WO2024168472A1 - Wireless method and device thereof - Google Patents
Wireless method and device thereof Download PDFInfo
- Publication number
- WO2024168472A1 WO2024168472A1 PCT/CN2023/075699 CN2023075699W WO2024168472A1 WO 2024168472 A1 WO2024168472 A1 WO 2024168472A1 CN 2023075699 W CN2023075699 W CN 2023075699W WO 2024168472 A1 WO2024168472 A1 WO 2024168472A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- access type
- wireless terminal
- network
- registration request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Definitions
- This document is directed generally to wireless communications and in particular to 5G communications.
- a UE user equipment
- PLMNs public land mobile networks
- UE can connect to two different visited networks
- the UE may leverage only one visited network to connect to a target AF, resulting in certain multiple registration problem in an AKMA (Authentication and Key Management for Applications) roaming scenario.
- AKMA Authentication and Key Management for Applications
- This document relates to methods, systems, and devices for multiple registrations, and in particular to methods, systems, and devices for multiple registrations in the AKMA roaming.
- the present disclosure relates to a wireless communication method for use in an anchor function.
- the method comprises:
- the first key registration request comprises a first serving network name of a first visited network and a first access type associated with the first visited network, wherein the first access type is one of a plurality of access types, and
- the first serving network name as a current network corresponding to the first access type for the wireless terminal.
- the plurality of access types comprises a trusted access type and an untrusted access type.
- the wireless communication method further comprises:
- the wireless communication method further comprises:
- the wireless communication method further comprises:
- the second key registration request comprises a second serving network name of a second visited network and a second access type associated with the second visited network, wherein the second access type is one of the plurality of access types and is different from the first access type, and
- the second serving network name as a current network corresponding to the second access type for the wireless terminal.
- the wireless communication method further comprises:
- the wireless communication method further comprises:
- the third key registration request comprises a third serving network name of a third visited network and the first access type associated with the third visited network
- the wireless communication method further comprises:
- the first key registration request further comprises a first anchor key and a first key identifier, wherein method further comprises:
- the wireless communication method further comprises:
- the fourth key registration request comprises a second anchor key and a second key identifier
- the fourth key registration request is associated with a fourth visited network which has a fourth access type different from or the same with the first access type.
- the present disclosure relates to a wireless communication method for use in an authentication server function.
- the method comprises: transmitting, to an anchor function, a first key registration request for a wireless terminal, wherein the first key registration request comprises a first serving network name of a first visited network and a first access type associated with the first visited network, wherein the first access type is one of a plurality of access types.
- the plurality of access types comprises a trusted access type and an untrusted access type.
- the wireless communication method further comprises: transmitting, to the anchor function, a second key registration request for the wireless terminal, wherein the second key registration request comprises a second serving network name of a second visited network and a second access type associated with the second visited network, wherein the second access type is one of the plurality of access types and is different from the first access type.
- the wireless communication method further comprises: transmitting, to the anchor function, a third key registration request for the wireless terminal, wherein the third key registration request comprises a third serving network name of a third visited network and the first access type associated with the third visited network.
- the first key registration request further comprises a first anchor key and a first key identifier.
- the wireless communication method further comprises:
- the fourth key registration request comprises a second anchor key and a second key identifier.
- the fourth key registration request is associated with a fourth visited network which has a fourth access type different from or the same with the first access type.
- the present disclosure relates to a wireless device for an anchor function.
- the wireless device comprises:
- a communication unit configured to receive, from an authentication server function, a first key registration request for a wireless terminal, wherein the first key registration request comprises a first serving network name of a first visited network and a first access type associated with the first visited network, wherein the first access type is one of a plurality of access types, and
- a processor configured to store the first serving network name as a current network corresponding to the first access type for the wireless terminal.
- Various embodiments may preferably implement the following feature:
- the processor is further configured to perform any of aforementioned wireless communication methods.
- the present disclosure relates to a wireless device for authentication server function.
- the wireless device comprises:
- a communication unit configured to transmit, to an anchor function, a first key registration request for a wireless terminal, wherein the first key registration request comprises a first serving network name of a first visited network and a first access type associated with the first visited network, wherein the first access type is one of a plurality of access types.
- Various embodiments may preferably implement the following feature:
- the wireless device further comprises a processor configured to perform any of aforementioned wireless communication methods.
- the present disclosure relates to a computer program product comprising a computer-readable program medium code stored thereupon, the code, when executed by a processor, causing the processor to implement a wireless communication method recited in any one of foregoing methods.
- the present disclosure is not limited to the exemplary embodiments and applications described and illustrated herein. Additionally, the specific order and/or hierarchy of steps in the methods disclosed herein are merely exemplary approaches. Based upon design preferences, the specific order or hierarchy of steps of the disclosed methods or processes can be re-arranged while remaining within the scope of the present disclosure. Thus, those of ordinary skill in the art will understand that the methods and techniques disclosed herein present various steps or acts in a sample order, and the present disclosure is not limited to the specific order or hierarchy presented unless expressly stated otherwise.
- FIG. 1 shows a schematic diagram of a network according to an embodiment of the present disclosure.
- FIGS. 2A to 2C show schematic diagrams of a process according to an embodiment of the present disclosure.
- FIG. 3 shows an example of a schematic diagram of a wireless terminal according to an embodiment of the present disclosure.
- FIG. 4 shows an example of a schematic diagram of a wireless network node according to an embodiment of the present disclosure.
- FIG. 5 shows a flowchart of a method according to an embodiment of the present disclosure.
- FIG. 6 shows a flowchart of a method according to an embodiment of the present disclosure.
- FIG. 1 shows an SBA (Service Based Architecture) of 5GS (5G system) for a roaming UE accessing application function.
- the 5GS shown in FIG. 1 comprises the following network functions (NF) :
- the Access and Mobility Management function includes functionalities such as: UE mobility management, reachability management, connection management, etc.
- the Security Anchor Function (SEAF) in the serving network stores the anchor key called the KSEAF provided by the AUSF of the home network.
- the KSEAF is derived from keying material generated by the primary authentication and key agreement procedure.
- the Authentication Server Function supports authentication for 3GPP access and untrusted non-3GPP access.
- the AUSF provides a Subscription Permanent Identifier (SUPI) and AKMA key material (e.g., AKMA key ID (A-KID) and/or AKMA Anchor Key (K AKMA ) ) of the UE to the AAnF.
- SUPI Subscription Permanent Identifier
- AKMA key material e.g., AKMA key ID (A-KID) and/or AKMA Anchor Key (K AKMA )
- A-KID AKMA key ID
- K AKMA AKMA Anchor Key
- the AKMA Anchor Function stores the AKMA key materials (e.g., K AKMA and/or the SUPI) of the UE for the AKMA service, where the AKMA key material is received from the AUSF after the UE completes a successful 5G primary authentication.
- the AAnF also generates the AKMA key material to be used between the UE and the Application Function (AF) and maintains UE AKMA contexts.
- the AAnF sends the SUPI of the UE to the AF located inside the network of the network operator according to a request from the or sends the SUPI to the network exposure function (NEF) .
- the Unified Data Management stores the subscription profile for the UEs.
- the UDM stores AKMA subscription data of the subscriber.
- the UE can connect to two different visited networks, the UE may leverage only one visited network to connect to a target AF. Under such conditions, certain multiple registration problems in the AKMA roaming scenario may emerge.
- the UE firstly registers with a VPLMN1 through a 3GPP access (e.g. trusted access) and the AAnF stores an SN-name of the VPLMN1.
- the AAnF can transfer the AKMA key information to NF (s) in the VPLMN1.
- the AAnF overwrites the SN-name of the VPLMN1 and stores the SN-name of the VPLMN2. In this case, no matter the UE initiates the AKMA service through the VPLMN1 or the VPLMN2, the AAnF always transfers the AKMA key information to NF (s) in the VPLMN2. If the VPLMN1 is configured with the supervisory service, the supervisory service cannot be implemented.
- the AAnF when the UE roams from the VPLMN1 to another VPLMN3 through the 3GPP access, the AAnF overwrites the SN-name of the VPLMN2 and stores the SN-name of the VPLMN3 if the primary authentication is triggered. Under such conditions, no matter whether the UE initiates the AKMA service through the VPLMN2 or the VPLMN3, the AAnF always transfers the AKMA key information to NF (s) in the VPLMN3. If the supervisory service is set on the VPLMN2, the supervisory service cannot be implemented.
- the AAnF stores a parameter “Access Type” , to indicate whether the access is via 3GPP/non-3GPP access.
- the AAnF stores the latest corresponding SN-name information.
- the access type may not be limited to the 3GPP access (e.g., trusted access) or non-3GPP access (untrusted access) and may comprise other types of access.
- the AAnF transfers the AKMA key material to the VPLMN (s) based on the latest SN-name information of each access type. If there is the latest SN-name information for just single Access Type, the AAnF transfers the AKMA key material to the VPLMN with this SN-name. If there is the latest SN-name information for multiple Access Types (e.g., 3GPP access and non-3GPP access) , the AAnF transfers the AKMA key material to the multiple VPLMNs according to the latest SN-name information.
- the latest SN-name information for multiple Access Types e.g., 3GPP access and non-3GPP access
- FIGS. 2A to 2C show schematic diagrams of a process according to an embodiment of the present disclosure.
- the process shown in FIGS. 2A to 2C comprises the following steps:
- Steps 1-8 in FIG. 2A The UE registers with the VPLMN1 through the 3GPP Access Type.
- Step 1 The UE is authenticated through the 3GPP Access Type in a VPLMN1.
- Step 2 After AKMA key material is generated, the AUSF selects an AAnF, sends the generated A-KID1, K AKMA , the SN-name of the VPLMN1 and corresponding Access Type (i.e., 3GPP Access Type) to the AAnF together with the SUPI of the UE by using the Naanf_AKMA_KeyRegistration Request service operation.
- A-KID1 the generated A-KID1
- K AKMA the SN-name of the VPLMN1
- corresponding Access Type i.e., 3GPP Access Type
- Step 3 The AAnF stores the latest information sent by the AUSF. Note that the stored information includes the SN-name and corresponding Access Type of the VPLMN1.
- Step 4 The AAnF sends a response to the AUSF by using the Naanf_AKMA_AnchorKey_Register Response service operation.
- Step 5 The UE generates the K AKMA and the A-KID1 received from the K AUSF before initiating communications with an AKMA Application Function (AF) .
- AF AKMA Application Function
- the UE includes the derived A-KID1 in an Application Session Establishment Request message.
- the UE may derive a K AF before sending the message or afterwards.
- Step 6 If the AF does not have an active context associated with the A-KID1, the AF selects the AAnF and sends a Naanf_AKMA_ApplicationKey_Get request to the AAnF with the A-KID1, to request the K AF for the UE.
- the AF may also include its identity (i.e., AF_ID) in the request.
- Step 7 The AAnF derives the K AF from the K AKMA if the AAnF does not have the K AF .
- the AAnF needs to push the AKMA key material to an NF of the VPLMN1 based on the SN-name of VPLMN1 if the AAnF is required to provide supervisory information to the VPLMN1.
- the NF in the VPLMN1 to which the AKMA key material is pushed may be an AMF, an AAnF or other new NF in the VPLMN1.
- Step 8 The AAnF sends a Naanf_AKMA_ApplicationKey_Get response to the AF with the SUPI, K AF and the K AF expiration time.
- Steps 9-16 in FIG. 2B If the UE wants to register with a VPLMN2 through a non-3GPP Access Type at the same time, steps 9-16 are executed.
- Step 9 The UE is authenticated through the non-3GPP Access Type in the VPLMN2.
- Step 10 After the AKMA key material is generated, the AUSF sends the generated A-KID2, new K AKMA , the SN-name of the VPLMN2 and corresponding Access Type (i.e., non-3GPP access) to the AAnF together with the SUPI of the UE by using the Naanf_AKMA_KeyRegistration Request service operation.
- Step 11 The AAnF overwrites the K AKMA as the newly received one, overwrites the A-KID1 as A-KID2 and stores the SN-name and the corresponding Access Type of the VPLMN2.
- the AAnF checks whether it has the SN-name information corresponding to the received Access Type and the SUPI. If there is no existing SN-name information corresponding to this Access Type and the SUPI, the AAnF stores the SN-name and the corresponding Access Type.
- Step 12 The AAnF sends the response to the AUSF by using the Naanf_AKMA_AnchorKey_Register Response service operation.
- Step 13 The UE generates a new K AKMA and the A-KID2 from the K AUSF before initiating communications with the AKMA AF and overwrites the K AKMA and A-KID1 generated in step 5.
- the UE includes the derived A-KID2 in the Application Session Establishment Request message.
- the UE may derive K AF from the new K AKMA before sending the message or afterwards.
- Step 14 If the AF does not have an active context associated with the A-KID2, the AF sends a Naanf_AKMA_ApplicationKey_Get request to the AAnF with the A-KID2 to request the K AF for the UE.
- the AF may also include its identity (i.e., AF_ID) in the request.
- Step 15 The AAnF derives the K AF from K AKMA if the AAnF does not have the K AF . Note that the AAnF needs to push the AKMA key material to the NFs in both VPLMN1 and VPLMN2 based on the SN-names and corresponding Access Types it has stored if the AAnF is required to provide the supervisory information.
- the NF may be the AMF, the AAnF or other new NF in the VPLMN1 and/or the VPLMN2.
- Step 16 The AAnF sends Naanf_AKMA_ApplicationKey_Get response to the AF with the SUPI, the K AF and the K AF expiration time.
- Steps 17-24 in FIG. 2C If the UE roams from the VPLMN1 to another VPLMN3 and registers through the 3GPP access, steps 17 to 24 are executed.
- Step 17 The UE is authenticated through the 3GPP Access Type in the VPLMN3.
- Step 18 After AKMA key material is generated, the AUSF sends the generated A-KID3, new K AKMA , the SN-name of the VPLMN3 and the corresponding Access Type to the AAnF together with the SUPI of the UE by using the Naanf_AKMA_KeyRegistration Request service operation.
- Step 19 The AAnF overwrites the K AKMA as the newly received one, overwrites the A-KID2 as the A-KID3, and overwrites the stored SN-name and the corresponding Access Type of the VPLMN1 as the received SN-name and the Access Type of the VPLMN3.
- the AAnF checks whether it has the SN-name information corresponding to the received Access Type (i.e., 3GPP access type) and the SUPI. Since there is existing SN-name information corresponding to the received Access Type, the AAnF overwrites the SN-name as the received SN-name of the VPLMN3.
- the AAnF overwrites the SN-name as the received SN-name of the VPLMN3.
- Step 20 The AAnF sends the response to the AUSF by using the Naanf_AKMA_AnchorKey_Register Response service operation.
- Step 21 The UE generates a new K AKMA and the A-KID3 from the K AUSF before initiating communication with an AKMA Application Function, and overwrites the K AKMA and A-KID2 generated in step 13.
- the UE initiates AKMA service via VPLMN2 or VPLMN3 to communicate with the AKMA AF
- the UE includes the derived A-KID3 in the Application Session Establishment Request message.
- the UE may derive K AF from the new K AKMA before sending the message or afterwards.
- Step 22 If the AF does not have an active context associated with the A-KID3, the AF sends a Naanf_AKMA_ApplicationKey_Get request to the AAnF with the A-KID3 to request the K AF for the UE.
- the AF may also include its identity (i.e., AF_ID) in the request.
- Step 23 The AAnF derives the K AF from the K AKMA if the AAnF does not have K AF .
- AAnF needs to push the AKMA key material to the NFs in both the VPLMN2 and the VPLMN3 NF based on the SN-names and the corresponding Access Types it has stored if the AAnF is required to provide the supervisory information.
- the NFs in the VPLMN2 and/or VPLMN3 may be the AMF, the AAnF or other new NF in the VPLMN2 and/or VPLMN3.
- Step 24 The AAnF sends the Naanf_AKMA_ApplicationKey_Get response to the AF with the SUPI, K AF and the K AF expiration time.
- FIG. 3 relates to a schematic diagram of a wireless terminal 30 according to an embodiment of the present disclosure.
- the wireless terminal 30 may be a user equipment (UE) , a mobile phone, a laptop, a tablet computer, an electronic book or a portable computer system and is not limited herein.
- the wireless terminal 30 may include a processor 300 such as a microprocessor or Application Specific Integrated Circuit (ASIC) , a storage unit 310 and a communication unit 320.
- the storage unit 310 may be any data storage device that stores a program code 312, which is accessed and executed by the processor 300.
- Embodiments of the storage unit 310 include but are not limited to a subscriber identity module (SIM) , read-only memory (ROM) , flash memory, random-access memory (RAM) , hard-disk, and optical data storage device.
- SIM subscriber identity module
- ROM read-only memory
- RAM random-access memory
- the communication unit 320 may a transceiver and is used to transmit and receive signals (e.g., messages or packets) according to processing results of the processor 300.
- the communication unit 320 transmits and receives the signals via at least one antenna 322 shown in FIG. 3.
- the storage unit 310 and the program code 312 may be omitted and the processor 300 may include a storage unit with stored program code.
- the processor 300 may implement any one of the steps in exemplified embodiments on the wireless terminal 30, e.g., by executing the program code 312.
- the communication unit 320 may be a transceiver.
- the communication unit 320 may as an alternative or in addition be combining a transmitting unit and a receiving unit configured to transmit and to receive, respectively, signals to and from a wireless network node (e.g., a base station) .
- a wireless network node e.g., a base station
- FIG. 4 relates to a schematic diagram of a wireless network node 40 according to an embodiment of the present disclosure.
- the wireless network node 40 may be a satellite, a base station (BS) , a network entity, a Mobility Management Entity (MME) , Serving Gateway (S-GW) , Packet Data Network (PDN) Gateway (P-GW) , a radio access network (RAN) node, a next generation RAN (NG-RAN) node, a gNB, an eNB, a gNB central unit (gNB-CU) , a gNB distributed unit (gNB-DU) a data network, a core network or a Radio Network Controller (RNC) , and is not limited herein.
- BS base station
- MME Mobility Management Entity
- S-GW Serving Gateway
- PDN Packet Data Network Gateway
- RAN radio access network
- NG-RAN next generation RAN
- gNB next generation RAN
- gNB next generation RAN
- the wireless network node 40 may comprise (perform) at least one network function such as an access and mobility management function (AMF) , a session management function (SMF) , a user place function (UPF) , a policy control function (PCF) , an application function (AF) , etc.
- the wireless network node 40 may include a processor 400 such as a microprocessor or ASIC, a storage unit 410 and a communication unit 420.
- the storage unit 410 may be any data storage device that stores a program code 412, which is accessed and executed by the processor 400. Examples of the storage unit 410 include but are not limited to a SIM, ROM, flash memory, RAM, hard-disk, and optical data storage device.
- the communication unit 420 may be a transceiver and is used to transmit and receive signals (e.g., messages or packets) according to processing results of the processor 400.
- the communication unit 420 transmits and receives the signals via at least one antenna 422 shown in FIG. 4.
- the storage unit 410 and the program code 412 may be omitted.
- the processor 400 may include a storage unit with stored program code.
- the processor 400 may implement any steps described in exemplified embodiments on the wireless network node 40, e.g., via executing the program code 412.
- the communication unit 420 may be a transceiver.
- the communication unit 420 may as an alternative or in addition be combining a transmitting unit and a receiving unit configured to transmit and to receive, respectively, signals to and from a wireless terminal (e.g., a user equipment or another wireless network node) .
- a wireless terminal e.g., a user equipment or another wireless network node
- FIG. 5 shows a flowchart of a method according to an embodiment of the present disclosure.
- the method shown in FIG. 5 may be used in an anchor function (e.g., AAnF, a wireless device comprising the AAnF or a wireless device performing at least part of functionalities of the AAnF) and comprises the following step:
- an anchor function e.g., AAnF, a wireless device comprising the AAnF or a wireless device performing at least part of functionalities of the AAnF
- Step 501 Receive, from an AUSF, a first key registration request for a wireless terminal, wherein the first key registration request comprises a first serving network name of a first visited network and a first access type associated with the first visited network.
- Step 502 Store the first serving network name as a current network corresponding to the first access type for the wireless terminal.
- the anchor function receives a first key registration request (e.g., Naanf_AKMA_KeyRegistration Request) for a wireless terminal (e.g., UE) from an AUSF.
- the first key registration request comprises a first serving network name of a first visited network (e.g., VPLMN) and a first access type associated with the first visited network.
- the first access type is one of a plurality of access types.
- the anchor function stores the first serving network name as a current network corresponding to the first access type for the wireless terminal. That is the anchor function records the latest serving network name of each access type for the wireless terminal.
- the serving network name may be replaced by any serving network information associated with (e.g., able to distinguish) the visited network.
- the anchor function is in a home network (e.g., HPLMN) .
- the plurality of access types comprises a trusted access type (e.g., 3GPP access type) and an untrusted access type (e.g., non-3GPP access type) .
- a trusted access type e.g., 3GPP access type
- an untrusted access type e.g., non-3GPP access type
- the anchor function transmits key information (e.g., K AKMA and A-KID) of the wireless terminal to a plurality of network functions based on the current networks corresponding to the plurality of access types.
- the network function may be the AMF or AUSF in the corresponding network.
- the anchor function transmits the key information of the wireless terminal in response to a reception of a key acquisition request for the wireless terminal from an AF (in the home network) .
- the anchor function receives a second key registration request for the wireless terminal from the AUSF.
- the second key registration request comprises a second serving network name of a second visited network and a second access type associated with the second visited network.
- the second access type is one of the plurality of access types and is different from the first access type.
- the anchor function stores the second serving network name as a current network corresponding to the second access type for the wireless terminal. Note that, because the second access type is different from the first access type, the anchor function does not overwrite the current network corresponding to the first access type by the second serving network name (i.e., second visited network) . Under such conditions, if the anchor function needs to transmit the key information of the wireless terminal (e.g.
- the anchor function transmits the key information of the wireless terminal to a first network function of the current network corresponding to the first access type (i.e., first visited network) and to a second network function of the current network corresponding to the second access type (i.e., second visited network) .
- the anchor function receives a third key registration request for the wireless terminal from the AUSF.
- the third key registration request comprises a third serving network name of a third visited network and a third access type associated with the second visited network.
- the third access type is equal to the first access type.
- the anchor function stores the third serving network name as the current network corresponding to the first/third access type for the wireless terminal. Note that, because the third access type and the first access type are the same, the anchor function overwrites the current network corresponding to the first access type by the third serving network name (i.e., third visited network) . Under such conditions, if the anchor function needs to transmit the key information of the wireless terminal (e.g.
- the anchor function transmits the key information of the wireless terminal to a third network function of the current network corresponding to the first/third access type (i.e., third visited network) and to the second network function of the current network corresponding to the second access type (i.e., second visited network) .
- the first key registration request further comprises a first anchor key (e.g., K AKMA ) and a first key identifier (e.g., A-KID) and the anchor function stores the first anchor key as a current anchor key of the wireless terminal and stores the first anchor key identifier as a current anchor key identifier of the wireless terminal.
- a first anchor key e.g., K AKMA
- a first key identifier e.g., A-KID
- the anchor function receives, from the AUSF, a fourth key registration request (e.g., either the second key registration request or the third key registration request) for the wireless terminal.
- the fourth key registration request comprises a second anchor key (e.g., K AKMA ) and a second key identifier (e.g., A-KID) .
- the anchor function stores the second anchor key as the current anchor key of the wireless terminal and stores the second anchor key identifier as the current anchor key identifier of the wireless terminal.
- the fourth key registration request is associated with a fourth visited network (e.g., having a fourth SN name of the fourth visited network) which has a fourth access type different from or the same with the first access type.
- the anchor function always overwrites the anchor key and the key identifier (i.e., key information) by the anchor key and the key identifier comprised in the latest/received key registration request.
- FIG. 6 shows a flowchart of a method according to an embodiment of the present disclosure.
- the method shown in FIG. 6 may be used in an AUSF (e.g., a wireless device comprising the AUSF or the wireless device performing at least part of functionalities of the AUSF) and comprises the following step:
- Step 601 Transmit, to an anchor function, a first key registration request for a wireless terminal, wherein the first key registration request comprises a first serving network name of a first visited network and a first access type associated with the first visited network.
- the AUSF transmits a first key registration request for a wireless terminal (e.g. UE) to an anchor function (e.g., AAnF) .
- the first key registration request comprises a first serving network name of a first visited network and a first access type associated with the first visited network.
- the first access type is one of a plurality of access types.
- the plurality of access types comprises a trusted access type (e.g., 3GPP access type) and an untrusted access type (e.g., non-3GPP access type) .
- a trusted access type e.g., 3GPP access type
- an untrusted access type e.g., non-3GPP access type
- the AUSF further transmits a second key registration request for the wireless terminal to the anchor function.
- the second key registration request comprises a second serving network name of a second visited network and a second access type associated with the second visited network.
- the second access type is one of the plurality of access types and is different from the first access type.
- the AUSF further transmits a third key registration request for the wireless terminal to the anchor function.
- the third key registration request comprises a third serving network name of a third visited network and a third access type associated with the third visited network.
- the third access type is one of the plurality of access types and is the same with the first access type.
- the first key registration request further comprises a first anchor key (e.g., K AKMA ) and a first key identifier (A-KID) .
- a first anchor key e.g., K AKMA
- A-KID first key identifier
- the AUSF transmits a fourth key registration request for the wireless terminal to the anchor function.
- the fourth key registration request comprises a second anchor key (e.g., K AKMA ) and a second key identifier (A-KID) .
- the fourth key registration request is associated with a fourth visited network which has a fourth access type different from or the same with the first access type.
- any reference to an element herein using a designation such as “first, “ “second, “ and so forth does not generally limit the quantity or order of those elements. Rather, these designations can be used herein as a convenient means of distinguishing between two or more elements or instances of an element. Thus, a reference to first and second elements does not mean that only two elements can be employed, or that the first element must precede the second element in some manner.
- any one of the various illustrative logical blocks, units, processors, means, circuits, methods and functions described in connection with the aspects disclosed herein can be implemented by electronic hardware (e.g., a digital implementation, an analog implementation, or a combination of the two) , firmware, various forms of program or design code incorporating instructions (which can be referred to herein, for convenience, as "software” or a “software unit” ) , or any combination of these techniques.
- a processor, device, component, circuit, structure, machine, unit, etc. can be configured to perform one or more of the functions described herein.
- IC integrated circuit
- DSP digital signal processor
- ASIC application specific integrated circuit
- FPGA field programmable gate array
- the logical blocks, units, and circuits can further include antennas and/or transceivers to communicate with various components within the network or within the device.
- a general purpose processor can be a microprocessor, but in the alternative, the processor can be any conventional processor, controller, or state machine.
- a processor can also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other suitable configuration to perform the functions described herein. If implemented in software, the functions can be stored as one or more instructions or code on a computer-readable medium. Thus, the steps of a method or algorithm disclosed herein can be implemented as software stored on a computer-readable medium.
- Computer-readable media includes both computer storage media and communication media including any medium that can be enabled to transfer a computer program or code from one place to another.
- a storage media can be any available media that can be accessed by a computer.
- such computer-readable media can include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to store desired program code in the form of instructions or data structures and that can be accessed by a computer.
- unit refers to software, firmware, hardware, and any combination of these elements for performing the associated functions described herein. Additionally, for purpose of discussion, the various units are described as discrete units; however, as would be apparent to one of ordinary skill in the art, two or more units may be combined to form a single unit that performs the associated functions according embodiments of the present disclosure.
- memory or other storage may be employed in embodiments of the present disclosure.
- memory or other storage may be employed in embodiments of the present disclosure.
- any suitable distribution of functionality between different functional units, processing logic elements or domains may be used without detracting from the present disclosure.
- functionality illustrated to be performed by separate processing logic elements, or controllers may be performed by the same processing logic element, or controller.
- references to specific functional units are only references to a suitable means for providing the described functionality, rather than indicative of a strict logical or physical structure or organization.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (23)
- A wireless communication method for use in an anchor function, the method comprising:receiving, from an authentication server function, a first key registration request for a wireless terminal, wherein the first key registration request comprises a first serving network name of a first visited network and a first access type associated with the first visited network, wherein the first access type is one of a plurality of access types, andstoring the first serving network name as a current network corresponding to the first access type for the wireless terminal.
- The wireless communication method of claim 1, wherein the plurality of access types comprises a trusted access type and an untrusted access type.
- The wireless communication method of claim 1 or 2, further comprising:receiving, from an application function, a key acquisition request for the wireless terminal, andtransmitting key information of the wireless terminal to a plurality of network functions based on the current networks corresponding to the plurality of access types.
- The wireless communication method of any of claims 1 to 3, further comprising:receiving, from an application function, a key acquisition request for the wireless terminal, andtransmitting key information of the wireless terminal to a first network function of the current network corresponding to the first access type.
- The wireless communication method of any of claims 1 to 4, further comprising:receiving, from the authentication server function, a second key registration request for the wireless terminal, wherein the second key registration request comprises a second serving network name of a second visited network and a second access type associated with the second visited network, wherein the second access type is one of the plurality of access types and is different from the first access type, andstoring the second serving network name as a current network corresponding to the second access type for the wireless terminal.
- The wireless communication method of claim 5, further comprising:receiving, from an application function, a key acquisition request for the wireless terminal, andtransmitting key information of the wireless terminal to a first network function of the current network corresponding to the first access type, andtransmitting the key information of the wireless terminal to a second network function of the current network corresponding to the second access type.
- The wireless communication method of any of claims 1 to 6, further comprising:receiving, from the authentication server function, a third key registration request for the wireless terminal, wherein the third key registration request comprises a third serving network name of a third visited network and the first access type associated with the third visited network, andstoring the third serving network name as the current network corresponding to the first access type for the wireless terminal.
- The wireless communication method of claim 7, further comprising:receiving, from an application function, a key acquisition request for the wireless terminal, andtransmitting key information of the wireless terminal to a third network function of the current network corresponding to the first access type, andtransmitting the key information of the wireless terminal to a second network function of the current network corresponding to the second access type.
- The wireless communication method of any of claims 1 to 8, wherein the first key registration request further comprises a first anchor key and a first key identifier, and wherein the method further comprises:storing the first anchor key as a current anchor key of the wireless terminal, andstoring the first anchor key identifier as a current anchor key identifier of the wireless terminal.
- The wireless communication method of claim 9, further comprising:receiving, from the authentication server function, a fourth key registration request for the wireless terminal, wherein the fourth key registration request comprises a second anchor key and a second key identifier,storing the second anchor key as the current anchor key of the wireless terminal, andstoring the second anchor key identifier as the current anchor key identifier of the wireless terminal.
- The wireless communication method of claim 10, wherein the fourth key registration request is associated with a fourth visited network which has a fourth access type different from or the same with the first access type.
- A wireless communication method for use in an authentication server function, the method comprising:transmitting, to an anchor function, a first key registration request for a wireless terminal, wherein the first key registration request comprises a first serving network name of a first visited network and a first access type associated with the first visited network, wherein the first access type is one of a plurality of access types.
- The wireless communication method of claim 12, wherein the plurality of access types comprises a trusted access type and an untrusted access type.
- The wireless communication method of claim 12 or 13, further comprising:transmitting, to the anchor function, a second key registration request for the wireless terminal, wherein the second key registration request comprises a second serving network name of a second visited network and a second access type associated with the second visited network, wherein the second access type is one of the plurality of access types and is different from the first access type.
- The wireless communication method of any of claims 12 to 14, further comprising:transmitting, to the anchor function, a third key registration request for the wireless terminal, wherein the third key registration request comprises a third serving network name of a third visited network and the first access type associated with the third visited network.
- The wireless communication method of any of claims 12 to 15, wherein the first key registration request further comprises a first anchor key and a first key identifier.
- The wireless communication method of any of claims 12 to 16, further comprising:transmitting, to the anchor function, a fourth key registration request for the wireless terminal, wherein the fourth key registration request comprises a second anchor key and a second key identifier.
- The wireless communication method of claim 17, wherein the fourth key registration request is associated with a fourth visited network which has a fourth access type different from or the same with the first access type.
- A wireless device for an anchor function, the wireless device comprising:a communication unit, configured to receive, from an authentication server function, a first key registration request for a wireless terminal, wherein the first key registration request comprises a first serving network name of a first visited network and a first access type associated with the first visited network, wherein the first access type is one of a plurality of access types, anda processor, configured to store the first serving network name as a current network corresponding to the first access type for the wireless terminal.
- The wireless device of claim 19, wherein the processor is further configured to perform the wireless communication method of any of claims 2 to 11.
- A wireless device for an authentication server function, the wireless device comprising:a communication unit, configured to transmit, to an anchor function, a first key registration request for a wireless terminal, wherein the first key registration request comprises a first serving network name of a first visited network and a first access type associated with the first visited network, wherein the first access type is one of a plurality of access types.
- The wireless device of claim 21, further comprising a processor configured to perform the wireless communication method of any of claims 13 to 18.
- A computer program product comprising a computer-readable program medium code stored thereupon, the code, when executed by a processor, causing the processor to implement a wireless communication method recited in any one of claims 1 to 18.
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2023/075699 WO2024168472A1 (en) | 2023-02-13 | 2023-02-13 | Wireless method and device thereof |
| CN202380083060.1A CN120359791A (en) | 2023-02-13 | 2023-02-13 | Wireless method and apparatus therefor |
| EP23921645.0A EP4609655A4 (en) | 2023-02-13 | 2023-02-13 | WIRELESS METHOD AND DEVICE THEREFOR |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2023/075699 WO2024168472A1 (en) | 2023-02-13 | 2023-02-13 | Wireless method and device thereof |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2024168472A1 true WO2024168472A1 (en) | 2024-08-22 |
Family
ID=92421323
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2023/075699 Ceased WO2024168472A1 (en) | 2023-02-13 | 2023-02-13 | Wireless method and device thereof |
Country Status (3)
| Country | Link |
|---|---|
| EP (1) | EP4609655A4 (en) |
| CN (1) | CN120359791A (en) |
| WO (1) | WO2024168472A1 (en) |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20210029660A1 (en) * | 2018-03-28 | 2021-01-28 | Nec Corporation | Handling of temporary non access stratum parameters during registration procedure for the ue supporting registration to the network using 3gpp network access and non-3gpp network access |
| CN112586047A (en) * | 2018-08-09 | 2021-03-30 | 诺基亚技术有限公司 | Method and apparatus for securely implementing a connection over a heterogeneous access network |
| US20220124479A1 (en) * | 2020-10-21 | 2022-04-21 | Oracle International Corporation | Methods, systems, and computer readable media for validating a session management function (smf) registration request |
| CN114390667A (en) * | 2020-10-21 | 2022-04-22 | 华为技术有限公司 | Network registration method |
| CN114788322A (en) * | 2020-05-22 | 2022-07-22 | 维沃移动通信有限公司 | Communication method, mobile device and network entity |
Family Cites Families (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114208278B (en) * | 2019-07-09 | 2023-12-12 | 欧芬诺有限责任公司 | Method, device and system for network reselection during disasters |
-
2023
- 2023-02-13 EP EP23921645.0A patent/EP4609655A4/en active Pending
- 2023-02-13 WO PCT/CN2023/075699 patent/WO2024168472A1/en not_active Ceased
- 2023-02-13 CN CN202380083060.1A patent/CN120359791A/en active Pending
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20210029660A1 (en) * | 2018-03-28 | 2021-01-28 | Nec Corporation | Handling of temporary non access stratum parameters during registration procedure for the ue supporting registration to the network using 3gpp network access and non-3gpp network access |
| CN112586047A (en) * | 2018-08-09 | 2021-03-30 | 诺基亚技术有限公司 | Method and apparatus for securely implementing a connection over a heterogeneous access network |
| CN114788322A (en) * | 2020-05-22 | 2022-07-22 | 维沃移动通信有限公司 | Communication method, mobile device and network entity |
| US20220124479A1 (en) * | 2020-10-21 | 2022-04-21 | Oracle International Corporation | Methods, systems, and computer readable media for validating a session management function (smf) registration request |
| CN114390667A (en) * | 2020-10-21 | 2022-04-22 | 华为技术有限公司 | Network registration method |
Non-Patent Citations (1)
| Title |
|---|
| See also references of EP4609655A4 * |
Also Published As
| Publication number | Publication date |
|---|---|
| EP4609655A1 (en) | 2025-09-03 |
| CN120359791A (en) | 2025-07-22 |
| EP4609655A4 (en) | 2025-10-22 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2021031065A1 (en) | A method of registration with access and mobility management function re-allocation | |
| US11388661B2 (en) | Network slice configuration update | |
| US12471050B2 (en) | Wireless communication method for registration procedure | |
| US20240334186A1 (en) | Method for ue-to-network relay security in proximity-based services | |
| US20220400460A1 (en) | Communication method for controlling packet data unit session | |
| US20230379704A1 (en) | Method for slice-specific authentication and authorization status transmission | |
| US20240314886A1 (en) | Method for slice resource release | |
| WO2024168472A1 (en) | Wireless method and device thereof | |
| WO2023137761A1 (en) | Method for slice resource release | |
| WO2025156435A1 (en) | Method, device and computer program product for wireless communication | |
| WO2025043389A1 (en) | Method, device and computer program product for wireless communication | |
| US20240236668A9 (en) | Method, device and computer program product for wireless communication | |
| WO2024230021A1 (en) | Wireless communication method and device thereof | |
| US20240224159A1 (en) | Method for per access type network slice admission control | |
| US20240349177A1 (en) | Method for network selection based on slice information | |
| WO2025236499A1 (en) | Systems and methods for authentication and key management for applications service disabling | |
| US20240098674A1 (en) | Method, device and computer program product for wireless communication | |
| WO2024109059A1 (en) | Method,device and computer program product for wireless communication | |
| WO2022233030A1 (en) | A method for network slice admission control | |
| US20250048459A1 (en) | Method for edge computing | |
| US20240171963A1 (en) | Method, device and computer program product for wireless communication | |
| WO2022147737A1 (en) | A method for notification of disaster condition | |
| WO2020253948A1 (en) | Session management function selection policy with limited assistance information provided by a user equipment |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23921645 Country of ref document: EP Kind code of ref document: A1 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2023921645 Country of ref document: EP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 202380083060.1 Country of ref document: CN |
|
| ENP | Entry into the national phase |
Ref document number: 2023921645 Country of ref document: EP Effective date: 20250529 |
|
| WWP | Wipo information: published in national office |
Ref document number: 202380083060.1 Country of ref document: CN |
|
| WWP | Wipo information: published in national office |
Ref document number: 2023921645 Country of ref document: EP |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |