WO2024055880A1 - 一种注册方法、装置及可读存储介质 - Google Patents
一种注册方法、装置及可读存储介质 Download PDFInfo
- Publication number
- WO2024055880A1 WO2024055880A1 PCT/CN2023/117173 CN2023117173W WO2024055880A1 WO 2024055880 A1 WO2024055880 A1 WO 2024055880A1 CN 2023117173 W CN2023117173 W CN 2023117173W WO 2024055880 A1 WO2024055880 A1 WO 2024055880A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- computing power
- terminal
- registration
- authentication
- request
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 170
- 238000003860 storage Methods 0.000 title claims abstract description 20
- 230000004044 response Effects 0.000 claims abstract description 106
- 238000009826 distribution Methods 0.000 claims description 114
- 230000015654 memory Effects 0.000 claims description 66
- 230000008569 process Effects 0.000 claims description 48
- 230000007246 mechanism Effects 0.000 claims description 27
- 238000004590 computer program Methods 0.000 claims description 24
- 238000004891 communication Methods 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 16
- 238000007726 management method Methods 0.000 description 12
- 230000000694 effects Effects 0.000 description 10
- 230000009286 beneficial effect Effects 0.000 description 9
- 230000006870 function Effects 0.000 description 9
- 238000005516 engineering process Methods 0.000 description 6
- 230000008859 change Effects 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 4
- 230000002093 peripheral effect Effects 0.000 description 4
- 230000007774 longterm Effects 0.000 description 3
- 238000010295 mobile communication Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 239000007787 solid Substances 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W60/00—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
Definitions
- the present application relates to the field of communication technology, and in particular, to a registration method, device and readable storage medium.
- computing power registration and computing power certification need to be carried out first. Only after the certification has passed the resources can be managed by the computing power network management center and perform subsequent computing power orchestration and scheduling.
- the current computing power network is mainly oriented to the bearer network, and its computing power registration process mainly registers resources such as physical servers, virtual machines, containers, and heterogeneous hardware.
- resources such as physical servers, virtual machines, containers, and heterogeneous hardware.
- Embodiments of the present application provide a registration method, device and readable storage medium, so as to be able to use the terminal to provide computing power services.
- embodiments of the present application provide a registration method, including:
- the terminal sends a first registration request to the core network device, where the first registration request is used to request computing power registration and computing power authentication for the terminal;
- the terminal receives the first registration response sent by the core network device.
- the first registration request includes:
- a first indication used to indicate whether the terminal is a computing power node
- the first computing power authentication data is used to determine whether the terminal is a legal computing power node.
- the first registration request also includes one or more of the following:
- the second indication is used to indicate the information of the computing power certification data distribution agency corresponding to the terminal;
- the computing power node capability parameter of the terminal is used to determine whether the terminal is an available computing power node during the authentication process, and to determine the computing power capability of the terminal after successful computing power registration and computing power authentication.
- the first computing power authentication data includes: a Certificate Authority (Certification Authority, CA) certificate or token (Token); or
- the terminal's computing power node capability parameters include one or more of the following: computing power node type, computing power size, computing power node location, and computing power services deployed on the computing power node.
- the method before the terminal sends the first registration request to the core network device, the method further includes:
- the terminal obtains the first computing power authentication data from the computing power authentication data distribution agency corresponding to the terminal.
- the first registration response if the first registration response indicates that the terminal has been authenticated, the first registration response includes the unique identifier of the computing power node of the terminal.
- embodiments of the present application provide a registration method, including:
- the core network device receives a first registration request sent by the terminal, where the first registration request is used to request computing power registration and computing power authentication for the terminal;
- the core network device sends a second registration request to the computing power authentication device, where the second registration request is used to request computing power registration and computing power authentication for the terminal;
- the core network device obtains a second registration response from the computing power authentication device, and sends a first registration response to the terminal according to the second registration response.
- the first registration request includes:
- a first indication used to indicate whether the terminal is a computing power node
- the first computing power authentication data is used to determine whether the terminal is a legal computing power node.
- the first registration request also includes one or more of the following:
- the second indication is used to indicate the information of the computing power certification data distribution agency corresponding to the terminal;
- the computing power node capability parameter of the terminal is used to determine whether the terminal is an available computing power node during the authentication process, and to determine the computing power capability of the terminal after successful computing power registration and computing power authentication.
- the core network device sends a second registration request to the computing power authentication device, including:
- the core network device When the first indication is used to indicate that the terminal is a computing power node, the core network device sends a second registration request to the computing power authentication device.
- the second registration request includes the identification of the terminal and the first computing power authentication data.
- the second registration request further includes one or more of the following:
- the third indication is used to indicate the information of the computing power certification data distribution agency corresponding to the terminal;
- the computing power node capability parameters of the terminal are the computing power node capability parameters of the terminal.
- the first registration response if the first registration response indicates that the terminal has been authenticated, the first registration response includes the unique identifier of the computing power node of the terminal.
- embodiments of the present application provide a registration method, including:
- the computing power authentication device receives a second registration request from the core network device, where the second registration request is sent by the core network device after receiving the first registration request from the terminal;
- the computing power authentication device authenticates the terminal according to the second registration request and obtains an authentication result
- the computing power authentication device sends a second registration response to the core network device, where the second registration response includes the authentication result;
- the first registration request is used to request computing power registration and computing power authentication for the terminal
- the second registration request is used to request computing power registration and computing power authentication for the terminal.
- the second registration request includes the identification of the terminal and the first computing power authentication data
- the computing power authentication device authenticates the terminal according to the second registration request, and obtains an authentication result, including:
- the computing power authentication device obtains the second computing power authentication data of the terminal according to the identification of the terminal;
- the computing power authentication device compares the first computing power authentication data and the second computing power authentication data to obtain the authentication result.
- the second registration request includes the identification of the terminal, the first computer Power authentication data, computing power node capability parameters of the terminal;
- the computing power authentication device authenticates the terminal according to the second registration request, and obtains an authentication result, including:
- the computing power authentication device obtains the second computing power authentication data of the terminal according to the identification of the terminal; the computing power authentication device compares the first computing power authentication data with the second computing power authentication data. ;
- the computing power authentication device authenticates the terminal according to the terminal computing power node capability parameters to obtain an authentication result.
- the computing power authentication device includes a computing power network management center
- the computing power authentication device obtains the second computing power authentication data of the terminal according to the identification of the terminal, including:
- the computing power network management center determines the computing power certification data distribution mechanism corresponding to the terminal according to the identification of the terminal;
- the computing power network management center obtains the second computing power certification data of the terminal from the computing power certification data distribution mechanism corresponding to the terminal.
- the second registration request further includes: a third indication, used to indicate the information of the computing power certification data distribution agency corresponding to the terminal;
- the computing power network management center determines the computing power certification data distribution mechanism corresponding to the terminal according to the identification of the terminal, including:
- the computing power network management center determines the computing power authentication data distribution mechanism corresponding to the terminal according to the identification of the terminal and the third instruction.
- the computing power network management center determines the computing power certification data distribution agency corresponding to the terminal based on the identification of the terminal, including:
- the computing power network management center determines the computing power certification data distribution mechanism corresponding to the terminal based on the identification of the terminal and the target correspondence stored in the computing power network management center;
- the target corresponding relationship is the corresponding relationship between the identification of the terminal and the computing power certification data distribution agency.
- the computing power network management center obtains the computing power authentication number corresponding to the terminal. According to the distribution agency, obtain the second computing power certification data of the terminal, including:
- the computing power network management center sends a first query request to the computing power certification data distribution agency corresponding to the terminal;
- the computing power network management center receives the second computing power certification data sent by the computing power certification data distribution agency corresponding to the terminal.
- the second registration response includes the unique identification of the computing power node of the terminal.
- the method further includes:
- the computing power network management center obtains the third computing power certification data of the terminal from the computing power certification data distribution mechanism, and the third computing power certification data is updated computing power certification data.
- embodiments of the present application provide a registration method, including:
- the computing power certification data distribution agency receives the first query request from the computing power network management center;
- the computing power certification data distribution mechanism sends the second computing power certification data of the terminal to the computing power network management center according to the first query request for use in authenticating the terminal;
- the first query request is sent by the computing power network management center after receiving the second registration request from the core network device, and the second registration request is sent by the core network device after receiving the first registration request from the terminal.
- Sent after the request the first registration request is used to request the computing power registration and computing power authentication of the terminal, and the second registration request is used to request the computing power registration and computing power authentication of the terminal.
- the method further includes:
- the computing power certification data distribution mechanism sends the third computing power certification data of the terminal to the computing power network management center, and the third computing power certification data is updated computing power certification data.
- the method further includes:
- the computing power certification data distribution mechanism sends the first computing power certification data to the terminal, and stores the corresponding relationship between the terminal and the first computing power certification data.
- the method further includes:
- the computing power certification data distribution mechanism manages all or part of the computing power certification data of the terminal.
- embodiments of the present application provide a registration device, which is applied to a terminal and includes: Memory, transceiver, processor:
- a memory for storing a computer program; a transceiver for transmitting and receiving data under the control of the processor; and a processor for reading the computer program in the memory and performing the following operations:
- embodiments of the present application provide a registration device, which is applied to core network equipment, including: memory, transceiver, and processor:
- Memory used to store computer programs
- transceiver used to send and receive data under the control of the processor
- processor used to read the computer program in the memory and perform the following operations:
- embodiments of the present application provide a registration device applied to computing power authentication equipment, including: a memory, a transceiver, and a processor:
- Memory used to store computer programs
- transceiver used to send and receive data under the control of the processor
- processor used to read the computer program in the memory and perform the following operations:
- the first registration request is used to request computing power registration and computing power authentication for the terminal
- the second registration request is used to request computing power registration and computing power authentication for the terminal.
- the embodiment of the present application provides a registration device, which is used in a computing power certification data distribution mechanism, including: a memory, a transceiver, and a processor:
- Memory used to store computer programs
- transceiver used to send and receive data under the control of the processor
- processor used to read the computer program in the memory and perform the following operations:
- the first query request is sent by the computing power network management center after receiving the second registration request from the core network device, and the second registration request is sent by the core network device after receiving the first registration request from the terminal.
- Sent after the request the first registration request is used to request the computing power registration and computing power authentication of the terminal, and the second registration request is used to request the computing power registration and computing power authentication of the terminal.
- embodiments of the present application provide a registration device, applied to a terminal, including:
- the first sending unit is configured to send a first registration request to the core network device, where the first registration request is used to request computing power registration and computing power authentication for the terminal;
- the first receiving unit is configured to receive the first registration response sent by the core network device.
- embodiments of the present application provide a registration device applied to core network equipment, including:
- the first receiving unit is configured to receive a first registration request sent by the terminal, where the first registration request is used to request computing power registration and computing power authentication for the terminal;
- a first sending unit configured to send a second registration request to the computing power authentication device, where the second registration request is used to request computing power registration and computing power authentication for the terminal;
- a first processing unit configured to obtain a second registration response from the computing power authentication device, and send a first registration response to the terminal according to the second registration response.
- embodiments of the present application provide a registration device applied to computing power authentication equipment, including:
- a first receiving unit configured to receive a second registration request from the core network device, where the second registration request is sent by the core network device after receiving the first registration request from the terminal;
- a first authentication unit configured to authenticate the terminal according to the second registration request and obtain an authentication result
- a first sending unit configured to send a second registration response to the core network device.
- the second registration response includes the certification result
- the first registration request is used to request the computing power registration and computing power authentication of the terminal
- the second registration request is used to request the computing power registration and computing power authentication of the terminal.
- embodiments of the present application provide a registration device applied to a computing power certification data distribution agency, including:
- the first receiving unit is used to receive the first query request from the computing power network management center;
- a first sending unit configured to send the second computing power authentication data of the terminal to the computing power network management center according to the first query request, for authenticating the terminal;
- the first query request is sent by the computing power network management center after receiving the second registration request from the core network device, and the second registration request is sent by the core network device after receiving the first registration request from the terminal.
- Sent after the request the first registration request is used to request the computing power registration and computing power authentication of the terminal, and the second registration request is used to request the computing power registration and computing power authentication of the terminal.
- embodiments of the present application also provide a processor-readable storage medium.
- a computer program is stored on the readable storage medium. When the computer program is executed by the processor, the steps in the registration method as described above are implemented. .
- the terminal can be registered and certified for computing power, so that the terminal can be used to provide computing power services.
- Figure 1 is one of the flow charts of the registration method provided by the embodiment of the present application.
- Figure 2 is the second flow chart of the registration method provided by the embodiment of the present application.
- Figure 3 is the third flow chart of the registration method provided by the embodiment of the present application.
- Figure 4 is the fourth flow chart of the registration method provided by the embodiment of the present application.
- Figure 5 is the fifth flow chart of the registration method provided by the embodiment of the present application.
- Figure 6 is one of the structural diagrams of the registration device provided by the embodiment of the present application.
- Figure 7 is the second structural diagram of the registration device provided by the embodiment of the present application.
- Figure 8 is the third structural diagram of the registration device provided by the embodiment of the present application.
- Figure 9 is the fourth structural diagram of the registration device provided by the embodiment of the present application.
- Figure 10 is the fifth structural diagram of the registration device provided by the embodiment of the present application.
- Figure 11 is the sixth structural diagram of the registration device provided by the embodiment of the present application.
- Figure 12 is the seventh structural diagram of the registration device provided by the embodiment of the present application.
- Figure 13 is the eighth structural diagram of the registration device provided by the embodiment of the present application.
- the term "and/or” describes the association of associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A exists alone, A and B exist simultaneously, and B exists alone. these three situations.
- the character "/” generally indicates that the related objects are in an "or” relationship.
- the term “plurality” refers to two or more than two, and other quantifiers are similar to it.
- Embodiments of the present application provide a registration method and device to provide computing power services using a terminal.
- the method and the device are based on the same application concept. Since the principles of the method and the device to solve the problem are similar, the implementation of the device and the method can be referred to each other, and the repeated details will not be repeated.
- Figure 1 is a flow chart of a registration method provided by an embodiment of the present application. As shown in Figure 1, it includes the following steps:
- Step 101 The terminal sends a first registration request to the core network device.
- the first registration request is used to request computing power registration and computing power authentication for the terminal.
- the first registration request includes:
- the first indication is used to indicate whether the terminal is a computing power node; the first computing power authentication data is used to determine whether the terminal is a legal computing power node.
- the first indication in the first registration request is mainly used to indicate whether the terminal is a computing power node.
- computing power nodes refer to nodes that can provide computing power services to the outside world.
- the specific implementation of the first instruction is not limited in the embodiment of this application.
- the first indication may be carried through a certain field of the first registration request. If the value of this field is "Yes”, the table Indicates that the terminal is a computing node; if the value of this field is "No", it means that the terminal is not a computing node.
- "legal computing power nodes” can be understood as computing power nodes certified by the computing power certification data distribution agency. If it passes the certification certified by the computing power certification data distribution agency, the computing power certification data can be assigned to the terminal and sent to the terminal. Correspondingly, the terminal can obtain the computing power certification data.
- This computing power authentication data can be used as the first computing power authentication data here, so that the computing power authentication device can determine whether the terminal is a legal computing power node. It should be noted that in the embodiment of this application, the authentication method of the computing power authentication data distribution agency is not limited.
- the first computing power certification data includes: CA certificate or Token.
- the first computing power certification data may be obtained by the terminal from the computing power certification data distribution agency corresponding to the terminal.
- One terminal can correspond to one or more computing power certification data distribution agencies.
- the embodiment of the present application may further include: the terminal obtains the first computing power certification data from the computing power certification data distribution agency corresponding to the terminal.
- the terminal may send a request to the computing power certification data distribution agency to obtain the first computing power certification data.
- the computing power certification data distribution agency can generate the computing power certification data of the terminal, and store the corresponding relationship between the terminal identification and the computing power certification data. Therefore, when receiving a request from a terminal, the computing power authentication data distribution mechanism can obtain the first computing power authentication data of the terminal based on the terminal identification carried in the terminal's request and the corresponding relationship.
- the first registration request also includes one or more of the following:
- the second indication is used to indicate the information of the computing power certification data distribution agency corresponding to the terminal; the computing power node capability parameter of the terminal is used to determine whether the terminal is an available computing power node during the authentication process, and, in the computing power After successful registration and computing power certification, the computing power capability of the terminal is determined.
- the second indication may be used to indicate the identity of the computing power certification data distribution agency corresponding to the terminal, etc.
- the computing power node capability parameters of the terminal include one or more of the following: computing power node type, computing power size, computing power node location, computing power service deployed on the computing power node, etc.
- available computing power nodes can be understood as whether the computing power capabilities of the terminals that have been certified by the computing power certification data distribution agency meet the requirements of the computing power certification equipment for computing power nodes, or, it can also be understood as having passed the computing power certification data distribution agency. Verify whether the terminal certified by the data distribution agency can truly serve as a computing power node.
- the computing power node type required by the computing power certification equipment is A
- the computing power node type of the terminal is B
- the terminal's computing power node type is A
- the terminal's computing power node type can be considered to meet the requirements of the computing power certification equipment, and can be used as an available computing power node, or it can also be combined with Use other information to make further judgments.
- the information carried in the first registration request can also be expanded to a certain extent as needed, and the specific content included in each information can also be expanded to a certain extent as needed.
- the core network equipment can refer to a specific device to achieve the purpose of this solution, or it can also use a module or unit in a certain device to achieve the purpose of this solution.
- the core network equipment may include Access and Mobility Management Function (AMF), etc.
- AMF Access and Mobility Management Function
- the core network device may request the computing power authentication device to perform computing power authentication on the terminal.
- Step 102 The terminal receives the first registration response sent by the core network device.
- the first registration response is formed by the core network device according to the second registration response of the computing power authentication device, wherein the second registration response includes the authentication result of the computing power authentication device on the terminal. Accordingly, the first registration response can carry the above authentication result.
- the first registration response may indicate that the authentication passed or the authentication failed. If the first registration response indicates that the terminal has been authenticated, the first registration response includes the terminal's unique identifier of the computing power node. Among them, the unique identifier of the computing power node is used to uniquely identify the terminal as the computing power node, and is obtained by the core network equipment from the computing power authentication device. If the first registration response indicates that the terminal is not authenticated, the first registration response may also include a corresponding reason.
- the terminal can be registered and certified for computing power, so that the terminal can be used to provide computing power services.
- FIG 2 is a flow chart of a registration method provided by an embodiment of the present application. As shown in Figure 2, it includes the following steps:
- Step 201 The core network device receives the first registration request sent by the terminal.
- the first registration request is used to request computing power registration and computing power authentication for the terminal.
- Step 202 The core network device sends a second registration request to the computing power authentication device.
- the second registration request Used to request computing power registration and computing power certification for the terminal.
- the core network device determines whether the terminal is a computing power node according to the first indication in the first registration request. If the first indication indicates that the terminal is a computing power node, the core network device sends a second registration request to the computing power authentication device to perform subsequent computing power registration and computing power authentication processes; otherwise, the normal terminal registration process can be followed.
- the second registration request includes the identification of the terminal and the first computing power authentication data.
- the second registration request in order to facilitate the computing power authentication device to obtain the authentication data of the terminal and perform authentication, the second registration request also includes one or more of the following:
- the third indication is used to indicate the information of the computing power certification data distribution agency corresponding to the terminal; the computing power node capability parameters of the terminal.
- the third indication may be used to indicate the identity of the computing power certification data distribution agency corresponding to the terminal, etc.
- the computing power node capability parameters of the terminal include one or more of the following: computing power node type, computing power size, computing power node location, and computing power services deployed on the computing power node.
- Step 203 The core network device obtains the second registration response from the computing power authentication device, and sends the first registration response to the terminal according to the second registration response.
- the second registration response may indicate that the authentication is passed or the authentication is not passed. If the second registration response indicates that the terminal has been authenticated, the second registration response includes the terminal's unique identifier of the computing power node. If the second registration response indicates that the terminal is not authenticated, the second registration response may also include a corresponding reason. Correspondingly, the core network device forms the first registration response according to the second registration response, and sends the first registration response to the terminal.
- the terminal can be registered and certified for computing power, so that the terminal can be used to provide computing power services.
- Figure 3 is a flow chart of a registration method provided by an embodiment of the present application. As shown in Figure 3, it includes the following steps:
- Step 301 The computing power authentication device receives a second registration request from the core network device.
- the second registration request is sent by the core network device after receiving the first registration request from the terminal.
- the first registration request is used to request the computing power registration and computing power certification of the terminal
- the second registration request is used to request the computing power registration and computing power certification of the terminal.
- the contents and meanings included in the first registration request and the second registration request may refer to the aforementioned methods. Description of method embodiments.
- Step 302 The computing power authentication device authenticates the terminal according to the second registration request and obtains the authentication result.
- the computing power authentication device obtains the terminal's second computing power authentication data based on the terminal's identification, and combines the first computing power authentication data and The second computing power certification data is compared to obtain the certification result.
- the purpose of comparing the two here is to determine whether the terminal is a legal terminal to ensure security.
- the terminal can pass the authentication, that is, the authentication result is that the terminal passes the authentication; otherwise, the terminal does not need to pass the authentication.
- the preset value can be set as needed.
- the computing power authentication device obtains the terminal's second computing power authentication data based on the terminal's identification, and The first computing power certification data is compared with the second computing power certification data; when the first computing power certification data and the second computing power certification data match, the computing power certification device authenticates the terminal according to the terminal computing power node capability parameters. , get the certification result. specific:
- the computing power certification equipment compares the first computing power certification data and the second computing power certification data.
- the purpose of comparing the two here is to determine whether the terminal is a legal terminal to ensure security.
- the computing power authentication device may consider that the first computing power authentication data and the second computing power authentication data match when the matching degree between the first computing power authentication data and the second computing power authentication data meets the preset value.
- the terminal is Legal terminal.
- the preset value can be set as needed.
- the computing power authentication device authenticates the terminal according to the terminal computing power node capability parameters and obtains the authentication result.
- the authentication method depends on the specific implementation of the computing power authentication device. For example, the computing power authentication device can determine whether the authentication is passed based on the terminal's computing power node type. Specifically, assuming that the computing power node type required by the computing power authentication equipment is type A, and the computing power node type of the terminal is type B, then it can be determined that the authentication of the terminal fails. For another example, assume that the computing power node required by the computing power network management center needs to be located in location C, and the location of the computing power node of the terminal indicates that the terminal is located in location C, then it can be determined that the authentication of the terminal has passed.
- the terminal is authenticated, and after obtaining the authentication result of each information, a certain strategy is adopted to obtain the final authentication result. For example, assuming that a certain proportion of the authentication results obtained through each piece of information indicates that the terminal has been authenticated, then the final authentication result is that the terminal has been authenticated. Among them, the ratio can be set as needed.
- the computing power authentication device may refer to a specific device to achieve the purpose of this solution, or it may be a module or unit in a certain device to achieve the purpose of this solution.
- the computing power authentication device may be an independent device.
- the computing power authentication device is used to authenticate the computing power of the terminal, store the computing power data of the terminal, manage the computing power data, etc.
- the above authentication process is performed by the computing power authentication equipment.
- the computing power certification device may also be formed by multiple devices.
- the computing power certification device may include a computing power network management center and a computing power certification data distribution agency.
- the computing power network management center is used to certify the computing power of the terminal
- the computing power certification data distribution agency is used to store the computing power data of the terminal and manage the computing power data.
- the above-mentioned authentication process is performed by the computing power network management center.
- the computing power authentication device can obtain the second authentication data from itself. That is, the computing power authentication device stores the correspondence between the terminal identification and the computing power authentication data. For example, the computing power authentication device can obtain the second computing power data of the terminal based on the terminal's identification and the corresponding relationship between the terminal identification and the computing power authentication data.
- the computing power network management center obtains the second computing power data from the computing power certification data distribution agency corresponding to the terminal.
- the computing power network management center can determine the computing power certification data distribution agency corresponding to the terminal based on the terminal's identification, and Get the second computing power data.
- the computing power network management center itself can store the target correspondence between the terminal and the computing power certification data distribution agency.
- the computing power network management center can determine the computing power certification data distribution agency corresponding to the terminal based on the terminal's identification and the corresponding relationship with the target.
- one terminal may correspond to one or more computing power certification data distribution centers. Then, in order to more accurately determine the information of the computing power certification data distribution agency corresponding to the terminal, the computing power network management center may also determine the terminal based on the third indication included in the second registration request and the terminal's identification. The corresponding computing power certification data distribution agency, and obtains the second computing power data from the computing power certification data distribution agency corresponding to the terminal. The third indication is used to indicate the information of the computing power certification data distribution agency corresponding to the terminal. For example, the computing power network management center may send a first query request to the computing power certification data distribution agency corresponding to the terminal, and receive the second computing power certification data sent by the computing power certification data distribution agency corresponding to the terminal.
- Step 303 The computing power authentication device sends a second registration response to the core network device, where the second registration response includes the authentication result.
- the second registration response may indicate that the authentication passed or the authentication failed. If the second registration response indicates that the terminal has been authenticated, the second registration response includes the terminal's unique identifier of the computing power node. If the second registration response indicates that the terminal is not authenticated, the second registration response may also include a corresponding reason.
- the computing power certification of the terminal is completed, thereby realizing the computing power registration of the terminal.
- the terminal can serve as a computing power node to provide computing power services.
- the terminal can be registered and certified for computing power, so that the terminal can be used to provide computing power services.
- Figure 4 is a flow chart of a registration method provided by an embodiment of the present application. As shown in Figure 4, it includes the following steps:
- Step 401 The computing power certification data distribution agency receives the first query request from the computing power network management center;
- Step 402 The computing power certification data distribution agency sends the second computing power certification data of the terminal to the computing power network management center according to the first query request for authentication of the terminal;
- the first query request is sent by the computing power network management center after receiving the second registration request from the core network device, and the second registration request is sent by the core network device after receiving the first registration request from the terminal; the first registration request The request is used to request the computing power registration and authentication of the terminal, and the second registration request is used to request the computing power registration and computing power authentication of the terminal.
- the first query request is sent by the computing network management center after receiving the second registration request from the core network device, and the second registration request is sent by the core network device after receiving the first registration request from the terminal.
- the first registration request is used to request the computing power registration and authentication of the terminal, and the second registration request Used to request computing power registration and computing power certification for the terminal.
- the first query request may carry the identification of the terminal.
- the computing power certification data distribution agency can generate the computing power certification data of the terminal and store the corresponding relationship between the terminal identification and the computing power certification data.
- the computing power certification data distribution agency can determine the computing power certification data of the terminal based on the terminal identifier carried in the first query request and the corresponding relationship.
- the computing power certification data distribution agency may also send the terminal's third computing power certification data to the computing power network management center, where the third computing power certification data is updated computing power certification data. For example, when the terminal's computing power data changes, the computing power certification data distribution agency can send updated computing power certification data to the computing power network management center.
- the computing power certification data distribution agency may also send the first computing power certification data to the terminal, and store the corresponding relationship between the terminal and the first computing power certification data.
- the computing power certification data distribution agency manages all or part of the computing power certification data of the terminal, including the generation, change, revocation, etc. of the computing power certification data.
- the terminal Before the terminal registers its computing power, the terminal applies to the computing power certification center for computing power certification data (such as CA certificate, Token, etc.).
- the computing power certification center allocates unique computing power certification data to the terminal and saves the terminal's unique identification and computing power. Correspondence of authentication data.
- the computing power certification center will synchronize the data changes to the terminal and the computing power network management center.
- the computing power certification center When the terminal's computing power certification data becomes invalid, the computing power certification center sends a revocation notification to the terminal, revokes the computing power certification data assigned to the terminal, and at the same time sends a computing power certification data invalidation notification to the computing power network management center.
- the terminal can be registered and certified for computing power, so that the terminal can be used to provide computing power services.
- the computing power registration and authentication system can include computing power nodes (User Equipment (UE)), core network equipment (AMF), computing power certification equipment, etc.
- the computing power certification equipment includes the computing power network management center and the computing power certification center (i.e., the computing power certification data distribution agency).
- the core network equipment takes AMF as an example.
- the UE is mainly used to initiate a registration request; when the core network device confirms that the UE is a computing power node based on the registration request initiated by the UE, it requests the computing power authentication device to register and authenticate the UE's computing power.
- the computing power certification center provides computing power certification data (such as CA certificate, Token etc.) management.
- computing power certification data such as CA certificate, Token etc.
- the computing power network management center provides computing power resource management and computing power orchestration and scheduling services (such as computing power registration, computing power resource management, computing power monitoring, computing power orchestration and scheduling, etc.) for computing power nodes (UE).
- computing power resource management and computing power orchestration and scheduling services such as computing power registration, computing power resource management, computing power monitoring, computing power orchestration and scheduling, etc.
- UE applies to the computing power certification center for computing power certification data (such as CA certificate, Token, etc.) before becoming a legal and trusted computing power node of the computing power network management center.
- the computing power certification center assigns a unique computing power to the UE. computing power authentication data, and save the corresponding relationship between the UE unique identifier and the computing power authentication data.
- the computing power authentication center manages the computing power authentication data throughout its life cycle, including the generation, change, and revocation of computing power authentication data.
- the UE Before the UE registers computing power, the UE applies to the computing power authentication center for computing power authentication data (such as CA certificates, tokens, etc.).
- the computing power authentication center allocates unique computing power authentication data to the UE and saves the correspondence between the UE's unique identifier and the computing power authentication data.
- the computing power authentication center synchronizes the change data to the UE and the computing power network management center.
- the computing power authentication center When the UE's computing power authentication data expires, the computing power authentication center sends a revocation notification to the UE, revokes the computing power authentication data allocated to the UE, and sends a computing power authentication data expiration notification to the computing power network management center.
- the computing power network management center can also subscribe to the computing power certification data change notification from the computing power certification center. When the computing power certification data changes, a change notification is triggered.
- this process may include:
- Step 501 The UE initiates a registration process.
- the UE sends a registration request to the Radio Access Network (RAN).
- the registration request includes the computing power information of the UE.
- the computing power information may include:
- Computing power node indication indicates whether the UE is a computing power node. When the value indicated by the computing power node is "Yes", it means that the UE is a computing power node, and AMF needs to parse the computing power information and send a computing power registration request to the computing power network management center; the value indicated by the computing power node When "No", perform the normal UE registration process.
- the computing power node indication is a parameter of the computing power node itself, which can be configured when the UE initiates a registration request, or can be provided when the UE leaves the factory.
- the value assigned to this parameter is the unique identifier of the computing power certification center that distributes the computing power certification data;
- Computing power node capability parameters including computing power node type, computing power size, computing power node location, computing power services deployed on the computing power node, etc.
- Step 502 RAN selects an appropriate AMF and forwards the registration request to the AMF.
- Step 503 After receiving the registration request, AMF authenticates the mobile user identity of the UE in conjunction with the Authentication Server Function (AUSF).
- AUSF Authentication Server Function
- Step 504 For users who have passed the UE identity authentication, AMF parses the UE registration request and submits the computing power registration request to the computing power network management center according to the instructions of the computing power node.
- the computing power registration request carries: the unique identifier of the UE, the computing power certification data (the first computing power certification data), the information of the computing power certification data distribution agency, and the computing power node capability parameters.
- Step 505 The computing power network management center checks the computing power authentication data of the UE from the computing power authentication center according to the unique identifier of the UE in the computing power registration request.
- Step 506 The computing power authentication center retrieves the saved computing power authentication data through the unique identifier of the UE, and feeds the result (ie, the second computing power authentication data) to the computing power network management center through the computing power authentication data response.
- Step 507 The computing power network management center performs computing power authentication on the UE, which mainly includes several methods:
- the first method Trusted identity authentication of computing power nodes. That is, the first computing power certification data and the second computing power certification data are authenticated and compared.
- the terminal can pass the authentication.
- the preset value can be set as needed.
- the second method judging the availability of computing power nodes. That is, the computing power node type, computing power node location, and computing power size are judged to determine whether the resource meets the management scope and management requirements of the computing power network management center.
- the computing power network management center can determine whether the authentication is passed based on the terminal's computing power node type. Specifically, assuming that the computing power node type required by the computing power network management center is type A, and the computing power node type of the UE is type B, then it can be determined that the authentication of the terminal fails. For another example, assume that the computing power node required by the computing power network management center needs to be located in location C, and the location of the computing power node of the UE indicates that the UE is located in location C, then, It can be confirmed that the authentication of the terminal is passed.
- a variety of information about computing power node capability parameters can also be combined to authenticate the terminal, and after obtaining the authentication results through each information, a certain strategy can be adopted to obtain the final authentication result. For example, assuming that a certain proportion of the authentication results obtained through each piece of information indicates that the terminal has been authenticated, then the final authentication result is that the terminal has been authenticated. Among them, the ratio can be set as needed.
- the third way the combination of the first way and the second way.
- the results of the two authentication methods can be combined to make decisions. For example, if the result obtained by one of the two authentication methods indicates that the authentication is passed, the terminal is deemed to have passed the authentication; The results obtained by the authentication method all indicate that the authentication has passed, which means that the terminal has been authenticated and so on.
- Step 508 The computing power network management center feeds back the computing power registration response to the AMF.
- the computing power network management center accepts the computing power registration, assigns the computing power node unique identifier to the UE, and feeds back the computing power registration response to the AMF.
- the response carries the assigned computing power node unique identifier; when the authentication fails, the computing power node
- the network management center rejects the computing power registration and feeds back the computing power registration response to the AMF.
- the response carries the reasons for the registration rejection, such as authentication failure, resource type incompatibility, resource location beyond the management range, computing power size does not meet management requirements, etc.
- Step 508 The AMF feeds back the computing power registration response to the UE to complete the UE's computing power registration process in the computing power network management center.
- the terminal can be registered and certified for computing power, so that the terminal can be used to provide computing power services.
- 5G fifth generation mobile communication technology
- applicable systems may be global system of mobile communication (GSM) system, code division multiple access (code division multiple access, CDMA) system, wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA) general packet Wireless service (general packet radio service, GPRS) system, long term evolution (long term evolution, LTE) system, LTE frequency division duplex (FDD) system, LTE time division duplex (TDD) system, Advanced long term evolution advanced (LTE-A) system, universal mobile telecommunication system (UMTS), global interoperability for microwave access (WiMAX) system, 5G New Radio (NR) system, etc.
- GSM global system of mobile communication
- CDMA code division multiple access
- WCDMA Wideband Code Division Multiple Access
- general packet Wireless service general packet Radio service
- GPRS general packet Wireless service
- LTE long term evolution
- FDD frequency division duplex
- TDD LTE time division duplex
- UMTS Universal mobile telecommunication system
- WiMAX global interoperability
- the terminal device involved in the embodiments of this application may be a device that provides voice and/or data connectivity to users, a handheld device with a wireless connection function, or other processing devices connected to a wireless modem, etc.
- the names of terminal equipment may also be different.
- the terminal equipment may be called user equipment (User Equipment, UE).
- Wireless terminal equipment can communicate with one or more core networks (Core Network, CN) via the Radio Access Network (RAN).
- CN Core Network
- RAN Radio Access Network
- the wireless terminal equipment can be a mobile terminal equipment, such as a mobile phone (also known as a "cell phone").
- Wireless terminal equipment can also be called a system, a subscriber unit, a subscriber station, a mobile station, a mobile station, a remote station, and an access point.
- remote terminal equipment remote terminal equipment
- access terminal equipment access terminal
- user terminal user terminal
- user agent user agent
- user device user device
- the registration device of the embodiment of the present application is applied to core network equipment and includes: a processor 600, used to read the program in the memory 620 and perform the following process:
- the first registration request is used to request computing power registration and authentication of the terminal;
- Transceiver 610 for receiving and transmitting data under the control of processor 600.
- the bus architecture may include any number of interconnected buses and bridges, specifically one or more processors represented by processor 600 and various circuits of the memory represented by memory 620 are linked together.
- the bus architecture can also link together various other circuits such as peripherals, voltage regulators, and power management circuits, which are all well known in the art and therefore will not be described further herein.
- the bus interface provides the interface.
- Transceiver 610 may be a plurality of elements, including a transmitter and a receiver, providing a unit for communicating with various other devices over a transmission medium.
- the processor 600 is responsible for managing the bus architecture and general processing, and the memory 620 can store data used by the processor 600 when performing operations.
- the processor 600 may be a central processing unit (Central Processing Unit, CPU), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), a field programmable gate array (Field-Programmable Gate Array, FPGA) or a complex programmable logic device (Complex Programmable Logic Device (CPLD), the processor can also adopt a multi-core architecture.
- CPU Central Processing Unit
- ASIC Application Specific Integrated Circuit
- FPGA Field-Programmable Gate Array
- CPLD Complex Programmable Logic Device
- the processor 600 is responsible for managing the bus architecture and general processing, and the memory 620 can store data used by the processor 600 when performing operations.
- the first registration request includes:
- the first indication is used to indicate whether the terminal is a computing power node
- the first computing power authentication data is used to determine whether the terminal is a legal computing power node.
- the first registration request also includes one or more of the following:
- the second indication is used to indicate the information of the computing power certification data distribution agency corresponding to the terminal;
- the computing power node capability parameter of the terminal is used to determine whether the terminal is an available computing power node during the authentication process, and to determine the computing power capability of the terminal after successful computing power registration and computing power certification.
- the second registration request includes the identification of the terminal and the first computing power authentication data.
- the processor 600 is configured to read the program in the memory 620 and perform the following processes:
- a second registration request is sent to the computing power authentication device.
- the second registration request also includes one or more of the following:
- the third indication is used to indicate the information of the computing power certification data distribution agency corresponding to the terminal;
- the terminal s computing power node capability parameters.
- the first registration response if the first registration response indicates that the terminal has been authenticated, the first registration response includes the terminal's unique identifier of the computing power node.
- the registration device of the embodiment of the present application is applied to computing power authentication equipment, including: a processor 700, used to read the program in the memory 720 and perform the following processes:
- the second registration request is sent by the core network device after receiving the first registration request from the terminal;
- the first registration request is used to request the computing power registration and authentication of the terminal
- the second registration request is used to request the computing power registration and computing power authentication of the terminal.
- Transceiver 710 for receiving and transmitting data under the control of processor 700.
- the bus architecture may include any number of interconnected buses and bridges, specifically one or more processors represented by processor 700 and various circuits of the memory represented by memory 720 are linked together.
- the bus architecture can also link together various other circuits such as peripherals, voltage regulators, and power management circuits, which are all well known in the art and therefore will not be described further herein.
- the bus interface provides the interface.
- Transceiver 710 may be a plurality of elements, including a transmitter and a receiver, providing a unit for communicating with various other devices over a transmission medium.
- the processor 700 is responsible for managing the bus architecture and general processing, and the memory 720 can store data used by the processor 700 when performing operations.
- the processor 700 may be a central processing unit (CPU), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), a field programmable gate array (Field-Programmable Gate Array, FPGA) or a complex programmable logic device (Complex Programmable Logic Device, CPLD), the processor can also adopt a multi-core architecture.
- CPU central processing unit
- ASIC Application Specific Integrated Circuit
- FPGA field programmable gate array
- CPLD Complex Programmable Logic Device
- the processor 700 is responsible for managing the bus architecture and general processing, and the memory 720 can store data used by the processor 700 when performing operations.
- the second registration request includes the identification of the terminal and the first computing power authentication data; the processor 700 is used to read the program in the memory 720 and perform the following process:
- the second registration request includes the identification of the terminal, the first computing power authentication data, and the computing power node capability parameters of the terminal;
- the processor 700 is used to read the program in the memory 720 and perform the following process:
- the computing power certification device includes a computing power network management center; the processor 700 is used to read the program in the memory 720 and perform the following processes:
- the identification of the terminal determine the computing power certification data distribution agency corresponding to the terminal;
- the second registration request also includes: a third indication, used to indicate the information of the computing power certification data distribution agency corresponding to the terminal; the processor 700, used to read the program in the memory 720, and perform the following process:
- the computing power certification data distribution agency corresponding to the terminal is determined.
- the processor 700 is used to read the program in the memory 720 and perform the following processes:
- the computing power network management center determines the computing power certification data distribution agency corresponding to the terminal;
- the target correspondence is the correspondence between the identification of the terminal and the computing power certification data distribution agency.
- the processor 700 is used to read the program in the memory 720 and perform the following processes:
- the second registration response includes the terminal's computing power node unique identifier.
- the processor 700 is used to read the program in the memory 720 and perform the following processes:
- the third computing power certification data of the terminal from the computing power certification data distribution agency, and the third computing power certification data is the updated computing power certification data.
- the registration device of the embodiment of the present application is used in a computing power certification data distribution agency, and includes: a processor 800, used to read the program in the memory 820 and perform the following processes:
- the first query request is sent by the computing power network management center after receiving the second registration request from the core network device, and the second registration request is sent by the core network device after receiving the first registration request from the terminal; the first registration request The request is used to request the computing power registration and authentication of the terminal, and the second registration request is used to request the computing power registration and computing power authentication of the terminal.
- Transceiver 810 for receiving and transmitting data under the control of processor 800.
- the bus architecture may include any number of interconnected buses and bridges, specifically one or more processors represented by processor 800 and various circuits of the memory represented by memory 820 are linked together.
- the bus architecture can also link together various other circuits such as peripherals, voltage regulators, and power management circuits, which are all well known in the art and therefore will not be described further herein.
- the bus interface provides the interface.
- Transceiver 810 may be a plurality of elements, including a transmitter and a receiver, providing a unit for communicating with various other devices over a transmission medium.
- the processor 800 is responsible for managing the bus architecture and general processing, and the memory 820 can store data used by the processor 800 when performing operations.
- the processor 800 may be a central processing unit (CPU), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), a field programmable gate array (Field-Programmable Gate Array, FPGA) or a complex programmable logic device (Complex Programmable Logic Device, CPLD), the processor can also adopt a multi-core architecture.
- CPU central processing unit
- ASIC Application Specific Integrated Circuit
- FPGA field programmable gate array
- CPLD Complex Programmable Logic Device
- the processor 800 is responsible for managing the bus architecture and general processing, and the memory 820 can store data used by the processor 800 when performing operations.
- the processor 800 is used to read the program in the memory 820 and perform the following processes:
- the processor 800 is used to read the program in the memory 820 and perform the following processes:
- the processor 800 is used to read the program in the memory 820 and perform the following processes:
- the registration device of the embodiment of the present application is applied to a terminal and includes: a processor 900, used to read the program in the memory 920 and perform the following process:
- Transceiver 910 for receiving and transmitting data under the control of processor 900.
- the bus architecture may include any number of interconnected buses and bridges, specifically one or more processors represented by processor 900 and various circuits of the memory represented by memory 920 are linked together.
- the bus architecture can also link together various other circuits such as peripherals, voltage regulators, and power management circuits, which are all well known in the art and therefore will not be described further herein.
- the bus interface provides the interface.
- Transceiver 910 may be a plurality of elements, including a transmitter and a receiver, providing a unit for communicating with various other devices over a transmission medium.
- the user interface 930 can also be an interface capable of externally connecting required equipment.
- the connected equipment includes but is not limited to a keypad, a display, a speaker, a microphone, a joystick, etc.
- the processor 900 is responsible for managing the bus architecture and general processing, and the memory 920 can store data used by the processor 900 when performing operations.
- the processor 900 may be a central processing unit (CPU), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), a field programmable gate array (Field-Programmable Gate Array, FPGA), or a complex programmable logic device (Complex Programmable Logic Device, CPLD), Processors can also adopt multi-core architecture.
- CPU central processing unit
- ASIC Application Specific Integrated Circuit
- FPGA field programmable gate array
- CPLD Complex Programmable Logic Device
- the processor is configured to execute any method provided by the embodiments of the present application according to the obtained executable instructions by calling the computer program stored in the memory.
- the processor and memory can also be physically separated.
- the processor 900 is also used to read the program and perform the following steps:
- the first registration response if the first registration response indicates that the terminal has been authenticated, the first registration response includes the terminal's unique identifier of the computing power node.
- the registration device As shown in Figure 10, the registration device according to the embodiment of the present application is applied to a terminal and includes:
- the first sending unit 1001 is used to send a first registration request to the core network device.
- the first registration request is used to request the computing power registration and authentication of the terminal;
- the first receiving unit 1002 is used to receive the first registration request sent by the core network device. Register response.
- the device may further include:
- the first obtaining unit is used to obtain the first computing power certification data from the computing power certification data distribution agency corresponding to the terminal.
- the first registration response indicates that the terminal has been authenticated, the first registration response includes the terminal's unique identifier of the computing power node.
- the registration device As shown in Figure 11, the registration device according to the embodiment of the present application is applied to core network equipment and includes:
- the first receiving unit 1101 is used to receive the first registration request sent by the terminal.
- the first registration request is used to request the computing power registration and authentication of the terminal;
- the first sending unit 1102 is used to send the second registration to the computing power authentication device.
- request the second registration request is used to request computing power registration and computing power authentication for the terminal;
- the first processing unit 1103 is used to obtain the second registration response from the computing power authentication device, and according to The second registration response sends the first registration response to the terminal.
- the first sending unit is configured to send a second registration request to the computing power authentication device when the first indication is used to indicate that the terminal is a computing power node.
- the first registration response if the first registration response indicates that the terminal has been authenticated, the first registration response includes the terminal's unique identifier of the computing power node.
- the registration device As shown in Figure 12, the registration device according to the embodiment of the present application is applied to computing power authentication equipment, including:
- the first receiving unit 1201 is configured to receive a second registration request from the core network device.
- the second registration request is sent by the core network device after receiving the first registration request from the terminal.
- the first authentication unit 1202 is configured to receive the second registration request based on the second registration request.
- the registration request authenticates the terminal and obtains the authentication result;
- the first sending unit 1203 is used to send a second registration response to the core network device, and the second registration response includes the authentication result; wherein the first registration request is used to request calculation of the terminal.
- Power registration and authentication, the second registration request is used to request computing power registration and computing power certification for the terminal.
- the first authentication unit includes:
- the acquisition subunit is used to obtain the second computing power authentication data of the terminal according to the terminal's identification; the first authentication subunit is used to compare the first computing power authentication data and the second computing power authentication data to obtain the authentication result.
- the second registration request includes the identification of the terminal, the first computing power authentication data, and the computing power node capability parameters of the terminal;
- the first authentication unit includes:
- the first acquisition subunit is used to obtain the second computing power authentication data of the terminal according to the terminal's identification; the second authentication subunit is used to compare the first computing power authentication data and the second computing power authentication data;
- the second acquisition subunit is used to match the first computing power authentication data and the second computing power authentication data.
- the terminal is authenticated based on the terminal's computing power node capability parameters and the authentication result is obtained.
- the computing power authentication device includes a computing power network management center; the acquisition subunit includes:
- the first determination module is used to determine the computing power certification data distribution agency corresponding to the terminal according to the terminal's identification; the first acquisition module is used to obtain the second computing power certification data of the terminal from the computing power certification data distribution agency corresponding to the terminal. .
- the second registration request also includes: a third indication, used to indicate the information of the computing power certification data distribution agency corresponding to the terminal; a first determination module, used to determine the terminal based on the terminal's identification and the third indication. The corresponding computing power certification data distribution agency.
- the first determination module is used to determine the computing power certification data distribution mechanism corresponding to the terminal based on the identification of the terminal and the target correspondence stored in the computing power network management center;
- the target correspondence is the correspondence between the identification of the terminal and the computing power certification data distribution agency.
- the first acquisition module includes:
- the first sending sub-module is used to send a first query request to the computing power certification data distribution agency corresponding to the terminal; the first receiving sub-module is used to receive the second computing power certification data sent by the computing power certification data distribution agency corresponding to the terminal. .
- the second registration response includes the terminal's computing power node unique identifier.
- the device may further include:
- the first acquisition unit is used to obtain the third computing power certification data of the terminal from the computing power certification data distribution agency, where the third computing power certification data is the updated computing power certification data.
- the registration device of the embodiment of the present application is applied to the computing power certification data distribution agency, including:
- the first receiving unit 1301 is used to receive the first query request from the computing power network management center; the first sending unit 1302 is used to send the second computing power authentication data of the terminal to the computing power network management center according to the first query request, Used to authenticate terminals;
- the first query request is sent by the computing power network management center after receiving the second registration request from the core network device, and the second registration request is sent by the core network device after receiving the first registration request from the terminal; the first registration request The request is used to request the computing power registration and authentication of the terminal, and the second registration request is used to request the computing power registration and computing power authentication of the terminal.
- the device may further include:
- the second sending unit is used to send the third computing power authentication data of the terminal to the computing power network management center, where the third computing power authentication data is the updated computing power authentication data.
- the device may further include:
- the third sending unit is used to send the first computing power authentication data to the terminal, and store the corresponding relationship between the terminal and the first computing power authentication data.
- the device may further include:
- the first processing unit is used to manage all or part of the computing power certification data of the terminal.
- each functional unit in each embodiment of the present application can be integrated into one processing unit, each unit can exist physically alone, or two or more units can be integrated into one unit.
- the above integrated units can be implemented in the form of hardware or software functional units.
- the integrated unit may be stored in a processor-readable storage medium if it is implemented in the form of a software functional unit and sold or used as an independent product.
- the technical solution of the present application is essentially or contributes to the relevant technology, or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, It includes several instructions to cause a computer device (which can be a personal computer, a server, or a network device, etc.) or a processor to execute all or part of the steps of the methods of various embodiments of the present application.
- the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, Various media that can store program code such as RAM), magnetic disks or optical disks.
- Embodiments of the present application also provide a processor-readable storage medium.
- a program is stored on the readable storage medium.
- the program is executed by the processor, each process of the above-mentioned registration method embodiment is implemented, and the same technical effect can be achieved. To avoid repetition, we will not go into details here.
- the readable storage medium may be any available medium or data storage device that the processor can access, including but not limited to magnetic storage (such as floppy disks, hard disks, magnetic tapes, magneto-optical disks (Magneto-Optical, MO), etc.), Optical storage (such as Compact Disk (CD), Digital Video Disc (DVD), Blu-ray Disc (BD), High-Definition Versatile Disc (HVD), etc.), and Semiconductor memories (such as Read-Only Memory (ROM), Erasable Programmable Read-Only Memory (EPROM), Electrically Erasable Programmable Read Only Memory, EEPROM), non-volatile memory (NAND FLASH), solid state drive (Solid State Disk, SSD)), etc.
- magnetic storage such as floppy disks, hard disks, magnetic tapes, magneto-optical disks (Magneto-Optical, MO), etc.
- Optical storage such as Compact Disk (CD), Digital Video Disc (DVD), Blu-ray Disc (BD
- embodiments of the present application may be provided as methods, systems, or computer program products. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment that combines software and hardware aspects. Furthermore, the present application may take the form of a computer program product implemented on one or more computer-usable storage media (including, but not limited to, magnetic disk storage and optical storage, etc.) embodying computer-usable program code therein.
- a computer-usable storage media including, but not limited to, magnetic disk storage and optical storage, etc.
- processor-executable instructions may also be stored in a processor-readable memory that causes a computer or other programmable data processing apparatus to operate in a particular manner, such that the generation of instructions stored in the processor-readable memory includes the manufacture of the instruction means product, the instruction device implements the function specified in one process or multiple processes in the flow chart and/or one block or multiple blocks in the block diagram.
- processor-executable instructions may also be loaded onto a computer or other programmable data processing device, causing a series of operational steps to be performed on the computer or other programmable device to produce computer-implemented processing, thereby causing the computer or other programmable device to
- the instructions that are executed provide steps for implementing the functions specified in a process or processes of the flowchart diagrams and/or a block or blocks of the block diagrams.
- each module above is only a division of logical functions. In actual implementation, it can be fully or partially integrated into a physical entity, or it can also be physically separated.
- these modules can all be implemented in the form of software calling through processing components; they can also all be implemented in the form of hardware; some modules can also be implemented in the form of software calling through processing components, and some modules can be implemented in the form of hardware.
- the determination module can be a separate processing element, or can be integrated into a chip of the above device.
- it can also be stored in the memory of the above device in the form of program code, and can be processed by a certain processing element of the above device. Call and execute the functions of the above identified modules.
- the implementation of other modules is similar.
- each step of the above method or each of the above modules can be completed by instructions in the form of hardware integrated logic circuits or software in the processor element.
- each module, unit, sub-unit or sub-module may be one or more integrated circuits configured to implement the above method, such as: one or more application specific integrated circuits (Application Specific Integrated Circuit, ASIC), or one or Multiple microprocessors (digital signal processor, DSP), or one or more field programmable gate arrays (Field Programmable Gate Array, FPGA), etc.
- ASIC Application Specific Integrated Circuit
- DSP digital signal processor
- FPGA Field Programmable Gate Array
- the processing element can be a general-purpose processor, such as a central processing unit (Central Processing Unit, CPU) or other processors that can call the program code.
- these modules can be integrated together and implemented in the form of a system-on-a-chip (SOC).
- SOC system-on-a-chip
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Sources (AREA)
- Telephonic Communication Services (AREA)
Abstract
本申请公开了一种注册方法、装置及可读存储介质,涉及通信技术领域。该方法包括:终端向核心网设备发送第一注册请求,所述第一注册请求用于请求对终端进行算力注册和认证;所述终端接收所述核心网设备发送的第一注册响应。
Description
相关申请的交叉引用
本申请主张在2022年09月13日在中国提交的中国专利申请号No.202211119073.3的优先权,其全部内容通过引用包含于此。
本申请涉及通信技术领域,尤其涉及一种注册方法、装置及可读存储介质。
在算力资源被算力网络管理中心纳管之前,需要首先进行算力注册和算力认证,认证通过后的资源才能被算力网络管理中心进行管理及进行后续的算力编排调度。
当前的算力网络主要面向承载网,其算力注册流程主要针对物理服务器、虚拟机、容器、异构硬件等资源进行注册。但是,相关技术中并没有关于如何对终端进行算力注册和算力认证的方案。
发明内容
本申请实施例提供一种注册方法、装置及可读存储介质,以能够利用终端提供算力服务。
第一方面,本申请实施例提供了一种注册方法,包括:
终端向核心网设备发送第一注册请求,所述第一注册请求用于请求对所述终端进行算力注册和算力认证;
所述终端接收所述核心网设备发送的第一注册响应。
在一些实施例中,所述第一注册请求包括:
第一指示,用于指示所述终端是否为算力节点;
第一算力认证数据,用于确定所述终端是否为合法的算力节点。
在一些实施例中,所述第一注册请求还包括以下一项或者多项:
第二指示,用于指示所述终端对应的算力认证数据分配机构的信息;
所述终端的算力节点能力参数,用于在认证过程中确定所述终端是否为可用的算力节点,以及,在算力注册和算力认证成功后确定所述终端具备的算力能力。
在一些实施例中,所述第一算力认证数据包括:证书机构(Certification Authority,CA)证书或令牌(Token);或者
所述终端的算力节点能力参数,包括以下一项或者多项:算力节点类型、算力大小、算力节点位置、算力节点上部署的算力服务。
在一些实施例中,在所述终端向核心网设备发送第一注册请求之前,所述方法还包括:
所述终端从所述终端对应的算力认证数据分配机构获取所述第一算力认证数据。
在一些实施例中,若所述第一注册响应表示通过对所述终端的认证,所述第一注册响应中包括所述终端的算力节点唯一标识。
第二方面,本申请实施例提供了一种注册方法,包括:
核心网设备接收终端发送的第一注册请求,所述第一注册请求用于请求对所述终端进行算力注册和算力认证;
所述核心网设备向算力认证设备发送第二注册请求,所述第二注册请求用于请求对所述终端进行算力注册和算力认证;
所述核心网设备从所述算力认证设备获取第二注册响应,并根据所述第二注册响应向所述终端发送第一注册响应。
在一些实施例中,所述第一注册请求包括:
第一指示,用于指示所述终端是否为算力节点;
第一算力认证数据,用于确定所述终端是否为合法的算力节点。
在一些实施例中,所述第一注册请求还包括以下一项或者多项:
第二指示,用于指示所述终端对应的算力认证数据分配机构的信息;
所述终端的算力节点能力参数,用于在认证过程中确定所述终端是否为可用的算力节点,以及,在算力注册和算力认证成功后确定所述终端具备的算力能力。
在一些实施例中,所述核心网设备向算力认证设备发送第二注册请求,包括:
在所述第一指示用于指示所述终端为算力节点的情况下,所述核心网设备向算力认证设备发送第二注册请求。
在一些实施例中,所述第二注册请求包括所述终端的标识、所述第一算力认证数据。
在一些实施例中,所述第二注册请求还包括以下一项或者多项:
第三指示,用于指示所述终端对应的算力认证数据分配机构的信息;
所述终端的算力节点能力参数。
在一些实施例中,若所述第一注册响应表示通过对所述终端的认证,所述第一注册响应中包括所述终端的算力节点唯一标识。
第三方面,本申请实施例提供了一种注册方法,包括:
算力认证设备接收核心网设备的第二注册请求,所述第二注册请求是所述核心网设备在接收到终端的第一注册请求后发送的;
所述算力认证设备根据所述第二注册请求对所述终端进行认证,得到认证结果;
所述算力认证设备向所述核心网设备发送第二注册响应,所述第二注册响应包括所述认证结果;
其中,所述第一注册请求用于请求对所述终端进行算力注册和算力认证,所述第二注册请求用于请求对所述终端进行算力注册和算力认证。
在一些实施例中,所述第二注册请求包括所述终端的标识、所述第一算力认证数据;
所述算力认证设备根据所述第二注册请求对所述终端进行认证,得到认证结果,包括:
所述算力认证设备根据所述终端的标识获取所述终端的第二算力认证数据;
所述算力认证设备将所述第一算力认证数据和所述第二算力认证数据进行比较,得到所述认证结果。
在一些实施例中,所述第二注册请求包括所述终端的标识、所述第一算
力认证数据、所述终端的算力节点能力参数;
所述算力认证设备根据所述第二注册请求对所述终端进行认证,得到认证结果,包括:
所述算力认证设备根据所述终端的标识获取所述终端的第二算力认证数据;所述算力认证设备将所述第一算力认证数据和所述第二算力认证数据进行比较;
在所述第一算力认证数据和所述第二算力认证数据匹配的情况下,所述算力认证设备根据所述终端算力节点能力参数对所述终端进行认证,得到认证结果。
在一些实施例中,所述算力认证设备包括算力网络管理中心;
所述算力认证设备根据所述终端的标识获取所述终端的第二算力认证数据,包括:
所述算力网络管理中心根据所述终端的标识,确定所述终端对应的算力认证数据分配机构;
所述算力网络管理中心从所述终端对应的算力认证数据分配机构,获取所述终端的第二算力认证数据。
在一些实施例中,所述第二注册请求还包括:第三指示,用于指示所述终端对应的算力认证数据分配机构的信息;
所述算力网络管理中心根据所述终端的标识确定所述终端对应的算力认证数据分配机构,包括:
所述算力网络管理中心根据所述终端的标识以及所述第三指示,确定所述终端对应的算力认证数据分配机构。
在一些实施例中,所述算力网络管理中心根据所述终端的标识确定所述终端对应的算力认证数据分配机构,包括:
所述算力网络管理中心根据所述终端的标识以及算力网络管理中心存储的目标对应关系,确定所述终端对应的算力认证数据分配机构;
其中,所述目标对应关系为终端的标识与算力认证数据分配机构的对应关系。
在一些实施例中,所述算力网络管理中心从所述终端对应的算力认证数
据分配机构,获取所述终端的第二算力认证数据,包括:
所述算力网络管理中心向所述终端对应的算力认证数据分配机构发送第一查询请求;
所述算力网络管理中心接收所述终端对应的算力认证数据分配机构发送的所述第二算力认证数据。
在一些实施例中,若所述算力认证设备通过对所述终端的认证,所述第二注册响应中包括所述终端的算力节点唯一标识。
在一些实施例中,所述方法还包括:
所述算力网络管理中心从所述算力认证数据分配机构获取所述终端的第三算力认证数据,所述第三算力认证数据为更新的算力认证数据。
第四方面,本申请实施例提供了一种注册方法,包括:
算力认证数据分配机构接收算力网络管理中心的第一查询请求;
所述算力认证数据分配机构根据所述第一查询请求,向所述算力网络管理中心发送终端的第二算力认证数据,用于对所述终端进行认证;
其中,所述第一查询请求是所述算力网络管理中心接收到核心网设备的第二注册请求后发送的,所述第二注册请求是所述核心网设备在接收到终端的第一注册请求后发送的;所述第一注册请求用于请求对所述终端进行算力注册和算力认证,所述第二注册请求用于请求对所述终端进行算力注册和算力认证。
在一些实施例中,所述方法还包括:
所述算力认证数据分配机构向所述算力网络管理中心发送所述终端的第三算力认证数据,所述第三算力认证数据为更新的算力认证数据。
在一些实施例中,所述方法还包括:
所述算力认证数据分配机构向所述终端发送第一算力认证数据,并存储所述终端和所述第一算力认证数据的对应关系。
在一些实施例中,所述方法还包括:
所述算力认证数据分配机构对所述终端的全部或部分算力认证数据进行管理。
第五方面,本申请实施例提供了一种注册装置,应用于终端,包括:存
储器,收发机,处理器:
存储器,用于存储计算机程序;收发机,用于在所述处理器的控制下收发数据;处理器,用于读取所述存储器中的计算机程序并执行以下操作:
向核心网设备发送第一注册请求,所述第一注册请求用于请求对所述终端进行算力注册和算力认证;
接收所述核心网设备发送的第一注册响应。
第六方面,本申请实施例提供了一种注册装置,应用于核心网设备,包括:存储器,收发机,处理器:
存储器,用于存储计算机程序;收发机,用于在所述处理器的控制下收发数据;处理器,用于读取所述存储器中的计算机程序并执行以下操作:
接收终端发送的第一注册请求,所述第一注册请求用于请求对所述终端进行算力注册和算力认证;
向算力认证设备发送第二注册请求,所述第二注册请求用于请求对所述终端进行算力注册和算力认证;
从所述算力认证设备获取第二注册响应,并根据所述第二注册响应向所述终端发送第一注册响应。
第七方面,本申请实施例提供了一种注册装置,应用于算力认证设备,包括:存储器,收发机,处理器:
存储器,用于存储计算机程序;收发机,用于在所述处理器的控制下收发数据;处理器,用于读取所述存储器中的计算机程序并执行以下操作:
接收核心网设备的第二注册请求,所述第二注册请求是所述核心网设备在接收到终端的第一注册请求后发送的;
根据所述第二注册请求对所述终端进行认证,得到认证结果;
向所述核心网设备发送第二注册响应,所述第二注册响应包括所述认证结果;
其中,所述第一注册请求用于请求对所述终端进行算力注册和算力认证,所述第二注册请求用于请求对所述终端进行算力注册和算力认证。
第八方面,本申请实施例提供了一种注册装置,应用于算力认证数据分配机构,包括:存储器,收发机,处理器:
存储器,用于存储计算机程序;收发机,用于在所述处理器的控制下收发数据;处理器,用于读取所述存储器中的计算机程序并执行以下操作:
接收算力网络管理中心的第一查询请求;
根据所述第一查询请求,向所述算力网络管理中心发送终端的第二算力认证数据,用于对所述终端进行认证;
其中,所述第一查询请求是所述算力网络管理中心接收到核心网设备的第二注册请求后发送的,所述第二注册请求是所述核心网设备在接收到终端的第一注册请求后发送的;所述第一注册请求用于请求对终端进行算力注册和算力认证,所述第二注册请求用于请求对所述终端进行算力注册和算力认证。
第九方面,本申请实施例提供了一种注册装置,应用于终端,包括:
第一发送单元,用于向核心网设备发送第一注册请求,所述第一注册请求用于请求对终端进行算力注册和算力认证;
第一接收单元,用于接收所述核心网设备发送的第一注册响应。
第十方面,本申请实施例提供了一种注册装置,应用于核心网设备,包括:
第一接收单元,用于接收终端发送的第一注册请求,所述第一注册请求用于请求对终端进行算力注册和算力认证;
第一发送单元,用于向算力认证设备发送第二注册请求,所述第二注册请求用于请求对所述终端进行算力注册和算力认证;
第一处理单元,用于从所述算力认证设备获取第二注册响应,并根据所述第二注册响应向所述终端发送第一注册响应。
第十一方面,本申请实施例提供了一种注册装置,应用于算力认证设备,包括:
第一接收单元,用于接收核心网设备的第二注册请求,所述第二注册请求是所述核心网设备在接收到终端的第一注册请求后发送的;
第一认证单元,用于根据所述第二注册请求对所述终端进行认证,得到认证结果;
第一发送单元,用于向所述核心网设备发送第二注册响应,所述第二注
册响应包括所述认证结果;
其中,所述第一注册请求用于请求对终端进行算力注册和算力认证,所述第二注册请求用于请求对所述终端进行算力注册和算力认证。
第十二方面,本申请实施例提供了一种注册装置,应用于算力认证数据分配机构,包括:
第一接收单元,用于接收算力网络管理中心的第一查询请求;
第一发送单元,用于根据所述第一查询请求,向所述算力网络管理中心发送终端的第二算力认证数据,用于对所述终端进行认证;
其中,所述第一查询请求是所述算力网络管理中心接收到核心网设备的第二注册请求后发送的,所述第二注册请求是所述核心网设备在接收到终端的第一注册请求后发送的;所述第一注册请求用于请求对终端进行算力注册和算力认证,所述第二注册请求用于请求对所述终端进行算力注册和算力认证。
第十三方面,本申请实施例还提供一种处理器可读存储介质,所述可读存储介质上存储计算机程序,所述计算机程序被处理器执行时实现如上所述的注册方法中的步骤。
在本申请实施例中,可对终端进行算力注册和算力认证,从而能够利用终端提供算力服务。
图1是本申请实施例提供的注册方法的流程图之一;
图2是本申请实施例提供的注册方法的流程图之二;
图3是本申请实施例提供的注册方法的流程图之三;
图4是本申请实施例提供的注册方法的流程图之四;
图5是本申请实施例提供的注册方法的流程图之五;
图6是本申请实施例提供的注册装置的结构图之一;
图7是本申请实施例提供的注册装置的结构图之二;
图8是本申请实施例提供的注册装置的结构图之三;
图9是本申请实施例提供的注册装置的结构图之四;
图10是本申请实施例提供的注册装置的结构图之五;
图11是本申请实施例提供的注册装置的结构图之六;
图12是本申请实施例提供的注册装置的结构图之七;
图13是本申请实施例提供的注册装置的结构图之八。
本申请实施例中术语“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。字符“/”一般表示前后关联对象是一种“或”的关系。
本申请实施例中术语“多个”是指两个或两个以上,其它量词与之类似。
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,并不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请实施例提供了一种注册方法及装置,用以能够利用终端提供算力服务。
其中,方法和装置是基于同一申请构思的,由于方法和装置解决问题的原理相似,因此装置和方法的实施可以相互参见,重复之处不再赘述。
参见图1,图1是本申请实施例提供的注册方法的流程图,如图1所示,包括以下步骤:
步骤101、终端向核心网设备发送第一注册请求,第一注册请求用于请求对终端进行算力注册和算力认证。
其中,第一注册请求包括:
第一指示,用于指示终端是否为算力节点;第一算力认证数据,用于确定所述终端是否为合法的算力节点。
具体的,在本申请实施例中,主要是利用第一注册请求中的第一指示来指示终端是否为算力节点。其中,算力节点指的是能够为外界提供算力服务的节点。在本申请实施例中并不对第一指示的具体实现进行限定。例如,可通过第一注册请求的某个字段携带该第一指示。若该字段的取值为“是”,表
示终端为算力节点;若该字段的取值为“否”,表示该终端不是算力节点。
其中,“合法的算力节点”可以理解为通过算力认证数据分配机构的认证的算力节点。若通过算力认证数据分配机构认证的认证,算力认证数据可为终端分配算力认证数据,并将其发送给终端。相应的,终端可获得该算力认证数据。该算力认证数据可作为在此的第一算力认证数据,以由算力认证设备等来确定终端是否为合法的算力节点。需要说明的是,在本申请实施例中并不对算力认证数据分配机构的认证方法进行限定。
其中,第一算力认证数据包括:CA证书或Token。该第一算力认证数据可以是终端从终端对应的算力认证数据分配机构获取的。一个终端可对应一个或多个算力认证数据分配机构。相应的,本申请实施例还可包括:终端从终端对应的算力认证数据分配机构获取第一算力认证数据。
例如,终端可向该算力认证数据分配机构发送请求,以获得第一算力认证数据。其中,该算力认证数据分配机构可生成终端的算力认证数据,并存储终端标识和算力认证数据的对应关系。因此,当接收到终端的请求时,该算力认证数据分配机构可根据终端的请求中携带的终端标识和该对应关系获取该终端的第一算力认证数据。
在一些实施例中,第一注册请求还包括以下一项或者多项:
第二指示,用于指示终端对应的算力认证数据分配机构的信息;终端的算力节点能力参数,用于在认证过程中确定所述终端是否为可用的算力节点,以及,在算力注册和算力认证成功后确定终端具备的算力能力。
例如,第二指示可用于指示终端对应的算力认证数据分配机构的标识等。终端的算力节点能力参数,包括以下一项或者多项:算力节点类型、算力大小、算力节点位置、算力节点上部署的算力服务等。
其中,“可用的算力节点”可以理解为已通过算力认证数据分配机构认证的终端的算力能力是否满足算力认证设备对算力节点的要求,或者,也可以理解为已通过算力认证数据分配机构认证的终端是否能够真正的作为算力节点。
例如,假设算力认证设备要求的算力节点类型为A,若终端的算力节点类型为B,那么,可认为终端的算力节点类型不符合算力认证设备的要求,
从而无法作为可用的算力节点;若终端的算力节点类型为A,那么,可认为终端的算力节点类型符合算力认证设备的要求,可以作为可用的算力节点,或者,还可结合其他信息对其进行进一步的判断。
需要说明的是,第一注册请求中所携带的信息还可根据需要进行一定的扩展,各个信息所包括的具体的内容也可根据需要进行一定的扩展。
其中,该核心网设备可以指的通过某个具体的设备来实现本方案的目的,也可以通过某个设备中的模块或者单元来实现本方案的目的。例如,该核心网设备例如可以包括接入和移动管理功能(Access and Mobility Management Function,AMF)等。
在核心网设备接收到该第一注册请求后,若根据该第一注册请求确定终端为算力节点,核心网设备可请求算力认证设备对终端进行算力认证。
步骤102、终端接收核心网设备发送的第一注册响应。
第一注册响应是核心网设备根据算力认证设备的第二注册响应形成的,其中,第二注册响应包括算力认证设备对终端的认证结果。相应的,第一注册响应可以携带上述认证结果。
具体的,第一注册响应可表示认证通过或者认证不通过。若第一注册响应表示通过对终端的认证,第一注册响应中包括终端的算力节点唯一标识。其中,该算力节点唯一标识用于唯一标识该终端为算力节点,是核心网设备从算力认证设备获得的。若第一注册响应表示不通过对终端的认证,第一注册响应还可包括相应的原因。
在本申请实施例中,可对终端进行算力注册和算力认证,从而能够利用终端提供算力服务。
参见图2,图2是本申请实施例提供的注册方法的流程图,如图2所示,包括以下步骤:
步骤201、核心网设备接收终端发送的第一注册请求,第一注册请求用于请求对终端进行算力注册和算力认证。
其中,该第一注册请求所包括的内容和其含义可参照前述方法实施例的描述。
步骤202、核心网设备向算力认证设备发送第二注册请求,第二注册请
求用于请求对终端进行算力注册和算力认证。
在此步骤中,核心网设备根据第一注册请求中的第一指示确定终端是否为算力节点。若第一指示表示终端为算力节点,则核心网设备向算力认证设备发送第二注册请求,执行后续的算力注册和算力认证流程;否则,可按照正常的终端注册流程处理。
其中,第二注册请求包括终端的标识、第一算力认证数据。在一些实施例中,为便于算力认证设备获取终端的认证数据并进行认证,第二注册请求还包括以下一项或者多项:
第三指示,用于指示终端对应的算力认证数据分配机构的信息;终端的算力节点能力参数。
例如,第三指示可用于指示终端对应的算力认证数据分配机构的标识等。终端的算力节点能力参数,包括以下一项或者多项:算力节点类型、算力大小、算力节点位置、算力节点上部署的算力服务。
步骤203、核心网设备从算力认证设备获取第二注册响应,并根据第二注册响应向终端发送第一注册响应。
其中,第二注册响应可表示认证通过或者认证不通过。若第二注册响应表示通过对终端的认证,第二注册响应中包括终端的算力节点唯一标识。若第二注册响应表示不通过对终端的认证,第二注册响应还可包括相应的原因。相应的,核心网设备根据该第二注册响应,形成该第一注册响应,并向终端发送该第一注册响应。
在本申请实施例中,可对终端进行算力注册和算力认证,从而能够利用终端提供算力服务。
参见图3,图3是本申请实施例提供的注册方法的流程图,如图3所示,包括以下步骤:
步骤301、算力认证设备接收核心网设备的第二注册请求,第二注册请求是核心网设备在接收到终端的第一注册请求后发送的。
其中,第一注册请求用于请求对终端进行算力注册和算力认证,第二注册请求用于请求对终端进行算力注册和算力认证。
其中,第一注册请求、第二注册请求所包括的内容和含义可参照前述方
法实施例的描述。
步骤302、算力认证设备根据第二注册请求对终端进行认证,得到认证结果。
在此步骤中,若第二注册请求中包括终端的标识、第一算力认证数据,算力认证设备根据终端的标识获取终端的第二算力认证数据,并将第一算力认证数据和第二算力认证数据进行比较,得到认证结果。在此将二者进行比较的目的是为了确定终端为合法终端,以保证安全性。
例如,若第一算力认证数据和第二算力认证数据的匹配度满足预设值,则可通过对终端的认证,即认证结果为通过对终端的认证;否则可不通过对终端的认证。其中,该预设值可根据需要设置。
在此步骤中,若第二注册请求包括终端的标识、第一算力认证数据、终端的算力节点能力参数,算力认证设备根据终端的标识获取终端的第二算力认证数据,并将第一算力认证数据和第二算力认证数据进行比较;在第一算力认证数据和第二算力认证数据匹配的情况下,算力认证设备根据终端算力节点能力参数对终端进行认证,得到认证结果。具体的:
(1)算力认证设备将第一算力认证数据和第二算力认证数据进行比较。在此将二者进行比较的目的是为了确定终端为合法终端,以保证安全性。
具体的,算力认证设备可以在第一算力认证数据和第二算力认证数据的匹配度满足预设值时,认为第一算力认证数据和第二算力认证数据匹配,该终端为合法的终端。其中,该预设值可根据需要设置。
(2)在第一算力认证数据和第二算力认证数据匹配的情况下,算力认证设备根据终端算力节点能力参数对终端进行认证,得到认证结果。
在根据终端算力节点能力参数对终端进行认证时,认证方式取决于算力认证设备的具体实现。例如,算力认证设备可根据终端的算力节点类型确定是否认证通过。具体的,假设算力认证设备需要的算力节点类型为A类型,而终端的算力节点类型为B类型,那么,可确定对终端的认证不通过。又例如,设算力网络管理中心需要的算力节点需要位于C地,而终端的算力节点位置表示终端位于为C地,那么,可确定对终端的认证通过。
当然,在实际应用中还可结合以上终端算力节点能力参数中的多种信息
对终端进行认证,并在获得各个信息的认证结果后,采取一定的策略而获得最终的认证结果。例如,假设通过各个信息获得的认证结果中有一定比例的认证结果表示对终端的认证通过,那么,最终的认证结果为通过对终端的认证。其中,该比例可根据需要设置。
在本申请实施例中,该算力认证设备可以指的通过某个具体的设备来实现本方案的目的,也可以通过某个设备中的模块或者单元来实现本方案的目的。
具体的,在本申请实施例中,算力认证设备可以是一个独立的设备。此时,该算力认证设备用于对终端进行算力认证、存储终端的算力数据、对算力数据进行管理等。上述的认证过程由该算力认证设备执行。
或者,算力认证设备也可以为由多个设备而形成,例如,算力认证设备可包括算力网络管理中心和算力认证数据分配机构。其中,算力网络管理中心用于对终端进行算力认证,算力认证数据分配机构用于存储终端的算力数据、对算力数据进行管理等。在这种情况下,上述的认证过程由该算力网络管理中心执行。
在上述过程中,若算力认证设备是一个独立的设备,那么,算力认证设备可从自身获取第二认证数据。也即,算力认证设备存储终端标识与算力认证数据的对应关系。例如,算力认证设备可根据终端的标识以及终端标识与算力认证数据的对应关系,获取该终端的第二算力数据。
若算力认证设备包括算力网络管理中心,那么,算力网络管理中心从该终端对应的算力认证数据分配机构获取第二算力数据。
在算力网络管理中心从该终端对应的算力认证数据分配机构获取第二算力数据的过程中,算力网络管理中心可根据终端的标识,确定终端对应的算力认证数据分配机构,并获取第二算力数据。例如,算力网络管理中心本身可存储终端与算力认证数据分配机构的目标对应关系。算力网络管理中心根据终端的标识以及该目标对应关系,即可确定该终端对应的算力认证数据分配机构。
或者,在实际应用中,一个终端可对应有一个或多个算力认证数据分配中心。那么,为了更准确的确定终端对应的算力认证数据分配机构的信息,
在算力网络管理中心从该终端对应的算力认证数据分配机构获取第二算力数据的过程中,算力网络管理中心还可根据第二注册请求包括的第三指示以及终端的标识确定终端对应的算力认证数据分配机构,并从终端对应的算力认证数据分配机构获取第二算力数据。其中,第三指示用于指示终端对应的算力认证数据分配机构的信息。例如,算力网络管理中心可向终端对应的算力认证数据分配机构发送第一查询请求,并接收终端对应的算力认证数据分配机构发送的第二算力认证数据。
步骤303、算力认证设备向核心网设备发送第二注册响应,第二注册响应包括认证结果。
第二注册响应可表示认证通过或者认证不通过。若第二注册响应表示通过对终端的认证,第二注册响应中包括终端的算力节点唯一标识。若第二注册响应表示不通过对终端的认证,第二注册响应还可包括相应的原因。
通过上述过程,完成了对终端的算力认证,从而实现了终端的算力注册。此时,终端可作为算力节点提供算力服务。
在本申请实施例中,可对终端进行算力注册和算力认证,从而能够利用终端提供算力服务。
参见图4,图4是本申请实施例提供的注册方法的流程图,如图4所示,包括以下步骤:
步骤401、算力认证数据分配机构接收算力网络管理中心的第一查询请求;
步骤402、算力认证数据分配机构根据第一查询请求,向算力网络管理中心发送终端的第二算力认证数据,用于对终端进行认证;
其中,第一查询请求是算力网络管理中心接收到核心网设备的第二注册请求后发送的,第二注册请求是核心网设备在接收到终端的第一注册请求后发送的;第一注册请求用于请求对终端进行算力注册和认证,第二注册请求用于请求对终端进行算力注册和算力认证。
其中,第一查询请求是算力网络管理中心接收到核心网设备的第二注册请求后发送的,第二注册请求是核心网设备在接收到终端的第一注册请求后发送的。第一注册请求用于请求对终端进行算力注册和认证,第二注册请求
用于请求对终端进行算力注册和算力认证。
例如,该第一查询请求中可携带该终端的标识。算力认证数据分配机构可生成终端的算力认证数据,并存储终端标识与算力认证数据的对应关系。在接收到第一查询请求后,算力认证数据分配机构根据第一查询请求中携带的终端的标识以及该对应关系,即可确定该终端的算力认证数据。
在一些实施例中,算力认证数据分配机构还可向算力网络管理中心发送终端的第三算力认证数据,第三算力认证数据为更新的算力认证数据。例如,当终端的算力数据发生改变时,算力认证数据分配机构可向算力网络管理中心发送更新后的算力认证数据。
在一些实施例中,算力认证数据分配机构还可向终端发送第一算力认证数据,并存储终端和第一算力认证数据的对应关系。
在一些实施例中,算力认证数据分配机构对终端的全部或部分算力认证数据进行管理,包括算力认证数据的生成、变更、撤销等。在终端进行算力注册之前,终端向算力认证中心申请算力认证数据(如CA证书、Token等),算力认证中心为终端分配唯一的算力认证数据,并保存终端唯一标识与算力认证数据的对应关系。终端的算力认证数据变更时,算力认证中心向终端、算力网络管理中心同步变更数据。终端的算力认证数据失效时,算力认证中心向终端发送撤销通知,撤销为终端分配的算力认证数据,同时向算力网络管理中心发送算力认证数据失效通知。
在本申请实施例中,可对终端进行算力注册和算力认证,从而能够利用终端提供算力服务。
参见图5,图5是本申请实施例的算力注册及认证的过程示意图。其中,如图5所示,该算力注册和认证系统可包括算力节点(用户设备(User Equipment,UE)),核心网设备(AMF)、算力认证设备等。算力认证设备包括算力网络管理中心和算力认证中心(即算力认证数据分配机构)。在图5中,核心网设备以AMF为例。
UE主要用于发起注册请求;核心网设备在根据UE发起的注册请求确认UE为算力节点时,请求算力认证设备对UE进行算力注册和认证。
其中,算力认证中心为算力节点提供算力认证数据(如CA证书、Token
等)的管理。
算力网络管理中心为算力节点(UE)提供算力资源管理及算力编排调度服务(如算力注册、算力资源管理、算力监控、算力编排调度等)。
UE作为算力提供者,在成为算力网络管理中心的合法可信算力节点之前,向算力认证中心申请算力认证数据(如CA证书、Token等),算力认证中心为UE分配唯一的算力认证数据,并保存UE唯一标识与算力认证数据的对应关系。
其中,算力认证中心对算力认证数据进行全生命周期的管理,包括算力认证数据的生成、变更、撤销等。在UE进行算力注册之前,UE向算力认证中心申请算力认证数据(如CA证书、Token等),算力认证中心为UE分配唯一的算力认证数据,并保存UE唯一标识与算力认证数据的对应关系。UE的算力认证数据变更时,算力认证中心向UE、算力网络管理中心同步变更数据。UE的算力认证数据失效时,算力认证中心向UE发送撤销通知,撤销为UE分配的算力认证数据,同时向算力网络管理中心发送算力认证数据失效通知。
算力网络管理中心还可向算力认证中心订阅算力认证数据变更通知,当算力认证数据发生变化时,触发变更通知。
结合图5,该过程可包括:
步骤501、UE发起注册流程,UE向无线接入网络(Radio Access Network,RAN)发送注册请求,注册请求中包括该UE的算力信息。其中,该算力信息可包括:
(1)算力节点指示(即第一指示):指示该UE是否是算力节点。该算力节点指示的取值为“是”时,表示该UE是算力节点,AMF需要解析算力信息,并向算力网络管理中心发送算力注册请求;该算力节点指示的取值为“否”时,执行正常的UE注册流程。
其中,算力节点指示是算力节点自身的参数,可以是UE发起注册请求时配置,也可以在UE出厂时自带。
(2)算力认证数据(即第一算力认证数据):算力节点指示的取值为“是”时,即该UE是算力节点时,携带算力认证中心分配的算力认证数据;
(3)算力认证数据分配机构的信息:此参数赋值为分配算力认证数据的算力认证中心的唯一标识;
(4)算力节点能力参数:包括算力节点类型、算力大小、算力节点位置、算力节点上部署的算力服务等。
步骤502、RAN选择合适的AMF,并向AMF转发注册请求。
步骤503、AMF接收到注册请求后,结合鉴权服务功能(Authentication Server Function,AUSF)对UE的移动用户身份进行认证。
步骤504、UE身份认证通过的用户,AMF解析UE注册请求,根据算力节点指示,向算力网络管理中心提交算力注册请求。
其中,算力注册请求中携带:UE的唯一标识、算力认证数据(第一算力认证数据)、算力认证数据分配机构的信息、算力节点能力参数。
步骤505、算力网络管理中心根据算力注册请求中的UE的唯一标识,向算力认证中心查阅该UE的算力认证数据。
步骤506、算力认证中心通过UE的唯一标识检索保存的算力认证数据,并将结果(即第二算力认证数据)通过算力认证数据响应反馈给算力网络管理中心。
步骤507、算力网络管理中心对UE进行算力认证,主要包括几种方式:
第一种方式:算力节点的可信身份认证。即对第一算力认证数据与第二算力认证数据进行认证比对。
例如,若第一算力认证数据和第二算力认证数据的匹配度满足预设值,则可通过对终端的认证。其中,该预设值可根据需要设置。
第二种方式:算力节点的可用性判断。即对算力节点类型、算力节点位置、算力大小进行判断,判断该资源是否满足本算力网络管理中心的管理范围及管理要求。
其中,这种方式取决于算力网络管理中心的具体实现。例如,算力网络管理中心可根据终端的算力节点类型确定是否认证通过。具体的,假设算力网络管理中心需要的算力节点类型为A类型,而UE的算力节点类型为B类型,那么,可确定对终端的认证不通过。又例如,设算力网络管理中心需要的算力节点需要位于C地,而UE的算力节点位置表示UE位于C地,那么,
可确定对终端的认证通过。
当然,在实际应用中还可结合算力节点能力参数的多种信息对终端进行认证,并在通过各个信息获得的认证结果后,采取一定的策略而获得最终的认证结果。例如,假设通过各个信息获得的认证结果中有一定比例的认证结果表示对终端的认证通过,那么,最终的认证结果为通过对终端的认证。其中,该比例可根据需要设置。
第三种方式:第一种方式和第二种方式的结合。
在这种认证方式中,可结合两种方式认证的结果进行决策,例如,两种方式中有一种认证方式获得的结果表示认证通过,即可认为对终端的认证通过;两种方式中两种认证方式获得的结果均表示认证通过,即可认为对终端的认证通过等。
步骤508、算力网络管理中心向AMF反馈算力注册响应。
认证通过时,算力网络管理中心接受算力注册,为该UE分配算力节点唯一标识,并向AMF反馈算力注册响应,响应中携带分配的算力节点唯一标识;认证失败时,算力网络管理中心拒绝算力注册,并向AMF反馈算力注册响应,响应中携带拒绝注册的原因,如认证失败、资源类型不符、资源位置超出管理范围、算力大小不满足管理要求等等。
步骤508、AMF向UE反馈算力注册响应,完成UE在算力网络管理中心的算力注册流程。
在本申请实施例中,可对终端进行算力注册和算力认证,从而能够利用终端提供算力服务。
本申请实施例提供的技术方案可以适用于多种系统,尤其是第五代移动通信技术(5th Generation Mobile Communication Technology,5G)系统。例如适用的系统可以是全球移动通讯(global system of mobile communication,GSM)系统、码分多址(code division multiple access,CDMA)系统、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)通用分组无线业务(general packet radio service,GPRS)系统、长期演进(long term evolution,LTE)系统、LTE频分双工(frequency division duplex,FDD)系统、LTE时分双工(time division duplex,TDD)系统、高级长期演进(long term evolution
advanced,LTE-A)系统、通用移动系统(universal mobile telecommunication system,UMTS)、全球互联微波接入(worldwide interoperability for microwave access,WiMAX)系统、5G新空口(New Radio,NR)系统等。这多种系统中均包括终端设备和网络设备。系统中还可以包括核心网部分,例如演进的分组系统(Evolved Packet System,EPS)、5G系统(5G System,5GS)等。
本申请实施例涉及的终端设备,可以是指向用户提供语音和/或数据连通性的设备,具有无线连接功能的手持式设备、或连接到无线调制解调器的其他处理设备等。在不同的系统中,终端设备的名称可能也不相同,例如在5G系统中,终端设备可以称为用户设备(User Equipment,UE)。无线终端设备可以经无线接入网(Radio Access Network,RAN)与一个或多个核心网(Core Network,CN)进行通信,无线终端设备可以是移动终端设备,如移动电话(或称为“蜂窝”电话)和具有移动终端设备的计算机,例如,可以是便携式、袖珍式、手持式、计算机内置的或者车载的移动装置,它们与无线接入网交换语言和/或数据。例如,个人通信业务(Personal Communication Service,PCS)电话、无绳电话、会话发起协议(Session Initiated Protocol,SIP)话机、无线本地环路(Wireless Local Loop,WLL)站、个人数字助理(Personal Digital Assistant,PDA)等设备。无线终端设备也可以称为系统、订户单元(subscriber unit)、订户站(subscriber station),移动站(mobile station)、移动台(mobile)、远程站(remote station)、接入点(access point)、远程终端设备(remote terminal)、接入终端设备(access terminal)、用户终端设备(user terminal)、用户代理(user agent)、用户装置(user device),本申请实施例中并不限定。
如图6所示,本申请实施例的注册装置,应用于核心网设备,包括:处理器600,用于读取存储器620中的程序,执行下列过程:
接收终端发送的第一注册请求,第一注册请求用于请求对终端进行算力注册和认证;
向算力认证设备发送第二注册请求,第二注册请求用于请求对终端进行算力注册和算力认证;
从算力认证设备获取第二注册响应,并根据第二注册响应向终端发送第一注册响应。
收发机610,用于在处理器600的控制下接收和发送数据。
其中,在图6中,总线架构可以包括任意数量的互联的总线和桥,具体由处理器600代表的一个或多个处理器和存储器620代表的存储器的各种电路链接在一起。总线架构还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路链接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口提供接口。收发机610可以是多个元件,即包括发送机和接收机,提供用于在传输介质上与各种其他装置通信的单元。处理器600负责管理总线架构和通常的处理,存储器620可以存储处理器600在执行操作时所使用的数据。
处理器600可以是中央处理器(Central Processing Unit,CPU)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)或复杂可编程逻辑器件(Complex Programmable Logic Device,CPLD),处理器也可以采用多核架构。
处理器600负责管理总线架构和通常的处理,存储器620可以存储处理器600在执行操作时所使用的数据。
在一些实施例中,第一注册请求包括:
第一指示,用于指示终端是否为算力节点;
第一算力认证数据,用于确定所述终端是否为合法的算力节点。
在一些实施例中,第一注册请求还包括以下一项或者多项:
第二指示,用于指示终端对应的算力认证数据分配机构的信息;
终端的算力节点能力参数,用于在认证过程中确定终端是否为可用的算力节点,以及,在算力注册和算力认证成功后确定终端具备的算力能力。
在一些实施例中,第二注册请求包括终端的标识、第一算力认证数据。
在一些实施例中,处理器600,用于读取存储器620中的程序,执行下列过程:
在第一指示用于指示终端为算力节点的情况下,向算力认证设备发送第二注册请求。
在一些实施例中,第二注册请求还包括以下一项或者多项:
第三指示,用于指示终端对应的算力认证数据分配机构的信息;
终端的算力节点能力参数。
在一些实施例中,若第一注册响应表示通过对终端的认证,第一注册响应中包括终端的算力节点唯一标识。
在此需要说明的是,本申请实施例提供的上述装置,能够实现上述方法实施例中核心网设备所实现的所有方法步骤,且能够达到相同的技术效果,在此不再对本实施例中与方法实施例相同的部分及有益效果进行具体赘述。
如图7所示,本申请实施例的注册装置,应用于算力认证设备,包括:处理器700,用于读取存储器720中的程序,执行下列过程:
接收核心网设备的第二注册请求,第二注册请求是核心网设备在接收到终端的第一注册请求后发送的;
根据第二注册请求对终端进行认证,得到认证结果;
向核心网设备发送第二注册响应,第二注册响应包括认证结果;
其中,第一注册请求用于请求对终端进行算力注册和认证,第二注册请求用于请求对终端进行算力注册和算力认证。
收发机710,用于在处理器700的控制下接收和发送数据。
其中,在图7中,总线架构可以包括任意数量的互联的总线和桥,具体由处理器700代表的一个或多个处理器和存储器720代表的存储器的各种电路链接在一起。总线架构还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路链接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口提供接口。收发机710可以是多个元件,即包括发送机和接收机,提供用于在传输介质上与各种其他装置通信的单元。处理器700负责管理总线架构和通常的处理,存储器720可以存储处理器700在执行操作时所使用的数据。
处理器700可以是中央处理器(CPU)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)或复杂可编程逻辑器件(Complex Programmable Logic Device,CPLD),处理器也可以采用多核架构。
处理器700负责管理总线架构和通常的处理,存储器720可以存储处理器700在执行操作时所使用的数据。
第二注册请求包括终端的标识、第一算力认证数据;处理器700,用于读取存储器720中的程序,执行下列过程:
根据终端的标识获取终端的第二算力认证数据;
将第一算力认证数据和第二算力认证数据进行比较,得到认证结果。
第二注册请求包括终端的标识、第一算力认证数据、终端的算力节点能力参数;处理器700,用于读取存储器720中的程序,执行下列过程:
根据终端的标识获取终端的第二算力认证数据;将第一算力认证数据和第二算力认证数据进行比较;在第一算力认证数据和第二算力认证数据匹配的情况下,根据终端算力节点能力参数对终端进行认证,得到认证结果。
在一些实施例中,算力认证设备包括算力网络管理中心;处理器700,用于读取存储器720中的程序,执行下列过程:
根据终端的标识,确定终端对应的算力认证数据分配机构;
从终端对应的算力认证数据分配机构,获取终端的第二算力认证数据。
在一些实施例中,第二注册请求还包括:第三指示,用于指示终端对应的算力认证数据分配机构的信息;处理器700,用于读取存储器720中的程序,执行下列过程:
根据终端的标识以及第三指示,确定终端对应的算力认证数据分配机构。
处理器700,用于读取存储器720中的程序,执行下列过程:
根据终端的标识以及算力网络管理中心存储的目标对应关系,确定终端对应的算力认证数据分配机构;
其中,目标对应关系为终端的标识与算力认证数据分配机构的对应关系。
处理器700,用于读取存储器720中的程序,执行下列过程:
向终端对应的算力认证数据分配机构发送第一查询请求;
接收终端对应的算力认证数据分配机构发送的第二算力认证数据。
在一些实施例中,若算力认证设备通过对终端的认证,第二注册响应中包括终端的算力节点唯一标识。
处理器700,用于读取存储器720中的程序,执行下列过程:
从算力认证数据分配机构获取终端的第三算力认证数据,第三算力认证数据为更新的算力认证数据。
在此需要说明的是,本申请实施例提供的上述装置,能够实现上述方法实施例中算力认证设备所实现的所有方法步骤,且能够达到相同的技术效果,在此不再对本实施例中与方法实施例相同的部分及有益效果进行具体赘述。
如图8所示,本申请实施例的注册装置,应用于算力认证数据分配机构,包括:处理器800,用于读取存储器820中的程序,执行下列过程:
接收算力网络管理中心的第一查询请求;
根据第一查询请求,向算力网络管理中心发送终端的第二算力认证数据,用于对终端进行认证;
其中,第一查询请求是算力网络管理中心接收到核心网设备的第二注册请求后发送的,第二注册请求是核心网设备在接收到终端的第一注册请求后发送的;第一注册请求用于请求对终端进行算力注册和认证,第二注册请求用于请求对终端进行算力注册和算力认证。
收发机810,用于在处理器800的控制下接收和发送数据。
其中,在图8中,总线架构可以包括任意数量的互联的总线和桥,具体由处理器800代表的一个或多个处理器和存储器820代表的存储器的各种电路链接在一起。总线架构还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路链接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口提供接口。收发机810可以是多个元件,即包括发送机和接收机,提供用于在传输介质上与各种其他装置通信的单元。处理器800负责管理总线架构和通常的处理,存储器820可以存储处理器800在执行操作时所使用的数据。
处理器800可以是中央处理器(CPU)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)或复杂可编程逻辑器件(Complex Programmable Logic Device,CPLD),处理器也可以采用多核架构。
处理器800负责管理总线架构和通常的处理,存储器820可以存储处理器800在执行操作时所使用的数据。
处理器800,用于读取存储器820中的程序,执行下列过程:
向算力网络管理中心发送终端的第三算力认证数据,第三算力认证数据
为更新的算力认证数据。
处理器800,用于读取存储器820中的程序,执行下列过程:
向终端发送第一算力认证数据,并存储终端和第一算力认证数据的对应关系。
处理器800,用于读取存储器820中的程序,执行下列过程:
对终端的全部或部分算力认证数据进行管理。
在此需要说明的是,本申请实施例提供的上述装置,能够实现上述方法实施例中算力认证数据分配机构所实现的所有方法步骤,且能够达到相同的技术效果,在此不再对本实施例中与方法实施例相同的部分及有益效果进行具体赘述。
如图9所示,本申请实施例的注册装置,应用于终端,包括:处理器900,用于读取存储器920中的程序,执行下列过程:
向核心网设备发送第一注册请求,第一注册请求用于请求对终端进行算力注册和认证;
接收核心网设备发送的第一注册响应。
收发机910,用于在处理器900的控制下接收和发送数据。
其中,在图9中,总线架构可以包括任意数量的互联的总线和桥,具体由处理器900代表的一个或多个处理器和存储器920代表的存储器的各种电路链接在一起。总线架构还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路链接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口提供接口。收发机910可以是多个元件,即包括发送机和接收机,提供用于在传输介质上与各种其他装置通信的单元。针对不同的用户设备,用户接口930还可以是能够外接内接需要设备的接口,连接的设备包括但不限于小键盘、显示器、扬声器、麦克风、操纵杆等。
处理器900负责管理总线架构和通常的处理,存储器920可以存储处理器900在执行操作时所使用的数据。
处理器900可以是中央处理器(CPU)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)或复杂可编程逻辑器件(Complex Programmable Logic Device,CPLD),
处理器也可以采用多核架构。
处理器通过调用存储器存储的计算机程序,用于按照获得的可执行指令执行本申请实施例提供的任一方法。处理器与存储器也可以物理上分开布置。
处理器900还用于读取程序,执行如下步骤:
从终端对应的算力认证数据分配机构获取第一算力认证数据。
在一些实施例中,若第一注册响应表示通过对终端的认证,第一注册响应中包括终端的算力节点唯一标识。
其中,第一注册请求包括的内容和含义可参照前述方法实施例的描述。
在此需要说明的是,本申请实施例提供的上述装置,能够实现上述方法实施例中终端所实现的所有方法步骤,且能够达到相同的技术效果,在此不再对本实施例中与方法实施例相同的部分及有益效果进行具体赘述。
如图10所示,本申请实施例的注册装置,应用于终端,包括:
第一发送单元1001,用于向核心网设备发送第一注册请求,第一注册请求用于请求对终端进行算力注册和认证;第一接收单元1002,用于接收核心网设备发送的第一注册响应。
其中,第一注册请求包括的内容和含义可参照前述方法实施例的描述。
在一些实施例中,装置还可包括:
第一获取单元,用于从终端对应的算力认证数据分配机构获取第一算力认证数据。
若第一注册响应表示通过对终端的认证,第一注册响应中包括终端的算力节点唯一标识。
在此需要说明的是,本申请实施例提供的上述装置,能够实现上述方法实施例中终端所实现的所有方法步骤,且能够达到相同的技术效果,在此不再对本实施例中与方法实施例相同的部分及有益效果进行具体赘述。
如图11所示,本申请实施例的注册装置,应用于核心网设备,包括:
第一接收单元1101,用于接收终端发送的第一注册请求,第一注册请求用于请求对终端进行算力注册和认证;第一发送单元1102,用于向算力认证设备发送第二注册请求,第二注册请求用于请求对终端进行算力注册和算力认证;第一处理单元1103,用于从算力认证设备获取第二注册响应,并根据
第二注册响应向终端发送第一注册响应。
其中,第一注册请求、第二注册请求包括的内容和含义可参照前述方法实施例的描述。
在一些实施例中,第一发送单元,用于在第一指示用于指示终端为算力节点的情况下,向算力认证设备发送第二注册请求。
在一些实施例中,若第一注册响应表示通过对终端的认证,第一注册响应中包括终端的算力节点唯一标识。
在此需要说明的是,本申请实施例提供的上述装置,能够实现上述方法实施例中核心网设备所实现的所有方法步骤,且能够达到相同的技术效果,在此不再对本实施例中与方法实施例相同的部分及有益效果进行具体赘述。
如图12所示,本申请实施例的注册装置,应用于算力认证设备,包括:
第一接收单元1201,用于接收核心网设备的第二注册请求,第二注册请求是核心网设备在接收到终端的第一注册请求后发送的;第一认证单元1202,用于根据第二注册请求对终端进行认证,得到认证结果;第一发送单元1203,用于向核心网设备发送第二注册响应,第二注册响应包括认证结果;其中,第一注册请求用于请求对终端进行算力注册和认证,第二注册请求用于请求对终端进行算力注册和算力认证。
其中,第一注册请求、第二注册请求包括的内容和含义可参照前述方法实施例的描述。
在一些实施例中,若第二注册请求包括终端的标识、第一算力认证数据;第一认证单元包括:
获取子单元,用于根据终端的标识获取终端的第二算力认证数据;第一认证子单元,用于将第一算力认证数据和第二算力认证数据进行比较,得到认证结果。
在一些实施例中,第二注册请求包括终端的标识、第一算力认证数据、终端的算力节点能力参数;第一认证单元包括:
第一获取子单元,用于根据终端的标识获取终端的第二算力认证数据;第二认证子单元,用于将第一算力认证数据和第二算力认证数据进行比较;
第二获取子单元,用于在第一算力认证数据和第二算力认证数据匹配的
情况下,根据终端算力节点能力参数对终端进行认证,得到认证结果。
在一些实施例中,算力认证设备包括算力网络管理中心;获取子单元包括:
第一确定模块,用于根据终端的标识,确定终端对应的算力认证数据分配机构;第一获取模块,用于从终端对应的算力认证数据分配机构,获取终端的第二算力认证数据。
在一些实施例中,第二注册请求还包括:第三指示,用于指示终端对应的算力认证数据分配机构的信息;第一确定模块,用于根据终端的标识以及第三指示,确定终端对应的算力认证数据分配机构。
在一些实施例中,第一确定模块,用于根据终端的标识以及算力网络管理中心存储的目标对应关系,确定终端对应的算力认证数据分配机构;
其中,目标对应关系为终端的标识与算力认证数据分配机构的对应关系。
在一些实施例中,第一获取模块包括:
第一发送子模块,用于向终端对应的算力认证数据分配机构发送第一查询请求;第一接收子模块,用于接收终端对应的算力认证数据分配机构发送的第二算力认证数据。
在一些实施例中,若算力认证设备通过对终端的认证,第二注册响应中包括终端的算力节点唯一标识。
在一些实施例中,装置还可包括:
第一获取单元,用于从算力认证数据分配机构获取终端的第三算力认证数据,第三算力认证数据为更新的算力认证数据。
在此需要说明的是,本申请实施例提供的上述装置,能够实现上述方法实施例中算力认证设备所实现的所有方法步骤,且能够达到相同的技术效果,在此不再对本实施例中与方法实施例相同的部分及有益效果进行具体赘述。
如图13所示,本申请实施例的注册装置,应用于算力认证数据分配机构,包括:
第一接收单元1301,用于接收算力网络管理中心的第一查询请求;第一发送单元1302,用于根据第一查询请求,向算力网络管理中心发送终端的第二算力认证数据,用于对终端进行认证;
其中,第一查询请求是算力网络管理中心接收到核心网设备的第二注册请求后发送的,第二注册请求是核心网设备在接收到终端的第一注册请求后发送的;第一注册请求用于请求对终端进行算力注册和认证,第二注册请求用于请求对终端进行算力注册和算力认证。
在一些实施例中,装置还可包括:
第二发送单元,用于向算力网络管理中心发送终端的第三算力认证数据,第三算力认证数据为更新的算力认证数据。
在一些实施例中,装置还可包括:
第三发送单元,用于向终端发送第一算力认证数据,并存储终端和第一算力认证数据的对应关系。
在一些实施例中,装置还可包括:
第一处理单元,用于对终端的全部或部分算力认证数据进行管理。
在此需要说明的是,本申请实施例提供的上述装置,能够实现上述方法实施例中算力认证数据分配机构所实现的所有方法步骤,且能够达到相同的技术效果,在此不再对本实施例中与方法实施例相同的部分及有益效果进行具体赘述。
需要说明的是,本申请实施例中对单元的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个处理器可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对相关技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器(processor)执行本申请各个实施例方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,
RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
在此需要说明的是,本申请实施例提供的上述装置,能够实现上述方法实施例所实现的所有方法步骤,且能够达到相同的技术效果,在此不再对本实施例中与方法实施例相同的部分及有益效果进行具体赘述。
本申请实施例还提供一种处理器可读存储介质,可读存储介质上存储有程序,该程序被处理器执行时实现上述注册方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。其中,的可读存储介质,可以是处理器能够存取的任何可用介质或数据存储设备,包括但不限于磁性存储器(例如软盘、硬盘、磁带、磁光盘(Magneto-Optical,MO)等)、光学存储器(例如光盘(Compact Disk,CD)、数字视频光盘(Digital Video Disc,DVD)、蓝光光盘(Blu-ray Disc,BD)、高清通用光盘(High-Definition Versatile Disc,HVD)等)、以及半导体存储器(例如只读存储器(Read-Only Memory,ROM)、可擦除可编程只读存储器(Erasable Programmable Read-Only Memory,EPROM)、带电可擦可编程只读存储器(Electrically Erasable Programmableread Only Memory,EEPROM)、非易失性存储器(NAND FLASH)、固态硬盘(Solid State Disk,SSD))等。
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。
本申请是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机可执行指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机可执行指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些处理器可执行指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的处理器可读存储器中,使得存储在该处理器可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些处理器可执行指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
需要说明的是,应理解以上各个模块的划分仅仅是一种逻辑功能的划分,实际实现时可以全部或部分集成到一个物理实体上,也可以物理上分开。且这些模块可以全部以软件通过处理元件调用的形式实现;也可以全部以硬件的形式实现;还可以部分模块通过处理元件调用软件的形式实现,部分模块通过硬件的形式实现。例如,确定模块可以为单独设立的处理元件,也可以集成在上述装置的某一个芯片中实现,此外,也可以以程序代码的形式存储于上述装置的存储器中,由上述装置的某一个处理元件调用并执行以上确定模块的功能。其它模块的实现与之类似。此外这些模块全部或部分可以集成在一起,也可以独立实现。这里所述的处理元件可以是一种集成电路,具有信号的处理能力。在实现过程中,上述方法的各步骤或以上各个模块可以通过处理器元件中的硬件的集成逻辑电路或者软件形式的指令完成。
例如,各个模块、单元、子单元或子模块可以是被配置成实施以上方法的一个或多个集成电路,例如:一个或多个特定集成电路(Application Specific Integrated Circuit,ASIC),或,一个或多个微处理器(digital signal processor,DSP),或,一个或者多个现场可编程门阵列(Field Programmable Gate Array,FPGA)等。再如,当以上某个模块通过处理元件调度程序代码的形式实现时,该处理元件可以是通用处理器,例如中央处理器(Central Processing Unit,CPU)或其它可以调用程序代码的处理器。再如,这些模块可以集成在一起,以片上系统(system-on-a-chip,SOC)的形式实现。
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的
数据在适当情况下可以互换,以便这里描述的本申请的实施例,例如除了在这里图示或描述的那些以外的顺序实施。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。根据这样的理解,本申请的技术方案本质上或者说对相关技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁盘、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例的方法。
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。
Claims (35)
- 一种注册方法,包括:终端向核心网设备发送第一注册请求,所述第一注册请求用于请求对所述终端进行算力注册和算力认证;所述终端接收所述核心网设备发送的第一注册响应。
- 根据权利要求1所述的方法,其中,所述第一注册请求包括:第一指示,用于指示所述终端是否为算力节点;第一算力认证数据,用于确定所述终端是否为合法的算力节点。
- 根据权利要求2所述的方法,其中,所述第一注册请求还包括以下一项或者多项:第二指示,用于指示所述终端对应的算力认证数据分配机构的信息;所述终端的算力节点能力参数,用于在算力认证过程中确定所述终端是否为可用的算力节点,以及,在算力注册和算力认证成功后确定所述终端具备的算力能力。
- 根据权利要求3所述的方法,其中,所述第一算力认证数据包括:证书机构CA证书或令牌Token;或者所述终端的算力节点能力参数,包括以下一项或者多项:算力节点类型、算力大小、算力节点位置、算力节点上部署的算力服务。
- 根据权利要求2至4任一项所述的方法,其中,在所述终端向核心网设备发送第一注册请求之前,所述方法还包括:所述终端从算力认证数据分配机构获取所述第一算力认证数据。
- 根据权利要求1所述的方法,其中,若所述第一注册响应表示通过对所述终端的认证,所述第一注册响应中包括所述终端的算力节点唯一标识。
- 一种注册方法,包括:核心网设备接收终端发送的第一注册请求,所述第一注册请求用于请求对所述终端进行算力注册和算力认证;所述核心网设备向算力认证设备发送第二注册请求,所述第二注册请求用于请求对所述终端进行算力注册和算力认证;所述核心网设备从所述算力认证设备获取第二注册响应,并根据所述第二注册响应向所述终端发送第一注册响应。
- 根据权利要求7所述的方法,其中,所述第一注册请求包括:第一指示,用于指示所述终端是否为算力节点;第一算力认证数据,用于确定所述终端是否为合法的算力节点。
- 根据权利要求8所述的方法,其中,所述第一注册请求还包括以下一项或者多项:第二指示,用于指示所述终端对应的算力认证数据分配机构的信息;所述终端的算力节点能力参数,用于在认证过程中确定所述终端是否为可用的算力节点,以及,在算力注册和算力认证成功后确定所述终端具备的算力能力。
- 根据权利要求8所述的方法,其中,所述核心网设备向算力认证设备发送第二注册请求,包括:在所述第一指示用于指示所述终端为算力节点的情况下,所述核心网设备向算力认证设备发送第二注册请求。
- 根据权利要求8所述的方法,其中,所述第二注册请求包括所述终端的标识、所述第一算力认证数据。
- 根据权利要求11所述的方法,其中,所述第二注册请求还包括以下一项或者多项:第三指示,用于指示所述终端对应的算力认证数据分配机构的信息;所述终端的算力节点能力参数。
- 根据权利要求7所述的方法,其中,若所述第一注册响应表示通过对所述终端的认证,所述第一注册响应中包括所述终端的算力节点唯一标识。
- 一种注册方法,包括:算力认证设备接收核心网设备的第二注册请求,所述第二注册请求是所述核心网设备在接收到终端的第一注册请求后发送的;所述算力认证设备根据所述第二注册请求对所述终端进行认证,得到认证结果;所述算力认证设备向所述核心网设备发送第二注册响应,所述第二注册 响应包括所述认证结果;其中,所述第一注册请求用于请求对所述终端进行算力注册和算力认证,所述第二注册请求用于请求对所述终端进行算力注册和算力认证。
- 根据权利要求14所述的方法,其中,所述第二注册请求包括所述终端的标识、第一算力认证数据;所述算力认证设备根据所述第二注册请求对所述终端进行认证,得到认证结果,包括:所述算力认证设备根据所述终端的标识获取所述终端的第二算力认证数据;所述算力认证设备将所述第一算力认证数据和所述第二算力认证数据进行比较,得到所述认证结果。
- 根据权利要求14所述的方法,其中,所述第二注册请求包括所述终端的标识、所述第一算力认证数据、所述终端的算力节点能力参数;所述算力认证设备根据所述第二注册请求对所述终端进行认证,得到认证结果,包括:所述算力认证设备根据所述终端的标识获取所述终端的第二算力认证数据;所述算力认证设备将所述第一算力认证数据和所述第二算力认证数据进行比较;在所述第一算力认证数据和所述第二算力认证数据匹配的情况下,所述算力认证设备根据所述终端算力节点能力参数对所述终端进行认证,得到认证结果。
- 根据权利要求15或16所述的方法,其中,所述算力认证设备包括算力网络管理中心;所述算力认证设备根据所述终端的标识获取所述终端的第二算力认证数据,包括:所述算力网络管理中心根据所述终端的标识,确定所述终端对应的算力认证数据分配机构;所述算力网络管理中心从所述终端对应的算力认证数据分配机构,获取所述终端的第二算力认证数据。
- 根据权利要求17所述的方法,其中,所述第二注册请求还包括:第三指示,用于指示所述终端对应的算力认证数据分配机构的信息;所述算力网络管理中心根据所述终端的标识确定所述终端对应的算力认证数据分配机构,包括:所述算力网络管理中心根据所述终端的标识以及所述第三指示,确定所述终端对应的算力认证数据分配机构。
- 根据权利要求17所述的方法,其中,所述算力网络管理中心根据所述终端的标识确定所述终端对应的算力认证数据分配机构,包括:所述算力网络管理中心根据所述终端的标识以及所述算力网络管理中心存储的目标对应关系,确定所述终端对应的算力认证数据分配机构;其中,所述目标对应关系为终端的标识与算力认证数据分配机构的对应关系。
- 根据权利要求17所述的方法,其中,所述算力网络管理中心从所述终端对应的算力认证数据分配机构,获取所述终端的第二算力认证数据,包括:所述算力网络管理中心向所述终端对应的算力认证数据分配机构发送第一查询请求;所述算力网络管理中心接收所述终端对应的算力认证数据分配机构发送的所述第二算力认证数据。
- 根据权利要求14所述的方法,其中,若所述算力认证设备通过对所述终端的认证,所述第二注册响应中包括所述终端的算力节点唯一标识。
- 根据权利要求17所述的方法,其中,所述方法还包括:所述算力网络管理中心从所述算力认证数据分配机构获取所述终端的第三算力认证数据,所述第三算力认证数据为更新的算力认证数据。
- 一种注册方法,包括:算力认证数据分配机构接收算力网络管理中心的第一查询请求;所述算力认证数据分配机构根据所述第一查询请求,向所述算力网络管理中心发送终端的第二算力认证数据,用于对所述终端进行认证;其中,所述第一查询请求是所述算力网络管理中心接收到核心网设备的 第二注册请求后发送的,所述第二注册请求是所述核心网设备在接收到终端的第一注册请求后发送的;所述第一注册请求用于请求对所述终端进行算力注册和算力认证,所述第二注册请求用于请求对所述终端进行算力注册和算力认证。
- 根据权利要求23所述的方法,其中,所述方法还包括:所述算力认证数据分配机构向所述算力网络管理中心发送所述终端的第三算力认证数据,所述第三算力认证数据为更新的算力认证数据。
- 根据权利要求23所述的方法,其中,所述方法还包括:所述算力认证数据分配机构向所述终端发送第一算力认证数据,并存储所述终端和所述第一算力认证数据的对应关系。
- 根据权利要求23所述的方法,其中,所述方法还包括:所述算力认证数据分配机构对所述终端的全部或部分算力认证数据进行管理。
- 一种注册装置,应用于终端,包括:存储器,收发机,处理器:存储器,用于存储计算机程序;收发机,用于在所述处理器的控制下收发数据;处理器,用于读取所述存储器中的计算机程序并执行以下操作:向核心网设备发送第一注册请求,所述第一注册请求用于请求对所述终端进行算力注册和算力认证;接收所述核心网设备发送的第一注册响应。
- 一种注册装置,应用于核心网设备,包括:存储器,收发机,处理器:存储器,用于存储计算机程序;收发机,用于在所述处理器的控制下收发数据;处理器,用于读取所述存储器中的计算机程序并执行以下操作:接收终端发送的第一注册请求,所述第一注册请求用于请求对所述终端进行算力注册和算力认证;向算力认证设备发送第二注册请求,所述第二注册请求用于请求对所述终端进行算力注册和算力认证;从所述算力认证设备获取第二注册响应,并根据所述第二注册响应向所述终端发送第一注册响应。
- 一种注册装置,应用于算力认证设备,包括:存储器,收发机,处理器:存储器,用于存储计算机程序;收发机,用于在所述处理器的控制下收发数据;处理器,用于读取所述存储器中的计算机程序并执行以下操作:接收核心网设备的第二注册请求,所述第二注册请求是所述核心网设备在接收到终端的第一注册请求后发送的;根据所述第二注册请求对所述终端进行认证,得到认证结果;向所述核心网设备发送第二注册响应,所述第二注册响应包括所述认证结果;其中,所述第一注册请求用于请求对所述终端进行算力注册和算力认证,所述第二注册请求用于请求对所述终端进行算力注册和算力认证。
- 一种注册装置,应用于算力认证数据分配机构,包括:存储器,收发机,处理器:存储器,用于存储计算机程序;收发机,用于在所述处理器的控制下收发数据;处理器,用于读取所述存储器中的计算机程序并执行以下操作:接收算力网络管理中心的第一查询请求;根据所述第一查询请求,向所述算力网络管理中心发送终端的第二算力认证数据,用于对所述终端进行认证;其中,所述第一查询请求是所述算力网络管理中心接收到核心网设备的第二注册请求后发送的,所述第二注册请求是所述核心网设备在接收到终端的第一注册请求后发送的;所述第一注册请求用于请求对所述终端进行算力注册和算力认证,所述第二注册请求用于请求对所述终端进行算力注册和算力认证。
- 一种注册装置,应用于终端,包括:第一发送单元,用于向核心网设备发送第一注册请求,所述第一注册请求用于请求对所述终端进行算力注册和算力认证;第一接收单元,用于接收所述核心网设备发送的第一注册响应。
- 一种注册装置,应用于核心网设备,包括:第一接收单元,用于接收终端发送的第一注册请求,所述第一注册请求 用于请求对所述终端进行算力注册和算力认证;第一发送单元,用于向算力认证设备发送第二注册请求,所述第二注册请求用于请求对所述终端进行算力注册和算力认证;第一处理单元,用于从所述算力认证设备获取第二注册响应,并根据所述第二注册响应向所述终端发送第一注册响应。
- 一种注册装置,应用于算力认证设备,包括:第一接收单元,用于接收核心网设备的第二注册请求,所述第二注册请求是所述核心网设备在接收到终端的第一注册请求后发送的;第一认证单元,用于根据所述第二注册请求对所述终端进行认证,得到认证结果;第一发送单元,用于向所述核心网设备发送第二注册响应,所述第二注册响应包括所述认证结果;其中,所述第一注册请求用于请求对所述终端进行算力注册和算力认证,所述第二注册请求用于请求对所述终端进行算力注册和算力认证。
- 一种注册装置,应用于算力认证数据分配机构,包括:第一接收单元,用于接收算力网络管理中心的第一查询请求;第一发送单元,用于根据所述第一查询请求,向所述算力网络管理中心发送终端的第二算力认证数据,用于对所述终端进行认证;其中,所述第一查询请求是所述算力网络管理中心接收到核心网设备的第二注册请求后发送的,所述第二注册请求是所述核心网设备在接收到终端的第一注册请求后发送的;所述第一注册请求用于请求对所述终端进行算力注册和算力认证,所述第二注册请求用于请求对所述终端进行算力注册和算力认证。
- 一种处理器可读存储介质,所述处理器可读存储介质存储有计算机程序,所述计算机程序用于使所述处理器执行权利要求1至6任一项所述的方法,或者执行权利要求7至13任一项所述的方法,或者执行权利要求14至22任一项所述的方法,或者执行权利要求23至26任一项所述的方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211119073.3A CN117750364A (zh) | 2022-09-13 | 2022-09-13 | 一种注册方法、装置及可读存储介质 |
CN202211119073.3 | 2022-09-13 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024055880A1 true WO2024055880A1 (zh) | 2024-03-21 |
Family
ID=90274226
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2023/117173 WO2024055880A1 (zh) | 2022-09-13 | 2023-09-06 | 一种注册方法、装置及可读存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN117750364A (zh) |
WO (1) | WO2024055880A1 (zh) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112132447A (zh) * | 2020-09-21 | 2020-12-25 | 江苏省未来网络创新研究院 | 一种基于区块链的算力网络信任评估与保障算法 |
US20220030473A1 (en) * | 2020-07-27 | 2022-01-27 | Southwest Jiaotong University | Method for batch handover authentication and key agreement oriented to heterogeneous network |
CN114205139A (zh) * | 2021-12-09 | 2022-03-18 | 中国电信股份有限公司 | 算力资源管理方法、节点、系统和存储介质 |
CN114500521A (zh) * | 2020-11-13 | 2022-05-13 | 中国移动通信有限公司研究院 | 一种算力调度方法、装置、调度设备、系统和存储介质 |
CN114760197A (zh) * | 2020-12-29 | 2022-07-15 | 中国移动通信有限公司研究院 | 算力节点管理方法、装置、设备及可读存储介质 |
-
2022
- 2022-09-13 CN CN202211119073.3A patent/CN117750364A/zh active Pending
-
2023
- 2023-09-06 WO PCT/CN2023/117173 patent/WO2024055880A1/zh unknown
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220030473A1 (en) * | 2020-07-27 | 2022-01-27 | Southwest Jiaotong University | Method for batch handover authentication and key agreement oriented to heterogeneous network |
CN112132447A (zh) * | 2020-09-21 | 2020-12-25 | 江苏省未来网络创新研究院 | 一种基于区块链的算力网络信任评估与保障算法 |
CN114500521A (zh) * | 2020-11-13 | 2022-05-13 | 中国移动通信有限公司研究院 | 一种算力调度方法、装置、调度设备、系统和存储介质 |
CN114760197A (zh) * | 2020-12-29 | 2022-07-15 | 中国移动通信有限公司研究院 | 算力节点管理方法、装置、设备及可读存储介质 |
CN114205139A (zh) * | 2021-12-09 | 2022-03-18 | 中国电信股份有限公司 | 算力资源管理方法、节点、系统和存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN117750364A (zh) | 2024-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7035163B2 (ja) | ネットワークセキュリティ管理方法および装置 | |
WO2021037175A1 (zh) | 一种网络切片的管理方法及相关装置 | |
WO2021197185A1 (zh) | 一种通信方法和通信装置 | |
US11989284B2 (en) | Service API invoking method and related apparatus | |
CN114271016A (zh) | 基于优先级的会话准入控制方法和装置 | |
WO2021138822A1 (zh) | 签约信息获取方法及装置 | |
WO2022170994A1 (zh) | Pc5根密钥处理方法、装置、ausf及远程终端 | |
JP2022522280A (ja) | 固定ネットワーク住宅用ゲートウェイの認証決定 | |
WO2022247812A1 (zh) | 一种鉴权方法、通信装置和系统 | |
TWI820696B (zh) | 通訊方法、裝置及電腦可讀儲存介質 | |
WO2022068474A1 (zh) | ProSe通信组的通信方法、装置及存储介质 | |
CN113055342B (zh) | 一种信息处理方法及通信装置 | |
WO2021159415A1 (zh) | 通信方法、装置及系统 | |
WO2024055880A1 (zh) | 一种注册方法、装置及可读存储介质 | |
WO2021195816A1 (zh) | 一种通信方法、装置及系统 | |
CN114745717A (zh) | 一种校验方法、装置、通信设备和计算机存储介质 | |
WO2021056142A1 (zh) | 无线通信的方法和设备 | |
CN115396895A (zh) | 一种服务授权的方法及装置 | |
WO2024114204A1 (zh) | 一种接入点认证方法、装置及可读存储介质 | |
WO2021219107A1 (zh) | 切片认证授权管理方法、装置和系统 | |
WO2024093923A1 (zh) | 通信方法和通信装置 | |
WO2022147838A1 (zh) | 无线通信的方法和装置 | |
WO2023169206A1 (zh) | 授权验证的方法和装置 | |
WO2021147662A1 (zh) | 通信方法和通信装置 | |
US20240292214A1 (en) | Verification of user equipment compliance in communication network environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23864612 Country of ref document: EP Kind code of ref document: A1 |