后面是加密后的字符串。Among them, CP is the prefix, indicating that the encrypted string follows.
在另一个示例中,拓扑信息的类型为第一网元的IP地址,第一SEPP根据第一算法和第一密钥ID对该IP地址加密,然后把加密后的IP地址转换为FQDN允许的字符;最后将密文、加密材料、原FQDN中的域信息按照指定的格式格式化成一个新的FQDN。In another example, the type of topology information is the IP address of the first network element. The first SEPP encrypts the IP address according to the first algorithm and the first key ID, and then converts the encrypted IP address into an IP address allowed by the FQDN. characters; finally, the ciphertext, encryption material, and domain information in the original FQDN are formatted into a new FQDN according to the specified format.
隐藏前的FQDN为:待隐藏的拓扑信息;The FQDN before hiding is: the topology information to be hidden;
隐藏后的FQDN为:CP+密文+加密材料+域信息。The hidden FQDN is: CP+ciphertext+encrypted material+domain information.
其中,CP为前缀,表示后面是加密后的字符串。Among them, CP is the prefix, indicating that the encrypted string follows.
与图6所示实施例相对应地,示例性地,图7示出了本申请实施例提供的一种SEPP恢复隐藏的拓 扑信息的方法700的示意性流程图。如图7所示,该方法700包括:Corresponding to the embodiment shown in FIG. 6 , exemplarily, FIG. 7 shows a SEPP recovery hidden topology provided by the embodiment of the present application. A schematic flowchart of a method 700 for fluttering information. As shown in Figure 7, the method 700 includes:
S701:第二SEPP从隐藏了拓扑信息的FQDN中获取加密材料和密文部分。其中,加密材料包括第一密钥ID,密文为隐藏后的拓扑信息(即:隐藏信息)。S701: The second SEPP obtains the encryption material and ciphertext part from the FQDN that hides the topology information. The encryption material includes the first key ID, and the ciphertext is the hidden topological information (that is, hidden information).
S702:第二SEPP根据第一密钥ID解密密文,获得未经隐藏的拓扑信息。S702: The second SEPP decrypts the ciphertext according to the first key ID and obtains unhidden topology information.
可选地,当拓扑信息类型为FQDN时,拓扑信息的恢复过程还可以包括以下步骤:Optionally, when the topology information type is FQDN, the recovery process of the topology information may also include the following steps:
S703:第二SEPP将解密后的拓扑信息和原FQDN中的域信息进行拼接,恢复为原FQDN。S703: The second SEPP splices the decrypted topology information and the domain information in the original FQDN to restore the original FQDN.
更具体地,以加密算法为AES_256_GCM为例,图8示出了本申请实施例提供的一种隐藏拓扑信息的方法800的示意性流程图。该方法以拓扑信息类型为FQDN为例,如图8所示,该方法800包括:More specifically, taking the encryption algorithm AES_256_GCM as an example, FIG. 8 shows a schematic flow chart of a method 800 for hiding topology information provided by an embodiment of the present application. This method takes the topology information type as FQDN as an example, as shown in Figure 8. The method 800 includes:
S801:SEPP从原FQDN中获取待隐藏的拓扑信息。S801: SEPP obtains the topology information to be hidden from the original FQDN.
其中,原FQDN由待隐藏的拓扑信息和域信息组成,例如:原FQDN为:Among them, the original FQDN consists of the topology information and domain information to be hidden. For example, the original FQDN is:
APP-XJCHJxjINRF001BHW01BHW012.chj.xj.node.5gc.mnc000.mcc460.3gppnetwork.org;待隐藏的拓扑信息为:APP-XJCHJxjINRF001BHW01BHW012.chj.xj.node.5gc.mnc000.mcc460.3gppnetwork.org; the topology information to be hidden is:
APP-XJCHJxjINRF001BHW01BHW012.chj.xj.node.APP-XJCHJxjINRF001BHW01BHW012.chj.xj.node.
S802:以第一密钥为加密密钥,使用AES_256_GCM算法将上述待隐藏的拓扑信息加密,得到对应的二进制密文。S802: Using the first key as the encryption key, use the AES_256_GCM algorithm to encrypt the above topology information to be hidden, and obtain the corresponding binary ciphertext.
其中,AES为一种对称加密算法,256代表密文分块长度,GCM为加密模式。Among them, AES is a symmetric encryption algorithm, 256 represents the ciphertext block length, and GCM is the encryption mode.
S803:对上述二进制密文进行BASE32编码,使其变为可视字符(密文)。S803: Base32 encode the above binary ciphertext to make it into visible characters (ciphertext).
其中,BASE32是指一种将二进制码流转换为可视字符的编码技术。Among them, BASE32 refers to an encoding technology that converts binary code streams into visual characters.
由于加密结果是二进制,不符合FQDN编码要求,所以需要转换为可视字符,且FQDN不区分大小写,因此使用BASE32。Since the encryption result is binary and does not meet the FQDN encoding requirements, it needs to be converted into visual characters, and FQDN is not case-sensitive, so BASE32 is used.
例如:上述二进制密文转换为可视字符串后为:For example: after the above binary ciphertext is converted into a visible string, it is:
IFIFALKYJJBUQSTYNJEU4USGGAYDCQSIK4WTAMKCJBLTAMJSFZRWQ2ROPBVC43TPMRSS4。IFIFALKYJJBUQSTYNJEU4USGGAYDCQSIK4WTAMKCJBLTAMJSFZRWQ2ROPBVC43TPMRSS4.
S804:在该可视字符的基础上,增加加密材料、CP前缀和域信息。S804: Based on the visible characters, add encryption material, CP prefix and domain information.
其中,加密材料包括第一密钥ID和VI值(为了供其他SEPP查询本地配置,获取真正的密钥),CP前缀表示其后为加密的字符串,域信息为原FQDN中所包括的域信息。Among them, the encryption material includes the first key ID and VI value (in order for other SEPPs to query the local configuration and obtain the real key). The CP prefix indicates that it is followed by an encrypted string, and the domain information is the domain included in the original FQDN. information.
例如:得到的新的FQDN为:For example: the new FQDN obtained is:
CP.IFIFALKYJJBUQSTYNJEU4USGGAYDCQSIK4WTAMKCJBLTAMJSFZRWQ2ROPBVC43TPMRSS4.skid1.ivF1E33E079831DF424A00D264.5gc.mnc000.mcc460.3gppnetwork.org。CP.IFIFALKYJJBUQSTYNJEU4USGGAYDCQSIK4WTAMKCJBLTAMJSFZRWQ2ROPBVC43TPMRSS4.skid1.ivF1E33E079831DF424A00D264.5gc.mnc000.mcc460.3gppnetwork.org.
应注意:本申请实施例中的加密算法可以是任意可逆的安全加密算法,不局限于AES_GCM。It should be noted that the encryption algorithm in the embodiment of this application can be any reversible secure encryption algorithm and is not limited to AES_GCM.
本申请实施例中,提供了一种通用的加密算法,用来实现拓扑信息的隐藏,使得不同的SEPP只要预置的加密算法和密钥信息相同,就可以实现相互恢复对方隐藏的拓扑信息。该方法的加密过程采用业界知名算法,可防暴力破解,可防御量子级别攻击,因每次加密结果(密文)都不同,无法通过反复尝试进行破解,安全且可靠;并且,同一网络的不同SEPP均可使用,通用性强;且因为不同网络情况下的SKID不同,其他网络即使采用相同的方案,也无法解析,如SKID泄露,在网络内统一修改即可;另外,该方法开局一条配置,能够覆盖所有FQDN,进而能够避免误配置或者少配置,便于运维;采用非映射算法(比如SEPP本地维护一对多的映射关系),不会由于未来NF增加或FQDN增加而导致配置增加。In the embodiment of this application, a universal encryption algorithm is provided to hide topology information, so that different SEPPs can mutually recover each other's hidden topology information as long as their preset encryption algorithms and key information are the same. The encryption process of this method uses well-known algorithms in the industry, which can prevent brute force cracking and quantum-level attacks. Because the encryption result (ciphertext) is different each time, it cannot be cracked through repeated attempts. It is safe and reliable; and, different encryption results (ciphertext) on the same network are different. SEPP can be used in all SEPPs and has strong versatility; and because the SKIDs in different network conditions are different, even if other networks use the same solution, they cannot be resolved. If the SKID is leaked, it can be modified uniformly within the network; in addition, this method can deploy a configuration , can cover all FQDNs, thereby avoiding misconfiguration or under-configuration, and facilitating operation and maintenance; using non-mapping algorithms (such as SEPP to locally maintain one-to-many mapping relationships) will not cause an increase in configuration due to future increases in NF or FQDN.
与图5所示实施例并列地,示例性地,图9示出了本申请实施例提供的一种实现拓扑隐藏通信的方法900的示意图,该方法900应用于AMF订阅UDM上的用户数据变化场景。如图9所示,该方案包括以下步骤:Parallel to the embodiment shown in Figure 5, Figure 9 exemplarily shows a schematic diagram of a method 900 for implementing topology hidden communication provided by an embodiment of the present application. The method 900 is applied to user data changes on AMF subscription UDM. Scenes. As shown in Figure 9, the solution includes the following steps:
S901:拜访域的AMF向同侧的SEPP-a发送订阅请求消息,该订阅请求消息携带CallbackURIA,其中,CallbackURIA是指未经隐藏的AMF相关的拓扑信息。S901: The AMF in the visited domain sends a subscription request message to SEPP-a on the same side. The subscription request message carries CallbackURIA, where CallbackURIA refers to unhidden AMF-related topology information.
S902:拜访域的SEPP-a隐藏CallbackURIA,向对侧的SEPP-1发送订阅请求消息,并进一步将该订阅请求消息发送给UDM,此时的订阅请求消息携带CallbackURIA1,其中,CallbackURIA1是指隐藏后的AMF相关的拓扑信息。S902: SEPP-a of the visited domain hides CallbackURIA, sends a subscription request message to SEPP-1 on the opposite side, and further sends the subscription request message to UDM. At this time, the subscription request message carries CallbackURIA1, where CallbackURIA1 refers to the hidden CallbackURIA. AMF related topology information.
S903:当UDM上的用户数据发生变化时,UDM通过同侧的SEPP-1向拜访域的SEPP-a发送通知 请求消息,该通知请求消息携带上述CallbackURIA1。S903: When the user data on the UDM changes, the UDM sends a notification to the SEPP-a of the visited domain through SEPP-1 on the same side. Request message, the notification request message carries the above-mentioned CallbackURIA1.
S904:SEPP-a接收到携带CallbackURIA1的通知请求消息后,将CallbackURIA1恢复为CallbackURIA。以便于根据CallbackURIA将通知请求消息路由到AMF。S904: After receiving the notification request message carrying CallbackURIA1, SEPP-a restores CallbackURIA1 to CallbackURIA. To facilitate routing of notification request messages to AMF based on CallbackURIA.
本申请实施例中,订阅请求消息的发送过程中的SEPP路径与通知请求消息的接收过程中的SEPP路径相同,这样,能够使得拓扑信息的隐藏和恢复都有同一个SEPP来完成,使得隐藏后的拓扑信息能够正确的恢复,从而能够避免因为隐藏拓扑信息和恢复拓扑信息的SEPP不同而导致的业务失败。In the embodiment of this application, the SEPP path during the sending process of the subscription request message is the same as the SEPP path during the receiving process of the notification request message. In this way, the hiding and recovery of the topology information can be completed by the same SEPP, so that after hiding The topology information can be restored correctly, thereby avoiding service failures caused by different SEPPs for hiding topology information and restoring topology information.
为了更清楚地理解图9所示实施例的实现过程,示例性地,图10示出了本申请实施例提供的一种严格路由通信的方法1000的示意性交互图。该方法1000应用于跨网络的第一网元与第二网元进行消息收发的场景。如图10所示,该方法1000包括:In order to more clearly understand the implementation process of the embodiment shown in Figure 9, as an example, Figure 10 shows a schematic interaction diagram of a method 1000 for strictly routing communications provided by an embodiment of the present application. The method 1000 is applied to the scenario of sending and receiving messages across the first network element and the second network element of the network. As shown in Figure 10, the method 1000 includes:
S1001:第一网元向第一SEPP发送第一请求消息,该第一请求消息用于请求向第二网元订阅目标信息,或者,第一请求消息用于请求从第二网元处获取目标信息。S1001: The first network element sends a first request message to the first SEPP. The first request message is used to request to subscribe to target information from the second network element, or the first request message is used to request to obtain the target from the second network element. information.
其中,可选地,第一网元在向第一SEPP发送第一请求消息的同时,还发送了第一网元的拓扑信息。Wherein, optionally, while sending the first request message to the first SEPP, the first network element also sends the topology information of the first network element.
可选地,第一网元发送第一网元的拓扑信息的方式,可以是被第一请求信息携带的方式,还可以是单独发送的方式,还可以是打包发送的方式,还可以是由其他设备或者网元转发的方式,本申请对此不作限定。Optionally, the first network element may send the topology information of the first network element in a manner carried by the first request information, may be sent individually, may be sent in a package, or may be sent by This application does not limit the forwarding methods of other devices or network elements.
可选地,该第一网元的拓扑信息可以是该第一网元的IP地址、FQDN、URI中的一项或者多项,还可以是其他拓扑信息,本申请对此不作限定。Optionally, the topology information of the first network element may be one or more of the IP address, FQDN, and URI of the first network element, or other topology information, which is not limited in this application.
可选地,第一SEPP接收到上述第一请求消息后,获取该第一网元的拓扑信息,并对该第一网元的拓扑信息进行隐藏,生成隐藏信息。其中,隐藏信息是指隐藏后的第一网元的拓扑信息。Optionally, after receiving the first request message, the first SEPP obtains the topology information of the first network element, hides the topology information of the first network element, and generates hidden information. The hidden information refers to the hidden topological information of the first network element.
S1002:第一SEPP向位于第二网络的第三SEPP发送第一消息,该第一消息包括第一请求消息和第一指示信息,该第一指示信息用于指示该第一SEPP对应的路由类别为严格路由。S1002: The first SEPP sends a first message to the third SEPP located in the second network. The first message includes a first request message and first indication information. The first indication information is used to indicate the routing category corresponding to the first SEPP. For strict routing.
可选地,第一消息还包括上述隐藏信息。Optionally, the first message also includes the above hidden information.
其中,可选地,上述隐藏信息的发送方式,可以是被第一请求消息携带的方式,还可以是单独发送的方式,还可以是打包发送的方式,还可以是由其他设备或者网元转发的方式,本申请对此不作限定。Optionally, the above hidden information may be sent in a manner carried by the first request message, may be sent individually, may be sent in a package, or may be forwarded by other devices or network elements. method, this application does not limit this.
S1003:第三SEPP向第二网元转发上述第一消息。S1003: The third SEPP forwards the above first message to the second network element.
S1004:其中,第二网元在收到第一消息后,生成第一路径,该第一路径是根据第一消息的路径生成的。S1004: After receiving the first message, the second network element generates a first path, and the first path is generated based on the path of the first message.
其中,第一路径包括一个或多个设备,所述一个或多个设备均对应一个路由类别,所述路由类别包括严格路由,还可以包括宽松路由。其中,严格路由的参数标记可以是sr,代表消息必须经过该严格路由对应的设备;宽松路由可以以无标记表示,代表消息可以经过也可以不经过该宽松路由对应的设备。Wherein, the first path includes one or more devices, each of the one or more devices corresponds to a routing category, and the routing category includes strict routing and may also include loose routing. Among them, the parameter mark of strict routing can be sr, which means that the message must pass through the device corresponding to the strict route; the loose route can be represented by no mark, which means that the message may or may not pass through the device corresponding to the loose route.
可选地,第二网元记录第一消息的路径。Optionally, the second network element records the path of the first message.
可选地,第二网元将第一消息的路径倒序排列,从而生成第一路径。Optionally, the second network element arranges the paths of the first message in reverse order to generate the first path.
S1005:响应于接收到的第一消息,第二网元根据第一路径向同侧的第三SEPP发送第二消息,该第二消息包括第一回复消息。其中,第一回复消息是第二网元为响应于第一请求消息所发送的消息。S1005: In response to the received first message, the second network element sends a second message to the third SEPP on the same side according to the first path, where the second message includes the first reply message. The first reply message is a message sent by the second network element in response to the first request message.
可选地,第二消息还包括上述隐藏信息。Optionally, the second message also includes the above hidden information.
其中,可选地,上述隐藏信息的发送方式,可以是被第一回复消息携带的方式,还可以是单独发送的方式,还可以是打包发送的方式,还可以是由其他设备或者网元转发的方式,本申请对此不作限定。Optionally, the above-mentioned hidden information may be sent in a manner carried by the first reply message, may be sent individually, may be sent in a package, or may be forwarded by other devices or network elements. method, this application does not limit this.
可选地,第二消息携带拓扑信息恢复请求消息,用于请求恢复其所携带的隐藏信息。Optionally, the second message carries a topology information recovery request message, which is used to request recovery of the hidden information it carries.
S1006:第三SEPP向位于第一SEPP转发上述第二消息。S1006: The third SEPP forwards the above-mentioned second message to the first SEPP.
应理解:由于第一SEPP对应的路由类别为严格路由,所以第二消息一定会经过第一SEPP。It should be understood that since the routing category corresponding to the first SEPP is strict routing, the second message will definitely pass through the first SEPP.
可选地,第一SEPP接收到第二消息后,获取第二消息中的隐藏信息,将该隐藏信息恢复为处于未隐藏状态的第一网元的拓扑信息。Optionally, after receiving the second message, the first SEPP acquires the hidden information in the second message and restores the hidden information to the topology information of the first network element in the unhidden state.
S1007:第一SEPP向第一网元发送第一回复消息。S1007: The first SEPP sends the first reply message to the first network element.
可选地,第一SEPP根据第一网元的拓扑信息向第一网元发送第一回复消息。 Optionally, the first SEPP sends the first reply message to the first network element according to the topology information of the first network element.
本申请实施例中,SEPP可以控制以其隐藏的地址为目的地址的消息都能路由到他自己,从而避免出现消息路由到其他SEPP无法恢复的情况,进而使得隐藏的拓扑信息能够被正确恢复,避免了由于SEPP不同而导致的业务失败。In the embodiment of this application, SEPP can control that messages with its hidden address as the destination address can be routed to itself, thereby avoiding the situation where messages are routed to other SEPPs and cannot be recovered, thereby enabling the hidden topology information to be correctly recovered. This avoids business failure due to different SEPPs.
为了更加清楚地了解图9和图10所示实施例中的消息收发路径,示例性地,图11示出了本申请实施例提供的不同网络中的SEPP间实现消息(涉及拓扑隐藏和恢复)收发的的方法1100的信息交互图。In order to more clearly understand the message sending and receiving paths in the embodiments shown in Figures 9 and 10, for example, Figure 11 shows inter-SEPP implementation messages (involving topology hiding and recovery) in different networks provided by the embodiments of the present application. Information interaction diagram of the sending and receiving method 1100.
如图11所示,第一网络包括cNF(第一网元),cSCP和cSEPP,第二网络包括pNF(作为第一网元),pSCP和pSEPP。其中,为了便于区分,第一网络中的网元有前缀c,第二网络中的网元有前缀p,并且,该示例中,以第一请求消息为初始请求消息,第一回复消息为回调请求消息为例进行说明,该方法1100包括:As shown in Figure 11, the first network includes cNF (the first network element), cSCP and cSEPP, and the second network includes pNF (as the first network element), pSCP and pSEPP. Among them, in order to facilitate distinction, the network elements in the first network have the prefix c, and the network elements in the second network have the prefix p. Moreover, in this example, the first request message is the initial request message, and the first reply message is the callback. Taking the request message as an example for illustration, the method 1100 includes:
S1101:cNF向cSCP发送初始请求消息,该初始请求消息用于请求从pNF获取目标信息,或者,该初始请求消息用于请求向pN订阅目标信息。S1101: The cNF sends an initial request message to the cSCP. The initial request message is used to request to obtain the target information from the pNF, or the initial request message is used to request to subscribe to the pN for the target information.
其中,该初始请求消息携带cNF的拓扑信息。The initial request message carries cNF topology information.
示例性地,该初始请求消息携带的cNF的拓扑信息在图11中表示为:callbackURI:cNF。For example, the topology information of cNF carried in the initial request message is represented in Figure 11 as: callbackURI:cNF.
S1102:cSCP作为proxy转发初始请求消息,并同步将自己的拓扑信息(可以是cSCF的FQDN)放入via头域,并指示为宽松路由。S1102: cSCP forwards the initial request message as a proxy, and synchronously puts its own topology information (which can be the FQDN of cSCF) into the via header field, and indicates loose routing.
示例性地,cSCP转发的初始请求消息携带的cSCP的拓扑信息在图11中表示为:Via:cSCP。For example, the topology information of cSCP carried in the initial request message forwarded by cSCP is represented in Figure 11 as: Via:cSCP.
具体地,cSCP作为proxy处理初始请求消息时,在添加的via:头域中通过扩展参数指示是否为严格路由(指示标记可以为sr),如果是严格路由,则说明后续请求消息或者回调请求消息必须经过该proxy。Specifically, when cSCP processes the initial request message as a proxy, it indicates whether it is strict routing (the indication mark can be sr) through the extended parameter in the added via: header field. If it is strict routing, it indicates the subsequent request message or the callback request message. Must go through the proxy.
应注意:该示例中,通过sr参数指示为严格路由,未携带参数代表宽松路由,但应理解:这并不对本申请的方案构成任何限定,可以根据实际情况或者需求来确定宽松路由和严格路由的标记方式。It should be noted that in this example, the sr parameter is used to indicate strict routing, and no parameters are carried to indicate loose routing. However, it should be understood that this does not constitute any limitation on the solution of this application. Loose routing and strict routing can be determined according to the actual situation or needs. marking method.
S1103:cSEPP接收到cSCP发送的初始请求消息后,对cNF的拓扑信息进行隐藏,将回调地址从cNF转换为cNFA,在via中删除cSCP的FQDN,并将自己的FQND放入via,指示为严格路由(指示标记可以为sr)。再进一步将初始请求消息发送给对端网络中的pSEPP。S1103: After receiving the initial request message sent by cSCP, cSEPP hides the topology information of cNF, converts the callback address from cNF to cNFA, deletes the FQDN of cSCP in via, and puts its own FQND into via, indicating strict Route (indicator tag can be sr). Then, the initial request message is sent to pSEPP in the peer network.
其中,后缀字母A表示该信息为隐藏后的信息。Among them, the suffix letter A indicates that the information is hidden information.
示例性地,cSEPP向pSEPP发送的初始请求消息携带的信息在图11中表示为:callbackURI:cNFA;Via:cSEPP;sr。For example, the information carried in the initial request message sent by cSEPP to pSEPP is represented in Figure 11 as: callbackURI: cNFA; Via: cSEPP; sr.
S1104:pSEPP接收到cSEPP发送的初始请求消息后,将自己的FQND放入via,指示为严格路由。再进一步将初始请求消息转发给pSCP。S1104: After receiving the initial request message sent by cSEPP, pSEPP puts its FQND into via, indicating strict routing. It further forwards the initial request message to pSCP.
示例性地,pSEPP向pSCP转发的初始请求消息携带的信息在图11中表示为:callbackURI:cNFA;Via:cSEPP;sr;Via:pSEPP;sr。For example, the information carried in the initial request message forwarded by pSEPP to pSCP is represented in Figure 11 as: callbackURI: cNFA; Via: cSEPP; sr; Via: pSEPP; sr.
S1105:pSCP接收到pSEPP发送的初始请求消息后,将自己的FQND放入via,指示为宽松路由。再进一步将初始请求消息转发给pNF。S1105: After receiving the initial request message sent by pSEPP, pSCP puts its FQND into via, indicating loose routing. The initial request message is further forwarded to pNF.
示例性地,pSCP向pNF转发的初始请求消息携带的信息在图11中表示为:callbackURI:cNFA;Via:cSEPP;sr;Via:pSEPP;sr;Via:pSCP。Exemplarily, the information carried in the initial request message forwarded by pSCP to pNF is represented in Figure 11 as: callbackURI: cNFA; Via: cSEPP; sr; Via: pSEPP; sr; Via: pSCP.
S1106:服务端的pNF接收到pSCP发送的初始请求消息后,记录callback地址cNFA和via头域,用于后续发送回调请求消息(通常采用notify方法)用;并生成响应消息,向pSEPP发送该响应消息。S1106: After receiving the initial request message sent by pSCP, pNF on the server side records the callback address cNFA and via header field for subsequent sending of callback request messages (usually using the notify method); and generates a response message and sends the response message to pSEPP. .
其中,该响应消息携带Location头域,并且pNF将via头域转换为record-route头域放入该响应消息中。The response message carries the Location header field, and pNF converts the via header field into the record-route header field and puts it into the response message.
示例性地,pNF向pSEPP发送的响应消息携带的信息在图11中表示为:Location:pNF;Record-route:cSEPP;sr;Record-route:pSEPP;sr;Record-route:pSCP。Exemplarily, the information carried in the response message sent by pNF to pSEPP is represented in Figure 11 as: Location: pNF; Record-route: cSEPP; sr; Record-route: pSEPP; sr; Record-route: pSCP.
S1107:pSEPP接收到pNF发送的响应消息后,删除record-route头域中pSCP的信息,并将location头域中的地址从pNF转换为pNFA,再进一步向cSEPP转发该响应消息。S1107: After pSEPP receives the response message sent by pNF, it deletes the pSCP information in the record-route header field, converts the address in the location header field from pNF to pNFA, and then further forwards the response message to cSEPP.
示例性地,pSEPP向cSEPP转发的响应消息携带的信息在图11中表示为:Location:pNFA;Record-route:cSEPP;sr;Record-route:pSEPP;sr。For example, the information carried in the response message forwarded by pSEPP to cSEPP is represented in Figure 11 as: Location: pNFA; Record-route: cSEPP; sr; Record-route: pSEPP; sr.
其中,后缀字母A表示该信息为隐藏后的信息。 Among them, the suffix letter A indicates that the information is hidden information.
S1108:cSEPP接收到pSEPP转发的响应消息后,将cSCP的信息放入record-route头域,再进一步向cNF转发该响应消息。S1108: After receiving the response message forwarded by pSEPP, cSEPP puts the cSCP information into the record-route header field, and then further forwards the response message to cNF.
示例性地,cSEPP向cNF转发的响应消息携带的信息在图11中表示为:Location:pNFA;Record-route:cSCP;Record-route:cSEPP;sr;Record-route:pSEPP;sr。For example, the information carried in the response message forwarded by cSEPP to cNF is shown in Figure 11 as: Location: pNFA; Record-route: cSCP; Record-route: cSEPP; sr; Record-route: pSEPP; sr.
S1109:cNF接收到cSEPP转发的响应消息后,记录location头域中的地址pNFA为后续请求的目标地址,同时记录record-route头域中的信息为后续请求的路由,并生成后续请求消息,向cSCP发送该后续请求消息。S1109: After receiving the response message forwarded by cSEPP, cNF records the address pNFA in the location header field as the target address of the subsequent request, and records the information in the record-route header field as the route of the subsequent request, and generates a subsequent request message to cSCP sends this subsequent request message.
其中,cNF将location头域转换为URI头域,将record-route头域转换为route头域放入该后续请求消息中。从而将记录的record-route放入后续请求消息的route字段,作为该后续请求消息的路由。Among them, cNF converts the location header field into a URI header field, and converts the record-route header field into a route header field and puts them into the subsequent request message. Thus, the recorded record-route is put into the route field of the subsequent request message as the route for the subsequent request message.
示例性地,cNF向cSCP发送的后续请求消息携带的信息在图11中表示为:URI:pNFA;route:cSCP;route:cSEPP;sr;route:pSEPP;sr。Exemplarily, the information carried in the subsequent request message sent by cNF to cSCP is represented in Figure 11 as: URI: pNFA; route: cSCP; route: cSEPP; sr; route: pSEPP; sr.
S1110:cSCP接收到cNF发送的后续请求消息后,根据route的指示路由,从route中删除自己的地址,进一步向cSEPP转发该后续请求消息。S1110: After receiving the subsequent request message sent by cNF, cSCP deletes its own address from the route according to the route instructions, and further forwards the subsequent request message to cSEPP.
示例性地,cSCP向cSEPP转发的后续请求消息携带的信息在图11中表示为:URI:pNFA;route:cSEPP;sr;route:pSEPP;sr。For example, the information carried in the subsequent request message forwarded by cSCP to cSEPP is represented in Figure 11 as: URI: pNFA; route: cSEPP; sr; route: pSEPP; sr.
应理解:中间proxy根据route的指示路由,如果指示为严格路由,则不能跳过;中间proxy在处理后续请求时,逐个从route中删除自己的地址。It should be understood that the intermediate proxy routes according to the route instructions. If the indication is strict routing, it cannot be skipped; the intermediate proxy deletes its own address from the route one by one when processing subsequent requests.
S1111:cSEPP接收到cSCP转发的后续请求消息后,根据route的指示路由,从route中删除自己的地址,进一步向pSEPP转发该后续请求消息。S1111: After receiving the subsequent request message forwarded by cSCP, cSEPP deletes its own address from the route according to the route instructions, and further forwards the subsequent request message to pSEPP.
示例性地,cSEPP向pSEPP转发的后续请求消息携带的信息在图11中表示为:URI:pNFA;route:pSEPP;sr。Exemplarily, the information carried in the subsequent request message forwarded by cSEPP to pSEPP is represented in Figure 11 as: URI: pNFA; route: pSEPP; sr.
S1112:pSEPP收到后续请求消息后,将URI头域中的pNFA恢复为pNF;并从route中删除自己的地址,根据恢复的pNF的地址进一步通过pSCP向pNF转发该后续请求消息。S1112: After receiving the subsequent request message, pSEPP restores the pNFA in the URI header field to pNF; deletes its own address from the route, and further forwards the subsequent request message to pNF through pSCP according to the restored pNF address.
其中,将URI头域中的pNFA恢复为pNF,就是指将隐藏后的pNF的拓扑信息恢复,以使得能够根据该pNF的拓扑信息将后续请求消息路由至pNF。Among them, restoring the pNFA in the URI header field to pNF means restoring the topology information of the hidden pNF so that subsequent request messages can be routed to the pNF according to the topology information of the pNF.
示例性地,pSEPP向pNF转发的后续请求消息携带的信息在图11中表示为:URI:pNF。For example, the information carried in the subsequent request message forwarded by pSEPP to pNF is represented in Figure 11 as: URI:pNF.
S1113:pNF收到后续请求消息后,使用回调地址cNFA发起回调请求消息,并且,发起该回调请求时,将在步骤S1106中记录的via头域倒序放入回调请求消息的route头域中,作为该回调请求消息的路由。pNF将该回调请求发送给pSCP。S1113: After receiving the subsequent request message, pNF uses the callback address cNFA to initiate a callback request message. When initiating the callback request, the via header field recorded in step S1106 is placed in the route header field of the callback request message in reverse order, as This callback requests the routing of the message. pNF sends the callback request to pSCP.
示例性地,pNF向pSCP发送的回调请求消息携带的信息在图11中表示为:URI:cNFA;route:Pscp;route:pSEPP;sr;route:cSEPP;sr。For example, the information carried in the callback request message sent by pNF to pSCP is represented in Figure 11 as: URI: cNFA; route: Pscp; route: pSEPP; sr; route: cSEPP; sr.
S1114:pSCP接收到pNF发送的回调请求消息后,根据route的指示路由,从route中删除自己的地址,进一步向pSEPP转发该后续请求消息。S1114: After pSCP receives the callback request message sent by pNF, it deletes its own address from the route according to the route instructions, and further forwards the subsequent request message to pSEPP.
示例性地,pSCP向pSEPP转发的后续请求消息携带的信息在图11中表示为:URI:cNFA;route:pSEPP;sr;route:cSEPP;sr。Exemplarily, the information carried in the subsequent request message forwarded by pSCP to pSEPP is represented in Figure 11 as: URI: cNFA; route: pSEPP; sr; route: cSEPP; sr.
应理解:中间proxy根据route的指示路由,如果指示为严格路由,则不能跳过;中间proxy在处理后续请求时,逐个从route中删除自己的地址。It should be understood that the intermediate proxy routes according to the route instructions. If the indication is strict routing, it cannot be skipped; the intermediate proxy deletes its own address from the route one by one when processing subsequent requests.
S1115:pSEPP接收到pSCP发送的回调请求消息后,根据route的指示路由,从route中删除自己的地址,进一步向cSEPP转发该后续请求消息。S1115: After pSEPP receives the callback request message sent by pSCP, it deletes its own address from the route according to the route instructions, and further forwards the subsequent request message to cSEPP.
示例性地,pSEPP向cSEPP转发的后续请求消息携带的信息在图11中表示为:URI:cNFA;route:cSEPP;sr。Exemplarily, the information carried in the subsequent request message forwarded by pSEPP to cSEPP is represented in Figure 11 as: URI: cNFA; route: cSEPP; sr.
S1116:cSEPP收到回调请求消息后,将URI头域中的cNFA恢复为cNF;并从route中删除自己的地址,根据恢复的cNF的地址进一步向cNF转发该回调请求消息。S1116: After receiving the callback request message, cSEPP restores the cNFA in the URI header field to cNF; deletes its own address from the route, and further forwards the callback request message to cNF based on the restored cNF address.
其中,将URI头域中的cNFA恢复为cNF,就是指将隐藏后的cNF的拓扑信息恢复,以使得能够根据该cNF的拓扑信息将后续请求消息路由至cNF。Among them, restoring the cNFA in the URI header field to cNF means restoring the topology information of the hidden cNF so that subsequent request messages can be routed to the cNF based on the topology information of the cNF.
示例性地,cSEPP向pSEPP转发的回调请求消息携带的信息在图11中表示为:URI:cNF。For example, the information carried in the callback request message forwarded by cSEPP to pSEPP is represented in Figure 11 as: URI:cNF.
其中,可选地,pNF在接收到后续请求消息后可以向cNF发送该后续请求消息的响应消息。 Optionally, after receiving the subsequent request message, the pNF may send a response message to the cNF for the subsequent request message.
类似地,cNF在接收到回调请求消息后可以向pNF发送该回调请求消息的响应消息。Similarly, after receiving the callback request message, cNF can send a response message to the callback request message to pNF.
应注意:本申请实施例中的头域命名为参考命名,不对本申请的方案构成任何限定,还可以替换为其他的命名。It should be noted that the header field naming in the embodiment of this application is a reference naming, which does not constitute any limitation on the solution of this application, and can also be replaced with other naming.
还应注意:本申请实施例中提出的路由方案还可以用于SCP等其他HTTP proxy上,以实现路由控制,不局限于SEPP。It should also be noted that the routing scheme proposed in the embodiment of this application can also be used on other HTTP proxies such as SCP to achieve routing control, and is not limited to SEPP.
本申请实施例中,新增了HTTP扩展头域record-route和route,分别用于携带后续请求消息的路由和本消息(回调请求消息)的路由,并且,该方法中的via、record-route和route头域支持携带参数标识是否是严格路由。这样,SEPP可以控制以其隐藏的地址为目的地址的消息都能路由到他自己,从而避免出现消息路由到其他SEPP无法恢复的情况,进而使得隐藏的拓扑信息能够被正确恢复,避免了由于SEPP不同而导致的业务失败;并且,通过改进SBI接口消息的路由机制,使得proxy可以控制相关联的请求消息的发送路径。一方面解决拓扑隐藏异厂家部署问题,也可以为后续关联会话做业务处理提供机制。In the embodiment of this application, the HTTP extension header fields record-route and route are added, which are used to carry the route of subsequent request messages and the route of this message (callback request message) respectively. Moreover, via and record-route in this method The route header field supports carrying parameters to identify whether it is a strict route. In this way, SEPP can control that messages with its hidden address as the destination address can be routed to itself, thereby avoiding the situation where messages are routed to other SEPPs and cannot be recovered, thereby enabling the hidden topology information to be correctly recovered, avoiding the problem of SEPP Business failure caused by differences; and, by improving the routing mechanism of SBI interface messages, the proxy can control the sending path of the associated request messages. On the one hand, it solves the problem of topology hiding from different manufacturers, and it can also provide a mechanism for business processing of subsequent associated sessions.
与图5和图9所示实施例并列地,示例性地,图12示出了本申请实施例提供的又一种实现拓扑隐藏通信的方法1200的示意图,该方法1200应用于AMF订阅UDM上的用户数据变化场景。如图12所示,该方案包括以下步骤:Parallel to the embodiments shown in Figures 5 and 9, as an example, Figure 12 shows a schematic diagram of yet another method 1200 for implementing topology hidden communication provided by the embodiment of the present application. This method 1200 is applied to AMF subscription UDM. User data change scenarios. As shown in Figure 12, the solution includes the following steps:
S1201:拜访域的AMF向同侧的SEPP-a发送订阅请求消息,该订阅请求消息携带CallbackURIA,其中,CallbackURIA是指未经隐藏的AMF相关的拓扑信息。S1201: The AMF in the visited domain sends a subscription request message to SEPP-a on the same side. The subscription request message carries CallbackURIA, where CallbackURIA refers to unhidden AMF-related topology information.
S1202:拜访域的SEPP-a隐藏CallbackURIA,向对侧的SEPP-1发送订阅请求消息,并进一步将该订阅请求消息发送给UDM,此时的订阅请求消息携带CallbackURIA1,其中,CallbackURIA1是指隐藏后的AMF相关的拓扑信息。S1202: SEPP-a of the visited domain hides CallbackURIA, sends a subscription request message to SEPP-1 on the opposite side, and further sends the subscription request message to UDM. At this time, the subscription request message carries CallbackURIA1, where CallbackURIA1 refers to the hidden CallbackURIA. AMF related topology information.
S1203:当UDM上的用户数据发生变化时,UDM通过同侧的SEPP-2向拜访域的SEPP-b发送通知请求消息,该通知请求消息携带上述CallbackURIA1。S1203: When the user data on the UDM changes, the UDM sends a notification request message to the SEPP-b of the visited domain through SEPP-2 on the same side. The notification request message carries the above-mentioned CallbackURIA1.
S1204:SEPP-b接收到携带CallbackURIA1的通知请求消息后,调用SEPP-a提供的服务查询callbackURIA1还原后的地址信息callbackURIA。S1204: After receiving the notification request message carrying CallbackURIA1, SEPP-b calls the service provided by SEPP-a to query the restored address information callbackURIA of callbackURIA1.
具体地,SEPP-b接收到携带CallbackURIA1的通知请求消息后,可以向SEPP-a发送第二请求消息,该第二请求消息用于请求SEPP-a将CallbackURIA1恢复为CallbackURIA;然后响应于接收到的该第二请求消息,SEPP-a向SEPP-b发送第二回复消息,该第二回复消息为CallbackURIA。Specifically, after SEPP-b receives the notification request message carrying CallbackURIA1, it can send a second request message to SEPP-a. The second request message is used to request SEPP-a to restore CallbackURIA1 to CallbackURIA; and then responds to the received In the second request message, SEPP-a sends a second reply message to SEPP-b, and the second reply message is CallbackURIA.
S1205:SEPP-b将通知请求消息中的目标地址替换为callbackURIA,以便于根据CallbackURIA将通知请求消息路由到AMF。S1205: SEPP-b replaces the target address in the notification request message with callbackURIA, so that the notification request message is routed to the AMF according to the CallbackURIA.
应注意:本实施例中以第一网络中的SEPP-a隐藏、SEPP-b恢复为例说明,在第二网络中,同样需要SEPP-1和SEPP-2相互提供上述类似的查询服务。It should be noted that this embodiment takes SEPP-a hiding and SEPP-b recovery in the first network as an example. In the second network, SEPP-1 and SEPP-2 also need to provide each other with the above-mentioned similar query services.
本申请实施例中,对SEPP进行功能扩展,使其能够对外提供服务,可以通过被隐藏的拓扑信息查询到隐藏前的拓扑信息,再将查询到的隐藏前的拓扑信息发送给发出请求消息的SEPP。这样,通过SEPP相互提供拓扑信息恢复服务,实现从隐藏后的拓扑信息到隐藏前拓扑信息的转换,能够使得隐藏后的拓扑信息能够正确的恢复,从而能够避免因为发送隐藏拓扑信息的SEPP和接收隐藏拓扑信息的SEPP不同而导致的业务失败。In the embodiment of the present application, the function of SEPP is extended so that it can provide external services. The topology information before hiding can be queried through the hidden topology information, and the queried topology information before hiding can be sent to the requester who issued the request message. SEPP. In this way, topology information recovery services are provided to each other through SEPP to realize the conversion from the hidden topology information to the pre-hidden topology information, so that the hidden topology information can be correctly restored, thereby avoiding the SEPP and reception of hidden topology information. Service failure caused by different SEPPs used to hide topology information.
为了更清楚地理解图12所示实施例的实现过程,示例性地,图13示出了本申请实施例提供的又一种拓扑信息隐藏通信的方法1300的示意性交互图。该方法1300应用于跨网络的第一网元与第二网元进行消息收发的场景。如图13所示,该方法1300包括:In order to more clearly understand the implementation process of the embodiment shown in Figure 12, for example, Figure 13 shows a schematic interaction diagram of yet another topology information hiding communication method 1300 provided by the embodiment of the present application. The method 1300 is applied to the scenario of sending and receiving messages across the first network element and the second network element of the network. As shown in Figure 13, the method 1300 includes:
S1301:第一网元向第一SEPP发送第一请求消息,该第一请求消息用于请求向第二网元订阅目标信息,或者,第一请求消息用于请求从第二网元处获取目标信息。S1301: The first network element sends a first request message to the first SEPP. The first request message is used to request to subscribe to target information from the second network element, or the first request message is used to request to obtain the target from the second network element. information.
其中,可选地,第一网元在向第一SEPP发送第一请求消息的同时,还发送了第一网元的拓扑信息。Wherein, optionally, while sending the first request message to the first SEPP, the first network element also sends the topology information of the first network element.
可选地,第一网元发送第一网元的拓扑信息的方式,可以是被第一请求信息携带的方式,还可以是单独发送的方式,还可以是打包发送的方式,还可以是由其他设备或者网元转发的方式,本申请对此不作限定。Optionally, the first network element may send the topology information of the first network element in a manner carried by the first request information, may be sent individually, may be sent in a package, or may be sent by This application does not limit the forwarding methods of other devices or network elements.
可选地,该第一网元的拓扑信息可以是该第一网元的IP地址、FQDN、URI中的一项或者多项,还可以是其他拓扑信息,本申请对此不作限定。 Optionally, the topology information of the first network element may be one or more of the IP address, FQDN, and URI of the first network element, or other topology information, which is not limited in this application.
S1302:第一SEPP接收到上述第一请求消息后,获取该第一网元的拓扑信息,并对该第一网元的拓扑信息进行隐藏,生成隐藏信息。其中,隐藏信息是指隐藏后的第一网元的拓扑信息。S1302: After receiving the first request message, the first SEPP obtains the topology information of the first network element, hides the topology information of the first network element, and generates hidden information. The hidden information refers to the hidden topological information of the first network element.
S1303:第一SEPP向位于第二网络的第三SEPP发送第一消息,该第一消息包括第一请求消息和隐藏信息。S1303: The first SEPP sends a first message to the third SEPP located in the second network. The first message includes the first request message and hidden information.
可选地,上述隐藏信息的发送方式,可以是被第一请求消息携带的方式,还可以是单独发送的方式,还可以是打包发送的方式,还可以是由其他设备或者网元转发的方式,本申请对此不作限定。Optionally, the above hidden information may be sent by being carried by the first request message, may be sent individually, may be packaged and sent, or may be forwarded by other devices or network elements. , this application does not limit this.
S1304:第三SEPP向第二网元转发上述第一消息。S1304: The third SEPP forwards the above first message to the second network element.
S1305:响应于接收到的第一消息,第二网元向同侧的第三SEPP发送第二消息,该第二消息包括第一回复消息和隐藏信息。其中,第一回复消息是第二网元为响应于第一请求消息所发送的消息。S1305: In response to the received first message, the second network element sends a second message to the third SEPP on the same side, where the second message includes the first reply message and hidden information. The first reply message is a message sent by the second network element in response to the first request message.
可选地,上述隐藏信息的发送方式,可以是被第一回复消息携带的方式,还可以是单独发送的方式,还可以是打包发送的方式,还可以是由其他设备或者网元转发的方式,本申请对此不作限定。Optionally, the above-mentioned hidden information may be sent by being carried by the first reply message, may be sent individually, may be packaged and sent, or may be forwarded by other devices or network elements. , this application does not limit this.
可选地,第二消息携带拓扑信息恢复请求消息,用于请求恢复其所携带的隐藏信息。Optionally, the second message carries a topology information recovery request message, which is used to request recovery of the hidden information it carries.
S1306:第三SEPP向位于第一网络的第二SEPP转发上述第二消息。S1306: The third SEPP forwards the above-mentioned second message to the second SEPP located in the first network.
S1307:第二SEPP接收到第二消息后,向第一SEPP发送第二请求消息,该第二请求消息用于请求获取恢复后的隐藏消息,该第二请求消息携带隐藏信息。S1307: After receiving the second message, the second SEPP sends a second request message to the first SEPP. The second request message is used to request to obtain the restored hidden message, and the second request message carries the hidden information.
S1308:响应于接收到第二请求消息,第一SEPP将隐藏消息恢复为未隐藏的拓扑信息,进而将该恢复后的第一网元的拓扑信息发送给第二SEPP。S1308: In response to receiving the second request message, the first SEPP restores the hidden message to the unhidden topology information, and then sends the restored topology information of the first network element to the second SEPP.
S1309:第二SEPP根据第一网元的拓扑信息向第一网元发送第一回复消息。S1309: The second SEPP sends the first reply message to the first network element according to the topology information of the first network element.
本申请实施例中,对SEPP进行功能扩展,使其能够对外提供服务,可以通过被隐藏的拓扑信息查询到隐藏前的拓扑信息,再将查询到的隐藏前的拓扑信息发送给发出请求消息的SEPP。这样,通过SEPP相互提供拓扑信息恢复服务,实现从隐藏后的拓扑信息到隐藏前拓扑信息的转换,能够使得隐藏后的拓扑信息能够正确的恢复,从而能够避免因为发送隐藏拓扑信息的SEPP和接收隐藏拓扑信息的SEPP不同而导致的业务失败。In the embodiment of the present application, the function of SEPP is extended so that it can provide external services. The topology information before hiding can be queried through the hidden topology information, and the queried topology information before hiding can be sent to the requester who issued the request message. SEPP. In this way, topology information recovery services are provided to each other through SEPP to realize the conversion from the hidden topology information to the pre-hidden topology information, so that the hidden topology information can be correctly restored, thereby avoiding the SEPP and reception of hidden topology information. Service failure caused by different SEPPs used to hide topology information.
与图13所示实施例并列地,示例性地,图14示出了本申请实施例提供的又一种拓扑信息隐藏通信的方法1400的示意性交互图。该方法1400应用于跨网络的第一网元与第二网元进行消息收发的场景。如图14所示,该方法1400包括:Parallel to the embodiment shown in FIG. 13 , as an example, FIG. 14 shows a schematic interaction diagram of yet another method 1400 for topological information hiding communication provided by an embodiment of the present application. The method 1400 is applied to the scenario of sending and receiving messages across the first network element and the second network element of the network. As shown in Figure 14, the method 1400 includes:
S1401:第一网元向第一SEPP发送第一请求消息,该第一请求消息用于请求向第二网元订阅目标信息,或者,第一请求消息用于请求从第二网元处获取目标信息。S1401: The first network element sends a first request message to the first SEPP. The first request message is used to request to subscribe to target information from the second network element, or the first request message is used to request to obtain the target from the second network element. information.
其中,可选地,第一网元在向第一SEPP发送第一请求消息的同时,还发送了第一网元的拓扑信息。Wherein, optionally, while sending the first request message to the first SEPP, the first network element also sends the topology information of the first network element.
可选地,第一网元发送第一网元的拓扑信息的方式,可以是被第一请求信息携带的方式,还可以是单独发送的方式,还可以是打包发送的方式,还可以是由其他设备或者网元转发的方式,本申请对此不作限定。Optionally, the first network element may send the topology information of the first network element in a manner carried by the first request information, may be sent individually, may be sent in a package, or may be sent by This application does not limit the forwarding methods of other devices or network elements.
可选地,该第一网元的拓扑信息可以是该第一网元的IP地址、FQDN、URI中的一项或者多项,还可以是其他拓扑信息,本申请对此不作限定。Optionally, the topology information of the first network element may be one or more of the IP address, FQDN, and URI of the first network element, or other topology information, which is not limited in this application.
S1402:第一SEPP接收到上述第一请求消息后,获取该第一网元的拓扑信息,并对该第一网元的拓扑信息进行隐藏,生成隐藏信息。其中,隐藏信息是指隐藏后的第一网元的拓扑信息。S1402: After receiving the first request message, the first SEPP obtains the topology information of the first network element, hides the topology information of the first network element, and generates hidden information. The hidden information refers to the hidden topological information of the first network element.
S1403:第一SEPP向位于第二网络的第三SEPP发送第一消息,该第一消息包括第一请求消息和隐藏信息。S1403: The first SEPP sends a first message to the third SEPP located in the second network. The first message includes the first request message and hidden information.
可选地,上述隐藏信息的发送方式,可以是被第一请求消息携带的方式,还可以是单独发送的方式,还可以是打包发送的方式,还可以是由其他设备或者网元转发的方式,本申请对此不作限定。Optionally, the above hidden information may be sent by being carried by the first request message, may be sent individually, may be packaged and sent, or may be forwarded by other devices or network elements. , this application does not limit this.
S1404:第三SEPP向第二网元转发上述第一消息。S1404: The third SEPP forwards the above first message to the second network element.
S1405:响应于接收到的第一消息,第二网元向同侧的第三SEPP发送第二消息,该第二消息包括第一回复消息和隐藏信息。其中,第一回复消息是第二网元为响应于第一请求消息所发送的消息。S1405: In response to the received first message, the second network element sends a second message to the third SEPP on the same side, where the second message includes the first reply message and hidden information. The first reply message is a message sent by the second network element in response to the first request message.
可选地,上述隐藏信息的发送方式,可以是被第一回复消息携带的方式,还可以是单独发送的方式,还可以是打包发送的方式,还可以是由其他设备或者网元转发的方式,本申请对此不作限定。Optionally, the above-mentioned hidden information may be sent by being carried by the first reply message, may be sent individually, may be packaged and sent, or may be forwarded by other devices or network elements. , this application does not limit this.
可选地,第二消息携带拓扑信息恢复请求消息,用于请求恢复其所携带的隐藏信息。Optionally, the second message carries a topology information recovery request message, which is used to request recovery of the hidden information it carries.
S1406:第三SEPP向位于第一网络的第二SEPP转发上述第二消息。 S1406: The third SEPP forwards the above-mentioned second message to the second SEPP located in the first network.
S1407:第二SEPP接收到第二消息后,向位于同侧的第三网元发送第二请求消息,该第二请求消息用于请求获取恢复后的隐藏消息,该第二请求消息携带隐藏信息。S1407: After receiving the second message, the second SEPP sends a second request message to the third network element located on the same side. The second request message is used to request to obtain the restored hidden message. The second request message carries the hidden information. .
S1408:响应于接收到第二请求消息,第三网元将隐藏消息恢复为未隐藏的拓扑信息,进而将该恢复后的第一网元的拓扑信息发送给第二SEPP。S1408: In response to receiving the second request message, the third network element restores the hidden message to the unhidden topology information, and then sends the restored topology information of the first network element to the second SEPP.
S1409:第二SEPP根据第一网元的拓扑信息向第一网元发送第一回复消息。S1409: The second SEPP sends the first reply message to the first network element according to the topology information of the first network element.
本申请实施例中,通过新增NF提供拓扑信息的隐藏和恢复服务,新增的NF可以通过被隐藏的拓扑信息查询到隐藏前的拓扑信息,再将查询到的隐藏前的拓扑信息发送给发出请求消息的SEPP。这样,能够使得隐藏后的拓扑信息能够正确的恢复,从而能够避免因为发送隐藏拓扑信息的SEPP和接收隐藏拓扑信息的SEPP不同而导致的业务失败。In the embodiment of this application, topology information hiding and recovery services are provided by adding a new NF. The newly added NF can query the pre-hiding topology information through the hidden topology information, and then send the queried pre-hiding topology information to SEPP that issued the request message. In this way, the hidden topology information can be restored correctly, thereby avoiding service failure caused by the difference between the SEPP for sending the hidden topology information and the SEPP for receiving the hidden topology information.
图15是本申请实施例提供的一种通信装置1500的示意性框图。该装置1500包括接收模块1501,接收模块1501可以用于实现相应的接收功能。接收模块1501还可以称为接收单元。Figure 15 is a schematic block diagram of a communication device 1500 provided by an embodiment of the present application. The device 1500 includes a receiving module 1501, which can be used to implement corresponding receiving functions. The receiving module 1501 may also be called a receiving unit.
该装置1500还包括处理模块1502,处理模块1502可以用于实现相应的处理功能,如隐藏第一网元的拓扑信息或者恢复第一网元的拓扑信息。The device 1500 also includes a processing module 1502, which can be used to implement corresponding processing functions, such as hiding the topology information of the first network element or restoring the topology information of the first network element.
该装置1500还包括发送模块1503,发送模块1503可以用于实现相应的发送功能,发送模块1503还可以称为发送单元。The device 1500 also includes a sending module 1503, which can be used to implement corresponding sending functions. The sending module 1503 can also be called a sending unit.
可选地,该装置1500还包括存储单元,该存储单元可以用于存储指令和/或数据,处理单元1502可以读取存储单元中的指令和/或数据,以使得装置实现前述各个方法实施例中的相关装置的动作。Optionally, the device 1500 also includes a storage unit, which can be used to store instructions and/or data, and the processing unit 1502 can read the instructions and/or data in the storage unit, so that the device implements each of the foregoing method embodiments. the actions of related devices.
该装置1500可以用于执行上文各个方法实施例中网络设备(例如:AMF、UDM或SEPP)所执行的动作,这时,该装置1500可以为网络设备的组成部件,接收模块1501用于执行上文方法实施例中网络设备的接收相关的操作,处理模块1502用于执行上文方法实施例中网络设备的处理相关的操作,发送模块1503用于执行上文方法实施例中网络设备的发送相关的操作。The device 1500 can be used to perform the actions performed by the network equipment (such as AMF, UDM or SEPP) in each of the above method embodiments. In this case, the device 1500 can be a component of the network equipment, and the receiving module 1501 is used to perform The processing module 1502 is used to perform operations related to the reception of the network device in the above method embodiment, and the sending module 1503 is used to perform the sending operation of the network device in the above method embodiment. related operations.
作为一种设计,该装置1500用于执行上文各个方法实施例中的任意网元或者任意设备所执行的动作。在一个实施例中,该通信装置可用于执行上述图4至图14中网络设备(例如:第一网元、第二网元、第三网元或SEPP)的操作。例如:As a design, the device 1500 is used to perform actions performed by any network element or any device in each of the above method embodiments. In one embodiment, the communication device may be used to perform operations of the network equipment (for example, the first network element, the second network element, the third network element or the SEPP) in FIGS. 4 to 14 described above. For example:
接收模块1501,用于接收第一请求消息,并向第一SEPP发送第一请求消息,该第一请求消息用于请求向第二网元订阅目标信息,或者,第一请求消息用于请求从第二网元处获取目标信息。The receiving module 1501 is configured to receive a first request message and send a first request message to the first SEPP. The first request message is used to request to subscribe to the target information from the second network element, or the first request message is used to request from the second network element. Obtain target information at the second network element.
其中,可选地,接收模块1501在向第一SEPP发送第一请求消息的同时,还发送了第一网元的拓扑信息。Optionally, while sending the first request message to the first SEPP, the receiving module 1501 also sends the topology information of the first network element.
处理模块1502,用于获取该第一网元的拓扑信息,并对该第一网元的拓扑信息进行隐藏,生成隐藏信息。其中,隐藏信息是指隐藏后的第一网元的拓扑信息。The processing module 1502 is configured to obtain the topology information of the first network element, hide the topology information of the first network element, and generate hidden information. The hidden information refers to the hidden topological information of the first network element.
发送模块1503,用于向位于第二网络的第三SEPP发送第一消息,该第一消息包括第一请求消息和隐藏信息。The sending module 1503 is configured to send a first message to the third SEPP located in the second network, where the first message includes the first request message and hidden information.
可选地,上述隐藏信息的发送方式,可以是被第一请求消息携带的方式,还可以是单独发送的方式,还可以是打包发送的方式,还可以是由其他设备或者网元转发的方式,本申请对此不作限定。Optionally, the above hidden information may be sent by being carried by the first request message, may be sent individually, may be packaged and sent, or may be forwarded by other devices or network elements. , this application does not limit this.
应理解,各模块执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。It should be understood that the specific process of each module performing the above corresponding steps has been described in detail in the above method embodiments, and will not be described again for the sake of brevity.
此外,该通信装置中的接收模块1501、处理模块1502和发送模块1503还可实现上述方法中网络设备的其他操作或功能,此处不再赘述。In addition, the receiving module 1501, the processing module 1502 and the sending module 1503 in the communication device can also implement other operations or functions of the network device in the above method, which will not be described again here.
此外,该通信装置中的接收模块1501、处理模块1502和发送模块1503还可实现上述方法中其他设备的操作或功能,此处不再赘述。In addition, the receiving module 1501, the processing module 1502 and the sending module 1503 in the communication device can also implement the operations or functions of other devices in the above method, which will not be described again here.
图16示出了上述实施例中所涉及的通信装置的另一种可能的结构示意图。该通信装置包括处理器1601,如图16所示,通信装置还可以包括至少一个存储器1602,用于存储程序指令和/或数据。存储器1602和处理器1601耦合。本申请实施例中的耦合是装置、单元或模块之间的间接耦合或通信连接,可以是电性,机械或其它的形式,用于装置、单元或模块之间的信息交互。处理器1601可能和存储器1602协同操作。处理器1601可能执行存储器1602中存储的程序指令。所述至少一个存储器中的至少一个可以包括于处理器中。Figure 16 shows another possible structural diagram of the communication device involved in the above embodiment. The communication device includes a processor 1601. As shown in Figure 16, the communication device may also include at least one memory 1602 for storing program instructions and/or data. Memory 1602 and processor 1601 are coupled. The coupling in the embodiment of this application is an indirect coupling or communication connection between devices, units or modules, which may be in electrical, mechanical or other forms, and is used for information interaction between devices, units or modules. Processor 1601 may cooperate with memory 1602. Processor 1601 may execute program instructions stored in memory 1602. At least one of the at least one memory may be included in the processor.
该通信装置还可以包括收发器1603,用于通过传输介质和其它设备进行通信,从而用于装置可以 和其它设备进行通信。可选地,收发器1603可以是接口、总线、电路或者能够实现收发功能的装置。可选地,收发器1603可以包括接收器和发送器。The communication device may also include a transceiver 1603 for communicating with other devices over a transmission medium so that the device may Communicate with other devices. Optionally, the transceiver 1603 may be an interface, a bus, a circuit, or a device capable of implementing transceiver functions. Optionally, transceiver 1603 may include a receiver and a transmitter.
本申请实施例中不限定上述处理器1601、存储器1602以及收发器1603之间的具体连接介质。本申请实施例在图16中以处理器1601、存储器1602以及收发器1603之间通过总线1604连接,总线在图16中以粗线表示,其它部件之间的连接方式,仅是进行示意性说明,并不引以为限。所述总线可以分为地址总线、数据总线、控制总线等。为便于表示,图16中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。The specific connection medium between the above-mentioned processor 1601, memory 1602 and transceiver 1603 is not limited in the embodiment of the present application. In the embodiment of the present application, the processor 1601, the memory 1602 and the transceiver 1603 are connected through a bus 1604 in Figure 16. The bus is represented by a thick line in Figure 16. The connection methods between other components are only schematically explained. , is not limited. The bus can be divided into address bus, data bus, control bus, etc. For ease of presentation, only one thick line is used in Figure 16, but it does not mean that there is only one bus or one type of bus.
例如,在一个实施例中,处理器1601被配置为网络设备的其他操作或功能。收发器1603用于实现该通信装置与其他网元/设备(比如,UE/gNB)之间的通信。For example, in one embodiment, processor 1601 is configured for other operations or functions of the network device. The transceiver 1603 is used to implement communication between the communication device and other network elements/devices (such as UE/gNB).
以上模块或单元的一个或多个可以软件、硬件或二者结合来实现。当以上任一模块或单元以软件实现的时候,所述软件以计算机程序指令的方式存在,并被存储在存储器中,处理器可以用于执行所述程序指令并实现以上方法流程。所述处理器可以包括但不限于以下至少一种:中央处理单元(central processing unit,CPU)、微处理器、数字信号处理器(DSP)、微控制器(microcontroller unit,MCU)、或人工智能处理器等各类运行软件的计算设备,每种计算设备可包括一个或多个用于执行软件指令以进行运算或处理的核。该处理器可以内置于SoC(片上系统)或专用集成电路(application specific integrated circuit,ASIC),也可是一个独立的半导体芯片。该处理器内处理用于执行软件指令以进行运算或处理的核外,还可进一步包括必要的硬件加速器,如现场可编程门阵列(field programmable gate array,FPGA)、PLD(可编程逻辑器件)、或者实现专用逻辑运算的逻辑电路。One or more of the above modules or units can be implemented in software, hardware, or a combination of both. When any of the above modules or units is implemented in software, the software exists in the form of computer program instructions and is stored in the memory. The processor can be used to execute the program instructions and implement the above method flow. The processor may include but is not limited to at least one of the following: a central processing unit (CPU), a microprocessor, a digital signal processor (DSP), a microcontroller unit (MCU), or artificial intelligence Various computing devices such as processors that run software. Each computing device may include one or more cores for executing software instructions to perform calculations or processing. The processor can be built into an SoC (system on a chip) or an application specific integrated circuit (ASIC), or it can be an independent semiconductor chip. In addition to the core used to execute software instructions for calculation or processing, the processor can further include necessary hardware accelerators, such as field programmable gate array (FPGA), PLD (programmable logic device) , or a logic circuit that implements dedicated logic operations.
当以上模块或单元以硬件实现的时候,该硬件可以是CPU、微处理器、DSP、MCU、人工智能处理器、ASIC、SoC、FPGA、PLD、专用数字电路、硬件加速器或非集成的分立器件中的任一个或任一组合,其可以运行必要的软件或不依赖于软件以执行以上方法流程。When the above modules or units are implemented in hardware, the hardware can be a CPU, microprocessor, DSP, MCU, artificial intelligence processor, ASIC, SoC, FPGA, PLD, dedicated digital circuit, hardware accelerator or non-integrated discrete device Any one or any combination thereof, which can run necessary software or not rely on software to perform the above method process.
当以上模块或单元使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘(solid state disk,SSD))等。When the above modules or units are implemented using software, they may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with the embodiments of the present invention are generated in whole or in part. The computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another, e.g., the computer instructions may be transferred from a website, computer, server, or data center Transmission to another website, computer, server or data center by wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.) means. The computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more available media integrated. The available media may be magnetic media (eg, floppy disk, hard disk, magnetic tape), optical media (eg, DVD), or semiconductor media (eg, solid state disk (SSD)), etc.
以上所述的具体实施方式,对本申请的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以上所述仅为本申请的具体实施方式而已,并不用于限定本申请的保护范围,凡在本申请的技术方案的基础之上,所做的任何修改、等同替换、改进等,均应包括在本申请的保护范围之内。The above-mentioned specific embodiments further describe the purpose, technical solutions and beneficial effects of the present application in detail. It should be understood that the above-mentioned are only specific embodiments of the present application and are not intended to limit the scope of the present application. Any modifications, equivalent substitutions, improvements, etc. made on the basis of the technical solution of this application shall be included in the scope of protection of this application.
根据本申请实施例提供的方法,本申请还提供一种计算机程序产品,该计算机程序产品包括:计算机程序代码,当该计算机程序代码在计算机上运行时,使得该计算机执行前述方法实施例中第一网元侧的方法。According to the method provided by the embodiment of the present application, the present application also provides a computer program product. The computer program product includes: computer program code. When the computer program code is run on a computer, it causes the computer to execute the first step in the foregoing method embodiment. One network element side method.
根据本申请实施例提供的方法,本申请还提供一种计算机程序产品,该计算机程序产品包括:计算机程序代码,当该计算机程序代码在计算机上运行时,使得该计算机执行前述方法实施例中第二网元侧的方法。According to the method provided by the embodiment of the present application, the present application also provides a computer program product. The computer program product includes: computer program code. When the computer program code is run on a computer, it causes the computer to execute the first step in the foregoing method embodiment. Method on the second network element side.
根据本申请实施例提供的方法,本申请还提供一种计算机程序产品,该计算机程序产品包括:计算机程序代码,当该计算机程序代码在计算机上运行时,使得该计算机执行前述方法实施例中SEPP侧的方法。According to the method provided by the embodiment of the present application, the present application also provides a computer program product. The computer program product includes: computer program code. When the computer program code is run on a computer, it causes the computer to execute the SEPP in the foregoing method embodiment. side method.
根据本申请实施例提供的方法,本申请还提供一种计算机可读介质,该计算机可读介质存储有程序代码,当该程序代码在计算机上运行时,使得该计算机执行前述方法实施例中第一网元侧的方法。According to the method provided by the embodiment of the present application, the present application also provides a computer-readable medium. The computer-readable medium stores program code. When the program code is run on a computer, it causes the computer to execute the first step in the foregoing method embodiment. One network element side method.
根据本申请实施例提供的方法,本申请还提供一种计算机可读介质,该计算机可读介质存储有程序代码,当该程序代码在计算机上运行时,使得该计算机执行前述方法实施例中第二网元侧的方法。 According to the method provided by the embodiment of the present application, the present application also provides a computer-readable medium. The computer-readable medium stores program code. When the program code is run on a computer, it causes the computer to execute the first step in the foregoing method embodiment. Method on the second network element side.
根据本申请实施例提供的方法,本申请还提供一种计算机可读介质,该计算机可读介质存储有程序代码,当该程序代码在计算机上运行时,使得该计算机执行前述方法实施例中SEPP侧的方法。According to the method provided by the embodiment of the present application, the present application also provides a computer-readable medium. The computer-readable medium stores program code. When the program code is run on a computer, it causes the computer to execute the SEPP in the foregoing method embodiment. side method.
本申请实施例还提供了一种处理装置,包括处理器和接口;所述处理器用于执行上述任一方法实施例中的通信方法。An embodiment of the present application also provides a processing device, including a processor and an interface; the processor is configured to execute the communication method in any of the above method embodiments.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Those of ordinary skill in the art will appreciate that the units and algorithm steps of each example described in conjunction with the embodiments disclosed herein can be implemented with electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the technical solution. Skilled artisans may implement the described functionality using different methods for each specific application, but such implementations should not be considered beyond the scope of this application.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that for the convenience and simplicity of description, the specific working processes of the systems, devices and units described above can be referred to the corresponding processes in the foregoing method embodiments, and will not be described again here.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed systems, devices and methods can be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of the units is only a logical function division. In actual implementation, there may be other division methods. For example, multiple units or components may be combined or can be integrated into another system, or some features can be ignored, or not implemented. On the other hand, the coupling or direct coupling or communication connection between each other shown or discussed may be through some interfaces, and the indirect coupling or communication connection of the devices or units may be in electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or they may be distributed to multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the present application can be integrated into one processing unit, each unit can exist physically alone, or two or more units can be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。If the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application is essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product. The computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in various embodiments of this application. The aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk and other media that can store program code. .
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。 The above are only specific embodiments of the present application, but the protection scope of the present application is not limited thereto. Any person familiar with the technical field can easily think of changes or substitutions within the technical scope disclosed in the present application. should be covered by the protection scope of this application. Therefore, the protection scope of this application should be subject to the protection scope of the claims.

Claims (27)

  1. 一种通信方法,其特征在于,所述方法包括:A communication method, characterized in that the method includes:
    响应于第一网元向第二网络发送第一请求消息的需求,第一安全和边界代理网元SEPP根据第一算法和第一密钥ID生成隐藏信息,所述隐藏信息为隐藏后的所述第一网元的拓扑信息;In response to the first network element sending a first request message to the second network, the first security and border proxy network element SEPP generates hidden information based on the first algorithm and the first key ID, and the hidden information is all hidden information. Describe the topology information of the first network element;
    所述第一SEPP向所述第二网络发送第一消息,所述第一消息包括所述第一请求消息和所述隐藏信息,所述隐藏信息携带所述第一密钥ID;The first SEPP sends a first message to the second network, the first message includes the first request message and the hidden information, the hidden information carries the first key ID;
    第二SEPP接收所述第二网络为响应于所述第一消息发送的第二消息,所述第二消息包括第一回复消息和所述隐藏信息,所述第一SEPP和所述第二SEPP属于第一网络,所述第一SEPP和所述第二SEPP预置有所述第一算法和所述第一密钥ID;The second SEPP receives a second message sent by the second network in response to the first message. The second message includes a first reply message and the hidden information. The first SEPP and the second SEPP Belonging to the first network, the first SEPP and the second SEPP are preset with the first algorithm and the first key ID;
    所述第二SEPP根据所述第一密钥ID恢复所述隐藏信息,进而获得所述第一网元的拓扑信息,以便根据所述第一网元的拓扑信息将所述第一回复消息路由至所述第一网元。The second SEPP recovers the hidden information according to the first key ID, and then obtains the topology information of the first network element, so as to route the first reply message according to the topology information of the first network element. to the first network element.
  2. 根据权利要求1所述的方法,其特征在于,所述第一SEPP根据第一算法和第一密钥ID生成隐藏信息,包括:The method according to claim 1, characterized in that the first SEPP generates hidden information according to the first algorithm and the first key ID, including:
    所述第一SEPP接收所述第一网元发送的所述第一请求消息和所述第一网元的拓扑信息;The first SEPP receives the first request message sent by the first network element and the topology information of the first network element;
    所述第一SEPP通过根据所述第一算法和所述第一密钥ID对所述第一网元的拓扑信息加密,生成所述隐藏信息。The first SEPP generates the hidden information by encrypting the topology information of the first network element according to the first algorithm and the first key ID.
  3. 根据权利要求1或2所述的方法,其特征在于,所述第一SEPP向所述第二网络发送第一消息,包括:The method according to claim 1 or 2, characterized in that the first SEPP sends a first message to the second network, including:
    所述第一SEPP生成第一完全限定域名FQDN,所述第一FQDN包括所述隐藏信息和所述第一密钥ID;The first SEPP generates a first fully qualified domain name FQDN, where the first FQDN includes the hidden information and the first key ID;
    所述第一SEPP向所述第二网络发送第一消息,所述第一消息包括所述第一请求消息和所述第一FQDN。The first SEPP sends a first message to the second network, where the first message includes the first request message and the first FQDN.
  4. 根据权利要求3所述的方法,其特征在于,所述第一FQDN还包括所述第一网元的域信息。The method of claim 3, wherein the first FQDN further includes domain information of the first network element.
  5. 根据权利要求1至4中任一项所述的方法,其特征在于,所述第一网元为接入与移动性管理功能AMF、会话管理功能SMF、统一数据管理UDM、用户面功能UPF、认证服务器功能AUSF、短消息服务功能SMSF中的任意一种。The method according to any one of claims 1 to 4, characterized in that the first network element is an access and mobility management function AMF, a session management function SMF, a unified data management UDM, a user plane function UPF, Any one of the authentication server function AUSF and the short message service function SMSF.
  6. 根据权利要求1至5中任一项所述的方法,其特征在于,所述第一SEPP和所述第二SEPP为同一个SEPP。The method according to any one of claims 1 to 5, characterized in that the first SEPP and the second SEPP are the same SEPP.
  7. 一种通信方法,其特征在于,所述方法包括:A communication method, characterized in that the method includes:
    响应于第一网元向第二网络发送第一请求消息的需求,第一安全和边界代理网元SEPP向所述第二网络发送第一消息,所述第一消息包括所述第一请求消息和第一指示信息,所述第一指示信息用于指示所述第一SEPP对应的路由类别为严格路由;In response to the first network element sending a first request message to the second network, the first security and border proxy network element SEPP sends a first message to the second network, the first message including the first request message and first indication information, the first indication information being used to indicate that the routing category corresponding to the first SEPP is strict routing;
    所述第一SEPP接收所述第二网络为响应于所述第一消息,根据第一路径发送的第二消息,所述第二消息包括第一回复消息,所述第一路径是所述第二网络根据所述第一消息的路径生成的,所述第一路径包括一个或多个设备,所述一个或多个设备均对应一个路由类别,所述路由类别包括所述严格路由;The first SEPP receives a second message sent by the second network according to a first path in response to the first message, the second message includes a first reply message, and the first path is the first path. The second network is generated according to the path of the first message, the first path includes one or more devices, each of the one or more devices corresponds to a routing category, and the routing category includes the strict routing;
    所述第一SEPP向所述第一网元发送所述第一回复消息。The first SEPP sends the first reply message to the first network element.
  8. 根据权利要求7所述的方法,其特征在于,所述第一消息还包括隐藏信息,所述隐藏信息为隐藏后的所述第一网元的拓扑信息,所述第二消息还包括所述隐藏信息,所述第一SEPP向所述第一网元发送所述第一回复消息,包括:The method of claim 7, wherein the first message further includes hidden information, the hidden information being the hidden topology information of the first network element, and the second message further includes the Hidden information, the first SEPP sends the first reply message to the first network element, including:
    所述第一SEPP将所述隐藏信息恢复为所述第一网元的拓扑信息;The first SEPP restores the hidden information to the topology information of the first network element;
    所述第一SEPP根据所述第一网元的拓扑信息向所述第一网元发送所述第一回复消息。The first SEPP sends the first reply message to the first network element according to the topology information of the first network element.
  9. 根据权利要求8所述的方法,其特征在于,所述方法还包括:The method of claim 8, further comprising:
    所述第一SEPP通过加密所述第一网元的拓扑信息,生成所述隐藏信息。The first SEPP generates the hidden information by encrypting the topology information of the first network element.
  10. 根据权利要求8或9所述的方法,其特征在于,所述方法还包括: The method according to claim 8 or 9, characterized in that, the method further includes:
    所述第一SEPP接收所述第一网元发送的所述第一请求消息和所述第一网元的拓扑信息。The first SEPP receives the first request message sent by the first network element and the topology information of the first network element.
  11. 根据权利要求7至10中任一项所述的方法,其特征在于,所述路由类别还包括宽松路由。The method according to any one of claims 7 to 10, characterized in that the routing category further includes loose routing.
  12. 根据权利要求7至11中任一项所述的方法,其特征在于,所述第一网元为接入与移动性管理功能AMF、会话管理功能SMF、统一数据管理UDM、用户面功能UPF、认证服务器功能AUSF、短消息服务功能SMSF中的任意一种。The method according to any one of claims 7 to 11, characterized in that the first network element is an access and mobility management function AMF, a session management function SMF, a unified data management UDM, a user plane function UPF, Any one of the authentication server function AUSF and the short message service function SMSF.
  13. 一种通信方法,其特征在于,所述方法包括:A communication method, characterized in that the method includes:
    第二网元接收第一安全和边界代理网元SEPP发送的第一消息,所述第一消息包括第一请求消息和第一指示信息,所述第一指示信息用于指示所述第一SEPP对应的路由类别为严格路由;The second network element receives the first message sent by the first security and border proxy network element SEPP. The first message includes a first request message and first indication information. The first indication information is used to instruct the first SEPP. The corresponding routing category is strict routing;
    所述第二网元根据所述第一消息的路径生成第一路径,所述第一路径包括一个或多个设备,所述一个或多个设备均对应一个路由类别,所述路由类别包括所述严格路由;The second network element generates a first path according to the path of the first message. The first path includes one or more devices. Each of the one or more devices corresponds to a routing category. The routing category includes all Strict routing is described;
    响应于所述第一消息,所述第二网元根据所述第一路径向所述第一SEPP发送第二消息,所述第二消息包括第一回复消息。In response to the first message, the second network element sends a second message to the first SEPP according to the first path, where the second message includes a first reply message.
  14. 根据权利要求13所述的方法,其特征在于,所述第一消息还包括隐藏信息,所述隐藏信息为隐藏后的所述第一网元的拓扑信息,所述第二消息还包括所述隐藏信息。The method of claim 13, wherein the first message further includes hidden information, the hidden information being the hidden topology information of the first network element, and the second message further includes the Hide information.
  15. 根据权利要求13或14所述的方法,其特征在于,所述方法还包括:The method according to claim 13 or 14, characterized in that the method further includes:
    所述第二网元记录所述第一消息的路径。The second network element records the path of the first message.
  16. 根据权利要求13至15中任一项所述的方法,其特征在于,所述第二网元根据所述第一消息的路径生成第一路径,包括:The method according to any one of claims 13 to 15, characterized in that the second network element generates the first path according to the path of the first message, including:
    所述第二网元通过将所述第一消息的路径倒序排放,生成所述第一路径。The second network element generates the first path by arranging the paths of the first message in reverse order.
  17. 根据权利要求13至16中任一项所述的方法,其特征在于,所述第二网元为接入与移动性管理功能AMF、会话管理功能SMF、统一数据管理UDM、用户面功能UPF、认证服务器功能AUSF、短消息服务功能SMSF中的任意一种。The method according to any one of claims 13 to 16, characterized in that the second network element is an access and mobility management function AMF, a session management function SMF, a unified data management UDM, a user plane function UPF, Any one of the authentication server function AUSF and the short message service function SMSF.
  18. 一种通信方法,其特征在于,所述方法包括:A communication method, characterized in that the method includes:
    响应于第一网元向第二网络发送第一请求消息的需求,第一安全和边界代理网元SEPP向所述第二网络发送第一消息,所述第一消息包括所述第一请求消息和所述隐藏信息,所述隐藏信息为隐藏后的所述第一网元的拓扑信息;In response to the first network element sending a first request message to the second network, the first security and border proxy network element SEPP sends a first message to the second network, the first message including the first request message and the hidden information, where the hidden information is the hidden topology information of the first network element;
    所述第二SEPP接收所述第二网络为响应于所述第一消息发送的第二消息,所述第二消息包括第一回复消息和所述隐藏信息;The second SEPP receives a second message sent by the second network in response to the first message, where the second message includes a first reply message and the hidden information;
    所述第二SEPP向第三网元发送第二请求消息,所述第二请求消息用于请求获取所述第一网元的拓扑信息,所述第二请求消息包括所述隐藏信息;The second SEPP sends a second request message to the third network element, the second request message is used to request to obtain the topology information of the first network element, and the second request message includes the hidden information;
    所述第二SEPP接收所述第三网元为响应于第二请求消息发送的第二回复消息,所述第二回复消息包括所述第一网元的拓扑信息,以便根据所述第一网元的拓扑信息将所述请求回复消息路由至所述第一网元。The second SEPP receives a second reply message sent by the third network element in response to the second request message, and the second reply message includes the topology information of the first network element so as to respond to the first network element according to the first network element. The request reply message is routed to the first network element based on the topology information of the network element.
  19. 根据权利要求18所述的方法,其特征在于,所述方法还包括:The method of claim 18, further comprising:
    所述第一SEPP通过加密所述第一网元的拓扑信息,生成所述隐藏信息。The first SEPP generates the hidden information by encrypting the topology information of the first network element.
  20. 根据权利要求18或19所述的方法,其特征在于,所述方法还包括:The method according to claim 18 or 19, characterized in that the method further includes:
    所述第一SEPP接收所述第一网元发送的所述第一请求消息和所述第一网元的拓扑信息。The first SEPP receives the first request message sent by the first network element and the topology information of the first network element.
  21. 根据权利要求18至20中任一项所述的方法,其特征在于,所述第三网元为所述第一SEPP。The method according to any one of claims 18 to 20, characterized in that the third network element is the first SEPP.
  22. 根据权利要求18至20中任一项所述的方法,其特征在于,所述第三网元为接入与移动性管理功能AMF、会话管理功能SMF、统一数据管理UDM、用户面功能UPF、认证服务器功能AUSF、短消息服务功能SMSF中的任意一种。The method according to any one of claims 18 to 20, characterized in that the third network element is access and mobility management function AMF, session management function SMF, unified data management UDM, user plane function UPF, Any one of the authentication server function AUSF and the short message service function SMSF.
  23. 根据权利要求18至22中任一项所述的方法,其特征在于,所述第一网元为AMF、SMF、UDM、UPF、AUSF、SMSF中的任意一种。The method according to any one of claims 18 to 22, characterized in that the first network element is any one of AMF, SMF, UDM, UPF, AUSF, and SMSF.
  24. 一种通信装置,其特征在于,包括用于执行如权利要求1至6,7至12,13至17或18至23中任一项所述的方法的模块。A communication device, characterized by comprising a module for executing the method according to any one of claims 1 to 6, 7 to 12, 13 to 17 or 18 to 23.
  25. 一种通信装置,其特征在于,包括处理器和接口电路,所述接口电路用于接收来自所述通信装置之外的其它通信装置的信号并传输至所述处理器或将来自所述处理器的信号发送给所述通信装置 之外的其它通信装置,所述处理器通过逻辑电路或执行代码指令用于实现如权利要求1至6,7至12,13至17或18至23中任一项所述的方法。A communication device, characterized in that it includes a processor and an interface circuit. The interface circuit is used to receive signals from other communication devices other than the communication device and transmit them to the processor or to transmit signals from the processor. The signal is sent to the communication device In addition to other communication devices, the processor is used to implement the method according to any one of claims 1 to 6, 7 to 12, 13 to 17 or 18 to 23 through logic circuits or execution of code instructions.
  26. 一种计算机可读存储介质,其特征在于,所述存储介质中存储有程序或指令,当所述程序或指令被运行时,实现如权利要求1至6,7至12,13至17或18至23中任一项所述的方法。A computer-readable storage medium, characterized in that a program or instructions are stored in the storage medium. When the program or instructions are executed, the implementation of claims 1 to 6, 7 to 12, 13 to 17 or 18 is achieved. The method described in any one of to 23.
  27. 一种通信系统,其特征在于,所述通信系统包括第一通信装置、第二通信装置、第三通信装置和第四通信装置中的任意一项或多项,其中,A communication system, characterized in that the communication system includes any one or more of a first communication device, a second communication device, a third communication device and a fourth communication device, wherein,
    所述第一通信装置用于实现如权利要求1至6中任一项所述的方法;The first communication device is used to implement the method according to any one of claims 1 to 6;
    所述第二通信装置用于实现如权利要求7至12中任一项所述的方法;The second communication device is used to implement the method according to any one of claims 7 to 12;
    所述第三通信装置用于实现如权利要求13至17中任一项所述的方法;The third communication device is used to implement the method according to any one of claims 13 to 17;
    所述第四通信装置用于实现如权利要求18至23中任一项所述的方法。 The fourth communication device is used to implement the method according to any one of claims 18 to 23.
PCT/CN2023/104692 2022-08-08 2023-06-30 Communication method and communication apparatus WO2024032245A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210943273.4 2022-08-08
CN202210943273.4A CN117580030A (en) 2022-08-08 2022-08-08 Communication method and communication device

Publications (1)

Publication Number Publication Date
WO2024032245A1 true WO2024032245A1 (en) 2024-02-15

Family

ID=89850676

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/104692 WO2024032245A1 (en) 2022-08-08 2023-06-30 Communication method and communication apparatus

Country Status (2)

Country Link
CN (1) CN117580030A (en)
WO (1) WO2024032245A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103023865A (en) * 2011-09-28 2013-04-03 中兴通讯股份有限公司 Method and device for recovering and hiding path parameters in topological hidden network
CN110290161A (en) * 2018-03-19 2019-09-27 中国移动通信有限公司研究院 A kind of topology hiding method, node, functional entity and computer storage medium
CN113940103A (en) * 2019-06-10 2022-01-14 瑞典爱立信有限公司 Network node for handling network functions and method performed therein
US20220030413A1 (en) * 2018-11-05 2022-01-27 Telefonaktiebolaget Lm Ericsson (Publ) Fully qualified domain name handling for service interactions in 5g

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103023865A (en) * 2011-09-28 2013-04-03 中兴通讯股份有限公司 Method and device for recovering and hiding path parameters in topological hidden network
CN110290161A (en) * 2018-03-19 2019-09-27 中国移动通信有限公司研究院 A kind of topology hiding method, node, functional entity and computer storage medium
US20220030413A1 (en) * 2018-11-05 2022-01-27 Telefonaktiebolaget Lm Ericsson (Publ) Fully qualified domain name handling for service interactions in 5g
CN113940103A (en) * 2019-06-10 2022-01-14 瑞典爱立信有限公司 Network node for handling network functions and method performed therein

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CHINA TELECOM: "New KI on Topology Hiding in Data and Analytics Exchange", 3GPP DRAFT; S3-220738, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG3, no. e-meeting; 20220516 - 20220520, 9 May 2022 (2022-05-09), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP052195070 *
CHINA TELECOM: "New solution on topology hiding in data and analytics exchange in roaming case", 3GPP DRAFT; S3-221369, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG3, no. e-meeting; 20220627 - 20220701, 20 June 2022 (2022-06-20), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP052195690 *

Also Published As

Publication number Publication date
CN117580030A (en) 2024-02-20

Similar Documents

Publication Publication Date Title
US11765150B2 (en) End-to-end M2M service layer sessions
RU2760728C1 (en) Protection of the message transferred between the domains of the base network
WO2021017381A1 (en) Systems and methods for supporting traffic steering through a service function chain
WO2017197273A1 (en) Connecting to virtualized mobile core networks
WO2018208295A1 (en) Iot device connectivity, discovery, and networking
US11284254B2 (en) Service-based 5G core authentication endpoints
JP2020517132A (en) Method, apparatus and system for implementing policy control
WO2022088029A1 (en) Key acquisition method and communication apparatus
US20210219137A1 (en) Security management between edge proxy and internetwork exchange node in a communication system
WO2023215720A1 (en) Authorization and authentication of machine learning model transfer
WO2024032245A1 (en) Communication method and communication apparatus
WO2022179218A1 (en) Communication method and apparatus
WO2021233235A1 (en) Method, apparatus and system for establishing connection
WO2023280369A1 (en) Authorization of a user equipment to access a resource
EP3989522A1 (en) Payload compression
WO2023160390A1 (en) Communication method and apparatus
WO2022237838A1 (en) Communication method and communication device
WO2022100197A1 (en) Method and apparatus for obtaining edge service
WO2024001524A1 (en) Communication method and apparatus
WO2021136301A1 (en) Communication method and apparatus
CN116888946A (en) Method and device for discovering edge application server

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23851472

Country of ref document: EP

Kind code of ref document: A1