WO2024092801A1 - 认证方法、装置、通信设备及存储介质 - Google Patents

认证方法、装置、通信设备及存储介质 Download PDF

Info

Publication number
WO2024092801A1
WO2024092801A1 PCT/CN2022/130092 CN2022130092W WO2024092801A1 WO 2024092801 A1 WO2024092801 A1 WO 2024092801A1 CN 2022130092 W CN2022130092 W CN 2022130092W WO 2024092801 A1 WO2024092801 A1 WO 2024092801A1
Authority
WO
WIPO (PCT)
Prior art keywords
ees
authentication
eec
information
ecs
Prior art date
Application number
PCT/CN2022/130092
Other languages
English (en)
French (fr)
Inventor
梁浩然
陆伟
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to CN202280004784.8A priority Critical patent/CN118302991A/zh
Priority to PCT/CN2022/130092 priority patent/WO2024092801A1/zh
Publication of WO2024092801A1 publication Critical patent/WO2024092801A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • the present disclosure relates to the field of wireless communication technology but is not limited to the field of wireless communication technology, and in particular to an authentication method, apparatus, communication device and storage medium.
  • edge enabler client EEC
  • ECS edge configuration server
  • EES edge enabler server
  • TLS Transport Layer Security
  • the TLS authentication method involves multiple authentication mechanisms. For these multiple authentication mechanisms, if the authentication mechanism adopted between EEC, ECS and/or EES cannot be determined, the authentication between EEC, ECS and/or EES cannot be synchronized, and low security and reliability problems may occur when performing authentication.
  • the embodiments of the present disclosure disclose an authentication method, an apparatus, a communication device and a storage medium.
  • an authentication method is provided, wherein the method is performed by an edge enabling client EEC, and the method includes:
  • the service provision request information is used to request to obtain the security authentication method supported by the edge enabling server EES.
  • an authentication method is provided, wherein the method is executed by an edge configuration client ECS, and the method includes:
  • the service provision request information is used to request to obtain the security authentication method supported by the edge enabling server EES.
  • an authentication method is provided, wherein the method is performed by an edge enabling server EES, and the method includes:
  • the authentication capability request information is used to request the authentication capability information of the EES, wherein the authentication capability information of the EES indicates the security authentication method supported by the EES.
  • an authentication device wherein the device includes:
  • a sending module is configured to send service provision request information to the edge configuration server ECS;
  • the service provision request information is used to request to obtain the security authentication method supported by the edge enabling server EES.
  • an authentication device wherein the device includes:
  • a receiving module configured to receive service provision request information sent by the EEC
  • the service provision request information is used to request to obtain the security authentication method supported by the edge enabling server EES.
  • an authentication device wherein the device comprises:
  • a receiving module configured to receive authentication capability request information sent by the ECS
  • the authentication capability request information is used to request the authentication capability information of the EES, wherein the authentication capability information of the EES indicates the security authentication method supported by the EES.
  • an authentication system is provided, wherein the system includes EEC, ECS and EES, wherein the EEC is used to implement the method performed by the EEC as described in any embodiment of the present disclosure; the ECS is used to implement the method performed by the ECS as described in any embodiment of the present disclosure; and the EES is used to implement the method performed by the EES as described in any embodiment of the present disclosure.
  • a communication device including:
  • a memory for storing instructions executable by the processor
  • the processor is configured to implement the method described in any embodiment of the present disclosure when running the executable instructions.
  • a computer storage medium stores a computer executable program, and when the executable program is executed by a processor, the method described in any embodiment of the present disclosure is implemented.
  • a service provision request message is sent to the edge configuration server ECS; wherein the service provision request message is used to request the security authentication method supported by the edge enabling server EES.
  • the service provision request message sent to the edge configuration server ECS can request the security authentication method supported by the edge enabling server EES
  • the authentication between the ECS and the EES can be performed based on the security authentication method supported by the EES indicated by the authentication capability information of the EES, so that the data transmission between the ECS and the EES is more secure and reliable, and the security and reliability of communication are improved.
  • Fig. 1 is a schematic structural diagram of a wireless communication system according to an exemplary embodiment.
  • Fig. 2 is a schematic flow chart of an authentication method according to an exemplary embodiment.
  • Fig. 3 is a schematic flow chart of an authentication method according to an exemplary embodiment.
  • Fig. 4 is a schematic flow chart showing an authentication method according to an exemplary embodiment.
  • Fig. 5 is a schematic flow chart of an authentication method according to an exemplary embodiment.
  • Fig. 6 is a schematic flow chart of an authentication method according to an exemplary embodiment.
  • Fig. 7 is a schematic flow chart of an authentication method according to an exemplary embodiment.
  • Fig. 8 is a schematic flow chart of an authentication method according to an exemplary embodiment.
  • Fig. 9 is a schematic flow chart of an authentication method according to an exemplary embodiment.
  • Fig. 10 is a schematic flow chart of an authentication method according to an exemplary embodiment.
  • Fig. 11 is a schematic flow chart of an authentication method according to an exemplary embodiment.
  • Fig. 12 is a schematic flow chart of an authentication method according to an exemplary embodiment.
  • Fig. 13 is a schematic structural diagram of an authentication method according to an exemplary embodiment.
  • Fig. 14 is a schematic structural diagram of an authentication method according to an exemplary embodiment.
  • Fig. 15 is a schematic diagram showing the structure of an authentication device according to an exemplary embodiment.
  • Fig. 16 is a schematic diagram showing the structure of an authentication device according to an exemplary embodiment.
  • Fig. 17 is a schematic diagram showing the structure of an authentication device according to an exemplary embodiment.
  • Fig. 18 is a schematic diagram showing the structure of an authentication system according to an exemplary embodiment.
  • Fig. 19 is a schematic diagram showing the structure of a terminal according to an exemplary embodiment.
  • Fig. 20 is a block diagram of a base station according to an exemplary embodiment.
  • first, second, third, etc. may be used to describe various information in the disclosed embodiments, these information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other.
  • first information may also be referred to as the second information, and similarly, the second information may also be referred to as the first information.
  • word "if” as used herein may be interpreted as "at the time of” or "when” or "in response to determining”.
  • FIG1 shows a schematic diagram of the structure of a wireless communication system provided by an embodiment of the present disclosure.
  • the wireless communication system is a communication system based on mobile communication technology, and the wireless communication system may include: a plurality of user equipments 110 and a plurality of base stations 120 .
  • the user equipment 110 may be a device that provides voice and/or data connectivity to a user.
  • the user equipment 110 may communicate with one or more core networks via a radio access network (RAN).
  • RAN radio access network
  • the user equipment 110 may be an IoT user equipment, such as a sensor device, a mobile phone, and a computer with an IoT user equipment.
  • IoT user equipment such as a sensor device, a mobile phone, and a computer with an IoT user equipment.
  • it may be a fixed, portable, pocket-sized, handheld, computer-built-in, or vehicle-mounted device.
  • a station STA
  • a subscriber unit a subscriber station, a mobile station, a mobile station, a remote station, an access point, a remote terminal, an access terminal, a user terminal, a user agent, a user device, or a user equipment.
  • the user equipment 110 may also be a device of an unmanned aerial vehicle.
  • the user device 110 may be a vehicle-mounted device, such as a driving computer with wireless communication function, or a wireless user device connected to a driving computer.
  • the user device 110 may be a roadside device, such as a street lamp, a signal lamp, or other roadside device with wireless communication function.
  • the base station 120 may be a network-side device in a wireless communication system.
  • the wireless communication system may be a fourth generation mobile communication technology (4G) system, also known as a long term evolution (LTE) system; or, the wireless communication system may be a 5G system, also known as a new air interface system or a 5G NR system. Alternatively, the wireless communication system may be a next generation system of the 5G system.
  • the access network in the 5G system may be called NG-RAN (New Generation-Radio Access Network).
  • the base station 120 can be an evolved base station (eNB) adopted in the 4G system.
  • the base station 120 can also be a base station (gNB) adopting a centralized distributed architecture in the 5G system.
  • the base station 120 adopts a centralized distributed architecture it usually includes a centralized unit (central unit, CU) and at least two distributed units (distributed units, DU).
  • the centralized unit is provided with a packet data convergence protocol (Packet Data Convergence Protocol, PDCP) layer, a radio link layer control protocol (Radio Link Control, RLC) layer, and a media access control (Media Access Control, MAC) layer protocol stack;
  • the distributed unit is provided with a physical (Physical, PHY) layer protocol stack.
  • the specific implementation method of the base station 120 is not limited in the embodiment of the present disclosure.
  • a wireless connection may be established between the base station 120 and the user equipment 110 via a wireless air interface.
  • the wireless air interface is a wireless air interface based on the fourth generation mobile communication network technology (4G) standard; or, the wireless air interface is a wireless air interface based on the fifth generation mobile communication network technology (5G) standard, for example, the wireless air interface is a new air interface; or, the wireless air interface may also be a wireless air interface based on the next generation mobile communication network technology standard of 5G.
  • an E2E (End to End) connection may also be established between the user devices 110.
  • V2X vehicle-to-everything
  • V2V vehicle to vehicle
  • V2I vehicle to Infrastructure
  • V2P vehicle to pedestrian
  • the above-mentioned user equipment can be considered as the terminal equipment of the following embodiments.
  • the wireless communication system may further include a network management device 130 .
  • the network management device 130 may be a core network device in a wireless communication system, for example, the network management device 130 may be a mobility management entity (MME) in an evolved packet core (EPC). Alternatively, the network management device may also be other core network devices, such as a serving gateway (SGW), a public data network gateway (PGW), a policy and charging rules function (PCRF), or a home subscriber server (HSS).
  • SGW serving gateway
  • PGW public data network gateway
  • PCRF policy and charging rules function
  • HSS home subscriber server
  • the embodiments of the present disclosure list multiple implementation methods to clearly illustrate the technical solutions of the embodiments of the present disclosure.
  • the multiple embodiments provided by the embodiments of the present disclosure can be executed separately, or can be executed together with the methods of other embodiments of the embodiments of the present disclosure, or can be executed together with some methods in other related technologies separately or in combination; the embodiments of the present disclosure do not limit this.
  • an authentication method is provided in this embodiment, wherein the method is executed by an edge enabling client EEC, and the method includes:
  • Step 21 Send service provision request information to the edge configuration server ECS;
  • the service provision request information is used to request to obtain the security authentication method supported by the edge enabling server EES.
  • the terminal involved in the present disclosure may be, but is not limited to, a mobile phone, a wearable device, a vehicle-mounted terminal, a road side unit (RSU, Road Side Unit), a smart home terminal, an industrial sensor device and/or a medical device, etc.
  • the terminal may be a Redcap terminal or a predetermined version of a new air interface NR terminal (for example, an R17 NR terminal).
  • the edge enabling client EEC may be an application program running on the terminal, for example, a WeChat application program and a Weibo application program, and the like.
  • a service provision request message is sent to an edge configuration server ECS; wherein the service provision request message is used to request a security authentication method supported by an edge enabling server EES; and the service provision request message includes the home network information of the terminal corresponding to the EEC.
  • the home network information includes at least one of the home network identifier, the Authentication and Key Management for Applications (AKMA) key identifier (A-KID, AKMA Key Identifier) and the session practice identifier (B-TID, Bootstrapping Transaction Identifier), which can be used to identify the home network of the terminal or EEC.
  • AKMA Authentication and Key Management for Applications
  • A-KID Authentication and Key Management for Applications
  • B-TID Bootstrapping Transaction Identifier
  • a service provision request message is sent to an edge configuration server ECS; wherein the service provision request message is used to request to obtain a security authentication method supported by an edge enabling server EES.
  • Authentication capability information of the EES sent by the ECS is received; wherein the authentication capability information of the EES indicates a security authentication method supported by the EES.
  • the location information and/or application client profile (AC Profile) of the terminal corresponding to the EEC is sent to the ECS; after receiving the location information and/or application client profile of the terminal corresponding to the EEC, the ECS stores them in the ECS; the location information and/or application client profile of the terminal corresponding to the EEC is used by the ECS to identify the ECS.
  • AC Profile application client profile
  • service provision request information is sent to the edge configuration server ECS; wherein the service provision request information is used to request to obtain the security authentication mode supported by the edge enabling server EES.
  • a service provision request message is sent to an edge configuration server ECS; wherein the service provision request message is used to request to obtain a security authentication method supported by an edge enabling server EES.
  • Authentication capability information of the EES sent by the ECS and information for establishing a connection between the ECS and the EES are received; wherein the authentication capability information of the EES indicates the security authentication method supported by the EES.
  • the EEC is configured with authentication capability information of the ECS, and the authentication capability information of the ECS indicates the security authentication methods supported by the ECS.
  • the authentication capability information of the ECS is pre-configured in the EEC; or, the authentication capability information of the ECS is configured in the EEC by an edge-aware application client (Edge-aware AC); or, the authentication capability information of the ECS is configured in the EEC by a user.
  • an authentication method for performing mutual authentication between the EEC and the ECS is determined; wherein the first authentication capability information includes at least one of the following: a security authentication method supported by the EEC; a security authentication method supported by the edge configuration server ECS; a security authentication method supported by the home network; and a security authentication method supported by the access network.
  • an authentication mode for performing mutual authentication between the EEC and the ECS is determined. Authentication between the EEC and the ECS is performed based on the authentication mode. In response to the mutual authentication between the EEC and the ECS being successful, a transport layer security TLS connection is established between the EEC and the ECS.
  • an authentication method for performing mutual authentication between the EEC and the ECS is determined. Authentication between the EEC and the ECS is performed based on the authentication method.
  • a transport layer security TLS connection is established between the EEC and the ECS. Based on the TLS connection, a service provision request message is sent to the edge configuration server ECS; wherein the service provision request message is used to request a security authentication method supported by the edge enabling server EES.
  • an authentication method for performing mutual authentication between the EEC and the ECS is determined. Authentication between the EEC and the ECS is performed based on the authentication method.
  • a transport layer security TLS connection is established between the EEC and the ECS. Based on the TLS connection, the authentication capability information of the EES sent by the ECS is received; wherein the authentication capability information of the EES indicates the security authentication method supported by the EES.
  • a service provision request message is sent to an edge configuration server ECS; wherein the service provision request message is used to request a security authentication method supported by an edge enabling server EES.
  • Authentication capability information of the EES sent by the ECS is received; wherein the authentication capability information of the EES indicates a security authentication method supported by the EES.
  • Based on the second authentication capability information an authentication method for performing mutual authentication between the EEC and the EES is determined; wherein the second authentication capability information includes at least one of the following: a security authentication method supported by the EEC; a security authentication method supported by the edge enabling server EES; a security authentication method supported by the home network; and a security authentication method supported by the access network.
  • a service provision request message is sent to the edge configuration server ECS; wherein the service provision request message is used to request the security authentication method supported by the edge enabling server EES.
  • the service provision request message sent to the edge configuration server ECS can request the security authentication method supported by the edge enabling server EES
  • the authentication between the ECS and the EES can be performed based on the security authentication method supported by the EES indicated by the authentication capability information of the EES, so that the data transmission between the ECS and the EES is more secure and reliable, and the security and reliability of communication are improved.
  • an authentication method is provided in this embodiment, wherein the method is executed by an edge enabling client EEC, and the method includes:
  • Step 31 Based on the first authentication capability information, determine an authentication method for performing mutual authentication between the EEC and the ECS;
  • the first authentication capability information includes at least one of the following:
  • the EEC is configured with authentication capability information of the ECS, and the authentication capability information of the ECS indicates a security authentication method supported by the ECS.
  • the authentication capability information of the ECS is pre-configured in the EEC; or, the authentication capability information of the ECS is configured in the EEC by an edge-sensitive application client AC; or, the authentication capability information of the ECS is configured in the EEC by a user.
  • an authentication method for performing mutual authentication between the EEC and the ECS is determined; wherein the first authentication capability information includes at least one of the following: an authentication method supported by the EEC; a security authentication method supported by the edge configuration server ECS; a security authentication method supported by the home network; and a security authentication method supported by the access network.
  • Authentication between the EEC and the ECS is performed based on the authentication method.
  • a transport layer security TLS connection is established between the EEC and the ECS.
  • an authentication method for performing mutual authentication between the EEC and the ECS is determined; wherein the first authentication capability information includes at least one of the following: an authentication method supported by the EEC; a security authentication method supported by the edge configuration server ECS; a security authentication method supported by the home network; and a security authentication method supported by the access network.
  • Authentication between the EEC and the ECS is performed based on the authentication method.
  • a transport layer security TLS connection is established between the EEC and the ECS.
  • a service provision request information is sent to the edge configuration server ECS; wherein the service provision request information is used to request the acquisition of the security authentication method supported by the edge enabling server EES.
  • an authentication method for performing mutual authentication between the EEC and the ECS is determined; wherein the first authentication capability information includes at least one of the following: an authentication method supported by the EEC; a security authentication method supported by the edge configuration server ECS; a security authentication method supported by the home network; and a security authentication method supported by the access network.
  • Authentication between the EEC and the ECS is performed based on the authentication method.
  • a transport layer security TLS connection is established between the EEC and the ECS.
  • a service provision request information is sent to the edge configuration server ECS; wherein the service provision request information is used to request the security authentication method supported by the edge enabling server EES.
  • the authentication capability information of the EES sent by the ECS and/or the information for establishing a connection between the ECS and the EES is received; wherein the authentication capability information of the EES indicates the security authentication method supported by the EES.
  • the authentication capability information of the EES in response to the EES not being authorized to use authentication and key management AKMA in the access network or home network of the EEC, does not include the authentication method of transport layer security TLS based on AKMA; and/or, in response to the EES not being authorized to use AKMA in the access network or home network of the terminal corresponding to the EEC, the authentication capability information of the EES does not include the authentication method of transport layer security TLS based on AKMA; and/or, in response to the EES not being authorized to use general bootstrapping framework GBA in the access network or home network of the EEC, the authentication capability information of the EES does not include the authentication method of transport layer security TLS based on GBA; and/or, in response to the EES not being authorized to use GBA in the access network or home network of the terminal corresponding to the EEC, the authentication capability information of the EES does not include the authentication method of transport layer security TLS based on GBA.
  • an authentication method is provided in this embodiment, wherein the method is executed by an edge enabling client EEC, and the method includes:
  • Step 41 Receive the authentication capability information of EES sent by ECS;
  • the authentication capability information of the EES indicates the security authentication method supported by the EES.
  • a service provision request message is sent to an edge configuration server ECS; wherein the service provision request message is used to request to obtain a security authentication method supported by an edge enabling server EES.
  • Authentication capability information of the EES sent by the ECS is received; wherein the authentication capability information of the EES indicates the security authentication method supported by the EES.
  • service provision request information is sent to the edge configuration server ECS; wherein the service provision request information is used to request to obtain the security authentication mode supported by the edge enabling server EES.
  • a service provision request message is sent to an edge configuration server ECS, wherein the service provision request message is used to request to obtain a security authentication method supported by an edge enabling server EES.
  • Authentication capability information of the EES sent by the ECS and information for establishing a connection between the ECS and the EES are received, wherein the authentication capability information of the EES indicates the security authentication method supported by the EES.
  • an authentication method for performing mutual authentication between the EEC and the ECS is determined; wherein the first authentication capability information includes at least one of the following: an authentication method supported by the EEC; a security authentication method supported by the edge configuration server ECS; a security authentication method supported by the home network; and a security authentication method supported by the access network.
  • Authentication between the EEC and the ECS is performed based on the authentication method.
  • a transport layer security TLS connection is established between the EEC and the ECS.
  • a service provision request information is sent to the edge configuration server ECS; wherein the service provision request information is used to request the security authentication method supported by the edge enabling server EES.
  • the authentication capability information of the EES sent by the ECS and/or the information for establishing a connection between the ECS and the EES is received; wherein the authentication capability information of the EES indicates the security authentication method supported by the EES.
  • an authentication method is provided in this embodiment, wherein the method is executed by an edge enabling client EEC, and the method includes:
  • Step 51 Based on the second authentication capability information, determine an authentication method for performing mutual authentication between the EEC and the EES;
  • the second authentication capability information includes at least one of the following:
  • a service provision request message is sent to an edge configuration server ECS; wherein the service provision request message is used to request a security authentication method supported by an edge enabling server EES.
  • Authentication capability information of the EES sent by the ECS is received; wherein the authentication capability information of the EES indicates a security authentication method supported by the EES.
  • Based on the second authentication capability information an authentication method for performing mutual authentication between the EEC and the EES is determined; wherein the second authentication capability information includes at least one of the following: a security authentication method supported by the EEC; a security authentication method supported by the edge enabling server EES; a security authentication method supported by the home network; and a security authentication method supported by the access network.
  • the authentication method for performing mutual authentication between the EEC and the ECS determines the authentication method for performing mutual authentication between the EEC and the ECS; wherein the first authentication capability information includes at least one of the following: an authentication method supported by the EEC; a security authentication method supported by the edge configuration server ECS; a security authentication method supported by the home network; and a security authentication method supported by the access network.
  • the authentication capability information of the EES sent by the ECS wherein the authentication capability information of the EES indicates the security authentication method supported by the EES.
  • the second authentication capability information determines the authentication method for performing mutual authentication between the EEC and the EES; wherein the second authentication capability information includes at least one of the following: a security authentication method supported by the EEC; a security authentication method supported by the edge enabling server EES; a security authentication method supported by the home network; and a security authentication method supported by the access network.
  • this embodiment provides an authentication method, wherein the method is executed by an edge configuration client ECS, and the method includes:
  • Step 61 receiving service provision request information sent by EEC
  • the service provision request information is used to request to obtain the security authentication method supported by the edge enabling server EES.
  • the terminal involved in the present disclosure may be, but is not limited to, a mobile phone, a wearable device, a vehicle-mounted terminal, a road side unit (RSU, Road Side Unit), a smart home terminal, an industrial sensor device and/or a medical device, etc.
  • the terminal may be a Redcap terminal or a predetermined version of a new air interface NR terminal (for example, an R17 NR terminal).
  • the edge enabling client EEC may be an application program running on the terminal, for example, a WeChat application program and a Weibo application program.
  • a service provision request message sent by an EEC is received; wherein the service provision request message is used to request a security authentication method supported by an edge enabling server EES; and the service provision request message includes home network information of a terminal corresponding to the EEC.
  • the home network information includes at least one of the home network identifier, the Authentication and Key Management for Applications (AKMA) key identifier (A-KID, AKMA Key Identifier) and the session practice identifier (B-TID, Bootstrapping Transaction Identifier), which can be used to identify the home network of the terminal or EEC.
  • AKMA Authentication and Key Management for Applications
  • A-KID Authentication and Key Management for Applications
  • B-TID Bootstrapping Transaction Identifier
  • a service provision request message sent by an EEC is received, wherein the service provision request message is used to request to obtain a security authentication method supported by an edge enabling server EES.
  • Authentication capability information is sent to the EEC, wherein the authentication capability information of the EES indicates the security authentication method supported by the EES.
  • service provision request information sent by the EEC is received; wherein the service provision request information is used to request to obtain a security authentication method supported by the edge enabling server EES.
  • a service provision request message sent by an EEC is received; wherein the service provision request message is used to request to obtain a security authentication method supported by an edge enabling server EES.
  • Authentication capability information of the EES and information for establishing a connection between the ECS and the EES are sent to the EEC; wherein the authentication capability information of the EES indicates the security authentication method supported by the EES.
  • receiving authentication capability information of the EES sent by the EES wherein the authentication capability information of the EES indicates the security authentication method supported by the EES.
  • Receive service provision request information sent by the EEC wherein the service provision request information is used to request to obtain the security authentication method supported by the edge enabling server EES.
  • receiving authentication capability information of the EES sent by the EES wherein the authentication capability information of the EES indicates a security authentication method supported by the EES.
  • Receive service provision request information sent by the EEC wherein the service provision request information is used to request to obtain a security authentication method supported by the edge enabling server EES.
  • receiving the authentication capability information of the EES sent by the EES wherein the authentication capability information of the EES indicates the security authentication method supported by the EES.
  • Receive service provision request information sent by the EEC wherein the service provision request information is used to request to obtain the security authentication method supported by the edge enabling server EES.
  • authentication capability request information is sent to the identified EES; wherein the authentication capability request information is used to request the authentication capability information of the EES, wherein the authentication capability information of the EES indicates the security authentication method supported by the EES.
  • Service provision request information sent by the EEC is received; wherein the service provision request information is used to request to obtain the security authentication method supported by the edge enabling server EES.
  • the authentication capability information of the identified EES is sent to the EEC.
  • the identified EES is the EES screened out by a predetermined condition.
  • the authentication capability request information includes a visited network identifier and/or a home network identifier of the EEC, or the authentication capability request information includes a visited network identifier and/or a home network identifier of a terminal corresponding to the EEC.
  • the authentication capability information of the EES in response to the EES not being authorized to use authentication and key management AKMA in the access network or home network of the EEC, does not include the authentication method of transport layer security TLS based on application authentication and key management AKMA; and/or, in response to the EES not being authorized to use AKMA in the access network or home network of the terminal corresponding to the EEC, the authentication capability information of the EES does not include the authentication method of transport layer security TLS based on AKMA; and/or, in response to the EES not being authorized to use general bootstrapping framework GBA in the access network or home network of the EEC, the authentication capability information of the EES does not include the authentication method of transport layer security TLS based on GBA; and/or, in response to the EES not being authorized to use GBA in the access network or home network of the terminal corresponding to the EEC, the authentication capability information of the EES does not include the authentication method of transport layer security TLS based on GBA.
  • a TLS connection is established between the EES and the ECS. Based on the TLS connection, authentication capability request information is sent to the identified EES; wherein the authentication capability request information is used to request the authentication capability information of the EES.
  • a TLS connection is established between the EES and the ECS. Based on the TLS connection, the authentication capability information of the EES sent by the EES is received; wherein the authentication capability information of the EES indicates a security authentication method supported by the EES.
  • this embodiment provides an authentication method, wherein the method is executed by an edge configuration client ECS, and the method includes:
  • Step 71 Receive the authentication capability information of the EES sent by the EES;
  • the authentication capability information of the EES indicates the security authentication method supported by the EES.
  • receiving authentication capability information of the EES sent by the EES wherein the authentication capability information of the EES indicates the security authentication method supported by the EES.
  • Receive service provision request information sent by the EEC wherein the service provision request information is used to request to obtain the security authentication method supported by the edge enabling server EES.
  • the authentication capability information of the EES is received from the EES, wherein the authentication capability information of the EES indicates the security authentication method supported by the EES.
  • Service provision request information is received from the EEC, wherein the service provision request information is used to request the security authentication method supported by the edge enabling server EES.
  • the identified authentication capability information of the EES is sent to the EEC.
  • a service provision request message sent by an EEC is received; wherein the service provision request message is used to request a security authentication method supported by an edge enabling server EES.
  • an authentication capability request message is sent to the identified EES; wherein the authentication capability request message is used to request the authentication capability information of the EES.
  • the authentication capability information of the EES sent by the EES is received; wherein the authentication capability information of the EES indicates the security authentication method supported by the EES.
  • the authentication capability request information includes a visited network identifier and/or a home network identifier of the EEC, or the authentication capability request information includes a visited network identifier and/or a home network identifier of a terminal corresponding to the EEC.
  • the authentication capability request information includes at least one of the following:
  • the home network information of the EEC corresponding terminal
  • the EEC's visited network information The EEC's visited network information.
  • the EEC corresponds to the visited network information of the terminal.
  • the authentication capability information of the EES in response to the EES not being authorized to use authentication and key management AKMA in the access network or home network of the EEC, does not include the authentication method of transport layer security TLS based on AKMA; and/or, in response to the EES not being authorized to use AKMA in the access network or home network of the terminal corresponding to the EEC, the authentication capability information of the EES does not include the authentication method of transport layer security TLS based on AKMA; and/or, in response to the EES not being authorized to use general bootstrapping framework GBA in the access network or home network of the EEC, the authentication capability information of the EES does not include the authentication method of transport layer security TLS based on GBA; and/or, in response to the EES not being authorized to use GBA in the access network or home network of the terminal corresponding to the EEC, the authentication capability information of the EES does not include the authentication method of transport layer security TLS based on GBA.
  • the authentication capability information of the EES is received from the EES, wherein the authentication capability information of the EES indicates the security authentication mode supported by the EES, and the identified authentication capability information of the EES is sent to the EEC.
  • the authentication capability information of the EES is received from the EES, wherein the authentication capability information of the EES indicates the security authentication mode supported by the EES.
  • the identified authentication capability information of the EES and information for establishing a connection between the ECS and the EES are sent to the EEC.
  • this embodiment provides an authentication method, wherein the method is executed by an edge configuration client ECS, and the method includes:
  • Step 81 In response to the ECS not having the authentication capability information of the identified EES, send authentication capability request information to the identified EES; wherein the authentication capability request information is used to request the authentication capability information of the EES.
  • the identified EES is the EES screened out through specific information, wherein the specific information includes the location information of the terminal corresponding to the EEC, the application client profile (AC Profile) and/or the ECS provider policy (ECSP policy).
  • specific information includes the location information of the terminal corresponding to the EEC, the application client profile (AC Profile) and/or the ECS provider policy (ECSP policy).
  • a service provision request message sent by an EEC is received; wherein the service provision request message is used to request a security authentication method supported by an edge enabling server EES.
  • an authentication capability request message is sent to the identified EES; wherein the authentication capability request message is used to request the authentication capability information of the EES.
  • the authentication capability information of the EES sent by the EES is received; wherein the authentication capability information of the EES indicates the security authentication method supported by the EES.
  • service provision request information sent by the EEC is received; wherein the service provision request information is used to request the secure authentication method supported by the edge enabling server EES.
  • a TLS connection is established between the EES and the ECS.
  • Authentication capability request information is sent to the identified EES based on the TLS connection; wherein the authentication capability request information is used to request the authentication capability information of the EES.
  • Authentication capability information of the EES sent by the EES is received; wherein the authentication capability information of the EES indicates the secure authentication method supported by the EES.
  • the authentication capability request information includes a visited network identifier and/or a home network identifier of the EEC, or the authentication capability request information includes a visited network identifier and/or a home network identifier of a terminal corresponding to the EEC.
  • the authentication capability information of the EES in response to the EES not being authorized to use authentication and key management AKMA in the access network or home network of the EEC, does not include the authentication method of transport layer security TLS based on AKMA; and/or, in response to the EES not being authorized to use AKMA in the access network or home network of the terminal corresponding to the EEC, the authentication capability information of the EES does not include the authentication method of transport layer security TLS based on AKMA; and/or, in response to the EES not being authorized to use general bootstrapping framework GBA in the access network or home network of the EEC, the authentication capability information of the EES does not include the authentication method of transport layer security TLS based on GBA; and/or, in response to the EES not being authorized to use GBA in the access network or home network of the terminal corresponding to the EEC, the authentication capability information of the EES does not include the authentication method of transport layer security TLS based on GBA.
  • a service provision request message sent by an EEC is received; wherein the service provision request message is used to request a security authentication method supported by an edge enabling server EES.
  • an authentication capability request message is sent to the identified EES; wherein the authentication capability request message is used to request the authentication capability information of the EES.
  • the authentication capability information of the EES sent by the EES is received; wherein the authentication capability information of the EES indicates a security authentication method supported by the EES.
  • the authentication capability information of the identified EES is sent to the EEC.
  • service provision request information sent by the EEC is received; wherein the service provision request information is used to request the secure authentication method supported by the edge enabling server EES.
  • authentication capability request information is sent to the identified EES; wherein the authentication capability request information is used to request the authentication capability information of the EES.
  • Authentication capability information of the EES sent by the EES is received; wherein the authentication capability information of the EES indicates the secure authentication method supported by the EES.
  • the authentication capability information of the identified EES and information for establishing a connection between the ECS and the EES are sent to the EEC.
  • this embodiment provides an authentication method, wherein the method is executed by an edge configuration client ECS, and the method includes:
  • Step 91 Send the identified authentication capability information of the EES to the EEC.
  • a service provision request message sent by an EEC is received, wherein the service provision request message is used to request to obtain a security authentication method supported by an edge enabling server EES, and the identified authentication capability information of the EES is sent to the EEC.
  • a service provision request message sent by an EEC is received, wherein the service provision request message is used to request a security authentication method supported by an edge enabling server (EES).
  • EES edge enabling server
  • the identified authentication capability information of the EES and information for establishing a connection between the ECS and the EES are sent to the EEC.
  • a service provision request message sent by an EEC is received; wherein the service provision request message is used to request a security authentication method supported by an edge enabling server EES.
  • an authentication capability request message is sent to the identified EES; wherein the authentication capability request message is used to request the authentication capability information of the EES.
  • the authentication capability information of the EES sent by the EES is received; wherein the authentication capability information of the EES indicates a security authentication method supported by the EES.
  • the authentication capability information of the identified EES is sent to the EEC.
  • this embodiment provides an authentication method, wherein the method is executed by an edge configuration server EES, and the method includes:
  • Step 101 Receive authentication capability request information sent by ECS
  • the authentication capability request information is used to request the authentication capability information of the EES, wherein the authentication capability information of the EES indicates the security authentication method supported by the EES.
  • the terminal involved in the present disclosure may be, but is not limited to, a mobile phone, a wearable device, a vehicle-mounted terminal, a road side unit (RSU, Road Side Unit), a smart home terminal, an industrial sensor device and/or a medical device, etc.
  • the terminal may be a Redcap terminal or a predetermined version of a new air interface NR terminal (for example, an R17 NR terminal).
  • the edge enabling client EEC may be an application program running on the terminal, for example, a WeChat application program and a Weibo application program, and the like.
  • authentication capability request information sent by ECS is received; wherein the authentication capability request information is used to request authentication capability information of the EES, wherein the authentication capability information of the EES indicates a security authentication method supported by the EES; the authentication capability request information includes an access network identifier and/or a home network identifier of the EEC, or the authentication capability request information includes an access network identifier and/or a home network identifier of a terminal corresponding to the EEC.
  • an authentication capability request message sent by an ECS is received, wherein the authentication capability request message is used to request authentication capability information of the EES, wherein the authentication capability information of the EES indicates a security authentication method supported by the EES, and the authentication capability information of the EES is sent to the ECS.
  • the authentication capability information of the EES in response to the EES not being authorized to use authentication and key management AKMA in the access network or home network of the EEC, does not include the authentication method of transport layer security TLS based on AKMA; and/or, in response to the EES not being authorized to use AKMA in the access network or home network of the terminal corresponding to the EEC, the authentication capability information of the EES does not include the authentication method of transport layer security TLS based on AKMA; and/or, in response to the EES not being authorized to use general bootstrapping framework GBA in the access network or home network of the EEC, the authentication capability information of the EES does not include the authentication method of transport layer security TLS based on GBA; and/or, in response to the EES not being authorized to use GBA in the access network or home network of the terminal corresponding to the EEC, the authentication capability information of the EES does not include the authentication method of transport layer security TLS based on GBA.
  • an authentication capability request message sent by an ECS is received; wherein the authentication capability request message is used to request the authentication capability information of the EES, wherein the authentication capability information of the EES indicates the security authentication method supported by the EES.
  • Authorization confirmation information is sent to the access network and/or home network of the EEC; authorization response information is received from the access network and/or home network, wherein the authorization response information indicates at least one of the following: the EEC is authorized to use AKMA; the EEC is not authorized to use AKMA; the EEC is authorized to use GBA; and the EEC is not authorized to use GBA.
  • the access network and the home network determine the authorization response information based on the identifier sent by the ECS.
  • this embodiment provides an authentication method, wherein the method is executed by an edge configuration server EES, and the method includes:
  • Step 111 Send authorization confirmation information to the visited network and/or home network of the EEC;
  • Step 112 Receive authorization response information sent by the visited network and/or the home network, wherein the authorization response information indicates at least one of the following:
  • Said EES is authorized to use AKMA
  • the said EES is not authorized to use AKMA;
  • the EES is authorized to use GBA.
  • the EES is not authorized to use GBA.
  • an authorization confirmation message is sent to a visited network and/or a home network of the EEC; an authorization response message sent by the visited network and/or the home network is received, wherein the authorization response message indicates at least one of the following: the EES is authorized to use AKMA; the EES is not authorized to use AKMA; the EES is authorized to use GBA; and the EES is not authorized to use GBA.
  • authentication capability information of the EES is sent to the ECS.
  • the access network and/or home network of the EEC determines whether to authorize AKMA and/or GBA based on the identification information sent by the ECS, and obtains a determination result; based on the determination result, determines the authorization response information. It should be noted that as long as one of the access network and the home network of the EEC does not authorize AKMA, AKMA is not authorized; and/or, as long as one of the access network and the home network of the EEC does not authorize GBA, GBA is not authorized.
  • this embodiment provides an authentication method, wherein the method is executed by an edge configuration server EES, and the method includes:
  • Step 121 Based on the authorization response information, send the authentication capability information of the EES to the ECS.
  • an authorization confirmation message is sent to a visited network and/or a home network of the EEC; an authorization response message sent by the visited network and/or the home network is received, wherein the authorization response message indicates at least one of the following: the EEC is authorized to use AKMA; the EEC is not authorized to use AKMA; the EEC is authorized to use GBA; and the EEC is not authorized to use GBA.
  • the authentication capability information of the EES is sent to the ECS.
  • the authentication capability information of the EES in response to the EES not being authorized to use authentication and key management AKMA in the access network or home network of the EEC, does not include the authentication method of transport layer security TLS based on AKMA; and/or, in response to the EES not being authorized to use AKMA in the access network or home network of the terminal corresponding to the EEC, the authentication capability information of the EES does not include the authentication method of transport layer security TLS based on AKMA; and/or, in response to the EES not being authorized to use general bootstrapping framework GBA in the access network or home network of the EEC, the authentication capability information of the EES does not include the authentication method of transport layer security TLS based on GBA; and/or, in response to the EES not being authorized to use GBA in the access network or home network of the terminal corresponding to the EEC, the authentication capability information of the EES does not include the authentication method of transport layer security TLS based on GBA.
  • this embodiment provides an authentication method, wherein the method is executed by an edge configuration server EES, and the method includes:
  • Step 131 receiving authentication capability request information sent by the ECS; wherein the authentication capability request information is used to request authentication capability information of the EES, wherein the authentication capability information of the EES indicates the security authentication method supported by the EES;
  • Step 132 Send the authentication capability information of the EES to the ECS.
  • EEC can be configured with the authentication capability of ECS.
  • the authentication capability of ECS can be pre-configured with EEC through ECS configuration information; the edge-aware application client (AC, Application Client) can configure the authentication capability of ECS through ECS configuration information; users can configure the authentication capability of ECS through ECS configuration information.
  • AC Application Client
  • this embodiment provides an authentication method, including:
  • Step 140 The edge enabling client EEC may obtain the authentication capabilities of the access network and the home network during the registration process.
  • the authentication capabilities indicate the supported authentication mechanisms.
  • the security authentication methods include at least one of the following: an authentication method based on transport layer security TLS of the general bootstrapping framework GBA; an authentication method based on TLS of the application authentication and key management AKMA; and an authentication method based on a certificate.
  • the EES may send its authentication capabilities to the ECS during the EES registration process.
  • Step 141 establish a TLS connection.
  • the EEC selects a mutual authentication method used between the EEC and the ECS based on the authentication capability of the EEC, the authentication capability of the ECS, the authentication capability of the home network, and the authentication capability of the access network.
  • a TLS connection is established between the EEC and the ECS.
  • messages between the EEC and the ECS are protected.
  • Step 142 send a service provision request.
  • the EEC sends a service provision request to the ECS.
  • the service provision request includes the security credentials of the EEC received during the EEC authorization process, and may include a UE identifier, such as a Generic Public Subscription Identifier (GPSI), connectivity information, UE location information, and AC configuration information.
  • GPSI Generic Public Subscription Identifier
  • the EEC may send its home network identifier to the ECS.
  • Step 143 check the authentication mode of the EES. If the AC configuration information is provided by the EEC, the ECS identifies the EES based on the provided AC profile information and the UE location information. If no AC profile is provided, then: the ECS identifies the EES based on the UE-specific service information and the UE location information at the ECS; or, the ECS identifies the EES by applying the ECS provider policy (e.g., based only on the UE location information); the ECS checks whether it has the authentication capability for the identified EES.
  • the ECS identifies the EES based on the provided AC profile information and the UE location information. If no AC profile is provided, then: the ECS identifies the EES based on the UE-specific service information and the UE location information at the ECS; or, the ECS identifies the EES by applying the ECS provider policy (e.g., based only on the UE location information); the ECS checks whether it has the authentication capability for the identified EES.
  • Step 144 Send authentication capability information. If the ECS has authentication capability information of the identified EES, steps 145 to 148 should be skipped. The ECS sends the authentication capability of the identified EES to the EEC together with information for establishing a connection with the identified EES (e.g., a Uniform Resource Identifier (URI) and an IP address).
  • URI Uniform Resource Identifier
  • Step 145 TLS connection establishment. If the ECS does not have the authentication capability information of the identified EES, a TLS connection is established between the EES and the ECS. After step 145, the messages between the EES and the ECS are protected.
  • Step 146 Send an EES authentication capability request.
  • the ECS sends an EES authentication capability request to the EES.
  • the ECS may send a visited network identifier and a home network identifier to the EES.
  • Step 147 Send the authentication capability information of the EES. After receiving the authentication capability request, the EES sends its authentication capability information back to the ECS. If the EES is not authorized to use AKMA in the visited network and home network of the UE (EEC), the EES should not include TLS with AKMA in the authentication capability information. If the EES is not authorized to use GBA in the visited network and home network of the UE (EEC), the EES should not include TLS with GBA in the authentication capability information.
  • Step 148 Send the authentication capability information of the EES.
  • the ECS sends the authentication capability of the identified EES to the EEC together with the information (eg, URI and IP address) for establishing a connection to the identified EES.
  • the information eg, URI and IP address
  • Step 149 Select an authentication method.
  • the EEC selects a security authentication method based on the authentication capability of the EEC, the authentication capability of the EES, the authentication capability of the home network, and the authentication function of the access network.
  • Step 150 Perform mutual authentication based on the selected authentication method.
  • the EEC triggers the authentication procedure according to the selected method.
  • the EES may send a registration request message to the ECS, and the registration request message includes the authentication capability information of the EES.
  • the ECS obtains the authentication capability information of the EES from the registration request message, and stores the authentication capability information of the EES and the identifier of the EES locally.
  • an authentication device is provided in this embodiment, wherein the device includes:
  • the sending module 151 is configured to send service provision request information to the edge configuration server ECS;
  • the service provision request information is used to request to obtain the security authentication method supported by the edge enabling server EES.
  • an authentication device is provided in this embodiment, wherein the device includes:
  • the receiving module 161 is configured to receive the service provision request information sent by the EEC;
  • the service provision request information is used to request to obtain the security authentication method supported by the edge enabling server EES.
  • an authentication device is provided in this embodiment, wherein the device includes:
  • the receiving module 171 is configured to receive the authentication capability request information sent by the ECS;
  • the authentication capability request information is used to request the authentication capability information of the EES, wherein the authentication capability information of the EES indicates the security authentication method supported by the EES.
  • an authentication system is provided in this embodiment, wherein the system includes EEC, ECS and EES, wherein the EEC is used to implement any method described in the present disclosure executed by the EEC; the ECS is used to implement any method described in the present disclosure executed by the ECS; and the EES is used to implement any method described in the present disclosure executed by the EES.
  • the present disclosure provides a communication device, the communication device comprising:
  • a memory for storing processor-executable instructions
  • the processor is configured to implement the method applied to any embodiment of the present disclosure when running executable instructions.
  • the processor may include various types of storage media, which are non-temporary computer storage media that can continue to memorize information stored thereon after the communication device loses power.
  • the processor may be connected to the memory via a bus or the like to read the executable program stored in the memory.
  • An embodiment of the present disclosure further provides a computer storage medium, wherein the computer storage medium stores a computer executable program, and when the executable program is executed by a processor, the method of any embodiment of the present disclosure is implemented.
  • an embodiment of the present disclosure provides a structure of a terminal.
  • this embodiment provides a terminal 800, which can be a mobile phone, a computer, a digital broadcast terminal, a message sending and receiving device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, etc.
  • terminal 800 may include one or more of the following components: a processing component 802 , a memory 804 , a power component 806 , a multimedia component 808 , an audio component 810 , an input/output (I/O) interface 812 , a sensor component 814 , and a communication component 816 .
  • a processing component 802 may include one or more of the following components: a processing component 802 , a memory 804 , a power component 806 , a multimedia component 808 , an audio component 810 , an input/output (I/O) interface 812 , a sensor component 814 , and a communication component 816 .
  • a processing component 802 may include one or more of the following components: a processing component 802 , a memory 804 , a power component 806 , a multimedia component 808 , an audio component 810 , an input/output (I/O) interface 812 , a sensor component 814 , and a communication component
  • the processing component 802 generally controls the overall operation of the terminal 800, such as operations associated with display, phone calls, data communications, camera operations, and recording operations.
  • the processing component 802 may include one or more processors 820 to execute instructions to complete all or part of the steps of the above-mentioned method.
  • the processing component 802 may include one or more modules to facilitate the interaction between the processing component 802 and other components.
  • the processing component 802 may include a multimedia module to facilitate the interaction between the multimedia component 808 and the processing component 802.
  • the memory 804 is configured to store various types of data to support operations on the device 800. Examples of such data include instructions for any application or method operating on the terminal 800, contact data, phone book data, messages, pictures, videos, etc.
  • the memory 804 can be implemented by any type of volatile or non-volatile storage device or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic disk or optical disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read-only memory
  • EPROM erasable programmable read-only memory
  • PROM programmable read-only memory
  • ROM read-only memory
  • magnetic memory flash memory
  • flash memory magnetic disk or optical disk.
  • Power component 806 provides power to various components of terminal 800.
  • Power component 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power to terminal 800.
  • the multimedia component 808 includes a screen that provides an output interface between the terminal 800 and the user.
  • the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from the user.
  • the touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundaries of the touch or slide action, but also detect the duration and pressure associated with the touch or slide operation.
  • the multimedia component 808 includes a front camera and/or a rear camera. When the device 800 is in an operating mode, such as a shooting mode or a video mode, the front camera and/or the rear camera may receive external multimedia data. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
  • the audio component 810 is configured to output and/or input audio signals.
  • the audio component 810 includes a microphone (MIC), and when the terminal 800 is in an operation mode, such as a call mode, a recording mode, and a speech recognition mode, the microphone is configured to receive an external audio signal.
  • the received audio signal can be further stored in the memory 804 or sent via the communication component 816.
  • the audio component 810 also includes a speaker for outputting audio signals.
  • I/O interface 812 provides an interface between processing component 802 and peripheral interface modules, such as keyboards, click wheels, buttons, etc. These buttons may include but are not limited to: home button, volume button, start button, and lock button.
  • the sensor assembly 814 includes one or more sensors for providing various aspects of status assessment for the terminal 800.
  • the sensor assembly 814 can detect the open/closed state of the device 800, the relative positioning of the components, such as the display and keypad of the terminal 800, and the sensor assembly 814 can also detect the position change of the terminal 800 or a component in the terminal 800, the presence or absence of contact between the user and the terminal 800, the orientation or acceleration/deceleration of the terminal 800, and the temperature change of the terminal 800.
  • the sensor assembly 814 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
  • the sensor assembly 814 may also include an optical sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • the communication component 816 is configured to facilitate wired or wireless communication between the terminal 800 and other devices.
  • the terminal 800 can access a wireless network based on a communication standard, such as Wi-Fi, 2G or 3G, or a combination thereof.
  • the communication component 816 receives a broadcast signal or broadcast-related information from an external broadcast management system via a broadcast channel.
  • the communication component 816 also includes a near field communication (NFC) module to facilitate short-range communication.
  • the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra-wideband
  • Bluetooth Bluetooth
  • terminal 800 can be implemented by one or more application-specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable gate arrays (FPGAs), controllers, microcontrollers, microprocessors or other electronic components to perform the above methods.
  • ASICs application-specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGAs field programmable gate arrays
  • controllers microcontrollers, microprocessors or other electronic components to perform the above methods.
  • a non-transitory computer-readable storage medium including instructions is also provided, such as a memory 804 including instructions, and the instructions can be executed by the processor 820 of the terminal 800 to complete the above method.
  • the non-transitory computer-readable storage medium can be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, etc.
  • an embodiment of the present disclosure shows the structure of a base station.
  • the base station 900 can be provided as a network side device.
  • the base station 900 includes a processing component 922, which further includes one or more processors, and a memory resource represented by a memory 932 for storing instructions that can be executed by the processing component 922, such as an application.
  • the application stored in the memory 932 may include one or more modules, each of which corresponds to a set of instructions.
  • the processing component 922 is configured to execute instructions to execute any method of the aforementioned method applied to the base station.
  • the base station 900 may also include a power supply component 926 configured to perform power management of the base station 900, a wired or wireless network interface 950 configured to connect the base station 900 to the network, and an input/output (I/O) interface 958.
  • the base station 900 may operate based on an operating system stored in the memory 932, such as Windows Server TM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开实施例提供了一种认证方法,其中,所述方法由边缘使能客户端EEC执行,所述方法包括:向边缘配置服务器ECS发送服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。这里,由于向边缘配置服务器ECS发送的服务提供请求信息可以请求获取边缘使能服务器EES支持的安全认证方式,在接收到所述ECS发送的EES的认证能力信息后,就可以基于所述EES的认证能力信息指示的所述EES支持的安全认证方式执行所述ECS和所述EES之间的认证,使得所述ECS和所述EES之间的数据传输更加安全和可靠,提升了通信的安全性和可靠性。

Description

认证方法、装置、通信设备及存储介质 技术领域
本公开涉及无线通信技术领域但不限于无线通信技术领域,尤其涉及一种认证方法、装置、通信设备及存储介质。
背景技术
在通信技术中,为了实现通信的安全和可靠,需要在边缘使能客户端(EEC,Edge Enabler Client)和边缘配置服务器(ECS,Edge Configuration Server)之间,以及EEC和边缘使能服务器(EES,Edge Enabler Server)之间进行认证和授权。对于EEC和ECS、以及EEC和EES之间的认证,会使用基于传输层安全(TLS,Transport Layer Security)的认证方法。该TLS的认证方法会涉及多种认证机制,针对该多种认证机制,如果不能确定EEC、ECS和/或EES之间采用的认证机制,会导致EEC、ECS和/或EES之间的认证不能同步,执行认证时可能会出现安全性和可靠性低的问题。
发明内容
本公开实施例公开了一种认证方法、装置、通信设备及存储介质。
根据本公开实施例的第一方面,提供一种认证方法,其中,所述方法由边缘使能客户端EEC执行,所述方法包括:
向边缘配置服务器ECS发送服务提供请求信息;
其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。
根据本公开实施例的第二方面,提供一种认证方法,其中,所述方法由边缘配置客户端ECS执行,所述方法包括:
接收EEC发送的服务提供请求信息;
其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。
根据本公开实施例的第三方面,提供一种认证方法,其中,所述方法由边缘使能服务器EES执行,所述方法包括:
接收ECS发送的认证能力请求信息;
其中,所述认证能力请求信息用于请求所述EES的认证能力信息,其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。
根据本公开实施例的第四方面,提供一种认证装置,其中,所述装置包括:
发送模块,被配置为向边缘配置服务器ECS发送服务提供请求信息;
其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。
根据本公开实施例的第五方面,提供一种认证装置,其中,所述装置包括:
接收模块,被配置为接收EEC发送的服务提供请求信息;
其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。
根据本公开实施例的第六方面,提供一种认证装置,其中,所述装置包括:
接收模块,被配置为接收ECS发送的认证能力请求信息;
其中,所述认证能力请求信息用于请求所述EES的认证能力信息,其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。
根据本公开实施例的第七方面,提供一种认证系统,其中,所述系统包括EEC、ECS和EES,其中,所述EEC用于实现所述EEC执行的如本公开任一实施例所述的方法;所述ECS用于实现所述ECS执行的如本公开任一实施例所述的方法;所述EES用于实现所述EES执行的如本公开任一实施例所述的方法。
根据本公开实施例的第八方面,提供一种通信设备,所述通信设备,包括:
处理器;
用于存储所述处理器可执行指令的存储器;
其中,所述处理器被配置为:用于运行所述可执行指令时,实现本公开任意实施例所述的方法。
根据本公开实施例的第九方面,提供一种计算机存储介质,所述计算机存储介质存储有计算机可执行程序,所述可执行程序被处理器执行时实现本公开任意实施例所述的方法。
在本公开实施例中,向边缘配置服务器ECS发送服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。这里,由于向边缘配置服务器ECS发送的服务提供请求信息可以请求获取边缘使能服务器EES支持的安全认证方式,在接收到所述ECS发送的EES的认证能力信息后,就可以基于所述EES的认证能力信息指示的所述EES支持的安全认证方式执行所述ECS和所述EES之间的认证,使得所述ECS和所述EES之间的数据传输更加安全和可靠,提升了通信的安全性和可靠性。
附图说明
图1是根据一示例性实施例示出的一种无线通信系统的结构示意图。
图2是根据一示例性实施例示出的一种认证方法的流程示意图。
图3是根据一示例性实施例示出的一种认证方法的流程示意图。
图4是根据一示例性实施例示出的一种认证方法的流程示意图。
图5是根据一示例性实施例示出的一种认证方法的流程示意图。
图6是根据一示例性实施例示出的一种认证方法的流程示意图。
图7是根据一示例性实施例示出的一种认证方法的流程示意图。
图8是根据一示例性实施例示出的一种认证方法的流程示意图。
图9是根据一示例性实施例示出的一种认证方法的流程示意图。
图10是根据一示例性实施例示出的一种认证方法的流程示意图。
图11是根据一示例性实施例示出的一种认证方法的流程示意图。
图12是根据一示例性实施例示出的一种认证方法的流程示意图。
图13是根据一示例性实施例示出的一种认证方法的结构示意图。
图14是根据一示例性实施例示出的一种认证方法的结构示意图。
图15是根据一示例性实施例示出的一种认证装置的结构示意图。
图16是根据一示例性实施例示出的一种认证装置的结构示意图。
图17是根据一示例性实施例示出的一种认证装置的结构示意图。
图18是根据一示例性实施例示出的一种认证系统的结构示意图。
图19是根据一示例性实施例示出的一种终端的结构示意图。
图20是根据一示例性实施例示出的一种基站的框图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开实施例相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开实施例的一些方面相一致的装置和方法的例子。
在本公开实施例使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开实施例。在本公开实施例和所附权利要求书中所使用的单数形式的“一种”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本公开实施例可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开实施例范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。
出于简洁和便于理解的目的,本文在表征大小关系时,所使用的术语为“大于”或“小于”。但对于本领域技术人员来说,可以理解:术语“大于”也涵盖了“大于等于”的含义,“小于”也涵盖了“小于等于”的含义。
请参考图1,其示出了本公开实施例提供的一种无线通信系统的结构示意图。如图1所示,无线通信系统是基于移动通信技术的通信系统,该无线通信系统可以包括:若干个用户设备110以及若干个基站120。
其中,用户设备110可以是指向用户提供语音和/或数据连通性的设备。用户设备110可以经无线接入网(Radio Access Network,RAN)与一个或多个核心网进行通信,用户设备110可以是物联网用户设备,如传感器设备、移动电话和具有物联网用户设备的计算机,例如,可以是固定式、便携式、袖珍式、手持式、计算机内置的或者车载的装置。例如,站(Station,STA)、订户单元(subscriber unit)、订户站(subscriber station),移动站(mobile station)、移动台(mobile)、远程站(remote station)、接入点、远程用户设备(remote terminal)、接入用户设备(access terminal)、用户装置(user terminal)、用户代理(user agent)、用户设备(user device)、或用户设备(user equipment)。或者,用户设备110 也可以是无人飞行器的设备。或者,用户设备110也可以是车载设备,比如,可以是具有无线通信功能的行车电脑,或者是外接行车电脑的无线用户设备。或者,用户设备110也可以是路边设备,比如,可以是具有无线通信功能的路灯、信号灯或者其它路边设备等。
基站120可以是无线通信系统中的网络侧设备。其中,该无线通信系统可以是第四代移动通信技术(the 4th generation mobile communication,4G)系统,又称长期演进(Long Term Evolution,LTE)系统;或者,该无线通信系统也可以是5G系统,又称新空口系统或5G NR系统。或者,该无线通信系统也可以是5G系统的再下一代系统。其中,5G系统中的接入网可以称为NG-RAN(New Generation-Radio Access Network,新一代无线接入网)。
其中,基站120可以是4G系统中采用的演进型基站(eNB)。或者,基站120也可以是5G系统中采用集中分布式架构的基站(gNB)。当基站120采用集中分布式架构时,通常包括集中单元(central unit,CU)和至少两个分布单元(distributed unit,DU)。集中单元中设置有分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)层、无线链路层控制协议(Radio Link Control,RLC)层、媒体访问控制(Media Access Control,MAC)层的协议栈;分布单元中设置有物理(Physical,PHY)层协议栈,本公开实施例对基站120的具体实现方式不加以限定。
基站120和用户设备110之间可以通过无线空口建立无线连接。在不同的实施方式中,该无线空口是基于第四代移动通信网络技术(4G)标准的无线空口;或者,该无线空口是基于第五代移动通信网络技术(5G)标准的无线空口,比如该无线空口是新空口;或者,该无线空口也可以是基于5G的更下一代移动通信网络技术标准的无线空口。
在一些实施例中,用户设备110之间还可以建立E2E(End to End,端到端)连接。比如车联网通信(vehicle to everything,V2X)中的V2V(vehicle to vehicle,车对车)通信、V2I(vehicle to Infrastructure,车对路边设备)通信和V2P(vehicle to pedestrian,车对人)通信等场景。
这里,上述用户设备可认为是下面实施例的终端设备。
在一些实施例中,上述无线通信系统还可以包含网络管理设备130。
若干个基站120分别与网络管理设备130相连。其中,网络管理设备130可以是无线通信系统中的核心网设备,比如,该网络管理设备130可以是演进的数据分组核心网(Evolved Packet Core,EPC)中的移动性管理实体(Mobility Management Entity,MME)。或者,该网络管理设备也可以是其它的核心网设备,比如服务网关(Serving GateWay,SGW)、公用数据网网关(Public Data Network GateWay,PGW)、策略与计费规则功能单元(Policy and Charging Rules Function,PCRF)或者归属签约用户服务器(Home Subscriber Server,HSS)等。对于网络管理设备130的实现形态,本公开实施例不做限定。
为了便于本领域内技术人员理解,本公开实施例列举了多个实施方式以对本公开实施例的技术方案进行清晰地说明。当然,本领域内技术人员可以理解,本公开实施例提供的多个实施例,可以被单独执行,也可以与本公开实施例中其他实施例的方法结合后一起被执行,还可以单独或结合后与其他相关技术中的一些方法一起被执行;本公开实施例并不对此作出限定。
如图2所示,本实施例中提供一种认证方法,其中,所述方法由边缘使能客户端EEC执行,所述 方法包括:
步骤21、向边缘配置服务器ECS发送服务提供请求信息;
其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。
这里,本公开所涉及的终端可以是但不限于是手机、可穿戴设备、车载终端、路侧单元(RSU,Road Side Unit)、智能家居终端、工业用传感设备和/或医疗设备等。在一些实施例中,该终端可以是Redcap终端或者预定版本的新空口NR终端(例如,R17的NR终端)。
这里,边缘使能客户端EEC可以是运行在终端上的应用程序,例如,微信应用程序和微博应用程序等。
在一个实施例中,向边缘配置服务器ECS发送服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式;所述服务提供请求信息包含所述EEC所对应终端的归属网络信息。
需要说明的是,归属网络信息包括归属网络标识、应用的认证和密钥管理(AKMA,Authentication and Key Management for Applications)密钥标识(A-KID,AKMA Key Identifier)和会话实务标识(B-TID,Bootstrapping Transaction Identifier)中的至少之一,可以被用于识别终端或者EEC的归属网络。
在一个实施例中,向边缘配置服务器ECS发送服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。接收所述ECS发送的EES的认证能力信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。
在一个实施例中,向ECS发送EEC所对应终端的位置信息和/或应用客户端配置文件(AC Profile);所述ECS在接收到所述EEC所对应终端的位置信息和/或应用客户端配置文件后,存储在所述ECS;所述EEC所对应终端的位置信息和/或应用客户端配置文件用于所述ECS识别ECS。
在一个实施例中,向边缘配置服务器ECS发送服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。接收所述ECS发送的EES的认证能力信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式;其中,响应于所述EES未被授权在EEC的访问网络或者归属网络使用认证和密钥管理AKMA,所述EES的认证能力信息中不包含基于AKMA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC所对应终端的访问网络或者归属网络使用AKMA,所述EES的认证能力信息中不包含基于AKMA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC的访问网络或者归属网络使用通用引导框架GBA,所述EES的认证能力信息中不包含基于GBA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC所对应终端的访问网络或者归属网络使用GBA,所述EES的认证能力信息中不包含基于GBA的传输层安全TLS的认证方式。
在一个实施例中,向边缘配置服务器ECS发送服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。接收所述ECS发送的EES的认证能力信息和用于建立所述ECS与所述EES之间的连接的信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。
在一个实施例中,所述EEC配置有所述ECS的认证能力信息,所述ECS的认证能力信息指示所 述ECS支持的安全认证方式。
在一个实施例中,所述ECS的认证能力信息预先配置于所述EEC;或者,所述ECS的认证能力信息由边缘敏感的应用客户端(Edge-aware AC)配置于所述EEC;或者,所述ECS的认证能力信息由用户配置于所述EEC。
在一个实施例中,基于第一认证能力信息,确定在所述EEC和所述ECS之间执行相互认证的认证方式;其中,所述第一认证能力信息包括以下至少之一:EEC支持的安全认证方式;边缘配置服务器ECS支持的安全认证方式;归属网络支持的安全认证方式;以及访问网络支持的安全认证方式。
在一个实施例中,基于第一认证能力信息,确定在所述EEC和所述ECS之间执行相互认证的认证方式。基于所述认证方式执行所述EEC和所述ECS之间的认证。响应于所述EEC和所述ECS之间相互认证成功,在所述EEC和所述ECS之间建立传输层安全TLS连接。
在一个实施例中,基于第一认证能力信息,确定在所述EEC和所述ECS之间执行相互认证的认证方式。基于所述认证方式执行所述EEC和所述ECS之间的认证。响应于所述EEC和所述ECS之间相互认证成功,在所述EEC和所述ECS之间建立传输层安全TLS连接。基于所述TLS连接,向边缘配置服务器ECS发送服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。
在一个实施例中,基于第一认证能力信息,确定在所述EEC和所述ECS之间执行相互认证的认证方式。基于所述认证方式执行所述EEC和所述ECS之间的认证。响应于所述EEC和所述ECS之间相互认证成功,在所述EEC和所述ECS之间建立传输层安全TLS连接。基于所述TLS连接,接收所述ECS发送的EES的认证能力信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。
在一个实施例中,向边缘配置服务器ECS发送服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。接收所述ECS发送的EES的认证能力信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。基于第二认证能力信息,确定在所述EEC和所述EES之间执行相互认证的认证方式;其中,所述第二认证能力信息包括以下至少之一:EEC支持的安全认证方式;边缘使能服务器EES支持的安全认证方式;归属网络支持的安全认证方式;以及访问网络支持的安全认证方式。
在本公开实施例中,向边缘配置服务器ECS发送服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。这里,由于向边缘配置服务器ECS发送的服务提供请求信息可以请求获取边缘使能服务器EES支持的安全认证方式,在接收到所述ECS发送的EES的认证能力信息后,就可以基于所述EES的认证能力信息指示的所述EES支持的安全认证方式执行所述ECS和所述EES之间的认证,使得所述ECS和所述EES之间的数据传输更加安全和可靠,提升了通信的安全性和可靠性。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图3所示,本实施例中提供一种认证方法,其中,所述方法由边缘使能客户端EEC执行,所述 方法包括:
步骤31、基于第一认证能力信息,确定在EEC和ECS之间执行相互认证的认证方式;
其中,所述第一认证能力信息包括以下至少之一:
EEC支持的认证方式;
边缘配置服务器ECS支持的安全认证方式;
归属网络支持的安全认证方式;以及
访问网络支持的安全认证方式。
在一个实施例中,所述EEC配置有所述ECS的认证能力信息,所述ECS的认证能力信息指示所述ECS支持的安全认证方式。
在一个实施例中,所述ECS的认证能力信息预先配置于所述EEC;或者,所述ECS的认证能力信息由边缘敏感的应用客户端AC配置于所述EEC;或者,所述ECS的认证能力信息由用户配置于所述EEC。
在一个实施例中,基于第一认证能力信息,确定在EEC和ECS之间执行相互认证的认证方式;其中,所述第一认证能力信息包括以下至少之一:EEC支持的认证方式;边缘配置服务器ECS支持的安全认证方式;归属网络支持的安全认证方式;以及访问网络支持的安全认证方式。基于所述认证方式执行所述EEC和所述ECS之间的认证。响应于所述EEC和所述ECS之间相互认证成功,在所述EEC和所述ECS之间建立传输层安全TLS连接。
在一个实施例中,基于第一认证能力信息,确定在EEC和ECS之间执行相互认证的认证方式;其中,所述第一认证能力信息包括以下至少之一:EEC支持的认证方式;边缘配置服务器ECS支持的安全认证方式;归属网络支持的安全认证方式;以及访问网络支持的安全认证方式。基于所述认证方式执行所述EEC和所述ECS之间的认证。响应于所述EEC和所述ECS之间相互认证成功,在所述EEC和所述ECS之间建立传输层安全TLS连接。基于所述TLS连接,向边缘配置服务器ECS发送服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。
在一个实施例中,基于第一认证能力信息,确定在EEC和ECS之间执行相互认证的认证方式;其中,所述第一认证能力信息包括以下至少之一:EEC支持的认证方式;边缘配置服务器ECS支持的安全认证方式;归属网络支持的安全认证方式;以及访问网络支持的安全认证方式。基于所述认证方式执行所述EEC和所述ECS之间的认证。响应于所述EEC和所述ECS之间相互认证成功,在所述EEC和所述ECS之间建立传输层安全TLS连接。基于所述TLS连接,向边缘配置服务器ECS发送服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。基于所述TLS连接,接收所述ECS发送的EES的认证能力信息和/或用于建立所述ECS与所述EES之间的连接的信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。
在一个实施例中,响应于所述EES未被授权在EEC的访问网络或者归属网络使用认证和密钥管理AKMA,所述EES的认证能力信息中不包含基于AKMA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC所对应终端的访问网络或者归属网络使用AKMA,所述EES的认证能力信息中不包含基于AKMA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC 的访问网络或者归属网络使用通用引导框架GBA,所述EES的认证能力信息中不包含基于GBA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC所对应终端的访问网络或者归属网络使用GBA,所述EES的认证能力信息中不包含基于GBA的传输层安全TLS的认证方式。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图4所示,本实施例中提供一种认证方法,其中,所述方法由边缘使能客户端EEC执行,所述方法包括:
步骤41、接收ECS发送的EES的认证能力信息;
其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。
在一个实施例中,向边缘配置服务器ECS发送服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。接收ECS发送的EES的认证能力信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。
在一个实施例中,向边缘配置服务器ECS发送服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。接收ECS发送的EES的认证能力信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式;其中,响应于所述EES未被授权在EEC的访问网络或者归属网络使用认证和密钥管理AKMA,所述EES的认证能力信息中不包含基于AKMA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC所对应终端的访问网络或者归属网络使用AKMA,所述EES的认证能力信息中不包含基于AKMA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC的访问网络或者归属网络使用通用引导框架GBA,所述EES的认证能力信息中不包含基于GBA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC所对应终端的访问网络或者归属网络使用GBA,所述EES的认证能力信息中不包含基于GBA的传输层安全TLS的认证方式。
在一个实施例中,向边缘配置服务器ECS发送服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。接收所述ECS发送的EES的认证能力信息和用于建立所述ECS与所述EES之间的连接的信息,其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。
在一个实施例中,基于第一认证能力信息,确定在EEC和ECS之间执行相互认证的认证方式;其中,所述第一认证能力信息包括以下至少之一:EEC支持的认证方式;边缘配置服务器ECS支持的安全认证方式;归属网络支持的安全认证方式;以及访问网络支持的安全认证方式。基于所述认证方式执行所述EEC和所述ECS之间的认证。响应于所述EEC和所述ECS之间相互认证成功,在所述EEC和所述ECS之间建立传输层安全TLS连接。基于所述TLS连接,向边缘配置服务器ECS发送服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。基于所述TLS连接,接收所述ECS发送的EES的认证能力信息和/或用于建立所述ECS与所述EES之间的连接的信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图5所示,本实施例中提供一种认证方法,其中,所述方法由边缘使能客户端EEC执行,所述方法包括:
步骤51、基于第二认证能力信息,确定在EEC和EES之间执行相互认证的认证方式;
其中,所述第二认证能力信息包括以下至少之一:
EEC支持的安全认证方式;
边缘使能服务器EES支持的安全认证方式;
归属网络支持的安全认证方式;以及
访问网络支持的安全认证方式。
在一个实施例中,向边缘配置服务器ECS发送服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。接收所述ECS发送的EES的认证能力信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。基于第二认证能力信息,确定在所述EEC和所述EES之间执行相互认证的认证方式;其中,所述第二认证能力信息包括以下至少之一:EEC支持的安全认证方式;边缘使能服务器EES支持的安全认证方式;归属网络支持的安全认证方式;以及访问网络支持的安全认证方式。
基于第一认证能力信息,确定在EEC和ECS之间执行相互认证的认证方式;其中,所述第一认证能力信息包括以下至少之一:EEC支持的认证方式;边缘配置服务器ECS支持的安全认证方式;归属网络支持的安全认证方式;以及访问网络支持的安全认证方式。基于所述认证方式执行所述EEC和所述ECS之间的认证。响应于所述EEC和所述ECS之间相互认证成功,在所述EEC和所述ECS之间建立传输层安全TLS连接。基于所述TLS连接,向边缘配置服务器ECS发送服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。接收所述ECS发送的EES的认证能力信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。基于第二认证能力信息,确定在所述EEC和所述EES之间执行相互认证的认证方式;其中,所述第二认证能力信息包括以下至少之一:EEC支持的安全认证方式;边缘使能服务器EES支持的安全认证方式;归属网络支持的安全认证方式;以及访问网络支持的安全认证方式。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图6所示,本实施例中提供一种认证方法,其中,所述方法由边缘配置客户端ECS执行,所述方法包括:
步骤61、接收EEC发送的服务提供请求信息;
其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。
这里,本公开所涉及的终端可以是但不限于是手机、可穿戴设备、车载终端、路侧单元(RSU, Road Side Unit)、智能家居终端、工业用传感设备和/或医疗设备等。在一些实施例中,该终端可以是Redcap终端或者预定版本的新空口NR终端(例如,R17的NR终端)。
这里,边缘使能客户端EEC可以是运行在终端上的应用程序,例如,微信应用程序和微博应用程序等。
在一个实施例中,接收EEC发送的服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式;所述服务提供请求信息包含所述EEC所对应终端的归属网络信息。
需要说明的是,归属网络信息包括归属网络标识、应用的认证和密钥管理(AKMA,Authentication and Key Management for Applications)密钥标识(A-KID,AKMA Key Identifier)和会话实务标识(B-TID,Bootstrapping Transaction Identifier)中的至少之一,可以被用于识别终端或者EEC的归属网络。
在一个实施例中,接收EEC发送的服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。向EEC发送认证能力信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。
在一个实施例中,接收EEC发送的服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。向EEC发送EES的认证能力信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式;其中,响应于所述EES未被授权在EEC的访问网络或者归属网络使用认证和密钥管理AKMA,所述EES的认证能力信息中不包含基于AKMA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC所对应终端的访问网络或者归属网络使用AKMA,所述EES的认证能力信息中不包含基于AKMA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC的访问网络或者归属网络使用通用引导框架GBA,所述EES的认证能力信息中不包含基于GBA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC所对应终端的访问网络或者归属网络使用GBA,所述EES的认证能力信息中不包含基于GBA的传输层安全TLS的认证方式。
在一个实施例中,接收EEC发送的服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。向EEC发送EES的认证能力信息和用于建立所述ECS与所述EES之间的连接的信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。
在一个实施例中,接收所述EES发送的所述EES的认证能力信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。接收EEC发送的服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。向所述EEC发送识别的所述EES的认证能力信息。
在一个实施例中,接收所述EES发送的所述EES的认证能力信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。接收EEC发送的服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。向所述EEC发送识别的所述EES的认证能力信息和用于建立所述ECS和所述EES之间的连接的信息。
在一个实施例中,在EES注册过程中,接收所述EES发送的所述EES的认证能力信息;其中,所 述EES的认证能力信息指示所述EES支持的安全认证方式。接收EEC发送的服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。向所述EEC发送识别的所述EES的认证能力信息。
在一个实施例中,响应于所述ECS不具有识别的所述EES的认证能力信息,向识别的所述EES发送认证能力请求信息;其中,所述认证能力请求信息用于请求所述EES的认证能力信息其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。接收EEC发送的服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。向所述EEC发送识别的所述EES的认证能力信息。这里,识别的EES(identified EES)为通过预定条件筛选出的EES。
在一个实施例中,所述认证能力请求信息包括EEC的访问网络标识符和/或归属网络标识符,或者,所述认证能力请求信息包括EEC所对应的终端的访问网络标识符和/或归属网络标识符。
在一个实施例中,响应于所述EES未被授权在EEC的访问网络或者归属网络使用认证和密钥管理AKMA,所述EES的认证能力信息中不包含基于应用的认证和密钥管理AKMA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC所对应终端的访问网络或者归属网络使用AKMA,所述EES的认证能力信息中不包含基于AKMA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC的访问网络或者归属网络使用通用引导框架GBA,所述EES的认证能力信息中不包含基于GBA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC所对应终端的访问网络或者归属网络使用GBA,所述EES的认证能力信息中不包含基于GBA的传输层安全TLS的认证方式。
在一个实施例中,响应于所述ECS不具有识别的所述EES的认证能力信息,在所述EES和所述ECS之间建立TLS连接。基于所述TLS连接,向识别的所述EES发送认证能力请求信息;其中,所述认证能力请求信息用于请求所述EES的认证能力信息。
在一个实施例中,响应于所述ECS不具有识别的所述EES的认证能力信息,在所述EES和所述ECS之间建立TLS连接。基于所述TLS连接,接收所述EES发送的所述EES的认证能力信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图7所示,本实施例中提供一种认证方法,其中,所述方法由边缘配置客户端ECS执行,所述方法包括:
步骤71、接收所述EES发送的所述EES的认证能力信息;
其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。
在一个实施例中,接收所述EES发送的所述EES的认证能力信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。接收EEC发送的服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。向所述EEC发送识别的所述EES的认证能力信息。
在一个实施例中,在EES注册过程中,接收所述EES发送的所述EES的认证能力信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。接收EEC发送的服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。向所述EEC发送识别的所述EES的认证能力信息。
在一个实施例中,接收EEC发送的服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。响应于所述ECS不具有识别的所述EES的认证能力信息,向识别的所述EES发送认证能力请求信息;其中,所述认证能力请求信息用于请求所述EES的认证能力信息。接收所述EES发送的所述EES的认证能力信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。
在一个实施例中,所述认证能力请求信息包括EEC的访问网络标识符和/或归属网络标识符,或者,所述认证能力请求信息包括EEC所对应的终端的访问网络标识符和/或归属网络标识符。
在一个实施中,所述认证能力请求信息包含以下至少之一:
所述EEC的归属网络信息;
所述EEC对应终端的归属网络信息;
所述EEC的拜访地网络信息;以及
所述EEC对应终端的拜访地网络信息。
在一个实施例中,响应于所述EES未被授权在EEC的访问网络或者归属网络使用认证和密钥管理AKMA,所述EES的认证能力信息中不包含基于AKMA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC所对应终端的访问网络或者归属网络使用AKMA,所述EES的认证能力信息中不包含基于AKMA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC的访问网络或者归属网络使用通用引导框架GBA,所述EES的认证能力信息中不包含基于GBA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC所对应终端的访问网络或者归属网络使用GBA,所述EES的认证能力信息中不包含基于GBA的传输层安全TLS的认证方式。
在一个实施例中,接收所述EES发送的所述EES的认证能力信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。向所述EEC发送识别的所述EES的认证能力信息。
在一个实施例中,接收所述EES发送的所述EES的认证能力信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。向所述EEC发送识别的所述EES的认证能力信息和用于建立所述ECS和所述EES之间的连接的信息。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图8所示,本实施例中提供一种认证方法,其中,所述方法由边缘配置客户端ECS执行,所述方法包括:
步骤81、响应于ECS不具有识别的EES的认证能力信息,向识别的所述EES发送认证能力请求信息;其中,所述认证能力请求信息用于请求所述EES的认证能力信息。
这里,识别的EES(identified EES)为通过特定信息筛选出的EES,所述特定信息包括EEC所对应终端的位置信息、应用客户端配置文件(AC Profile)和/或ECS提供商策略(ECSP policy)。
在一个实施例中,接收EEC发送的服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。响应于所述ECS不具有识别的所述EES的认证能力信息,向识别的所述EES发送认证能力请求信息;其中,所述认证能力请求信息用于请求所述EES的认证能力信息。接收所述EES发送的所述EES的认证能力信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。
在一个实施例中,接收EEC发送的服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。响应于所述ECS不具有识别的所述EES的认证能力信息,在所述EES和所述ECS之间建立TLS连接。基于所述TLS连接向识别的所述EES发送认证能力请求信息;其中,所述认证能力请求信息用于请求所述EES的认证能力信息。接收所述EES发送的所述EES的认证能力信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。
在一个实施例中,所述认证能力请求信息包括EEC的访问网络标识符和/或归属网络标识符,或者,所述认证能力请求信息包括EEC所对应的终端的访问网络标识符和/或归属网络标识符。
在一个实施例中,响应于所述EES未被授权在EEC的访问网络或者归属网络使用认证和密钥管理AKMA,所述EES的认证能力信息中不包含基于AKMA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC所对应终端的访问网络或者归属网络使用AKMA,所述EES的认证能力信息中不包含基于AKMA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC的访问网络或者归属网络使用通用引导框架GBA,所述EES的认证能力信息中不包含基于GBA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC所对应终端的访问网络或者归属网络使用GBA,所述EES的认证能力信息中不包含基于GBA的传输层安全TLS的认证方式。
在一个实施例中,接收EEC发送的服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。响应于所述ECS不具有识别的所述EES的认证能力信息,向识别的所述EES发送认证能力请求信息;其中,所述认证能力请求信息用于请求所述EES的认证能力信息。接收所述EES发送的所述EES的认证能力信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。向所述EEC发送识别的所述EES的认证能力信息。
在一个实施例中,接收EEC发送的服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。响应于所述ECS不具有识别的所述EES的认证能力信息,向识别的所述EES发送认证能力请求信息;其中,所述认证能力请求信息用于请求所述EES的认证能力信息。接收所述EES发送的所述EES的认证能力信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。向所述EEC发送识别的所述EES的认证能力信息和用于建立所述ECS和所述EES之间的连接的信息。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图9所示,本实施例中提供一种认证方法,其中,所述方法由边缘配置客户端ECS执行,所述方法包括:
步骤91、向所述EEC发送识别的所述EES的认证能力信息。
在一个实施例中,接收EEC发送的服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。向所述EEC发送识别的所述EES的认证能力信息。
在一个实施例中,接收EEC发送的服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。向所述EEC发送识别的所述EES的认证能力信息和用于建立所述ECS和所述EES之间的连接的信息。
在一个实施例中,接收EEC发送的服务提供请求信息;其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。响应于所述ECS不具有识别的所述EES的认证能力信息,向识别的所述EES发送认证能力请求信息;其中,所述认证能力请求信息用于请求所述EES的认证能力信息。接收所述EES发送的所述EES的认证能力信息;其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。向所述EEC发送识别的所述EES的认证能力信息。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图10所示,本实施例中提供一种认证方法,其中,所述方法由边缘配置服务器EES执行,所述方法包括:
步骤101、接收ECS发送的认证能力请求信息;
其中,所述认证能力请求信息用于请求所述EES的认证能力信息,其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。
这里,本公开所涉及的终端可以是但不限于是手机、可穿戴设备、车载终端、路侧单元(RSU,Road Side Unit)、智能家居终端、工业用传感设备和/或医疗设备等。在一些实施例中,该终端可以是Redcap终端或者预定版本的新空口NR终端(例如,R17的NR终端)。
这里,边缘使能客户端EEC可以是运行在终端上的应用程序,例如,微信应用程序和微博应用程序等。
在一个实施例中,接收ECS发送的认证能力请求信息;其中,所述认证能力请求信息用于请求所述EES的认证能力信息,其中,所述EES的认证能力信息指示所述EES支持的安全认证方式;所述认证能力请求信息包括EEC的访问网络标识符和/或归属网络标识符,或者,所述认证能力请求信息包括EEC所对应的终端的访问网络标识符和/或归属网络标识符。
在一个实施例中,接收ECS发送的认证能力请求信息;其中,所述认证能力请求信息用于请求所述EES的认证能力信息,其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。向所述ECS发送所述EES的认证能力信息。
在一个实施例中,响应于所述EES未被授权在EEC的访问网络或者归属网络使用认证和密钥管理AKMA,所述EES的认证能力信息中不包含基于AKMA的传输层安全TLS的认证方式;和/或,响应 于所述EES未被授权在EEC所对应终端的访问网络或者归属网络使用AKMA,所述EES的认证能力信息中不包含基于AKMA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC的访问网络或者归属网络使用通用引导框架GBA,所述EES的认证能力信息中不包含基于GBA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC所对应终端的访问网络或者归属网络使用GBA,所述EES的认证能力信息中不包含基于GBA的传输层安全TLS的认证方式。
在一个实施例中,接收ECS发送的认证能力请求信息;其中,所述认证能力请求信息用于请求所述EES的认证能力信息,其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。向EEC的访问网络和/或归属网络发送授权确认信息;接收所述访问网络和/或归属网络发送的授权响应信息,其中,所述授权响应信息指示以下至少之一:所述EEC授权使用AKMA;所述EEC未被授权使用AKMA;所述EEC授权使用GBA;以及所述EEC未被授权使用GBA。需要说明的是,访问网络和归属网络是根据ECS发送的标识符来确定所述授权响应信息的。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图11所示,本实施例中提供一种认证方法,其中,所述方法由边缘配置服务器EES执行,所述方法包括:
步骤111、向EEC的访问网络和/或归属网络发送授权确认信息;
步骤112、接收所述访问网络和/或归属网络发送的授权响应信息,其中,所述授权响应信息指示以下至少之一:
所述EES被授权使用AKMA;
所述EES未被授权使用AKMA;
所述EES被授权使用GBA;以及
所述EES未被授权使用GBA。
在一个实施例中,向EEC的访问网络和/或归属网络发送授权确认信息;接收所述访问网络和/或归属网络发送的授权响应信息,其中,所述授权响应信息指示以下至少之一:所述EES被授权使用AKMA;所述EES未被授权使用AKMA;所述EES被授权使用GBA;以及所述EES未被授权使用GBA。基于所述授权响应信息,向所述ECS发送所述EES的认证能力信息。
在一个实施例中,EEC的访问网络和/或归属网络基于ECS发送的标识信息确定是否授权AKMA和/或GBA,获得确定结果;基于确定结果,确定授权响应信息。需要说明的是,只要EEC的访问网络和归属网络中的二者之一未授权AKMA,AKMA未被授权;和/或,只要EEC的访问网络和归属网络中的二者之一未授权GBA,GBA未被授权。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图12所示,本实施例中提供一种认证方法,其中,所述方法由边缘配置服务器EES执行,所述 方法包括:
步骤121、基于授权响应信息,向所述ECS发送所述EES的认证能力信息。
在一个实施例中,向EEC的访问网络和/或归属网络发送授权确认信息;接收所述访问网络和/或归属网络发送的授权响应信息,其中,所述授权响应信息指示以下至少之一:所述EEC授权使用AKMA;所述EEC未被授权使用AKMA;所述EEC授权使用GBA;以及所述EEC未被授权使用GBA。基于所述授权响应信息,向所述ECS发送所述EES的认证能力信息。
在一个实施例中,其中,响应于所述EES未被授权在EEC的访问网络或者归属网络使用认证和密钥管理AKMA,所述EES的认证能力信息中不包含基于AKMA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC所对应终端的访问网络或者归属网络使用AKMA,所述EES的认证能力信息中不包含基于AKMA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC的访问网络或者归属网络使用通用引导框架GBA,所述EES的认证能力信息中不包含基于GBA的传输层安全TLS的认证方式;和/或,响应于所述EES未被授权在EEC所对应终端的访问网络或者归属网络使用GBA,所述EES的认证能力信息中不包含基于GBA的传输层安全TLS的认证方式。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图13所示,本实施例中提供一种认证方法,其中,所述方法由边缘配置服务器EES执行,所述方法包括:
步骤131、接收ECS发送的认证能力请求信息;其中,所述认证能力请求信息用于请求所述EES的认证能力信息,其中,所述EES的认证能力信息指示所述EES支持的安全认证方式;
步骤132、向所述ECS发送所述EES的认证能力信息。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
为了更好地理解本公开实施例,以下通过一个示例性实施例对本公开技术方案做进一步说明:
示例1:
假设EEC可以配置有ECS的认证能力。ECS的认证能力可以通过ECS配置信息完成与EEC预配置;边缘感知应用客户端(AC,Application Client)可以通过ECS配置信息配置ECS的认证能力;用户可以通过ECS配置信息配置ECS的认证能力。
请参见图14、本实施例中提供一种认证方法,包括:
步骤140、边缘使能客户端EEC可以在注册过程中获得访问网络和归属网络的认证能力。认证能力指示支持的认证机制。所述安全认证方式包括以下至少之一:基于通用引导框架GBA的传输层安全TLS的认证方式;基于应用的认证和密钥管理AKMA的TLS的认证方式;以及基于证书的认证方式。EES可以在EES注册过程中向ECS发送其认证能力。
步骤141、建立TLS连接。EEC根据EEC的认证能力、ECS的认证能力,归属网络的认证能力和 访问网络的认证能力,选择在EEC和ECS之间使用的相互认证方法。在相互认证之后,在EEC和ECS之间建立TLS连接。在步骤141之后,EEC和ECS之间的消息受到保护。
步骤142、发送服务提供请求。为了获得EEC支持的安全认证方法,EEC向ECS发送服务提供请求。服务提供请求包括在EEC授权过程期间接收的EEC的安全凭证,并且可以包括UE标识符,例如,通用公共签约标识(GPSI,Generic Public Subscription Identifier)、连接性信息、UE位置信息和AC配置信息。EEC可以向ECS发送其归属网络标识符。
步骤143、检查EES的认证方式。如果AC配置信息由EEC提供,则ECS基于提供的AC文件信息和UE位置信息识别EES。如果未提供AC配置文件,则:ECS基于ECS处的UE特定服务信息和UE位置信息识别EES;或者,ECS通过应用ECS提供者策略(例如,仅基于UE位置信息)来识别EES;ECS检查其是否具有识别的EES的认证能力。
步骤144、发送认证能力信息。如果ECS具有所识别的EES的认证能力信息,则应跳过步骤145至步骤148。ECS将所识别的EES的认证能力连同用于建立与所识别EES的连接的信息(例如,统一资源标识符(URI,Uniform Resource Identifier)和IP地址)一起发送给EEC。
步骤145、TLS连接建立。如果ECS不具有所识别的EES的认证能力信息,则在EES和ECS之间建立TLS连接。在步骤145之后,EES和ECS之间的消息受到保护。
步骤146、发送EES认证能力请求。为了获得所识别的EES的认证能力,ECS向EES发送EES认证能力请求。ECS可以向EES发送访问网络标识符和归属网络标识符。
步骤147、发送EES的认证能力信息。在接收到认证能力请求后,EES将其认证能力信息发送回ECS。如果EES未被授权在UE(EEC)的受访网络和归属网络中使用AKMA,则EES不应在认证能力信息中包括带有AKMA的TLS。如果EES未被授权在UE(EEC)的受访网络和归属网络中使用GBA,则EES不应将带有GBA的TLS包括在认证能力信息中。
步骤148、发送EES的认证能力信息。ECS将所识别的EES的认证能力连同用于建立到所识别EES的连接的信息(例如,URI和IP地址)一起发送给EEC。
步骤149、选择认证方式。EEC根据EEC的认证能力、EES的认证能力,家庭网络的认证能力和访问网络的认证功能来选择安全认证方式。
步骤150、基于选择的认证方式执行相互认证。EEC根据所选方法触发认证程序。
在一个实施例中,EES可以向ECS发送注册请求信息,并在注册请求信息中包含EES的认证能力信息。ECS从注册请求信息中得到EES的认证能力信息,并将EES的认证能力信息和EES的标识存储在本地。
如图15所示,本实施例中提供一种认证装置,其中,所述装置包括:
发送模块151,被配置为向边缘配置服务器ECS发送服务提供请求信息;
其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。
如图16所示,本实施例中提供一种认证装置,其中,所述装置包括:
接收模块161,被配置为接收EEC发送的服务提供请求信息;
其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图17所示,本实施例中提供一种认证装置,其中,所述装置包括:
接收模块171,被配置为接收ECS发送的认证能力请求信息;
其中,所述认证能力请求信息用于请求所述EES的认证能力信息,其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图18所示,本实施例中提供一种认证系统,其中,所述系统包括EEC、ECS和EES,其中,所述EEC用于实现所述EEC执行的如本公开任一所述的方法;所述ECS用于实现所述ECS执行的如本公开任一所述的方法;所述EES用于实现所述EES执行的如本公开任一所述的方法。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
本公开实施例提供一种通信设备,通信设备,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,处理器被配置为:用于运行可执行指令时,实现应用于本公开任意实施例的方法。
其中,处理器可包括各种类型的存储介质,该存储介质为非临时性计算机存储介质,在通信设备掉电之后能够继续记忆存储其上的信息。
处理器可以通过总线等与存储器连接,用于读取存储器上存储的可执行程序。
本公开实施例还提供一种计算机存储介质,其中,计算机存储介质存储有计算机可执行程序,可执行程序被处理器执行时实现本公开任意实施例的方法。
关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。
如图19所示,本公开一个实施例提供一种终端的结构。
参照图19所示终端800本实施例提供一种终端800,该终端具体可是移动电话,计算机,数字广播终端,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等。
参照图19,终端800可以包括以下一个或多个组件:处理组件802,存储器804,电源组件806, 多媒体组件808,音频组件810,输入/输出(I/O)的接口812,传感器组件814,以及通信组件816。
处理组件802通常控制终端800的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件802可以包括一个或多个处理器820来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件802可以包括一个或多个模块,便于处理组件802和其他组件之间的交互。例如,处理组件802可以包括多媒体模块,以方便多媒体组件808和处理组件802之间的交互。
存储器804被配置为存储各种类型的数据以支持在设备800的操作。这些数据的示例包括用于在终端800上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器804可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电源组件806为终端800的各种组件提供电力。电源组件806可以包括电源管理系统,一个或多个电源,及其他与为终端800生成、管理和分配电力相关联的组件。
多媒体组件808包括在终端800和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件808包括一个前置摄像头和/或后置摄像头。当设备800处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件810被配置为输出和/或输入音频信号。例如,音频组件810包括一个麦克风(MIC),当终端800处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器804或经由通信组件816发送。在一些实施例中,音频组件810还包括一个扬声器,用于输出音频信号。
I/O接口812为处理组件802和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件814包括一个或多个传感器,用于为终端800提供各个方面的状态评估。例如,传感器组件814可以检测到设备800的打开/关闭状态,组件的相对定位,例如组件为终端800的显示器和小键盘,传感器组件814还可以检测终端800或终端800中的一个组件的位置改变,用户与终端800接触的存在或不存在,终端800方位或加速/减速和终端800的温度变化。传感器组件814可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件814还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件814还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件816被配置为便于终端800和其他设备之间有线或无线方式的通信。终端800可以接入基于通信标准的无线网络,如Wi-Fi,2G或3G,或它们的组合。在一个示例性实施例中,通信组件816经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,通信组 件816还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,终端800可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器804,上述指令可由终端800的处理器820执行以完成上述方法。例如,非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
如图20所示,本公开一实施例示出一种基站的结构。例如,基站900可以被提供为一网络侧设备。参照图20,基站900包括处理组件922,其进一步包括一个或多个处理器,以及由存储器932所代表的存储器资源,用于存储可由处理组件922的执行的指令,例如应用程序。存储器932中存储的应用程序可以包括一个或一个以上的每一个对应于一组指令的模块。此外,处理组件922被配置为执行指令,以执行上述方法前述应用在所述基站的任意方法。
基站900还可以包括一个电源组件926被配置为执行基站900的电源管理,一个有线或无线网络接口950被配置为将基站900连接到网络,和一个输入输出(I/O)接口958。基站900可以操作基于存储在存储器932的操作系统,例如Windows Server TM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTM或类似。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本发明的其它实施方案。本公开旨在涵盖本发明的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本发明的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本发明的真正范围和精神由下面的权利要求指出。
应当理解的是,本发明并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本发明的范围仅由所附的权利要求来限制。

Claims (32)

  1. 一种认证方法,其中,所述方法由边缘使能客户端EEC执行,所述方法包括:
    向边缘配置服务器ECS发送服务提供请求信息;
    其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。
  2. 根据权利要求1所述的方法,其中,所述服务提供请求信息包含所述EEC所对应终端的归属网络信息。
  3. 根据权利要求1所述的方法,其中,所述EEC配置有所述ECS的认证能力信息,所述ECS的认证能力信息指示所述ECS支持的安全认证方式。
  4. 根据权利要求1所述的方法,其中,所述ECS的认证能力信息预先配置于所述EEC;或者,所述ECS的认证能力信息由边缘敏感的应用客户端AC配置于所述EEC;或者,所述ECS的认证能力信息由用户配置于所述EEC。
  5. 根据权利要求1所述的方法,其中,所述方法还包括:
    基于第一认证能力信息,确定在所述EEC和所述ECS之间执行相互认证的认证方式;
    其中,所述第一认证能力信息包括以下至少之一:
    EEC支持的认证方式;
    边缘配置服务器ECS支持的安全认证方式;
    归属网络支持的安全认证方式;和,
    访问网络支持的安全认证方式。
  6. 根据权利要求5所述的方法,其中,所述方法还包括:
    响应于所述EEC和所述ECS之间相互认证成功,在所述EEC和所述ECS之间建立传输层安全TLS连接。
  7. 根据权利要求1所述的方法,其中,所述方法还包括:
    接收所述ECS发送的EES的认证能力信息;
    其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。
  8. 根据权利要求7所述的方法,其中,所述接收所述ECS发送的EES的认证能力信息,包括:
    接收所述ECS发送的EES的认证能力信息和用于建立所述ECS与所述EES之间的连接的信息。
  9. 根据权利要求7所述的方法,其中,
    响应于所述EES未被授权在EEC的访问网络或者归属网络使用认证和密钥管理AKMA,所述EES的认证能力信息中不包含基于应用的认证和密钥管理AKMA的传输层安全TLS的认证方式;
    和/或,
    响应于所述EES未被授权在EEC所对应终端的访问网络或者归属网络使用AKMA,所述EES的认证能力信息中不包含基于AKMA的传输层安全TLS的认证方式;
    和/或,
    响应于所述EES未被授权在EEC的访问网络或者归属网络使用通用引导框架GBA,所述EES的认证能力信息中不包含基于GBA的传输层安全TLS的认证方式;
    和/或,
    响应于所述EES未被授权在EEC所对应终端的访问网络或者归属网络使用GBA,所述EES的认证能力信息中不包含基于GBA的传输层安全TLS的认证方式。
  10. 根据权利要求7所述的方法,其中,所述方法还包括:
    基于第二认证能力信息,确定在所述EEC和所述EES之间执行相互认证的认证方式;
    其中,所述第二认证能力信息包括以下至少之一:
    EEC支持的安全认证方式;
    边缘使能服务器EES支持的安全认证方式;
    归属网络支持的安全认证方式;和,
    访问网络支持的安全认证方式。
  11. 一种认证方法,其中,所述方法由边缘配置客户端ECS执行,所述方法包括:
    接收EEC发送的服务提供请求信息;
    其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。
  12. 根据权利要求11所述的方法,其中,所述服务提供请求信息包含所述EEC所对应终端的归属网络信息。
  13. 根据权利要求11所述的方法,其中,所述方法还包括:
    接收所述EES发送的所述EES的认证能力信息;
    其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。
  14. 根据权利要求13所述的方法,其中,所述接收所述EES发送的所述EES的认证能力信息,包括:
    在EES注册过程中,接收所述EES发送的所述EES的认证能力信息。
  15. 根据权利要求13所述的方法,其中,所述方法还包括:
    响应于所述ECS不具有识别的所述EES的认证能力信息,向识别的所述EES发送认证能力请求信息;
    其中,所述认证能力请求信息用于请求所述EES的认证能力信息。
  16. 根据权利要求15所述的方法,其中,所述认证能力请求信息包括EEC的访问网络标识符和/或归属网络标识符,或者,所述认证能力请求信息包括EEC所对应的终端的访问网络标识符和/或归属网络标识符。
  17. 根据权利要求13所述的方法,其中,所述方法还包括:
    响应于所述ECS不具有识别的所述EES的认证能力信息,向所述EES发送认证能力请求信息;
    其中,所述认证能力请求信息包含以下至少之一:
    所述EEC的归属网络信息;
    所述EEC对应终端的归属网络信息;
    所述EEC的拜访地网络信息;和,
    所述EEC对应终端的拜访地网络信息。
  18. 根据权利要求13所述的方法,其中,
    响应于所述EES未被授权在EEC的访问网络或者归属网络使用认证和密钥管理AKMA,所述EES的认证能力信息中不包含基于AKMA的传输层安全TLS的认证方式;
    和/或,
    响应于所述EES未被授权在EEC所对应终端的访问网络或者归属网络使用AKMA,所述EES的认证能力信息中不包含基于AKMA的传输层安全TLS的认证方式;
    和/或,
    响应于所述EES未被授权在EEC的访问网络或者归属网络使用通用引导框架GBA,所述EES的认证能力信息中不包含基于GBA的传输层安全TLS的认证方式;
    和/或,
    响应于所述EES未被授权在EEC所对应终端的访问网络或者归属网络使用GBA,所述EES的认证能力信息中不包含基于GBA的传输层安全TLS的认证方式。
  19. 根据权利要求18所述的方法,其中,所述方法还包括:
    向所述EEC发送识别的所述EES的认证能力信息。
  20. 根据权利要求19所述的方法,其中,所述向所述EEC发送识别的所述EES的认证能力信息,包括:
    向所述EEC发送识别的所述EES的认证能力信息和用于建立所述ECS和所述EES之间的连接的信息。
  21. 一种认证方法,其中,所述方法由边缘使能服务器EES执行,所述方法包括:
    接收ECS发送的认证能力请求信息;
    其中,所述认证能力请求信息用于请求所述EES的认证能力信息,其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。
  22. 根据权利要求21所述的方法,其中,所述认证能力请求信息包括EEC的访问网络标识符和/或归属网络标识符,或者,所述认证能力请求信息包括EEC所对应的终端的访问网络标识符和/或归属网络标识符。
  23. 根据权利要求21所述的方法,其中,所述认证能力请求信息包含以下至少之一:
    所述EEC的归属网络信息;
    所述EEC对应终端的归属网络信息;
    所述EEC的拜访地网络信息;和,
    所述EEC对应终端的拜访地网络信息。
  24. 根据权要求21所述的方法,其中,所述方法还包括:
    向EEC的访问网络和/或归属网络发送授权确认信息;
    接收所述访问网络和/或归属网络发送的授权响应信息,其中,所述授权响应信息指示以下至少之一:
    所述EES被授权使用AKMA;
    所述EES未被授权使用AKMA;
    所述EES被授权使用GBA;以及
    所述EES未被授权使用GBA。
  25. 根据权利要求24所述的方法,其中,所述方法还包括:
    基于所述授权响应信息,向所述ECS发送所述EES的认证能力信息。
  26. 根据权利要求25所述的方法,其中,
    响应于所述EES未被授权在EEC的访问网络或者归属网络使用认证和密钥管理AKMA,所述EES的认证能力信息中不包含基于AKMA的传输层安全TLS的认证方式;
    和/或,
    响应于所述EES未被授权在EEC所对应终端的访问网络或者归属网络使用AKMA,所述EES的认证能力信息中不包含基于AKMA的传输层安全TLS的认证方式;
    和/或,
    响应于所述EES未被授权在EEC的访问网络或者归属网络使用通用引导框架GBA,所述EES的认证能力信息中不包含基于GBA的传输层安全TLS的认证方式;
    和/或,
    响应于所述EES未被授权在EEC所对应终端的访问网络或者归属网络使用GBA,所述EES的认证能力信息中不包含基于GBA的传输层安全TLS的认证方式。
  27. 一种认证装置,其中,所述装置包括:
    发送模块,被配置为向边缘配置服务器ECS发送服务提供请求信息;
    其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。
  28. 一种认证装置,其中,所述装置包括:
    接收模块,被配置为接收EEC发送的服务提供请求信息;
    其中,所述服务提供请求信息用于请求获取边缘使能服务器EES支持的安全认证方式。
  29. 一种认证装置,其中,所述装置包括:
    接收模块,被配置为接收ECS发送的认证能力请求信息;
    其中,所述认证能力请求信息用于请求所述EES的认证能力信息,其中,所述EES的认证能力信息指示所述EES支持的安全认证方式。
  30. 一种认证系统,其中,所述系统包括EEC、ECS和EES,其中,所述EEC用于实现所述EEC执行的如权利要求1至10任一所述的方法;所述ECS用于实现所述ECS执行的如权利要求11至20任一所述的方法;所述EES用于实现所述EES执行的如权利要求21至26任一所述的方法。
  31. 一种通信设备,其中,包括:
    存储器;
    处理器,与所述存储器连接,被配置为通过执行存储在所述存储器上的计算机可执行指令,并能够实现权利要求1至10、11至20或者21至26任一项所述的方法。
  32. 一种计算机存储介质,所述计算机存储介质存储有计算机可执行指令,所述计算机可执行指令被处理器执行后能够实现权利要求1至10、11至20或者21至26任一项所述的方法。
PCT/CN2022/130092 2022-11-04 2022-11-04 认证方法、装置、通信设备及存储介质 WO2024092801A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202280004784.8A CN118302991A (zh) 2022-11-04 2022-11-04 认证方法、装置、通信设备及存储介质
PCT/CN2022/130092 WO2024092801A1 (zh) 2022-11-04 2022-11-04 认证方法、装置、通信设备及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/130092 WO2024092801A1 (zh) 2022-11-04 2022-11-04 认证方法、装置、通信设备及存储介质

Publications (1)

Publication Number Publication Date
WO2024092801A1 true WO2024092801A1 (zh) 2024-05-10

Family

ID=90929522

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/130092 WO2024092801A1 (zh) 2022-11-04 2022-11-04 认证方法、装置、通信设备及存储介质

Country Status (2)

Country Link
CN (1) CN118302991A (zh)
WO (1) WO2024092801A1 (zh)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104660614A (zh) * 2015-03-16 2015-05-27 联想(北京)有限公司 认证方法、电子设备以及服务器
CN106506439A (zh) * 2015-11-30 2017-03-15 杭州华三通信技术有限公司 一种认证终端接入网络的方法和装置
US20200359218A1 (en) * 2019-05-09 2020-11-12 Samsung Electronics Co., Ltd. Apparatus and method for providing mobile edge computing services in wireless communication system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104660614A (zh) * 2015-03-16 2015-05-27 联想(北京)有限公司 认证方法、电子设备以及服务器
CN106506439A (zh) * 2015-11-30 2017-03-15 杭州华三通信技术有限公司 一种认证终端接入网络的方法和装置
US20200359218A1 (en) * 2019-05-09 2020-11-12 Samsung Electronics Co., Ltd. Apparatus and method for providing mobile edge computing services in wireless communication system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on Security Aspects of Enhancement of Support for Edge Computing in 5GC (Release 17)", 3GPP DRAFT; S3-202085, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, 29 August 2020 (2020-08-29), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051922999 *
APPLE: "New solution for EEC authentication and authorization framework with ECS/EES based on GBA", 3GPP DRAFT; S3-213982, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG3, no. e-meeting; 20211108 - 20211119, 1 November 2021 (2021-11-01), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP052073395 *
HUAWEI, HISILICON: "EC: New solution on authentication and authorization between EEC and ECS", 3GPP DRAFT; S3-202483, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG3, no. e-meeting; 20201012 - 20201016, 2 October 2020 (2020-10-02), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051937784 *

Also Published As

Publication number Publication date
CN118302991A (zh) 2024-07-05

Similar Documents

Publication Publication Date Title
WO2024021142A1 (zh) 应用程序接口api认证方法、装置、通信设备及存储介质
WO2024092801A1 (zh) 认证方法、装置、通信设备及存储介质
CN115581125A (zh) 通信设备检测方法、装置、通信设备和存储介质
WO2024164333A1 (zh) 密钥分发方法、装置、通信设备及存储介质
WO2024164337A1 (zh) 定位服务的授权方法、装置、通信设备及存储介质
WO2024164340A1 (zh) Qos监控结果的订阅方法、装置、通信设备及存储介质
WO2024092735A1 (zh) 通信控制方法、系统及装置、通信设备及存储介质
EP4429298A1 (en) Relay communication method and apparatus, communication device, and storage medium
WO2023231018A1 (zh) 个人物联网pin基元凭证配置方法、装置、通信设备及存储介质
WO2024145948A1 (zh) 授权方法、装置、通信设备及存储介质
WO2024197490A1 (zh) 信息处理方法、系统及装置、通信设备及存储介质
WO2023240657A1 (zh) 认证与授权方法、装置、通信设备及存储介质
WO2024031399A1 (zh) Ue加入pin的方法及装置、通信设备及存储介质
WO2024092467A1 (zh) 信息传输方法、装置、通信设备和存储介质
WO2024138444A1 (zh) 信息处理方法以及装置、通信设备及存储介质
US20230014016A1 (en) Voice call method, terminal and storage medium
WO2023164796A1 (zh) 信息处理方法、装置、通信设备及存储介质
WO2024164345A1 (zh) 信息处理方法、系统及装置、通信设备及存储介质
WO2023240574A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2022236602A1 (zh) 能力指示信息的传输方法、装置、通信设备及存储介质
WO2024021137A1 (zh) Api调用者认证方法以及装置、通信设备及存储介质
WO2024207347A1 (zh) 信息传输方法、装置及存储介质
WO2024031391A1 (zh) 测距或侧行链路定位方法、装置、通信设备及存储介质
WO2024000115A1 (zh) Ims会话方法、装置、通信设备及存储介质
WO2023000139A1 (zh) 传输凭证的方法、装置、通信设备及存储介质

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 202280004784.8

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22964103

Country of ref document: EP

Kind code of ref document: A1